Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method, client and server

An identity verification and client-side technology, which is applied in the fields of client, identity verification, and server, and can solve problems such as the method of program cracking without image recognition technology

Active Publication Date: 2020-06-23
中国移动通信集团广西有限公司 +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The drawing information does not propose to adopt the form of animation. It is to display all the drawing requirements in the drawing area at one time and ask the user to execute it, and it does not propose how to avoid being cracked by the program of image recognition technology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, client and server
  • Identity authentication method, client and server
  • Identity authentication method, client and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some of the embodiments of the present invention, rather than all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0059] figure 1 The structure of a system architecture applicable to the embodiment of the present invention is exemplarily shown, and the system architecture may include a client 100 and a server 200 , and the client 100 may communicate with the server 200 .

[0060]Wherein, the client 100 may include an Internet component 110 , a content display component 120 , an image processor 130 , a computing component 140 , a storage component 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method, a client and a server. The method comprises the steps that a client obtains a verification drawing requirement instruction set sent by a server, wherein the drawing requirement verification instruction set comprises a multi-step drawing requirement for indicating a user to draw, a verification threshold value of each step and prompt information of each step; wherein the verification drawing requirement instruction set is a verification drawing requirement instruction set which is randomly generated by the server after receiving a verification request sent by the client and corresponds to the client, determining a verification result according to the verification drawing requirement instruction set, and sending the verification result to the server. According to the embodiment of the invention, the complexity and confidentiality of drawing verification of a user are enriched through a multiplexing multimedia technology, and cracking of an image recognition program can be better avoided.

Description

technical field [0001] The embodiment of the present invention relates to the field of user verification, in particular to an identity verification method, a client, and a server. Background technique [0002] The current identity verification scheme is that the user terminal obtains the drawing verification information carrying the drawing pattern and then sends the drawing verification information to the server, the server verifies the drawing verification information, and sends the verified verification result to the user terminal, and the user terminal When the verification result is that the verification of the drawing verification information is successful, it is determined that the identity verification is passed. The drawing information does not propose to be in the form of animation. It is to display all the drawing requirements in the drawing area at one time and ask the user to execute it, and does not propose a method to avoid being cracked by the image recogniti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/36
CPCH04L63/08G06F21/36H04L67/60
Inventor 黄翊凇杨疆梁耿韦佩华白雪伟
Owner 中国移动通信集团广西有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products