Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Verification method, device and system

A verification method and technology for verifying requests, applied in the field of verification methods, devices and systems, can solve problems such as property loss and information leakage, and achieve the effect of protecting security

Active Publication Date: 2018-07-06
SHENZHEN TENCENT COMP SYST CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem of information leakage or property loss that may be caused once user information is illegally obtained by hackers, the embodiment of the present invention provides a verification method, device and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method, device and system
  • Verification method, device and system
  • Verification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0048] Please refer to figure 1 , which shows a method flowchart of a verification method provided by an embodiment of the present invention. This verification method includes:

[0049] Step 101, receiving a verification request, the verification request carries a user ID and a first terminal ID, and the first terminal ID is the terminal ID of the terminal sending the verification request;

[0050] The verification server receives the verification request, where the verification request carries the user identifier and the first terminal identifier, where the first terminal identifier is the terminal identifier of the terminal sending the verification request.

[0051] Step 102, querying whether there is a second terminal identifier b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a verification method, device and system, belonging to the field of network technology. The method includes: receiving a verification request, the verification request carrying a user ID and a first terminal ID, the first terminal ID being the terminal ID of the terminal sending the verification request; querying whether there is a second terminal ID bound to the user ID; Detecting whether the first terminal ID is the same as the second terminal ID; if the first terminal ID is the same as the second terminal ID, it is determined that the authentication of the user ID is passed. The present invention verifies the user ID by detecting whether the terminal ID of the terminal sending the verification request is the same as the terminal ID bound with the user ID by the verification server; it solves the information leakage or property that may be caused once the user information is obtained illegally by hackers. The problem of loss; it has achieved the effect of further protecting the safety of user information and property.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a verification method, device and system. Background technique [0002] With the development of network applications, users use network accounts to perform services such as games, transactions and data interaction on terminals more and more widely. The "terminal" mentioned here can be any one of desktop computers, notebooks, smart phones, tablet computers and e-book readers. [0003] In the process of using a network account by a user, identity verification is required for security reasons. An existing verification method includes: first, the user uses a terminal to send user information to the verification server, and the user information is used to identify the user's identity, usually including a user name and password; secondly, the verification server receives the user information sent by the terminal, and then Query the corresponding password according to the use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/08H04L2101/69H04L67/52
Inventor 胡帅王玉叶左海波秦铭雪廖锡光贺啸
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products