Method, device and system for identity verification
A technology of identity verification and verification code, which is applied in the field of Internet communication and can solve the problems of reducing the interception rate of automatic machines
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] see figure 1 , the embodiment of the present invention provides a method for identity verification, including:
[0047] Step 101: Generate a verification code, the verification code includes at least a reference graphic and a first graphic, the reference graphic includes a plurality of block elements, the first graphic is a graphic obtained by removing at least one block element from the reference graphic, or the second A graphic is a graphic obtained by disturbing the block elements included in the reference graphic;
[0048]Step 102: Send the verification code to the terminal, so that the terminal obtains a second figure obtained by the user's collage of the first figure according to the reference figure, and compares the second figure with the reference figure to obtain a comparison result;
[0049] Step 103: Receive the user ID of the user and the comparison result sent by the terminal, and determine whether the user verification corresponding to the user ID of the...
Embodiment 2
[0066] The embodiment of the present invention provides an identity verification method.
[0067] When the user needs to log in to the server, the server generates a verification code, the verification code includes a reference graphic and a first graphic, the reference graphic includes a plurality of block elements, and the first graphic is obtained by removing at least one block element from the reference graphic Then, the server verifies the identity of the user according to the verification code and executes the following method flow, and if the verification is passed, the user is allowed to log in to the server.
[0068] see diagram 2-1 , the method flow may include:
[0069] Step 201: The server receives the login request message sent by the terminal, the login request message carries the user ID of the user, and then performs step 202;
[0070] For example, the server receives a login request message sent by the terminal, and the login request message carries the use...
Embodiment 3
[0101] The embodiment of the present invention provides an identity verification method.
[0102] When the user needs to log in to the server, the server generates a verification code, the verification code includes a reference graphic and a first graphic, the reference graphic includes a plurality of block elements, and the first graphic is a graphic obtained by disturbing the block elements included in the reference graphic, Then the server verifies the identity of the user according to the verification code and by executing the following method flow, and if the verification is passed, the user is allowed to log in to the server.
[0103] see Figure 3-1 , the method flow may include:
[0104] Step 301: The server receives the login request message sent by the terminal, the login request message carries the user ID of the user, and then executes step 302;
[0105] For example, the server receives a login request message sent by the terminal, and the login request message c...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com