Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identity verification method, device and system

An identity verification method and a technology for verifying information, which are applied in the field of devices and systems, and identity verification methods, and can solve problems such as error-prone user input, complex verification methods, and long time required

Active Publication Date: 2016-02-03
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Since the user is required to perform steps such as reading text messages and filling in verification information in sequence during identity verification, this verification method is more complicated, takes a long time, and is prone to errors during the user input process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method, device and system
  • Identity verification method, device and system
  • Identity verification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0086] Before explaining the embodiment of the present invention in detail, the application scenario of the embodiment of the present invention is briefly introduced. see figure 1 , the typical application scenario of the embodiment of the present invention is: when the user performs sensitive operations such as login account, password change, point exchange, account retrieval, and payment consumption on the first terminal (sensitive operation execution terminal) 101, in order to ensure that the sensitive operation Triggered by the user himself, the verification server 103 usually sends verification information to the second terminal (mobile terminal) 102 that is pre-bound with the user account, and confirms the identity of the user ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity verification method, device and system, belonging to the technical field of information processing. The method comprises the following steps: receiving first verification information sent by a verification server when a first terminal initiates a sensitive operation and sends a request for obtaining first application verification information based on an account number of a user to the verification server, wherein the first verification information comprises a verification character string and the account number of the user; extracting the verification character string and the account number of the user from the first verification information; and sending the verification character string to a first application server relative to the account number of the user, such that the verification server verifies the verification character string sent by a second terminal after obtaining the verification character string sent by the second terminal from the first application server. According to the invention, users are unnecessary to read short messages, fill in the verification information and the like while being verified; therefore, the verification information is automatically filled in; the verification manner is relatively simple; the required time is short; and the disadvantages that mistakes are easily made due to manual input of users can be avoided.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to an identity verification method, device and system. Background technique [0002] At present, when performing sensitive operations such as credit card consumption, account login, and point exchange on the Internet, in order to protect the user's property security, the verification server usually sends a text message including verification information to the terminal bound with the user account in advance, and then passes the verification. Authentication information is used to verify the identity to determine whether the sensitive operation is triggered by the user himself. [0003] In the prior art, after the terminal receives the short message sent by the verification server, the terminal user reads the short message to obtain the verification information, and then the user manually inputs the verification information in the corresponding input box on the web page. Af...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
Inventor 王小叶郭计伟秦雷王峰
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products