Safety verification method and device, server and terminal

A security verification and server technology, applied in the fields of servers and terminals, security verification methods, and devices, can solve problems such as poor reliability, and achieve the effect of improving reliability and ensuring access security.

Inactive Publication Date: 2016-03-30
ALIBABA GRP HLDG LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a security verification method, device, server and terminal to solve the problem of poor reliability of security verification methods in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification method and device, server and terminal
  • Safety verification method and device, server and terminal
  • Safety verification method and device, server and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0048] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety verification method and device, a server and a terminal. The method comprises the following steps: receiving a safety verification request sent by the terminal; returning original verification information to the terminal according to the safety verification request; receiving first conversion verification information returned by the terminal, wherein the first conversion verification information is the verification information input to the terminal by a user after the original verification information is converted based on preset verification rules; and when the first conversion verification information is identical to second conversion verification information, determining that the user passes safety verification. According to the safety verification method and device, the server and the terminal, the terminal carries out safety verification through the verification rules obtained through negotiation with the server; since a malicious third party cannot obtain the verification rules, the malicious third party cannot finish the safety verification even thought the third party obtains the original verification codes; and therefore, reliability of safety verification can be improved, and network application access safety is ensured.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a security verification method, device, server and terminal. Background technique [0002] With the development of smart terminals and the development of network applications, users can access various network applications through various application clients installed on the terminal. During the access process, users often need to perform identity authentication, membership registration, network transactions, etc. , at this time, the application server will send verification information such as verification text messages and verification emails to the terminal held by the user, so that the user can pass the security verification of the application server after entering the dynamic verification code carried in the verification information. , enabling access to the web application. [0003] However, the dynamic verification code carried in the verification info...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/08G06F21/44H04L9/3271H04L63/105H04L63/20G06F21/31
Inventor 吴燕萍
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products