Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification method, verification device, terminal and server

A verification method and verification device technology, applied in the field of computer information, can solve problems such as improving the difficulty of user self-identification, reducing judgment ability, etc., to reduce spiritual or economic losses, accurate results, and reduce the possibility of brute force cracking Effect

Active Publication Date: 2020-09-29
ZICT TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, for the verification method of graphic verification codes, cracking through coding platforms has been widely used in some specific groups of people, which reduces the ability of traditional verification solutions to judge whether the operation instructions are issued by humans. , in order to solve the above problems, the method adopted is to add distortion or blur effects to the pictures and texts, so as to distinguish whether the operation instructions are issued by humans, but it will inevitably increase the difficulty of the user's own recognition

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method, verification device, terminal and server
  • Verification method, verification device, terminal and server
  • Verification method, verification device, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0055] In the following description, many specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways different from those described here, therefore, the protection scope of the present invention is not limited to the specific details disclosed below. EXAMPLE LIMITATIONS.

[0056] Such as figure 1 As shown, a schematic flowchart of a verification method for a server according to an embodiment of the present invention:

[0057] Step 102, receiving a verification request sen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a verification method, a verification device, a terminal, and a server. The verification method for the server comprises the following steps: receiving a verification request sent by the terminal; generating first verification information according to the verification request and transmitting the first verification information to the terminal; transmitting the additional information to the terminal; receiving the execution result transmitted by the terminal; determining a verification signal according to the execution result; and transmitting the verification signal to the terminal. The verification method provided by the invention can reduce the possibility of violent deciphering in a verification process without increasing a user's difficulty with identification when the user authenticates certain operations on the terminal, and further more accurately discriminate the execution results from a person to a machine, therefore, effectively minimizing the possibility of metal and economic losses incurred by deciphering software or violent deciphering of hackers.

Description

technical field [0001] The present invention relates to the field of computer information technology, in particular, to a verification method, a verification device, a terminal and a server. Background technique [0002] When it is necessary to judge whether some operation instructions are issued by human beings, the proposed solutions usually use graphic verification codes, mobile phone SMS verification codes or mobile phone voice verification codes for verification. Among the above solutions, graphic verification codes are , due to its low cost, stability, and easy implementation, it occupies a large market space. At the same time, for the verification method of graphic verification codes, cracking through coding platforms has been widely used in some specific groups of people, which reduces the ability of traditional verification solutions to judge whether the operation instructions are issued by humans. , in order to solve the above problems, the method adopted is to ad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807
Inventor 刘畅
Owner ZICT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products