User data processing method, intelligent terminal, server and storage medium

A technology for user data and processing methods, applied in the computer field, can solve problems such as illegal registration, verification code leakage, account binding, etc., to achieve the effect of improving security and overcoming security defects

Active Publication Date: 2021-10-15
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] If the user's SMS verification code is transmitted to the server for verification in plain text, it may be intercepted by packet capture, which will lead to the leakage of the verification code. The hijacker can maliciously tamper with the user's request within a certain validity period, resulting in a series of information security problems. , such as security issues such as illegal registration and illegal account binding caused by the verification code being intercepted and tampered with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User data processing method, intelligent terminal, server and storage medium
  • User data processing method, intelligent terminal, server and storage medium
  • User data processing method, intelligent terminal, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In application scenarios such as user registration, user account binding, and user data submission, verification processing based on verification codes may be involved. The network-side device that provides verification codes prompts users for verification codes, including SMS verification codes and picture verification. Code, or even voice verification code, etc. After the client receives the corresponding text message or picture or voice data, it can automatically or manually extract characters from the text message, and identify characters from pictures and voice to be verified. After obtaining the verification code, the obtained verification code can be further processed accordingly to ensure the security of the subsequent processing.

[0055] In the embodiment of the present invention, the client can directly use the verification code as the authentication key or the value after processing the verification code as the authentication key (for example, the hash value ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses a user data processing method, an intelligent terminal, and a server, wherein the method includes: receiving authentication user data generated by a client, the authentication user data including: user identification and authentication encryption data, the The authentication encrypted data is obtained after encrypting the authentication information in the client according to the authentication key, and the authentication key is obtained according to the verification code obtained by the client; code, and decrypt the authentication encrypted data according to the found verification code; if the authentication information is successfully decrypted, it is determined that the authentication of the client is passed, and the authentication return packet data is generated; The authentication return packet data is used to trigger the client to send service information according to the authentication return packet data. By adopting the present invention, the safety of verification based on the verification code can be better guaranteed.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a user data processing method, an intelligent terminal, a server and a storage medium. Background technique [0002] With the development of computer application technology and network technology, people can basically surf the Internet anytime and anywhere, and participate in various network activities, such as participating in social activities, shopping activities, financial activities and so on. In the process of participating in various network activities, verification code operations are generally involved. [0003] The verification code can generally be sent to a mobile terminal by SMS from a server that provides verification services, and the user who performs the verification code operation fills in the verification code and then sends it to a server that provides other services, such as a server that provides user registration or provides The server for user a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/08H04L63/083
Inventor 刘亚运王维富
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products