Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Operation authentication method and device, storage medium and electronic device

An authentication method and operation request technology, applied in the computer field, can solve problems such as poor portability, user forgetting, and no solution proposed

Inactive Publication Date: 2020-08-25
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In practice, it has been found that for the first method of operation authentication, there is a situation where the SMS verification code is stolen, resulting in unreliable operation authentication; for the second method of operation authentication, there is a problem that the security token is inconvenient to carry Problem: For the third method of operation authentication, there are too many passwords that cause users to forget, which leads to unreliable operation authentication
In summary, the current method of operating authentication has the problems of low reliability and poor portability
[0004] For the above problems, no effective solution has been proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation authentication method and device, storage medium and electronic device
  • Operation authentication method and device, storage medium and electronic device
  • Operation authentication method and device, storage medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0029] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an operation authentication method and device, a storage medium and an electronic device. The method comprises the steps of acquiring a resource operation request sent by a target device, wherein the resource operation request is used for indicating an application client running by using a target account in the target device to request to execute resource operation; obtaining a first target password input by the target device under the condition that the target device is determined to be a binding device of the target account according to the resource operation request;under the condition that the first target password is matched with a verification password of a target account stored in a server, obtaining a first dynamic password dynamically generated for the resource processing operation by a token development kit in the target equipment; and under the condition that the first dynamic password is matched with a second dynamic password generated by the server, setting the permission of executing the resource operation by the target device to be allowed to be executed, the second dynamic password being used for verifying the resource operation. According to the invention, the reliability and portability of operation authentication can be improved.

Description

technical field [0001] The present invention relates to the field of computers, in particular to an operation authentication method, device, storage medium and electronic device. Background technique [0002] At present, in the case of online fund transactions, operation certification is often required, and risky operations such as transfers are performed only after the operation certification is passed. [0003] Currently, there are three main methods of operation authentication: the first method of operation authentication requires password verification and SMS verification code verification, and the second method of operation authentication requires password verification and security token verification , the third way to perform operation authentication is to enter multiple passwords such as login password and payment password to perform multi-password authentication. In practice, it has been found that for the first method of operation authentication, there is a situati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40
CPCG06Q20/4014
Inventor 卢仕培蔡洁鸿张锋
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products