Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security verification method and security verification system

A security verification and verification code technology, which is applied in the field of security verification methods and security verification systems, can solve problems such as weak anti-risk capabilities, and achieve the effect of improving anti-risk capabilities

Pending Publication Date: 2022-03-25
GUANGZHOU PINWEI SOFTWARE
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing verification mechanism has weak anti-risk ability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security verification method and security verification system
  • Security verification method and security verification system
  • Security verification method and security verification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0054] The existing verification mechanism has weak anti-risk ability. For example, when a hacker learns that the current client has a verification mechanism, he can use certain technical means to bypass the entire verification code verification process and directly enter the next link.

[0055] Therefore, it is necessary to study a method that can prevent hackers from bypassing the verification code verification process and improve the anti-risk...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the security verification method and the security verification system provided by the invention, after the server receives and verifies the verification code input result returned by the client and returns the verification information to the client, the verification information returned by the server contains the verification result of the verification code input result and the ticket value, so that the verification result of the verification code input result can be verified; and if the current client user does not execute the verification process, the client cannot obtain the ticket value returned by the server, sends an instruction for requesting the ticket value to the server, and performs secondary verification on the ticket value in the verification information by using the ticket value returned at this time, if the client cannot perform secondary verification, the current verification process is not passed, and if the current verification process is not passed, the client does not perform secondary verification on the ticket value in the verification information. Therefore, hackers can be effectively prevented from bypassing the verification code verification process, and the anti-risk capability of a verification mechanism is further improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a security verification method and a security verification system. Background technique [0002] At present, in order to ensure the security of information, most of various applications have introduced authentication mechanisms, such as verification codes. Among them, verification codes are widely used in various application programs as a public automatic program to distinguish between man and machine. [0003] However, the existing verification mechanism has weak anti-risk ability. For example, when a hacker learns that the current client has a verification mechanism, he can use certain technical means to bypass the entire verification code verification process and directly enter the next link. [0004] Therefore, it is necessary to study a method that can prevent hackers from bypassing the verification code verification process and improve the anti-risk capability...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/44G06F21/45
CPCG06F21/44G06F21/45
Inventor 姚伟强
Owner GUANGZHOU PINWEI SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products