发明名称 SENSITIVE OPERATION VERIFICATION METHOD, APPARATUS, AND SYSTEM
摘要 The present disclosure discloses a sensitive operation verification method, apparatus, and system, and belongs to the field of network security. The method includes: acquiring encrypted verification information on an operating terminal; decrypting the encrypted verification information according to decryption information corresponding to a user account to obtain verification information; receiving a result of verification that is performed on the sensitive operation by a user according to the verification information; encrypting the verification result according to encryption information corresponding to the user account to obtain an encrypted verification result; and providing the encrypted verification result to the operating terminal, so that the operating terminal feeds back the encrypted verification result to the server, and after the server detects that the encrypted verification result is that the verification succeeds, the server authorizes the operating terminal to execute the sensitive operation.
申请公布号 US2016301530(A1) 申请公布日期 2016.10.13
申请号 US201615184596 申请日期 2016.06.16
申请人 TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED 发明人 He Xiao
分类号 H04L9/32;G06K7/10;H04L29/06 主分类号 H04L9/32
代理机构 代理人
主权项 1. A sensitive operation verification method, applied to an auxiliary terminal, the method comprising: acquiring encrypted verification information on an operating terminal, the encrypted verification information being information that is encrypted and used for verifying a sensitive operation of a user account, which is fed back by a server to the operating terminal after the operating terminal applies to the server for the sensitive operation; decrypting the encrypted verification information according to decryption information corresponding to the user account to obtain verification information; receiving a result of verification that is performed on the sensitive operation by a user according to the verification information; encrypting the verification result according to encryption information corresponding to the user account to obtain an encrypted verification result; and providing the encrypted verification result to the operating terminal, so that the operating terminal feeds back the encrypted verification result to the server, and after the server detects that the encrypted verification result is that the verification succeeds, the server authorizes the operating terminal to execute the sensitive operation.
地址 SHENZHEN CN