摘要:
Identity authentication comprises: determining, in response to a request from a first device operated by a source user, that an identity authentication is to be performed for the source user; identifying a target user who is deemed to satisfy at least a preset condition, the target user being a user other than the source user; generating validation information to authenticate identity of the source user; sending the validation information to a second device operated by the target user; receiving a validation response from the first device operated by the source user; and performing identity authentication, including verifying whether the validation response received from the first device operated by the source user matches the validation information sent to the second device.
摘要:
A method and an apparatus of identifying a proxy IP address. The method includes determining a first network delay between a server and a terminal that establishes a TCP connection with the server using an IP address as a user IP address; determining a second network delay between the server and a router that is a hop prior to the IP address; determining whether a ratio between the first network delay and the second network delay is greater than a threshold; and identifying the IP address as a proxy IP address when the ratio between the first network delay and the second network delay is greater than the threshold. Using the technical solution of the present disclosure, identifying whether an IP address is a proxy IP address can be made quickly and accurately.
摘要:
Provided are a data communication method and device, the method comprising: receiving a plugin execution instruction transmitted by a server according to a first channel, the plugin execution instruction being used to instruct to operate a target plugin; according to the plugin execution instruction, calling the target plugin to operate, and feeding back operation result data to the server via the first channel for processing, such that the server feeds back a processing result to a browser. The present invention realizes the compatibility of each browser.
摘要:
An identity authentication method is provided. The method comprises receiving request information transmitted by an online terminal device for determining neighbor network devices and determining at least one neighbor network device of the online terminal device according to the request information, identifying at least one credible neighbor network device of the online terminal device from the at least one neighbor network device and identifying at least one weighted neighbor network device of the online terminal device from the at least one neighbor network device, and computing a credibility score of the online terminal device according to a number of the credible neighbor network device and a number of the weighted neighbor network device, generating authentication notification information according to the credibility score, the authentication notification information indicating whether the online terminal device passes identity authentication, and transmitting the authentication notification information to the online terminal device.
摘要:
Operation identification is obtained from a captured barcode. An authentication criterion is determined whether is satisfied. If the authentication criterion is met, the operation identification and stored account information is sent to server for authenticating based on the account information. The authentication criterion includes whether a similarity degree between an image characteristic of a first surrounding image of a barcode and an image characteristic of a second surrounding image of the barcode is larger than or equal to a present threshold. The second surrounding image is an authenticated surrounding image of the barcode such as a surrounding image when the barcode is generated. The present techniques ensure that a successful authentication is possibly returned only when the first surrounding image is in consistent with the second image. It is difficult for the barcode placed on a fake webpage or sent through group sending by a hacker to pass authentication.