TWI817674B - Two-steps authentication method and two-steps authentication system - Google Patents

Two-steps authentication method and two-steps authentication system Download PDF

Info

Publication number
TWI817674B
TWI817674B TW111131944A TW111131944A TWI817674B TW I817674 B TWI817674 B TW I817674B TW 111131944 A TW111131944 A TW 111131944A TW 111131944 A TW111131944 A TW 111131944A TW I817674 B TWI817674 B TW I817674B
Authority
TW
Taiwan
Prior art keywords
response
electronic device
user
step verification
prompt message
Prior art date
Application number
TW111131944A
Other languages
Chinese (zh)
Other versions
TW202409864A (en
Inventor
姚勝雄
曹淩帆
Original Assignee
宏碁股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宏碁股份有限公司 filed Critical 宏碁股份有限公司
Priority to TW111131944A priority Critical patent/TWI817674B/en
Application granted granted Critical
Publication of TWI817674B publication Critical patent/TWI817674B/en
Publication of TW202409864A publication Critical patent/TW202409864A/en

Links

Images

Abstract

A two-steps authentication method and a two-steps authentication system are disclosed. The method includes: collecting contact interaction information related to a first user; activating a two-steps authentication for the first user; presenting a first prompt message through a first electronic device; in response to that a first response from the first electronic device for the first prompt message meets a fist condition, presenting a second prompt message through a second electronic device according to the contact interaction information, wherein an owner bound to the second electronic device is not the first user; and in response to that a second response from the second electronic device for the second prompt message meets a second condition, determining that the first passes the two-steps authentication.

Description

二步驟驗證方法與二步驟驗證系統Two-step verification method and two-step verification system

本發明是有關於一種身分認證技術,且特別是有關於一種二步驟驗證方法與二步驟驗證系統。The present invention relates to an identity authentication technology, and in particular to a two-step verification method and a two-step verification system.

在網路相當普及的時代,帳號的安全性非常重要。目前利用手機來進行登入帳號時的二步驟驗證,是時下讓帳號登入時多一層保護的方法。然而,人們總是會有手機不在身邊或者手機沒電的時候。當沒有手機但需要進行二步驟驗證時,似乎就沒有方法可以通過驗證。因此,如何透過其他人的手機等輔助驗證裝置來替代使用者本人的手機來進行二步驟驗證,實為相關領域技術人員所致力的課題之一。In an era where the Internet is quite popular, account security is very important. Currently, using mobile phones to perform two-step verification when logging in to an account is a current method to provide an additional layer of protection when logging in to an account. However, there are always times when people are not around their mobile phones or their batteries are out of battery. When two-step verification is required without a phone, there seems to be no way to pass it. Therefore, how to use other people's mobile phones and other auxiliary verification devices to replace the user's own mobile phone to perform two-step verification is actually one of the topics that technicians in the related field are dedicated to.

本發明提供一種二步驟驗證方法與二步驟驗證系統,可在滿足相關的安全需求的前提下,給外出忘記攜帶手機或手機沒電的使用者帶來更多關於身分驗證的便利性。The present invention provides a two-step verification method and a two-step verification system, which can bring more convenience in identity verification to users who forget to bring their mobile phones when going out or whose mobile phones are out of battery on the premise of meeting relevant security requirements.

本發明的實施例提供一種二步驟驗證方法,其包括:蒐集與第一使用者有關的聯絡人互動資訊;啟動針對所述第一使用者的二步驟驗證;經由第一電子裝置呈現第一提示訊息;響應於所述第一電子裝置針對所述第一提示訊息的第一回應符合第一條件,根據所述聯絡人互動資訊,經由第二電子裝置呈現第二提示訊息,其中所述第二電子裝置所綁定的擁有者非為所述第一使用者;以及響應於所述第二電子裝置針對所述第二提示訊息的第二回應符合第二條件,判定第一電子裝置的使用者通過所述二步驟驗證。Embodiments of the present invention provide a two-step verification method, which includes: collecting contact interaction information related to a first user; initiating a two-step verification for the first user; and presenting a first prompt through the first electronic device Message; in response to the first response of the first electronic device to the first prompt message meeting the first condition, a second prompt message is presented via the second electronic device according to the contact interaction information, wherein the second The owner bound to the electronic device is not the first user; and in response to the second response of the second electronic device to the second prompt message meeting the second condition, determining the user of the first electronic device Pass the two-step verification.

本發明的實施例另提供一種二步驟驗證系統,其包括儲存電路與處理器。所述處理器耦接至所述儲存電路。所述處理器用以:蒐集與第一使用者有關的聯絡人互動資訊並將該聯絡人互動資訊儲存於該儲存電路;啟動針對所述第一使用者的二步驟驗證;經由第一電子裝置呈現第一提示訊息;響應於所述第一電子裝置針對所述第一提示訊息的第一回應符合第一條件,根據所述聯絡人互動資訊,經由第二電子裝置呈現第二提示訊息,其中所述第二電子裝置所綁定的擁有者非為所述第一使用者;以及響應於所述第二電子裝置針對所述第二提示訊息的第二回應符合第二條件,判定第一電子裝置的使用者通過所述二步驟驗證。An embodiment of the present invention further provides a two-step verification system, which includes a storage circuit and a processor. The processor is coupled to the storage circuit. The processor is used to: collect contact interaction information related to the first user and store the contact interaction information in the storage circuit; initiate a two-step verification for the first user; present via the first electronic device A first prompt message; in response to the first response of the first electronic device to the first prompt message meeting the first condition, a second prompt message is presented via the second electronic device according to the contact interaction information, wherein the The owner bound to the second electronic device is not the first user; and in response to the second response of the second electronic device to the second prompt message meeting the second condition, it is determined that the first electronic device of users passed the two-step verification.

基於上述,本發明的實施例提供的二步驟驗證方法與二步驟驗證系統,可蒐集與第一使用者有關的聯絡人互動資訊。在啟動針對第一使用者的二步驟驗證後,根據所述聯絡人互動資訊及第一電子裝置針對第一提示訊息的第一回應,可進一步經由第二電子裝置來完成對於第一使用者的二步驟驗證。特別是,第二電子裝置的擁有者非為第一使用者。藉此,可在滿足相關的安全需求的前提下,給外出忘記攜帶手機或手機沒電的使用者帶來更多關於身分驗證的便利性。Based on the above, the two-step verification method and the two-step verification system provided by embodiments of the present invention can collect contact interaction information related to the first user. After activating the two-step verification for the first user, based on the contact interaction information and the first response of the first electronic device to the first prompt message, the second electronic device can further complete the verification for the first user. Two-step verification. In particular, the owner of the second electronic device is not the first user. In this way, it can bring more convenience in identity verification to users who forget to bring their mobile phones when they go out or when their mobile phones are out of battery, while meeting relevant security requirements.

圖1是根據本發明的實施例所繪示的二步驟驗證系統的示意圖。請參照圖1,二步驟驗證系統10可設置於智慧型手機、平板電腦、筆記型電腦、桌上型電腦或工業用電腦等各式可作為伺服器主機的電腦裝置中,且所述電腦裝置的類型不限於此。FIG. 1 is a schematic diagram of a two-step verification system according to an embodiment of the present invention. Referring to Figure 1, the two-step verification system 10 can be installed in various computer devices that can serve as server hosts, such as smartphones, tablet computers, notebook computers, desktop computers or industrial computers, and the computer device The type is not limited to this.

二步驟驗證系統10可包括處理器11、儲存電路12及輸入/輸出(Input/Output, I/O)裝置13。處理器11可用以負責二步驟驗證系統10的整體或部分運作。例如,處理器11可包括中央處理單元(Central Processing Unit, CPU)或是其他可程式化之一般用途或特殊用途的微處理器、數位訊號處理器(Digital Signal Processor, DSP)、可程式化控制器、特殊應用積體電路(Application Specific Integrated Circuits, ASIC)、可程式化邏輯裝置(Programmable Logic Device, PLD)或其他類似裝置或這些裝置的組合。The two-step verification system 10 may include a processor 11, a storage circuit 12, and an input/output (I/O) device 13. The processor 11 may be responsible for the entire or partial operation of the two-step verification system 10 . For example, the processor 11 may include a central processing unit (CPU) or other programmable general-purpose or special-purpose microprocessor, digital signal processor (Digital Signal Processor, DSP), programmable control devices, Application Specific Integrated Circuits (ASIC), Programmable Logic Device (PLD) or other similar devices or a combination of these devices.

儲存電路12耦接至處理器11並用以儲存資料。例如,儲存電路12可包括揮發性儲存電路與非揮發性儲存電路。揮發性儲存電路用以揮發性地儲存資料。例如,揮發性儲存電路可包括隨機存取記憶體(Random Access Memory, RAM)或類似的揮發性儲存媒體。非揮發性儲存電路用以非揮發性地儲存資料。例如,非揮發性儲存電路可包括唯讀記憶體(Read Only Memory, ROM)、固態硬碟(solid state disk, SSD)、傳統硬碟(Hard disk drive, HDD)、快閃記憶體(flash memory)、嵌入式多媒體卡(embedded MultiMedia Card, eMMC)、通用快閃儲存(Universal Flash Storage, UFS)裝置或類似的非揮發性儲存媒體。The storage circuit 12 is coupled to the processor 11 and used to store data. For example, storage circuit 12 may include volatile storage circuits and non-volatile storage circuits. Volatile storage circuits are used to store data volatilely. For example, the volatile storage circuit may include random access memory (RAM) or similar volatile storage media. Non-volatile storage circuits are used to store data in a non-volatile manner. For example, non-volatile storage circuits may include read only memory (ROM), solid state disk (SSD), traditional hard disk drive (HDD), flash memory (flash memory) ), embedded MultiMedia Card (eMMC), Universal Flash Storage (UFS) device or similar non-volatile storage media.

輸入/輸出裝置13耦接至處理器11並可用以傳輸訊號。例如,輸入/輸出裝置13可包括網路介面卡、顯示器、滑鼠、鍵盤、觸控螢幕、觸控板及揚聲器等各式具訊號傳輸功能的介面電路,且輸入/輸出裝置13的類型不限於此。The input/output device 13 is coupled to the processor 11 and can be used to transmit signals. For example, the input/output device 13 may include various interface circuits with signal transmission functions such as network interface cards, monitors, mice, keyboards, touch screens, touch pads, and speakers, and the type of the input/output device 13 varies. Limited to this.

處理器11可經由輸入/輸出裝置13蒐集與特定使用者(亦稱為第一使用者)有關的聯絡人互動資訊101。例如,聯絡人互動資訊101可反映第一使用者平時透過社交媒體、電子郵件程式及/或即時通訊程式等互動程式與其他使用者互動的狀態。例如,聯絡人互動資訊101可反映第一使用者平時透過社交媒體、電子郵件程式及/或即時通訊程式等互動程式與其他使用者之間進行文字交談、語音交談、線上互動(例如對特定使用者在社群媒體上的貼文按讚、留言或在社群媒體上標記特定使用者等)、電子郵件往來的時間、頻率及/或內容。處理器11可將聯絡人互動資訊101儲存於儲存電路12中以供後續查詢使用。The processor 11 can collect contact interaction information 101 related to a specific user (also referred to as the first user) via the input/output device 13 . For example, the contact interaction information 101 may reflect the first user's usual interaction status with other users through interactive programs such as social media, email programs, and/or instant messaging programs. For example, the contact interaction information 101 may reflect the first user's usual text conversations, voice conversations, and online interactions with other users through interactive programs such as social media, email programs, and/or instant messaging programs (for example, for specific applications). Users like posts on social media, leave comments or tag specific users on social media, etc.), the time, frequency and/or content of email exchanges. The processor 11 can store the contact interaction information 101 in the storage circuit 12 for subsequent query.

在一實施例中,處理器11可透過安裝於與第一使用者綁定的各式電子裝置(例如第一使用者所擁有的智慧型手機、平板電腦、桌上型電腦)中的代理程式來擷取聯絡人互動資訊101。此代理程式可將所擷取到的聯絡人互動資訊101定期或不定期回報給二步驟驗證系統10。或者,處理器11亦可直接透過社交媒體、電子郵件程式及/或即時通訊程式所使用的線上平台來擷取聯絡人互動資訊101。In one embodiment, the processor 11 can use an agent program installed in various electronic devices bound to the first user (such as a smartphone, tablet, or desktop computer owned by the first user). To retrieve contact interaction information 101. This agent can report the captured contact interaction information 101 to the two-step verification system 10 regularly or irregularly. Alternatively, the processor 11 can also directly retrieve the contact interaction information 101 through social media, email programs and/or online platforms used by instant messaging programs.

在一實施例中,使用者(例如第一使用者)可透過手邊的電子裝置(亦稱為第一電子裝置)來發送驗證請求。此驗證請求可用以向二步驟驗證系統10請求使用其他人的電子裝置來對當前正在操作第一電子裝置的使用者進行二步驟驗證。亦即,此二步驟驗證可用以驗證當前正在操作第一電子裝置的使用者是否為第一使用者本人。In one embodiment, the user (eg, the first user) can send the verification request through the electronic device at hand (also referred to as the first electronic device). This verification request can be used to request the two-step verification system 10 to use other people's electronic devices to perform two-step verification on the user who is currently operating the first electronic device. That is, this two-step verification can be used to verify whether the user currently operating the first electronic device is the first user himself.

須注意的是,第一電子裝置所綁定的使用者可以是第一使用者也可以不是第一使用者。例如,第一電子裝置可包括第一使用者所擁有且已與第一使用者綁定的平板電腦或筆記型電腦等。或者,第一電子裝置也可以是未綁定使用者的私人或公用電腦。It should be noted that the user bound to the first electronic device may or may not be the first user. For example, the first electronic device may include a tablet computer or a laptop computer owned by the first user and bound to the first user. Alternatively, the first electronic device may also be a private or public computer that is not bound to the user.

在一實施例中,處理器11可透過輸入/輸出裝置13接收所述驗證請求。響應於所述驗證請求,處理器11可啟動針對第一使用者的二步驟驗證。In one embodiment, the processor 11 may receive the verification request through the input/output device 13 . In response to the verification request, the processor 11 may initiate a two-step verification for the first user.

響應於針對第一使用者的二步驟驗證被啟動,處理器11可經由第一電子裝置呈現提示訊息(亦稱為第一提示訊息)。例如,處理器11可根據聯絡人互動資訊101來產生第一提示訊息。例如,第一提示訊息可隨機抽問第一使用者最近與親近好友的互動內容,例如,「最近一週內與好友A的聊天內容大多為什麼類型?」或者「請輸入您最近聯絡的好友的電話號碼或是電子郵件信箱」等。這些問題的答案皆可由聯絡人互動資訊101中取得。In response to the two-step verification for the first user being activated, the processor 11 may present a prompt message (also referred to as a first prompt message) via the first electronic device. For example, the processor 11 can generate a first prompt message according to the contact interaction information 101 . For example, the first prompt message can randomly ask the first user about the content of his recent interactions with close friends, for example, "What type of chat content have been most common with friend A in the past week?" or "Please enter the phone number of the friend you have recently contacted. number or email address" etc. The answers to these questions can be obtained from Contact Interactive Information 101.

處理器11可透過輸入/輸出裝置13將此第一提示訊息傳送至第一電子裝置進行呈現(例如顯示於第一電子裝置的顯示器)。換言之,此第一提示訊息即是用來針對第一使用者的身分進行二步驟驗證中的初步驗證(亦稱為第一階段驗證),以初步判斷當前操作第一電子裝置的使用者是否為第一使用者本人。The processor 11 can send the first prompt message to the first electronic device for presentation through the input/output device 13 (for example, displayed on the display of the first electronic device). In other words, this first prompt message is used to perform preliminary verification (also called first-stage verification) in the two-step verification of the first user's identity to initially determine whether the user currently operating the first electronic device is the The first user himself.

在經由第一電子裝置呈現第一提示訊息後,處理器11可經由輸入/輸出裝置13接收第一電子裝置針對第一提示訊息的回應(亦稱為第一回應)。然後,處理器11可對第一回應進行驗證並判斷第一回應是否符合預設條件(亦稱為第一條件)。After the first prompt message is presented via the first electronic device, the processor 11 may receive a response (also referred to as a first response) from the first electronic device to the first prompt message via the input/output device 13 . Then, the processor 11 can verify the first response and determine whether the first response meets the preset condition (also referred to as the first condition).

一般來說,若當前正在操作第一電子裝置的使用者確實為第一使用者本人,則由第一使用者針對上述第一提示訊息所回傳的第一回應理應是正確的。例如,假設聯絡人互動資訊101反映出第一使用者最近一週內與好友A的聊天內容大多為「手遊」與「考試」的相關內容,且第一回應中帶有的訊息也為「手遊」及/或「考試」的相關內容,則處理器11可根據聯絡人互動資訊101判定此第一回應是正確的。響應於第一回應是正確的,處理器11可判定第一回應符合第一條件。其中,第一回應符合第一條件,亦可視為當前正在操作第一電子裝置的使用者之身分通過初步驗證(即通過第一階段驗證)。Generally speaking, if the user currently operating the first electronic device is indeed the first user, the first response returned by the first user in response to the first prompt message should be correct. For example, assume that the contact interaction information 101 reflects that the chat content of the first user with friend A in the past week is mostly related to "mobile games" and "exams", and the message included in the first response is also "mobile games". "Game" and/or "Examination" related content, then the processor 11 can determine that the first response is correct according to the contact interaction information 101. In response to the first response being correct, the processor 11 may determine that the first response meets the first condition. Wherein, if the first response meets the first condition, it can also be deemed that the identity of the user currently operating the first electronic device has passed preliminary verification (ie, passed the first stage of verification).

另一方面,若聯絡人互動資訊101反映出第一使用者最近一週內與好友A的聊天內容大多為「手遊」與「考試」的相關內容,但第一回應中帶有的訊息卻為「小孩」的相關內容,則處理器11可根據聯絡人互動資訊101判定此第一回應不是正確的。響應於第一回應不是正確的,處理器11可判定第一回應不符合第一條件。其中,第一回應不符合第一條件,亦可視為當前正在操作第一電子裝置的使用者之身分未通過初步驗證(即未通過第一階段驗證)。響應於第一回應不符合第一條件,處理器11可判定當前正在操作第一電子裝置的使用者未通過二步驟驗證(即二步驟驗證失敗)。On the other hand, if the contact interaction information 101 reflects that most of the first user's chats with friend A in the past week were related to "mobile games" and "exams", but the message in the first response is "Child" related content, the processor 11 can determine that the first response is not correct based on the contact interaction information 101. In response to the first response being incorrect, the processor 11 may determine that the first response does not meet the first condition. Wherein, if the first response does not meet the first condition, it can also be regarded as that the identity of the user currently operating the first electronic device has not passed the preliminary verification (ie, has not passed the first stage of verification). In response to the first response not meeting the first condition, the processor 11 may determine that the user currently operating the first electronic device has failed the two-step verification (ie, the two-step verification failed).

在一實施例中,響應於第一電子裝置針對第一提示訊息的第一回應符合第一條件,處理器11可根據聯絡人互動資訊101,經由另一電子裝置(亦稱為第二電子裝置)呈現另一提示訊息(亦稱為第二提示訊息)。In one embodiment, in response to the first response of the first electronic device to the first prompt message meeting the first condition, the processor 11 may, according to the contact interaction information 101, via another electronic device (also referred to as the second electronic device ) presents another prompt message (also called a second prompt message).

特別是,第二電子裝置所綁定的擁有者(亦稱為第二使用者)非為第一使用者。例如,第二使用者可為第一使用者的家人、親戚、同事或朋友。換言之,第二電子裝置即是用來取代第一使用者本人的智慧型手機等已與第一使用者綁定的電子裝置,以對當前正在操作第一電子裝置的使用者之身分進行二步驟驗證中的進階驗證(亦稱為第二階段驗證)。In particular, the owner bound to the second electronic device (also referred to as the second user) is not the first user. For example, the second user may be a family member, relative, colleague or friend of the first user. In other words, the second electronic device is used to replace the electronic device that has been bound to the first user, such as the first user's smartphone, to perform two steps on the identity of the user currently operating the first electronic device. Advanced verification within verification (also known as second-stage verification).

在一實施例中,響應於第一回應符合第一條件,處理器11可根據聯絡人互動資訊101產生聯絡人清單並經由第一電子裝置呈現此聯絡人清單。例如,根據聯絡人互動資訊101,所產生的聯絡人清單中可列出至少一位與第一使用者在過去一段時間內互動較為頻繁及/或互動較為親密的聯絡人。In one embodiment, in response to the first response meeting the first condition, the processor 11 may generate a contact list according to the contact interaction information 101 and present the contact list through the first electronic device. For example, according to the contact interaction information 101, the generated contact list may list at least one contact who has interacted more frequently and/or interacted more closely with the first user in the past period of time.

在一實施例中,處理器11可根據聯絡人互動資訊101對與第一使用者有關的多個聯絡人進行篩選。經過篩選獲得的聯絡人可被加入至所述聯絡人清單中。例如,處理器11可參照下表1來對聯絡人互動資訊101中與第一使用者有關的多個聯絡人進行評分。 表1 項目 給分 寄信給對方且對方有回信 每往來一次得 2 分 即時傳訊且有回應 每往來一次得 2 分 語音對話超過十秒 每十秒得 2 分 在對方的貼文上按讚 每個讚得 0.5 分 在相片中標記對方姓名 每個相片有標記得 1 分 以人工智慧模型分析有往有來的文字內容,互有親近的稱呼,例如媽媽,老公,寶貝;或是互動方式,例如:唉喲討厭啦、你怎麼了 每則文字內容得 10 分 In one embodiment, the processor 11 can filter multiple contacts related to the first user based on the contact interaction information 101 . Contacts obtained through filtering can be added to the contact list. For example, the processor 11 may refer to Table 1 below to score multiple contacts related to the first user in the contact interaction information 101 . Table 1 Project Give points Send a letter to the other party and receive a reply from the other party 2 points for each exchange Instant messaging and response 2 points for each exchange Voice conversation exceeds ten seconds 2 points every ten seconds Like the other person’s post 0.5 points for each like Tag someone's name in a photo 1 point for each photo tagged An artificial intelligence model is used to analyze the text content that comes and goes. There are close names for each other, such as mother, husband, baby; or interaction methods, such as: Ouch, I hate it, what’s wrong with you? 10 points for each piece of text

須注意的是,上表1所列之各項目與給分標準僅為範例而非用以限定本發明。在綜合評分結果後,得分相對較高的部分聯絡人可以被加入所述聯絡人清單中。It should be noted that the items and scoring standards listed in Table 1 above are only examples and are not used to limit the present invention. After comprehensive scoring results, some contacts with relatively high scores may be added to the contact list.

在第一電子裝置呈現所述聯絡人清單後,處理器11可經由第一電子裝置接收使用者操作(亦稱為第一使用者操作)並根據第一使用者操作從所述聯絡人清單中決定一個聯絡人作為所述第二使用者。所述第二使用者即可用以協助當前操作第一電子裝置的使用者(例如第一使用者)完成二步驟驗證。然後,處理器11可根據第一使用者操作所選定的聯絡人(即第二使用者),透過輸入/輸出裝置13將第二提示訊息傳送至第二電子裝置進行呈現(例如由第二電子裝置的顯示器顯示)。例如,處理器11可根據與第二使用者綁定的電話號碼、電子郵件帳號或即時通訊帳號等通訊資訊,將第二提示訊息傳送至第二電子裝置進行呈現。After the first electronic device presents the contact list, the processor 11 may receive a user operation (also referred to as a first user operation) via the first electronic device and retrieve the information from the contact list according to the first user operation. Determine a contact person as the second user. The second user can be used to assist the user currently operating the first electronic device (eg, the first user) to complete the two-step verification. Then, the processor 11 can send the second prompt message to the second electronic device for presentation through the input/output device 13 according to the contact selected by the first user's operation (ie, the second user) (for example, by the second electronic device). display on the device). For example, the processor 11 can send the second prompt message to the second electronic device for presentation based on the communication information such as the phone number, email account, or instant messaging account bound to the second user.

圖2是根據本發明的實施例所繪示的聯絡人清單的示意圖。請參照圖2,聯絡人清單21中可呈現多位聯絡人(包含1.老婆、2.媽媽、3.同事A、4.爸爸、5.死黨)供使用者選擇。須注意的是,圖2的聯絡人清單21僅為範例而非用以限定本發明。FIG. 2 is a schematic diagram of a contact list according to an embodiment of the present invention. Please refer to Figure 2. Multiple contacts (including 1. Wife, 2. Mom, 3. Colleague A, 4. Dad, 5. Best Buddy) can be displayed in the contact list 21 for the user to select. It should be noted that the contact list 21 in FIG. 2 is only an example and is not used to limit the present invention.

在一實施例中,假設使用者透過第一使用者操作從聯絡人清單21中選擇「4.爸爸」作為第二使用者,則處理器11可將第二提示訊息傳送至與聯絡人「4.爸爸」所綁定的電子裝置。接著,與聯絡人「4.爸爸」所綁定的電子裝置即可作為第二電子裝置來輔助對使用者進行二步驟驗證。In one embodiment, assuming that the user selects “4.Dad” as the second user from the contact list 21 through the first user operation, the processor 11 may send the second prompt message to the contact “4. .Dad" is an electronic device bound to it. Then, the electronic device bound to the contact "4. Dad" can be used as a second electronic device to assist in the two-step verification of the user.

在經由第二電子裝置呈現第二提示訊息後,處理器11可經由輸入/輸出裝置13接收第二電子裝置針對第二提示訊息的回應(亦稱為第二回應)。然後,處理器11可對第二回應進行驗證並判斷第二回應是否符合預設條件(亦稱為第二條件)。After the second prompt message is presented via the second electronic device, the processor 11 may receive a response (also referred to as a second response) from the second electronic device to the second prompt message via the input/output device 13 . Then, the processor 11 can verify the second response and determine whether the second response meets the preset condition (also referred to as the second condition).

在一實施例中,第二提示訊息可包括訊息上傳介面。此訊息上傳介面可用以上傳圖像或文字訊息。根據第二提示訊息,使用者可以對第二電子裝置進行操作,以透過所述訊息上傳介面上傳第二回應所攜帶的訊息。藉此,來自第二電子裝置的第二回應可包括第二電子裝置經由所述訊息上傳介面傳送的圖像或文字訊息。In one embodiment, the second prompt message may include a message upload interface. This message upload interface can be used to upload images or text messages. According to the second prompt message, the user can operate the second electronic device to upload the message carried in the second response through the message upload interface. Thereby, the second response from the second electronic device may include an image or a text message sent by the second electronic device through the message upload interface.

在一實施例中,處理器11可判斷第二回應中的訊息是否正確。若第二回應中的訊息是正確的,則處理器11可判定第二回應符合第二條件。反之,若第二回應中的訊息不是正確,則處理器11可判定第二回應不符合第二條件。或者,在一實施例中,若處理器11在傳送第二提示訊息後一段預設時間範圍內沒有接收到來自第二電子裝置的第二回應,則處理器11亦可判定第二回應不符合第二條件。In one embodiment, the processor 11 can determine whether the message in the second response is correct. If the message in the second response is correct, the processor 11 may determine that the second response meets the second condition. On the contrary, if the message in the second response is not correct, the processor 11 may determine that the second response does not meet the second condition. Alternatively, in one embodiment, if the processor 11 does not receive the second response from the second electronic device within a preset time range after sending the second prompt message, the processor 11 may also determine that the second response does not meet the requirements. Second condition.

在一實施例中,在根據第一使用者操作決定第二使用者後,處理器11可經由第一電子裝置接收另一使用者操作(亦稱為第二使用者操作)。處理器11可根據第二使用者操作從至少一資訊類別中決定目標資訊類別。In one embodiment, after determining the second user based on the first user operation, the processor 11 may receive another user operation (also called a second user operation) via the first electronic device. The processor 11 can determine the target information type from at least one information type according to the second user operation.

在透過第二電子裝置呈現第二提示訊息並接收到第二回應後,處理器11可經由人工智慧模型辨識第二回應中的訊息是否屬於目標資訊類別。例如,所述人工智慧模型可經過訓練(例如圖像辨識訓練或語意辨識訓練)以判斷第二回應中的圖像或文字訊息是否屬於目標資訊類別。關於如何對人工智慧模型進行圖像辨識訓練或語意辨識訓練屬於相關技術領域的習知技術,故在此不多加贅述。After the second prompt message is presented through the second electronic device and the second response is received, the processor 11 can identify whether the message in the second response belongs to the target information category through the artificial intelligence model. For example, the artificial intelligence model can be trained (such as image recognition training or semantic recognition training) to determine whether the image or text message in the second response belongs to the target information category. How to perform image recognition training or semantic recognition training on artificial intelligence models is a common knowledge technology in related technical fields, so it will not be described in detail here.

在一實施例中,響應於第二回應中的訊息屬於目標資訊類別,處理器11可判定第二回應符合第二條件。或者,響應於第二回應中的訊息不屬於目標資訊類別,處理器11可判定第二回應不符合第二條件。In one embodiment, in response to the message in the second response belonging to the target information category, the processor 11 may determine that the second response meets the second condition. Alternatively, in response to the message in the second response not belonging to the target information category, the processor 11 may determine that the second response does not meet the second condition.

圖3是根據本發明的實施例所繪示的決定目標資訊類別的示意圖。請參照圖3,操作介面31可被呈現於第一電子裝置。使用者可透過第二使用者操作在操作介面31中提供的多種資訊類別(包括1.鯨魚、2.墨水匣、3.嬰兒)中擇一作為目標資訊類別。例如,假設使用者透過第二使用者操作在操作介面31中選擇「1.鯨魚」作為目標資訊類別,則後續第二回應中需帶有符合此目標資訊類別(即,鯨魚)的圖片,才能通過第二階段驗證。FIG. 3 is a schematic diagram of determining a target information type according to an embodiment of the present invention. Referring to FIG. 3 , the operation interface 31 can be presented on the first electronic device. The user can select one of multiple information categories (including 1. whale, 2. ink cartridge, 3. baby) provided in the operation interface 31 as the target information category through the second user operation. For example, assuming that the user selects "1. Whale" as the target information category in the operation interface 31 through the second user operation, the subsequent second response must contain an image that matches this target information category (i.e., whale). Passed the second stage of verification.

圖4是根據本發明的實施例所繪示的訊息上傳介面的示意圖。請參照圖4,提示訊息(即第二提示訊息)41可用以告知第二電子裝置當前的使用者(例如為第二使用者或當前借用第二電子裝置進行身分驗證的第一使用者)上傳用於進階驗證的訊息(即第二訊息)。FIG. 4 is a schematic diagram of a message upload interface according to an embodiment of the present invention. Referring to Figure 4, the prompt message (ie, the second prompt message) 41 can be used to inform the current user of the second electronic device (for example, the second user or the first user currently borrowing the second electronic device for identity verification) to upload Message used for advanced verification (i.e. second message).

以圖3為例,假設使用者透過第二使用者操作所選擇的目標資訊類別為「1.鯨魚」,則使用者必須要透過按下提示訊息41中的上傳按紐401,上傳一張帶有鯨魚的圖案的圖片(即第二回應中的訊息屬於目標資訊類別),即可完成對於第一使用者的二步驟驗證。反之,若使用者上傳的圖片沒有鯨魚的圖案(即第二回應中的訊息不屬於目標資訊類別),則對於第一使用者的二步驟驗證會被判定為失敗。Taking Figure 3 as an example, assuming that the target information category selected by the user through the second user operation is "1. Whale", the user must upload a tape by pressing the upload button 401 in the prompt message 41. A picture with a whale pattern (that is, the message in the second response belongs to the target information category) can complete the two-step verification for the first user. On the contrary, if the image uploaded by the user does not have a whale pattern (that is, the message in the second response does not belong to the target information category), the two-step verification for the first user will be judged as failed.

在一實施例中,響應於第二回應符合第二條件,處理器11可判定當前操作第一電子裝置的使用者已通過二步驟驗證(即第二階段驗證)。也就是說,在當前操作第一電子裝置的使用者已連續通過二步驟驗證中的第一階段驗證與第二階段驗證的情況下,處理器11可判定當前操作第一電子裝置的使用者應為第一使用者本人。因此,處理器11可給予當前第一電子裝置的使用者與第一使用者相匹配的某些系統權限,例如登入第一使用者在某些網站或操作特定應用程式的帳號等。In one embodiment, in response to the second response meeting the second condition, the processor 11 may determine that the user currently operating the first electronic device has passed the two-step verification (ie, second-stage verification). That is to say, when the user currently operating the first electronic device has successively passed the first stage verification and the second stage verification in the two-step verification, the processor 11 can determine that the user currently operating the first electronic device should For the first user himself. Therefore, the processor 11 can grant the current user of the first electronic device certain system permissions that match the first user, such as logging in to the first user's account on certain websites or operating a specific application.

另一方面,響應於第二回應不符合第二條件,處理器11可判定當前操作第一電子裝置的使用者未通過二步驟驗證(即第二階段驗證),且不給予當前操作第一電子裝置的使用者與第一使用者相匹配的系統權限,藉以避免第一使用者的帳號被盜用。On the other hand, in response to the second response not meeting the second condition, the processor 11 may determine that the user currently operating the first electronic device has failed the two-step verification (ie, second-stage verification), and does not grant the user currently operating the first electronic device The user of the device matches the system permissions of the first user to prevent the first user's account from being stolen.

圖5是根據本發明的實施例所繪示的二階段驗證系統的使用環境的示意圖。請參照圖5,伺服器51可包含圖1的二階段驗證系統10。伺服器51、電子裝置52及輔助驗證裝置53可透過網路(例如網際網路)連接。FIG. 5 is a schematic diagram of the usage environment of the two-stage verification system according to an embodiment of the present invention. Referring to FIG. 5 , the server 51 may include the two-stage verification system 10 of FIG. 1 . The server 51, the electronic device 52 and the auxiliary verification device 53 can be connected through a network (such as the Internet).

在一實施例中,假設使用者A(即第一使用者)出門時攜帶了電子裝置52(即第一電子裝置,其例如為筆記型電腦,且其擁有者為使用者A)但忘了帶智慧型手機(或者使用者A的智慧型手機沒電了)。此時,若使用者A想要透過電子裝置52來執行某些需要通過身分驗證的功能,例如登入特定網站或應用程式,則使用者A可透過電子裝置52向伺服器51請求執行針對使用者A的二步驟驗證。In one embodiment, it is assumed that user A (i.e., the first user) carries the electronic device 52 (i.e., the first electronic device, such as a laptop computer, and its owner is user A) when going out but forgets Bring a smartphone (or user A’s smartphone is out of battery). At this time, if user A wants to use the electronic device 52 to perform certain functions that require identity verification, such as logging in to a specific website or application, user A can request the server 51 to execute the function for the user through the electronic device 52 A two-step verification.

在啟用針對使用者A的二步驟驗證後,伺服器51可透過上述提及的各項操作,根據與使用者A有關的聯絡人互動資訊,最終選定以輔助驗證裝置53(即第二電子裝置)來輔助對使用者A進行二步驟驗證。特別是,輔助驗證裝置53的擁有者為使用者B(即第二使用者)。After activating the two-step verification for user A, the server 51 can finally select the auxiliary verification device 53 (i.e., the second electronic device) based on the contact interaction information related to user A through the above-mentioned operations. ) to assist in the two-step verification of User A. In particular, the owner of the auxiliary verification device 53 is user B (ie, the second user).

在一實施例中,若使用者A可操作電子裝置52通過二步驟驗證中的初步驗證,且使用者A或使用者B可進一步操作輔助驗證裝置53通過二步驟驗證中的進階驗證,則伺服器51可判定當前操作電子裝置52的使用者通過二步驟驗證,並給予當前操作電子裝置52的使用者與使用者A相匹配的系統權限。反之,若使用者A(或其他使用者)未透過操作電子裝置52來通過二步驟驗證中的初步驗證,或使用者A(或其他使用者)未透過操作輔助驗證裝置53來通過二步驟驗證中的進階驗證,則伺服器51可判定當前操作電子裝置52的使用者未通過二步驟驗證,且不給予當前操作電子裝置52的使用者與使用者A相匹配的系統權限。In one embodiment, if user A can operate the electronic device 52 to pass the preliminary verification in the two-step verification, and user A or user B can further operate the auxiliary verification device 53 to pass the advanced verification in the two-step verification, then The server 51 can determine that the user currently operating the electronic device 52 has passed the two-step verification, and grant the user currently operating the electronic device 52 system permissions that match user A. On the contrary, if user A (or other users) fails to pass the preliminary verification in the two-step verification by operating the electronic device 52 , or user A (or other users) fails to pass the two-step verification by operating the auxiliary verification device 53 In the advanced verification, the server 51 may determine that the user currently operating the electronic device 52 has failed the two-step verification, and does not grant the system authority matching the user A to the user currently operating the electronic device 52 .

圖6是根據本發明的實施例所繪示的二步驟驗證方法的流程圖。請參照圖6,在步驟S601中,蒐集與第一使用者有關的聯絡人互動資訊。在步驟S602中,啟動針對所述第一使用者的二步驟驗證。在步驟S603中,經由第一電子裝置呈現第一提示訊息。在步驟S604中,判斷第一電子裝置針對所述第一提示訊息的第一回應是否符合第一條件。若第一電子裝置針對第一提示訊息的第一回應不符合第一條件,在步驟S605中,判定二步驟驗證失敗並結束二步驟驗證。FIG. 6 is a flow chart of a two-step verification method according to an embodiment of the present invention. Please refer to Figure 6. In step S601, contact interaction information related to the first user is collected. In step S602, a two-step verification for the first user is initiated. In step S603, the first prompt message is presented via the first electronic device. In step S604, it is determined whether the first response of the first electronic device to the first prompt message meets the first condition. If the first response of the first electronic device to the first prompt message does not meet the first condition, in step S605, it is determined that the two-step verification fails and the two-step verification ends.

若第一電子裝置針對第一提示訊息的第一回應符合第一條件,在步驟S606中,根據所述聯絡人互動資訊,經由第二電子裝置呈現第二提示訊息。特別是,第二電子裝置所綁定的擁有者非為所述第一使用者。接著,在步驟S607中,判斷第二電子裝置針對第二提示訊息的第二回應是否符合第二條件。若第二電子裝置針對第二提示訊息的第二回應不符合第二條件,在步驟S608中,判定二步驟驗證失敗並結束二步驟驗證。此外,若第二電子裝置針對第二提示訊息的第二回應符合第二條件,在步驟S609中,判定當前操作第一電子裝置的使用者通過二步驟驗證。If the first response of the first electronic device to the first prompt message meets the first condition, in step S606, a second prompt message is presented via the second electronic device according to the contact interaction information. In particular, the owner bound to the second electronic device is not the first user. Next, in step S607, it is determined whether the second response of the second electronic device to the second prompt message meets the second condition. If the second response of the second electronic device to the second prompt message does not meet the second condition, in step S608, it is determined that the two-step verification fails and the two-step verification ends. In addition, if the second response of the second electronic device to the second prompt message meets the second condition, in step S609, it is determined that the user currently operating the first electronic device passes the two-step verification.

然而,圖6中各步驟已詳細說明如上,在此便不再贅述。值得注意的是,圖6中各步驟可以實作為多個程式碼或是電路,本案不加以限制。此外,圖6的方法可以搭配以上範例實施例使用,也可以單獨使用,本案不加以限制。However, each step in Figure 6 has been described in detail above and will not be described again here. It is worth noting that each step in Figure 6 can be implemented as multiple program codes or circuits, and is not limited in this case. In addition, the method in Figure 6 can be used in conjunction with the above example embodiments or can be used alone, and is not limited in this case.

綜上所述,相較於傳統上使用者進行二步驟驗證時都必須要至少準備一台屬於同一使用者的電子裝置作為輔助驗證之用,本發明實施例所提出的二步驟驗證方法與系統,可在使用者當下手邊沒有智慧型手機或智慧型手機沒電時,可透過借用熟識的親友的智慧型手機等輔助驗證裝置來協助完成二步驟驗證。藉此,可在滿足相關的安全需求的前提下,給外出忘記攜帶手機或手機沒電的使用者帶來更多關於身分驗證的便利性。To sum up, compared with the traditional method when users perform two-step verification, they must prepare at least one electronic device belonging to the same user as an auxiliary verification. The two-step verification method and system proposed by the embodiment of the present invention , when the user does not have a smartphone at hand or the smartphone is out of battery, they can borrow auxiliary verification devices such as smartphones from familiar relatives and friends to help complete the two-step verification. In this way, it can bring more convenience in identity verification to users who forget to bring their mobile phones when they go out or when their mobile phones are out of battery, while meeting relevant security requirements.

雖然本案已以實施例發明如上,然其並非用以限定本案,任何所屬技術領域中具有通常知識者,在不脫離本案的精神和範圍內,當可作些許的更動與潤飾,故本案的保護範圍當視後附的申請專利範圍所界定者為準。Although this case has been invented as above with the embodiment, it is not used to limit this case. Anyone with ordinary knowledge in the technical field should be able to make some changes and modifications without departing from the spirit and scope of this case. Therefore, the protection of this case The scope shall be determined by the appended patent application scope.

10:二步驟驗證系統 11:處理器 12:儲存電路 13:輸入/輸出裝置 101:聯絡人互動資訊 21:聯絡人清單 31:操作介面 41:提示訊息 401:上傳按鈕 51:伺服器 52:電子裝置 53:輔助驗證裝置 S601~S609:步驟10: Two-step verification system 11: Processor 12:Storage circuit 13:Input/output device 101:Contact interaction information 21: Contact list 31: Operation interface 41: Prompt message 401:Upload button 51:Server 52:Electronic devices 53: Auxiliary verification device S601~S609: steps

圖1是根據本發明的實施例所繪示的二步驟驗證系統的示意圖。 圖2是根據本發明的實施例所繪示的聯絡人清單的示意圖。 圖3是根據本發明的實施例所繪示的決定目標資訊類別的示意圖。 圖4是根據本發明的實施例所繪示的訊息上傳介面的示意圖。 圖5是根據本發明的實施例所繪示的二階段驗證系統的使用環境的示意圖。 圖6是根據本發明的實施例所繪示的二步驟驗證方法的流程圖。 FIG. 1 is a schematic diagram of a two-step verification system according to an embodiment of the present invention. FIG. 2 is a schematic diagram of a contact list according to an embodiment of the present invention. FIG. 3 is a schematic diagram of determining a target information type according to an embodiment of the present invention. FIG. 4 is a schematic diagram of a message upload interface according to an embodiment of the present invention. FIG. 5 is a schematic diagram of the usage environment of the two-stage verification system according to an embodiment of the present invention. FIG. 6 is a flow chart of a two-step verification method according to an embodiment of the present invention.

S601~S609:步驟 S601~S609: steps

Claims (12)

一種二步驟驗證方法,包括: 蒐集與第一使用者有關的聯絡人互動資訊; 啟動針對該第一使用者的二步驟驗證; 經由第一電子裝置呈現第一提示訊息; 響應於該第一電子裝置針對該第一提示訊息的第一回應符合第一條件,根據該聯絡人互動資訊,經由第二電子裝置呈現第二提示訊息,其中該第二電子裝置所綁定的擁有者非為該第一使用者;以及 響應於該第二電子裝置針對該第二提示訊息的第二回應符合第二條件,判定當前操作該第一電子裝置的使用者通過該二步驟驗證。 A two-step verification method, including: Collect contact interaction information related to the first user; Initiate two-step verification for the first user; Present the first prompt message via the first electronic device; In response to the first response of the first electronic device to the first prompt message meeting the first condition, a second prompt message is presented through the second electronic device according to the contact interaction information, wherein the second electronic device is bound to The owner is not the first user; and In response to the second response of the second electronic device to the second prompt message meeting the second condition, it is determined that the user currently operating the first electronic device passes the two-step verification. 如請求項1所述的二步驟驗證方法,更包括: 根據該聯絡人互動資訊判斷該第一回應是否正確;以及 響應於該第一回應是正確的,判定該第一回應符合該第一條件。 The two-step verification method as described in request item 1 further includes: Determine whether the first response is correct based on the contact's interaction information; and In response to the first response being correct, it is determined that the first response meets the first condition. 如請求項1所述的二步驟驗證方法,其中該第二電子裝置所綁定的該擁有者為第二使用者,且根據該聯絡人互動資訊,經由該第二電子裝置呈現該第二提示訊息的步驟包括: 根據該聯絡人互動資訊,經由該第一電子裝置呈現聯絡人清單; 經由該第一電子裝置接收第一使用者操作;以及 根據該第一使用者操作從該聯絡人清單中決定該第二使用者;以及 將該第二提示訊息傳送至該第二電子裝置進行顯示。 The two-step verification method as described in claim 1, wherein the owner bound to the second electronic device is a second user, and the second prompt is presented through the second electronic device based on the contact interaction information The message steps include: Present a contact list via the first electronic device based on the contact interaction information; receiving a first user operation via the first electronic device; and Determine the second user from the contact list based on the first user operation; and The second prompt message is sent to the second electronic device for display. 如請求項1所述的二步驟驗證方法,其中該第二提示訊息包括訊息上傳介面,且該第二回應包括該第二電子裝置經由該訊息上傳介面傳送的訊息。The two-step verification method of claim 1, wherein the second prompt message includes a message upload interface, and the second response includes a message sent by the second electronic device through the message upload interface. 如請求項1所述的二步驟驗證方法,更包括: 經由該第一電子裝置接收第二使用者操作; 根據該第二使用者操作從至少一資訊類別中決定目標資訊類別; 在接收到該第二回應後,經由人工智慧模型辨識該第二回應中的訊息是否屬於該目標資訊類別;以及 響應於該訊息屬於該目標資訊類別,判定該第二回應符合該第二條件。 The two-step verification method as described in request item 1 further includes: receiving a second user operation via the first electronic device; Determine a target information category from at least one information category based on the second user operation; After receiving the second response, identify whether the information in the second response belongs to the target information category through an artificial intelligence model; and In response to the message belonging to the target information category, it is determined that the second response meets the second condition. 如請求項1所述的二步驟驗證方法,更包括: 響應於該第一回應不符合該第一條件或該第二回應不符合該第二條件,判定當前操作該第一電子裝置的該使用者未通過該二步驟驗證。 The two-step verification method as described in request item 1 further includes: In response to the first response not meeting the first condition or the second response not meeting the second condition, it is determined that the user currently operating the first electronic device has failed the two-step verification. 一種二步驟驗證系統,包括: 儲存電路;以及 處理器,耦接至該儲存電路, 其中該處理器用以: 蒐集與第一使用者有關的聯絡人互動資訊並將該聯絡人互動資訊儲存於該儲存電路; 啟動針對該第一使用者的二步驟驗證; 經由第一電子裝置呈現第一提示訊息; 響應於該第一電子裝置針對該第一提示訊息的第一回應符合第一條件,根據該聯絡人互動資訊,經由第二電子裝置呈現第二提示訊息,其中該第二電子裝置所綁定的擁有者非為該第一使用者;以及 響應於該第二電子裝置針對該第二提示訊息的第二回應符合第二條件,判定當前操作該第一電子裝置的使用者通過該二步驟驗證。 A two-step verification system including: storage circuitry; and a processor coupled to the storage circuit, The processor is used to: Collect contact interaction information related to the first user and store the contact interaction information in the storage circuit; Initiate two-step verification for the first user; Present the first prompt message via the first electronic device; In response to the first response of the first electronic device to the first prompt message meeting the first condition, a second prompt message is presented through the second electronic device according to the contact interaction information, wherein the second electronic device is bound to The owner is not the first user; and In response to the second response of the second electronic device to the second prompt message meeting the second condition, it is determined that the user currently operating the first electronic device passes the two-step verification. 如請求項7所述的二步驟驗證系統,其中該處理器更用以: 根據該聯絡人互動資訊判斷該第一回應是否正確;以及 響應於該第一回應是正確的,判定該第一回應符合該第一條件。 The two-step verification system as described in claim 7, wherein the processor is further used to: Determine whether the first response is correct based on the contact's interaction information; and In response to the first response being correct, it is determined that the first response meets the first condition. 如請求項7所述的二步驟驗證系統,其中該第二電子裝置所綁定的該擁有者為第二使用者,且該處理器根據該聯絡人互動資訊,經由該第二電子裝置呈現該第二提示訊息的操作包括: 根據該聯絡人互動資訊,經由該第一電子裝置呈現聯絡人清單; 經由該第一電子裝置接收第一使用者操作;以及 根據該第一使用者操作從該聯絡人清單中決定該第二使用者;以及 將該第二提示訊息傳送至該第二電子裝置進行顯示。 The two-step verification system as described in claim 7, wherein the owner bound to the second electronic device is a second user, and the processor presents the contact information through the second electronic device based on the contact interaction information. The operations for the second prompt message include: Present a contact list via the first electronic device based on the contact interaction information; receiving a first user operation via the first electronic device; and Determine the second user from the contact list based on the first user operation; and The second prompt message is sent to the second electronic device for display. 如請求項7所述的二步驟驗證系統,其中該第二提示訊息包括訊息上傳介面,且該第二回應包括該第二電子裝置經由該訊息上傳介面傳送的訊息。The two-step verification system of claim 7, wherein the second prompt message includes a message upload interface, and the second response includes a message sent by the second electronic device through the message upload interface. 如請求項7所述的二步驟驗證系統,其中該處理器更用以: 經由該第一電子裝置接收第二使用者操作; 根據該第二使用者操作從至少一資訊類別中決定目標資訊類別; 在接收到該第二回應後,經由人工智慧模型辨識該第二回應中的訊息是否屬於該目標資訊類別;以及 響應於該訊息屬於該目標資訊類別,判定該第二回應符合該第二條件。 The two-step verification system as described in claim 7, wherein the processor is further used to: receiving a second user operation via the first electronic device; Determine a target information category from at least one information category based on the second user operation; After receiving the second response, identify whether the information in the second response belongs to the target information category through an artificial intelligence model; and In response to the message belonging to the target information category, it is determined that the second response meets the second condition. 如請求項7所述的二步驟驗證系統,其中該處理器更用以: 響應於該第一回應不符合該第一條件或該第二回應不符合該第二條件,判定當前操作該第一電子裝置的該使用者未通過該二步驟驗證。 The two-step verification system as described in claim 7, wherein the processor is further used to: In response to the first response not meeting the first condition or the second response not meeting the second condition, it is determined that the user currently operating the first electronic device has failed the two-step verification.
TW111131944A 2022-08-24 2022-08-24 Two-steps authentication method and two-steps authentication system TWI817674B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW111131944A TWI817674B (en) 2022-08-24 2022-08-24 Two-steps authentication method and two-steps authentication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW111131944A TWI817674B (en) 2022-08-24 2022-08-24 Two-steps authentication method and two-steps authentication system

Publications (2)

Publication Number Publication Date
TWI817674B true TWI817674B (en) 2023-10-01
TW202409864A TW202409864A (en) 2024-03-01

Family

ID=89857854

Family Applications (1)

Application Number Title Priority Date Filing Date
TW111131944A TWI817674B (en) 2022-08-24 2022-08-24 Two-steps authentication method and two-steps authentication system

Country Status (1)

Country Link
TW (1) TWI817674B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105468948A (en) * 2015-12-09 2016-04-06 广州广电运通金融电子股份有限公司 Method for identifying identity through social relation
US20180315105A1 (en) * 2011-11-07 2018-11-01 Facebook, Inc. Identity Verification and Authentication

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180315105A1 (en) * 2011-11-07 2018-11-01 Facebook, Inc. Identity Verification and Authentication
CN105468948A (en) * 2015-12-09 2016-04-06 广州广电运通金融电子股份有限公司 Method for identifying identity through social relation

Similar Documents

Publication Publication Date Title
Lambert Intimacy and social capital on Facebook: Beyond the psychological perspective
US20210218697A1 (en) Servers, method of controlling servers, and non-transitory computer-readable mediums
US10402825B2 (en) Device, system, and method of enhancing user privacy and security within a location-based virtual social networking context
US9224008B1 (en) Detecting impersonation on a social network
US11250218B2 (en) Personalizing natural language understanding systems
US9721079B2 (en) Image authenticity verification using speech
US20160359773A1 (en) Electronic Communication System
US20130086185A1 (en) Systems and methods for a multimedia social networking system
WO2018054387A1 (en) Method and device for managing permission of terminal
US20190342237A1 (en) Group Information Acquisition Method, Apparatus and Interaction System
CN112328136B (en) Comment information display method, comment information display device, comment information display equipment and storage medium
Phong et al. Mobile phones and internet use in Cambodia 2016
US20180246739A1 (en) Posted information providing device and terminal device
CN110502512B (en) Information carrier generation method, correlation method, device, equipment and storage medium
JP5325919B2 (en) Authentication apparatus and method
US20180262404A1 (en) Hypermedia-driven record and playback test framework
TWI817674B (en) Two-steps authentication method and two-steps authentication system
WO2024041510A1 (en) Contact determination method and apparatus, and electronic device and medium
WO2023193717A1 (en) Group chat session management method and apparatus, electronic device and readable storage medium
TW202409864A (en) Two-steps authentication method and two-steps authentication system
JP2017228004A (en) Information processing apparatus and information processing program
WO2023178921A1 (en) Interaction method and apparatus, and device, storage medium and computer program product
US20150358318A1 (en) Biometric authentication of content for social networks
CN109615443A (en) User's processing method, device, server and storage medium based on block chain
CN111782971B (en) Information processing method, device, equipment and storage medium