Network bidding safe code operation method and system
A security code and marking technology, which is applied in the field of network marking security code operations and systems, can solve the problems of feasibility limitations, failure to provide a single user security code, and inability to achieve secure capital transactions.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] In order to make the present invention concretely implemented, the following special descriptions are described in detail, and the preferred specific examples are listed as follows:
[0036] figure 1 Please refer to figure 1 shown. The system accepts the user's application to become a member of the online marking platform (101). After the user enters the basic personal information, the system then reviews the user information (102). After the user information is checked, the system judges whether the user is Meet the qualifications to become a member (103), if not qualified, then the user exits the platform (104); After the agreed contract (106), the system will give the user a formal membership status in real time and a security code (107) by means of random numbers, sorting, or according to specific program operation rules, etc., and finally the qualified user will become a member The identity and the security code enter the network marking platform (108), and the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 