Login and verification method for application program
A technology of application program and application program list, applied in the field of verification and application program login, which can solve the problems of user loss, achieve the effect of improving security and preventing illegal login
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0031] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.
[0032] In the embodiment of the present invention, a login request is sent to the application server, and the login request includes login information and a check code, so that the application server verifies the login information according to the check code and the check code stored in the application server. Since the identification of the mobile terminal is unique, and the generated check code is also unique, when the generated check code is different from the check code stored in the application server, the login information verification result is illegal. At this time, even if someone el...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap