Method and device for writing safety verification

A security verification and handwriting technology, applied in the fields of digital data authentication, character and pattern recognition, special data processing applications, etc., can solve the problems of complex technical solutions, low safety factor, large investment, etc., to reduce the probability of hacker attacks, The effect of improving safety and ensuring simplicity

Active Publication Date: 2014-09-03
KINGDEE SOFTWARE(CHINA) CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the drawbacks of the above-mentioned password verification are: low safety factor, easy to be broken by hackers, leading to leakage of important information of the mobile service system
[0005] The defect of the above-mentioned dynamic password verification lies in: the technical scheme is complicated, and corresponding software and hardware of the dynamic password need to be invested, and the initial investment is relatively large
And the dynamic password card needs to be carried with you, which is inconvenient to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for writing safety verification
  • Method and device for writing safety verification
  • Method and device for writing safety verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0048] like figure 1 As shown, it is a schematic flow chart of the first embodiment of the handwriting security verification method of the present invention.

[0049] It should be emphasized that: figure 1 The flow chart shown is only a preferred embodiment, and those skilled in the art should know that any embodiment constructed around the idea of ​​the present invention should not deviate from the scope covered by the following technical solutions:

[0050] When receiving the user's security verification instruction, obtain the handwriting data entered by the user; compare the similarity between the handwriting data and the pre-stored standard handwriting data according to the preset handwriting algorithm, and obtain the handwriting data and the pre-stored The similarity of standard handwriting data; when the simi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for writing safety verification. The method includes the steps that when a safety verification command of a user is received, writing data input by the user are obtained; similarity comparison is conducted on the writing data and pre-stored standard writing data according to a preset writing algorithm, so that similarity between the writing data and the pre-stored standard writing data is obtained; when the similarity is larger than a preset threshold value, it is judged that the user passes safety verification. The invention further discloses a device for writing safety verification. Simplicity of safety verification is guaranteed, the probability of hacker attacks is effectively reduced, and information safety is improved.

Description

technical field [0001] The invention relates to the technical field of mobile terminal security, in particular to a method and device for handwriting security verification. Background technique [0002] With the rapid development of mobile devices, mobile terminal software has also developed rapidly. Mobile terminal software focuses on the processing of mobile services, and the security of mobile services requires a certain security mechanism to guarantee. Different from other mobile application fields with a strong security environment (such as the financial industry, etc.), mobile terminal software only has a security verification of the login mechanism, and lacks reliable security protection methods. If the login mechanism is cracked, the security of the key business of the mobile application (such as the review of important documents) cannot be guaranteed. [0003] At present, in the existing mobile software, the methods for performing security verification of mobile se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06K9/00
CPCG06F16/5846G06F21/32
Inventor 邱俊占勇
Owner KINGDEE SOFTWARE(CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products