Verification code processing method and device, and terminal and server
A processing method and a technology of a processing device, which are applied in the field of communication, can solve problems such as low security, poor user experience, and easy to be cracked by programs, and achieve the effect of high security and improved user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 2
[0086] Preferred Embodiment 2 (The processing flow of the verification code is realized through the physical operation of the orientation sensor, and the flow includes the following steps)
[0087] In step S902, the user starts the login program to start the login, and waits for the verification code given by the server.
[0088] In step S904, the server may request specific configuration information of the terminal through an HTTPS encrypted message. The requested configuration message can include the following:
[0089]
[0090]
[0091]
[0092] Step S906, after receiving the request, the terminal collects configuration information and returns detailed data to the server. Fill in 0 (no) or 1 (yes) in the question mark according to the actual situation, and fill in the number of question marks on the touch screen. Then return this message to the server in https encrypted manner.
[0093] In step S908, the server calculates the verification code according to the char...
Embodiment 3
[0102] Preferred embodiment three (realize the processing flow of the verification code through the physical operation of the proximity sensor, the flow includes the following steps)
[0103] In step S1002, the user starts the login program to start the login, and waits for the verification code given by the server.
[0104] In step S1004, the server requests specific configuration information of the terminal through an https encrypted message. The requested configuration message is as follows:
[0105]
[0106]
[0107]
[0108] Step S1006, after receiving the request, the terminal collects the configuration information, and fills in 0 (no) or 1 (yes) in the question mark according to the actual situation, and how many question marks are filled in the touch screen. Then return this message to the server in https encrypted manner.
[0109] In step S1008, the server calculates the verification code according to the characteristics of the terminal and returns it to the t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 