Security verification method and device
A security verification and security protection technology, applied in the field of computer, electromechanical and electronic products, which can solve problems such as the inability of users to verify the system and the injustice of users
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0057] A securities online trading system supporting the user verification system and its usage method
[0058] Renovate an existing securities online trading system to support the user verification system. Users who need this function have a verification password specially used to configure the security verification policy, which is used to make related settings in the system. The user first logs in to the system in a confirmed safe environment and sets the system feedback information. If the user name is correct, the prompt "This is the information passed by the verification system I set up" is returned. When accessing the system, first enter the correct user name to verify the system, and the system will provide the correct user name according to it, and return the prompt "This is the information that the verification system I set passed". The user judges that the verification system has passed based on this information and gives Subsequent authorization of operation behav...
Embodiment 2
[0061] Banking system and method of preventing copying of bank cards
[0062] Transform an existing banking system to support two-way verification of user systems. Users who need this function have a verification password specially used to configure the security verification policy, which is used to make related settings in the system. The user first logs in to the system in a confirmed safe environment and sets the system feedback information. If the user name is correct, it will return the prompt "This is the information passed by the verification system I set up" and set up to receive local operations at the same time. This operation is a There are 10 options in the multi-choice menu, and the user settings to select items 1, 5, and 7 are the correct options. When the card is used normally, if a fake ATM machine with a device that has been copied and installed with stolen bank card information is encountered by a criminal, the user does not know at the beginning, inserts th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More