Information verification method, device and system

A technology of information verification and verification code, which is applied in the fields of information verification methods, devices and systems, can solve problems such as difficulty for users to obtain and loss of efficacy of verification codes, and achieve the effect of ensuring safety and effective information verification

Active Publication Date: 2015-11-18
广州密码科技有限公司
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the user's network environment is not good or the text message cannot be received due to third-party filtering, the user can only try to obtain the verification code text message by refreshing the verification code multiple times, or, as the user protects his own privacy, And the safety awareness has been greatly enhanced. Many users will turn on the function similar to the white list on the mobile phone to filter the text messages sent by the numbers that are not in the address book, and the verification server sends a large number of text messages every day, which is easy to be blocked by security software. In this case In this case, even if the verification code SMS is sent again, it is still difficult for the user to obtain its specific content, which makes the verification code lose its corresponding effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information verification method, device and system
  • Information verification method, device and system
  • Information verification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0033] figure 1 A schematic diagram is constructed for a mobile terminal 100 according to an embodiment of the present invention. refer to figure 1 , the mobile terminal 100 includes: a memory interface 102 , one or more data processors, image processors and / or a central processing unit 104 , and a peripheral interface 106 . Memory interface 102, one or more processors 104, and / or peripheral interface 106 may be discrete componen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information verification method, and the method is executed in a mobile terminal. The mobile terminal can be connected with an application server and a short message server through a network. The method comprises the steps: generating a verification code at a return mode; responding to an operation that a user confirms the return, carrying out the call of a short message interface, transmitting a verification short message containing the verification code and an application account number to the short message server, and transmitting the verification short message to the application server through the short message server; receiving an application account number and a verification code, which are inputted by a user, responding to logging-in operation of the user, and transmitting the verification code and the application account number to the application server, so as to bring convenience to the application server for verification, wherein the application server completes the verification through comparing the verification code corresponding to the application account number transmitted by the short message server with the verification code corresponding to the application account number transmitted by the mobile terminal and judging whether the verification code corresponding to the application account number transmitted by the short message server is consistent with the verification code corresponding to the application account number transmitted by the mobile terminal or not. The method also comprises a step: receiving verification results transmitted by the application server, and logging into the account number if the verification is consistent.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to an information verification method, device and system. Background technique [0002] Today, with the continuous development of computer technology and network technology, people can basically enjoy the services provided by various businesses and service providers through the Internet anytime and anywhere. In network activities, how to ensure the security of the network environment is a key consideration. At present, a large number of technologies for ensuring network security have been developed, and each network security technology is used by different users due to its own advantages and disadvantages. Among them, the security technology based on verification code is widely used because of its simplicity and ease of implementation. [0003] The verification method of the verification code can effectively prevent malicious password cracking, swiping tickets, and m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/12
Inventor 吴洪声吴云彬
Owner 广州密码科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products