Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for an access function in network applications

A network application and function technology, applied in transmission systems, electrical components, etc., can solve the problem that network application functions are no longer safe.

Active Publication Date: 2015-11-25
ADVANCED NEW TECH CO LTD
View PDF5 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, since all the functions of network applications in the prior art are controlled by a verification method of passwords, malicious users only need to crack the verification method of passwords to obtain other users' information on the network. Access passwords for all functions in the application, so that all functions of other users in the network application can be maliciously accessed, making all functions in the network application no longer safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for an access function in network applications
  • Method and apparatus for an access function in network applications
  • Method and apparatus for an access function in network applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0101] In order to enable those skilled in the art to better understand the solutions of the application, the technical solutions in the embodiments of the application will be clearly and completely described below in conjunction with the drawings in the embodiments of the application. Obviously, the described embodiments are only It is a part of the embodiments of this application, but not all the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of this application.

[0102] This application can be used in many general or special computing system environments or configurations. For example: personal computers, server computers, handheld or portable devices, tablet devices, multi-processor systems, microprocessor-based systems, set-top boxes, programmable consumer electronic devices, network PCs, small computers, large computers, including Distrib...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present invention discloses a method, an apparatus and a system for an access function in network applications. The method includes the steps as follows: receiving a functional access request transmitted by a first client; confirming a target verification mode for verifying the functional access request based on the functional access request; acquiring a kind of verification information as information to be verified, wherein, the verification information corresponds to the target verification mode, and verifying whether the information to be verified and the target verification information are same, if yes, allowing the first client to access the target function by adopting user identity information. According the technical scheme of an embodiment of the present invention, a server pre-records a corresponding relation of the target verification mode and the target function for the user identity information, and the verification modes of various kinds of verification information for various functions are adopted for the user. A problem that a malicious user can maliciously access all functions only needed password cracking is avoided, and thereby increasing a security of the access function in network applications.

Description

Technical field [0001] This application relates to the technical field of network information processing, and in particular to a method and device for accessing functions in network applications. Background technique [0002] Currently, network applications based on the Internet involve more and more fields, and more and more functions are involved in the same network application. Through the same network application, users can access, use, and implement a variety of different functions. For example, through Internet financial applications, users can implement various functions such as account information query, online payment, online financial management, and account management (such as password modification). [0003] In some network applications, the functions they provide often require high security. For example, due to the user's account funds involved, the functions related to account management and fund in and out provided in Internet financial applications have higher secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 曹恺
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products