Verification code inputting method and device

An input method and verification code technology, applied in the field of terminal and security verification, can solve problems such as user memory error, verification failure, and cumbersomeness, and achieve the effect of improving input efficiency and accuracy and avoiding user operations.

Inactive Publication Date: 2015-11-25
IYUNTIAN
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The entire verification code input process is not only very cumbersome, but also likely to cause verification failure due to user memory errors or input errors, which seriously affects the verification code input efficiency and accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification code inputting method and device
  • Verification code inputting method and device
  • Verification code inputting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0015] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0016] figure 1 An exemplary system architecture 100 to which embodiments of the present application may be applied is shown.

[0017] like figure 1 As shown, the system architecture 100 may include terminal devices 101 , 102 , a network 103 and a server 104 . The network...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verification code inputting method and device. The verification code inputting method comprises: obtaining a new short message received by a terminal; detecting whether the new short message is a verification short message; if so, extracting a verification code from the new short message; and inputting the verification code into a specified position of a current display interface. The verification code inputting method is capable of automatically inputting the verification code in the verification short message; as a result, the verification code inputting efficiency is improved.

Description

technical field [0001] The present application relates to the technical field of terminals, in particular to the technical field of security verification, and in particular to a verification code input method and device. Background technique [0002] As people pay more and more attention to network security, mobile phone dynamic SMS verification has become one of the important means of network security verification. In the prior art, network service providers often determine whether the current user has the corresponding operation authority by sending a verification message to a specific communication number (eg, a mobile phone number bound to the current operation account). [0003] Because the terminal receiving the verification short message is often the same terminal as the terminal currently operated by the user. Therefore, when performing identity verification, the user usually needs to exit the current operation interface first, then open the verification text messag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/14H04W4/20H04W12/06
CPCH04W4/14H04W4/20H04W12/06
Inventor 王博通位广军马家智桂敬文王晓卿常磊秦松
Owner IYUNTIAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products