Safety verification method and device
A technology for security verification and password verification, applied in the field of security verification methods and devices, can solve problems such as cumbersome operations, slow application program speed, etc., to simplify the operation steps, reduce the number of times of entering passwords, and improve the speed and the efficiency of security verification. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0038] see figure 2 , figure 2 It is a flow chart of the security verification method provided by the first embodiment of the present invention. Such as figure 2 As shown, the security verification method provided in this embodiment includes the following steps:
[0039] Step S101, when it is detected that the user has logged into the account of the preset application program, it is judged whether the user has logged into the account by verifying the password;
[0040] In this embodiment, the application program that needs to be detected can be preset by the user, and the mobile terminal 100 can set the type or name of the application program that needs to be detected according to the setting instruction triggered by the interactive interface provided by the user on the mobile terminal 100 at any time. Make presets. Alternatively, the mobile terminal 100 can also set a certain type of application program as an application program that needs to be detected according to t...
no. 2 example
[0065] see image 3 , image 3 It is a flow chart of the security verification method provided by the second embodiment of the present invention. Such as image 3 As shown, the security verification method provided in this embodiment includes the following steps:
[0066] Step S201, the mobile terminal detects whether there is a user logging in to a preset application program account;
[0067] In this embodiment, the application program that needs to be detected can be preset by the user, and the mobile terminal 100 can set the type or name of the application program that needs to be detected according to the setting instruction triggered by the interactive interface provided by the user on the mobile terminal 100 at any time. Make presets. Alternatively, the mobile terminal 100 can also set a certain type of application program as an application program that needs to be detected according to the setting rules issued by the server, for example: payment application programs...
no. 3 example
[0087] see Figure 4 , Figure 4 It is a flow chart of the security verification method provided by the third embodiment of the present invention. Such as Figure 4 As shown, the security verification method provided in this embodiment includes the following steps:
[0088] Step S301, the mobile terminal detects whether there is a user logging in to a preset application program account;
[0089] Step S302, when it is detected that the user has logged into the account, it is judged whether the user has logged into the account by verifying the password;
[0090] If not, execute step S303: display a preset password input box to guide the user to log in to the account by inputting a verification password;
[0091] Step S301 to step S303 are the same as step S201 to step S203 in the second embodiment, and will not be repeated here.
[0092] If so, execute step S304: collect the current location data of the user and the historical location data when the user exited the account la...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


