Unlock instant, AI-driven research and patent intelligence for your innovation.

Security check method and security check device

A technology of safety verification and verification code, which is applied in the field of safety verification methods and equipment, can solve problems such as safety loopholes, and achieve the effect of improving safety

Active Publication Date: 2016-03-30
ADVANCED NEW TECH CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that there are still security loopholes in the security verification process based on the verification code in the prior art.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security check method and security check device
  • Security check method and security check device
  • Security check method and security check device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the objectives, technical solutions, and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, not all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0026] figure 1 It is a schematic flowchart of a security verification method provided by an embodiment of the present invention. Such as figure 1 As shown, the method includes:

[0027] 101. The server sends the first check code to the terminal device of the user, so that the terminal device provides the first check code to the user. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security check method and a security check device. The method comprises the following steps: a server sends a first check code to a terminal device of a user so as to enable the terminal device to offer the first check code to the user; the server receives a second check code sent by a client, wherein the second check code is obtained by the user through processing of the first check code according to preset processing rules and offered to the client; and the server performs security check according to the processing rules, the first check code and the second check code. By implementing the technical scheme of the invention, the safety of security check based on check codes can be further improved.

Description

【Technical Field】 [0001] The present invention relates to the field of Internet technology, in particular to a safety verification method and equipment. 【Background technique】 [0002] Mobile phone verification codes are widely used in various Internet applications for convenient and quick security verification (for example, user identity verification). According to different Internet applications, the content of security verification based on mobile phone verification code will be different. In Internet applications, the mobile phone verification code is generally used: the client completes some operations in the Internet application based on some basic information (such as account and password, or bank card number or credit card number), and then the background server sends a verification Code to the pre-bound mobile phone, and then the user provides the check code to the server through the client. The server determines whether the check code provided by the client is the same...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 刘波郑科
Owner ADVANCED NEW TECH CO LTD