Unlock instant, AI-driven research and patent intelligence for your innovation.

A verification method and device

A verification method and character verification technology, applied in the field of information security, can solve the hidden dangers of user account security, increase the risk of user payment password being stolen, and may be seen by others, so as to achieve the effect of enhancing security

Active Publication Date: 2020-01-24
ADVANCED NEW TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Taking the payment password as an example, when the user enters the payment password on the terminal to make payment, if the user is in a crowd, the payment password entered by the user is very likely to be seen by others, which increases the risk of the user's payment password being stolen, causing User account security brings great hidden dangers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A verification method and device
  • A verification method and device
  • A verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0046] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a verification method and device.The verification method comprises following steps: obtaining confusion passwords inputted by a user; judging the presence of verification passwords set by the user in the confusion passwords; and confirming to validate verification passwords in the confusion passwords.By adoption of the technical scheme, safety of verification passwords is enhanced.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a verification method and device. Background technique [0002] With the extensive development of Internet technology, information security issues are particularly prominent. When people use various APPs (Application, application software) loaded on the terminal for entertainment and shopping, they usually need to enter a password for identity verification. [0003] Taking the payment password as an example, when the user enters the payment password on the terminal to make payment, if the user is in a crowd, the payment password entered by the user is very likely to be seen by others, which increases the risk of the user's payment password being stolen, causing The user's account security brings great hidden dangers. Contents of the invention [0004] In view of this, the present application provides a verification method and device. [0005] Specifica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/46
Inventor 曾岳伟
Owner ADVANCED NEW TECH CO LTD