Unlock instant, AI-driven research and patent intelligence for your innovation.

A verification method and device

A verification method and equipment technology, applied in the field of communication, can solve problems such as inconvenient management and leakage, and achieve the effect of convenient management and security.

Active Publication Date: 2019-06-21
ADVANCED NEW TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the inventor found in the process of implementing this application that although the existing account password verification is the longest and most widely used method, the user needs to additionally set his own account and corresponding password for this purpose, which is very difficult to manage. Inconvenience, and there is a risk of disclosure, the gesture password needs the auxiliary support of the corresponding device, and it is easy to be obtained by others during the input process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A verification method and device
  • A verification method and device
  • A verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] As mentioned in the background art, the current authentication methods for users are not only cumbersome to manage, but also cannot be guaranteed in safety. For this reason, this application proposes a verification method. When verifying the correctness of the signature, in addition to verifying the correctness of the input signature content, it is also necessary to verify the size and font information of the signature content. Only when all three verifications pass Identity verification is officially passed; it is more convenient and safer than gesture passwords and signature verification methods commonly used in the market.

[0017] Such as figure 1 As shown, it is a schematic flow chart of a verification method proposed in this application, including the following steps:

[0018] S101. Obtain character content, font type and size of each character in the signature information submitted by the user.

[0019] Specifically, based on different ways of user input, this ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a verification method. The character content, the font type of characters and the size of characters in signature information submitted by a user are compared with those in verification information preset by the user, and the signature information passes verification when the character content, the font type of characters and the size of characters in the signature information are consistent with those in the verification information. Convenient management of user signature information is realized, and the security of signature information verification is ensured.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a verification method. The present application also relates to a verification device. Background technique [0002] With the continuous development of network technology, people pay more and more attention to the security of user accounts. In the current field of identity verification, in addition to traditional account password verification, account identity verification methods such as gesture passwords have also been developed. Users can perform important operations such as account login and payment through these verification methods. [0003] However, the inventor found in the process of implementing this application that although the existing account password verification is the longest and most widely used method, the user needs to additionally set his own account and corresponding password for this purpose, which is very difficult to manage. Inconve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 殷光辉
Owner ADVANCED NEW TECH CO LTD