Unlock instant, AI-driven research and patent intelligence for your innovation.

Credit verifying method and device

A verification method and a verification device technology are applied in the field of information security to achieve the effect of protecting security and saving user operations

Inactive Publication Date: 2016-05-25
NEUSOFT XIKANG HEALTHCARE TECH
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

cause a lot of trouble for users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credit verifying method and device
  • Credit verifying method and device
  • Credit verifying method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0036] figure 1 It is a schematic structural diagram of an implementation environment shown according to an exemplary embodiment. Such as figure 1 As shown, the implementation environment may include: a terminal device 110 and a server 120 .

[0037] The terminal device 110 may be a terminal device such as a personal computer, a smart phone, or a tablet computer. figure 1 In the illustration, the terminal device 110 is a personal computer.

[0038] Server 120 may be a computer system capable of providing certain services to other machines in a network. For example, it could be any website or other service provider's computer system.

[0039]Wherein, the co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a credit verifying method and device. The credit verifying method applied in a terminal device comprises following steps: sending the credit request of a user to a server so that the server generates credit information corresponding to the user identity information of the user and feeds back the credit information to the terminal device; storing the credit information in the terminal device; when the user executes sensitive operations through the terminal device, and sending the credit information to the server so that the server verifies received credit information. According to the method and the device of the invention, the security of the sensitive operations is protected; and the user operations are reduced.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a credit verification method and device. Background technique [0002] With the rapid development of the Internet, there are more and more situations where people use terminal devices to perform various sensitive operations through the Internet. For example, people may perform sensitive operations such as changing passwords and order payments through the Internet in the application of terminal devices. [0003] In order to protect the security of these sensitive operations, the server on the network side usually requires the user to perform secondary authentication. For example, the secondary identity verification is performed by sending a verification code to the mobile phone, sending a verification email to the user's mailbox, or requiring the user to answer a security question. [0004] However, to perform secondary identity verification in these existing ways, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 于波杨波启哲
Owner NEUSOFT XIKANG HEALTHCARE TECH