Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for generating a verification password

A technology for verifying passwords and passwords, applied in the field of generating verification passwords, it can solve problems such as manual configuration by users, and achieve the effect of dynamic

Active Publication Date: 2019-06-11
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, taking the terminal as an example of a smart phone, at present, the verification password of the smart phone is preset by the user on the smart phone, for example, multiple digits or patterns can be preset as the verification password of the smart phone. The verification password setting method needs to be manually configured by the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for generating a verification password
  • A method and device for generating a verification password
  • A method and device for generating a verification password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0041] see figure 1 , is a schematic flowchart of a method for generating a verification password provided by an embodiment of the present invention, and the method can be performed by a smart phone (such as an Android phone, an iOS phone, a Windows Phone, etc.), a tablet computer, a mobile Internet device (Mobile Internet Devices, MID) or wearable devices and other terminals, such as figure 1 A method for generating a verification password shown may include the f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a verification password generation method. The method comprises the steps of obtaining current position information of a terminal; querying a preset database according to the current position information of the terminal to obtain a character combination corresponding to the current position information; and setting the character combination corresponding to the current position information to be a verification password of the terminal. An embodiment of the invention furthermore discloses a verification password generation apparatus. By adopting the method and the apparatus, different terminal verification passwords can be automatically generated according to different position information of the terminal.

Description

technical field [0001] The invention relates to the field of computer application technology, in particular to a method and device for generating verification passwords. Background technique [0002] With the development of communication technology and electronic technology and the continuous improvement of people's living standards, various terminals (such as smart phones, tablet computers, etc.) are widely used in people's daily life. For example, taking the terminal as an example of a smart phone, at present, the verification password of the smart phone is preset by the user on the smart phone, for example, multiple digits or patterns can be preset as the verification password of the smart phone. The verification password setting method needs to be manually configured by the user. Contents of the invention [0003] The technical problem to be solved by the embodiments of the present invention is to provide a method and device for generating a verification password. Di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/46G06F16/29
CPCG06F16/29G06F21/31G06F21/46
Inventor 关光炫
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD