Verification code processing method, client and user terminal

A technology of a user terminal and a processing method, applied in the field of application software, can solve the problem of multiple execution steps in a mobile phone system, and achieve the effects of reducing signaling consumption, execution steps, and operation time.

Active Publication Date: 2019-12-10
ALIBABA GRP HLDG LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a verification code processing method, a client terminal and a user terminal to at least solve the technical problem that the existing verification code needs to be memorized by the user and the mobile phone system has many execution steps

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification code processing method, client and user terminal
  • Verification code processing method, client and user terminal
  • Verification code processing method, client and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] According to the embodiment of the present application, a method embodiment of a verification code processing method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions , and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0026] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking running on a mobile terminal as an example, figure 1 It is a hardware structural block diagram of a mobile terminal according to a verification code processing method according to an embodiment of the present application. Such as figure 1 As shown, the mobile terminal 10 may include one or more (only one is shown...

Embodiment 2

[0076] According to the embodiment of the present application, an embodiment of an apparatus for implementing the foregoing method embodiment is also provided, and the apparatus provided in the foregoing embodiment of the present application can run on a mobile terminal.

[0077] Figure 8 is a schematic structural diagram of a client according to an embodiment of the present application.

[0078] Such as Figure 8 As shown, the client may include a first detection unit 802 , a replication unit 804 and a processing unit 806 .

[0079] Wherein, the first detecting unit 802 is used to detect whether the short message contains a verification code when detecting that the user terminal has received the short message; the copying unit 804 is used to copy the short message if the short message contains the verification code. The verification code is copied to the clipboard of the user terminal; the processing unit 806 is configured to display a first message through the user termin...

Embodiment 3

[0100] The embodiment of the present application also provides a storage medium. Optionally, in this embodiment, the above-mentioned storage medium may be used to store the program code executed by the verification code processing method provided in the first embodiment above.

[0101] Optionally, in this embodiment, the above-mentioned storage medium may be located in any computer terminal in the group of computer terminals in the computer network, or in any mobile terminal in the group of mobile terminals.

[0102] Optionally, in this embodiment, the storage medium is configured to store program codes for performing the following steps: when the client detects that the user terminal has received a short message, detect whether the short message contains a verification code; if the The short message contains the verification code, and the verification code is copied to the pasteboard of the user terminal; the first message is displayed through the user terminal, wherein the f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses an authentication code processing method, a client, and a user terminal. The method comprises the following steps: when detecting that a user terminal receives a short message, a client detects whether the short message contains an authentication code; if the short message contains the authentication code, the authentication code is copied to the pasteboard of the user terminal; and a first message is displayed through the user terminal, wherein the first message indicates that the authentication code has been copied to the pasteboard of the user terminal. The technical problem that the mobile phone system needs to perform a lot of steps as the existing authentication code needs to be memorized by users is solved.

Description

technical field [0001] The present application relates to the field of application software, in particular, to a verification code processing method, a client and a user terminal. Background technique [0002] Nowadays, when users perform operations such as registration, authorization, and payment, they often trigger a "verification code" text message. The user needs to extract the verification code number in the text message and then input it into the mobile phone. [0003] According to the survey, 84.85% of the mobile phones can see the verification code without the user opening the text message. The user needs to silently remember the verification code number and then enter it into the corresponding application; the remaining 15.15% of the users must leave the application and open the mobile phone SMS, check the verification code and then return to the application, the process is cumbersome, resulting in more steps to be executed by the mobile phone system, large signalin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/725H04W4/14
Inventor 胡雪梅陈昭宇刘坤
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products