Security verification-based mobile terminal operation method and system

A security verification and mobile terminal technology, applied in the field of mobile terminal operation methods and systems based on security verification, can solve problems such as easy formation of loopholes, increase of illegal things, and proliferation of false information, and achieve the effect of avoiding loopholes

Inactive Publication Date: 2017-05-10
SHENZHEN YOOMAA TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, direct dial-up is used for business operations. For payment business, both parties generally pay directly; for securities account opening business, it is only dial-up or fill in information to complete the account opening; for auto insu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security verification-based mobile terminal operation method and system
  • Security verification-based mobile terminal operation method and system
  • Security verification-based mobile terminal operation method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0049] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0050] The implementation of the present invention will be described in detail below in conjunction with specific embodiments.

[0051] Reference Figure 1~7 , Is a preferred embodiment provided by the present invention.

[0052] Such as figure 1 As shown, the mobile terminal operation method based on security verification provided in this embodiment includes the following steps:

[0053] S1. The server obtains the content of the user's dial-up service operation;

[0054] S2. Perform security verification on the user's information and determine whether the user's information is true;

[0055] S3. If...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security verification-based mobile terminal operation method and system. The method comprises the steps that a server obtains business operation contents of dialing by a user; performing security verification on user information and judging whether the user information is true or not; if the user information is true, performing corresponding business operation; and if the user information is not true, performing corresponding processing. According to the method and the system, the user performs the business operation by utilizing a mobile terminal when dialing for performing the business operation, and the user information is subjected to the security verification, and the corresponding operation is performed according to a verification result, so that the business processing operation can be accessed through the security verification in combination with the security verification of business information, a vulnerability is prevented from being formed, the flooding of false information is reduced, and the occurrence probability of illegal things is reduced.

Description

technical field [0001] The invention relates to the technical field of safety verification, in particular to a method and system for operating a mobile terminal based on safety verification. Background technique [0002] In order to improve work efficiency, more and more businesses are chosen to be completed on mobile terminals, such as direct dial-up for payment, securities account opening, auto insurance form filling and other businesses. [0003] At present, direct dial-up is used for business operations. For payment business, both parties generally pay directly; for securities account opening business, it is only dial-up or fill in information to complete the account opening; for auto insurance form, it is directly reported and filled in information. There is no security verification in these processes. The process is easy to form loopholes, causing the proliferation of false information and increasing the probability of illegal incidents. [0004] Therefore, it is nece...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/40G06Q40/08G06Q40/04H04L29/06
CPCG06Q20/4014G06Q40/04G06Q40/08H04L63/0876Y02A10/40
Inventor 郑强
Owner SHENZHEN YOOMAA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products