Mobile phone security verification method based on intelligent network

A technology of mobile phone security and verification method, applied in the field of mobile phone security verification based on intelligent network, can solve the problem of inability to guarantee user accounts, etc., and achieve the effect of high security and high security

Inactive Publication Date: 2017-05-31
江苏号百科技有限公司
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can only ensure that the verification result is feasible, but it cannot guarantee the account security in the event of the user account being stolen or the password leaked.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone security verification method based on intelligent network
  • Mobile phone security verification method based on intelligent network
  • Mobile phone security verification method based on intelligent network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0033] A mobile phone security verification method based on an intelligent network, such as figure 1 shown, including the following steps:

[0034] Step 1: The user makes payment through the mobile payment software, which includes a mobile banking client, a third-party payment client and a mobile payment software based on near-field communication technology (NFC).

[0035] Step 2: If figure 2 As shown, it is judged whether the actual payment location is consistent with the location of the mobile phone card through the regional consistenc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile phone security verification method based on an intelligent network. The security of a payment account of a user is not protected just depending on the consistency verification of the account password of the user, data are obtained from the network ability of an operator, the payment security risks are identified by the combination of regional consistency verification and login verification of the present card, the verification is realized by the network of the operator without being affected by the Trojan virus of the mobile phone, thereby being unlikely to break, higher in security, and authoritative, and the flow of the present platform cannot be duplicated by technical means at the outside.

Description

technical field [0001] The invention belongs to the technical field of mobile Internet security, in particular to an intelligent network-based mobile phone security verification method. Background technique [0002] With the current popularization of smart terminals, there are various types of mobile phone viruses and Trojan horses, and a large number of infected users have already brought serious negative impacts on users' safe online environment. The existing mobile Internet security technology mainly relies on the security mechanism of the mobile phone APP itself, and the method adopted is mainly verification code verification, which is relatively easy to be broken. Once cheated, the amount involved is often relatively large. Public opinion orientation often associates operators with social responsibility issues such as information security and information purification. [0003] The application number is 201410429090.6, and the patent name is the patent of safety verifi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06Q20/32
CPCG06Q20/322G06Q20/401G06Q20/4014
Inventor 袁海戴志强盛康
Owner 江苏号百科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products