Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification method, server and terminal

A verification method and server technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of not fully exploiting other uses of verification codes, single function of verification codes, etc., and achieve the effect of advertising

Inactive Publication Date: 2017-06-13
BEIJING 58 INFORMATION TTECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The verification codes of the above methods are only applied to prevent malicious login behaviors, and have no other effects. The function of the verification code is single, and other uses of the verification code have not been fully explored.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method, server and terminal
  • Verification method, server and terminal
  • Verification method, server and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention. The following content is a detailed description of specific implementation methods, structures, features and functions according to the application of the present invention in conjunction with the accompanying drawings and preferred embodiments.

[0058] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the pres...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a verification method, a server and a terminal. The verification method comprises the following steps: when a user logs in the first internet product at the first terminal, the verification request is sent through the first terminal to the first server corresponding to the first internet product to request login the first internet product; and the first server generates a verification code displaying in the advertisement form according to the prestored behavior data and pushes to the first terminal, so that the first terminal can complete the verification and login according to the verification code. According to the verification method, the first server generates a verification code in the advertisement form for each of the different users according to the behavior data of the user, and the verification code inputting is a necessary step to login the internet products, therefore, the purpose of advertising can be realized while realizing the verification function of the verification code.

Description

technical field [0001] The embodiments of the present invention relate to communication technologies, and in particular to a verification method, server and terminal. Background technique [0002] With the development of the Internet, there are more and more types and quantities of Internet products, such as web pages and applications (Application, APP). In order to pay attention to users, most Internet products provide account login functions. At the same time, in order to prevent malicious login behaviors such as malicious cracking of passwords, swiping tickets, flooding forums, and brute force cracking, when users log in, Internet products require users to fill in a verification code when filling in their username and password. [0003] Usually, the verification code is displayed in the following ways: method 1, simple numbers or characters; method 2, the calculation result of numbers, for example: 3×4, the answer is 12; method 3, identifying patterns, such as 12306 veri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815
Inventor 刘孟吕庆春
Owner BEIJING 58 INFORMATION TTECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products