Operation verification method and operation verification device
A verification method and post-verification technology, applied in the computer field, can solve problems such as low verification efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] In an embodiment of the present invention, an embodiment of the above operation verification method is provided. As an optional implementation, the operation verification method can be applied, but not limited to, such as figure 1 In the shown application environment, the first client running on the first terminal 106 obtains an operation request for performing a first operation, and obtains an audio file matching the first operation in response to the operation request, wherein the audio file uses In verifying whether the first operation is allowed to execute, the second client running on the network 104 and the second terminal 102 connected to the network 104 obtains the verification result after the verification of the audio file, wherein the second client and the first A client has an association relationship, and the second client has passed the verification, and when the verification result indicates that the first operation is allowed to be performed, the above-m...
Embodiment 2
[0126] According to an embodiment of the present invention, an operation verification device for implementing the above operation verification method is also provided, such as Figure 8 As shown, the device includes:
[0127] 1) a first obtaining unit 802, configured to obtain an operation request for performing a first operation in a first client running on a first terminal;
[0128] 2) The second obtaining unit 804 is configured to obtain an audio file matching the first operation in response to the operation request, wherein the audio file is used to verify whether the first operation is allowed to be performed;
[0129] 3) The third obtaining unit 806 is configured to obtain the verification result after the audio file verification through the second client running on the second terminal, wherein the second client has an association relationship with the first client, and the second client has been verified;
[0130] 4) The execution unit 808 is configured to execute the...
Embodiment 3
[0201] The application environment of the embodiment of the present invention may be, but not limited to, refer to the application environment in Embodiment 1, which will not be repeated in this embodiment. The embodiment of the present invention provides an optional specific application example for implementing the above operation verification method. For example, it is applied to the following scenarios: devices or users who have difficulty recognizing images or texts, such as devices with low recognition accuracy, or blurred images and texts, or users who are visually impaired, do not need to use texts or images for verification. By using audio files, cross-device operation verification can be realized, thereby expanding the range of application groups performing operation verification, and enabling more users to participate in fast and convenient operation verification.
[0202] As an optional embodiment, the above operation verification method can be applied to but not li...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


