Method, device and system for data verification
A data verification and random verification code technology, applied in transmission systems, electrical components, etc., can solve the problems that the verification server cannot synchronize the verification code in time and cannot accurately perform data verification.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] According to an embodiment of the present application, an embodiment of a data verification method is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0029] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of the hardware structure of a computer terminal according to a data verification method according to an embodiment of the present application. Such asfigure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processors ...
Embodiment 2
[0130] According to the embodiment of the present application, an embodiment of a data verification method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0131] Under the above operating environment, this application provides such Figure 4 The method of data verification shown. Figure 4 is a flow chart of another data verification method according to an embodiment of the present application, such as Figure 4 As shown, the method includes the following steps:
[0132]In step S40, the first verification server receives the random check code sent by the currently accessed user terminal and the terminal identification information of the user terminal.
[...
Embodiment 3
[0178] According to an embodiment of the present application, there is also provided a data verification device for implementing the above data verification method, such as Figure 5 As shown, the above device includes: a first receiving module 51 , a first sending module 53 , a second receiving module 55 and a third receiving module 57 .
[0179] Wherein, the first receiving module 51 is used for the user terminal to receive the random check code.
[0180] Specifically, the above-mentioned user terminal may be a smart phone (such as an Android phone, an IOS phone, etc.), a tablet computer, a palmtop computer, and a terminal device such as a mobile Internet device (Mobile Internet Devices, MID), and a PAD.
[0181] The first sending module 53 is configured to send the random check code and the terminal identification information of the user terminal to the first verification server that the current user terminal is allowed to access after the user terminal triggers to check th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com