Registration verify method and device

A login verification and verification code technology, applied in the field of login verification methods and devices, can solve the problems of cumbersome input, low security, easy memory of passwords and high security

Active Publication Date: 2017-09-19
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the above-mentioned login verification method, if the character password set by the user is too complex, it will be difficult to remember and enter cumbersome problems, while the character password is too simple, it is easy to be cracked, low security, visible, easy to remember and safe password high sex can not have both

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Registration verify method and device
  • Registration verify method and device
  • Registration verify method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0138] As an implementation manner of the embodiment of the present invention, the verification code generating module 620 may include:

[0139] The coordinate group determines the unit ( Figure 5 not shown in ), used to determine a target coordinate group uniquely corresponding to the target user identifier; the target coordinate group is used to extract pixel information from the first verification image;

[0140] Pixel information extraction unit ( Figure 5 not shown in ), for extracting target pixel information of pixel points corresponding to each coordinate value from the first verification image according to each coordinate value in the target coordinate group;

[0141] Verification code generation unit ( Figure 5 not shown in ), used to generate a first verification code according to the target pixel information.

[0142] As an implementation manner of the embodiment of the present invention, the coordinate group determining unit may include:

[0143] Find subun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a registration verify method and device applied to a terminal; the method comprises the following steps: obtaining a target user identity and a first verify image provided by the user; processing the first verify image according to preset identifying code forming rules, and forming a first identifying code; sending the target user identity and the first identifying code to a server, allowing the server to match the first identifying code with a preset second identifying code corresponding to the target user identity, forming a verify result according to the matching result, and sending the verify result to the terminal; receiving the verify result sent by the server. The method needs not to let the user to set a character cipher, only needs the user to provide the first verify image, thus greatly reducing the cipher memorizing difficulty; the first identifying code can be obtained according to the preset identifying code forming rules, is hard to be decoded, thus improving the cipher security.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a login verification method and device. Background technique [0002] With the continuous development of electronic technology, mobile phones, tablet computers, etc. have become indispensable electronic devices in people's lives, and various applications have emerged as the times require. In order to ensure the security of the application program, the user generally needs to perform login verification when logging in to the application program. [0003] Existing login verification methods are generally based on character passwords, that is to say, users need to enter a user name and corresponding character password when logging in to an application program, and the application program sends the user name and character password to the server, and the server can use the user's The user name searches for the pre-stored password corresponding to the user name (the pass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/083
Inventor 梁建煌
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products