Verification method based on secondary geographic location information

A geographic location information and secondary verification technology, applied in the field of verification based on secondary geographic location information, to achieve a safe and reliable verification method and prevent false passes

Pending Publication Date: 2018-05-11
黄策
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even in the dual-terminal verification method with stricter verification conditions, the reality is that with the technical support of various Trojan horse viruses and the cooperation of various deceptions, it is still impossible to avoid the occurrence of various illegal verifications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method based on secondary geographic location information
  • Verification method based on secondary geographic location information
  • Verification method based on secondary geographic location information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The content of the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments of the description:

[0019] figure 1 It is a schematic diagram of the network connection of the current single-terminal verification mode. In this mode, the user's business confirmation work is performed on terminal A, and the network platform passes the user's business confirmation application after obtaining the correct verification information.

[0020] figure 2 It is the network connection schematic diagram of the current dual-terminal verification mode; in this mode, the user's business confirmation work is performed on terminal A, and the network platform obtains the correct verification information and sends it to terminal B for secondary verification After receiving the information, the terminal A confirms the application through the user's business.

[0021] Under the above two verification modes, with the cooperation of Troja...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verification method based on secondary geographic location information. The method is characterized in that when a user submits a verification application on a terminal A connected to a network platform, the user needs to complete by cooperative operation on the terminal A for verification task submission and a secondary verification terminal (terminal B). The network platform reads verification information input on the terminal A and the terminal B by the user, and geographic location information of the terminal A and the terminal B; the network platform not only needs to verify the verification information input by the user through the terminal A and the terminal B but the geographic location information of the two terminals; the network platform can confirm theverification application submitted on the terminal A by the user on the terminal A under a condition that the verification information input by the user through the two terminals and the geographic location information of the two terminals are verified. The method can provide the safer and more reliable verification method.

Description

technical field [0001] The invention relates to a verification method based on secondary geographic location information. Background technique [0002] In various network-based applications, users submit verification and authentication tasks on terminals connected to the network platform, and the network platform interacts with the authentication information of the user through the terminal that submits the authentication tasks, and verifies the received authentication information. Completing the verification of verification and certification tasks is an essential and important link in various network-based applications. It can be said that without the information verification of submitted certification tasks, it is impossible to have various network-based applications. . [0003] However, because the verification and authentication work is based on the data interaction between the terminal where the user submits the verification and authentication task and the network plat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0838H04L63/0876H04L63/107H04L63/12H04L63/1441
Inventor 黄策
Owner 黄策
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products