Unlock instant, AI-driven research and patent intelligence for your innovation.

String verification method and device

A string verification and string technology, applied in the computer field, can solve the problems of failing to pass identity authentication, affecting the effectiveness of the network platform and user experience friendliness, etc., to achieve the effect of improving the accuracy of judgment and improving the effectiveness

Active Publication Date: 2022-06-07
ADVANCED NEW TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in some cases, in this way, for example, when the user enters a long (such as 20 characters) verification string, or cannot remember the exact verification string, if he enters or remembers a character incorrectly, he cannot pass the identity authentication. , when the user cannot determine which character was mistyped or misremembered, he needs to re-enter and try again, which affects the effectiveness of the network platform or application and the friendliness of the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • String verification method and device
  • String verification method and device
  • String verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The solution provided in this specification will be described below with reference to the accompanying drawings.

[0054] figure 1 A schematic diagram of an implementation scenario of an embodiment disclosed in this specification. As shown in the figure, the user can set user names and login passwords for various client applications, such as e-mail, dating applications, shopping applications, payment applications, and so on. The client applications here can run on various terminal devices with data processing capabilities and data input functions, such as smart phones, tablet computers, desktop computers, and so on. The computing platform, such as the server of the above-mentioned client application, can use the above-mentioned login password set by the user as a standard character string, and generate a check character set including the standard character string and the fault-tolerant character string. Next, when the user logs in to the platform through the client ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of this specification provides a method and device for character string verification. According to the method, firstly, the current character string input by the user is received, and the current character string is matched with multiple verification character strings pre-stored in the verification data set. , wherein the multiple check strings include a standard string set by the user and at least one fault-tolerant string associated with the standard string, and then determine whether the current string passes the check according to the matching result. Further, the above verification data set may be updated according to the verification result. In this way, strings can be verified more efficiently.

Description

technical field [0001] One or more embodiments of this specification relate to the field of computer technology, and in particular, to a method and apparatus for performing character string verification by a computer. Background technique [0002] With the development of computer and Internet technologies, people come into contact with more and more network platforms or applications in their lives, such as e-mails, dating applications, shopping applications, payment applications, and so on. When a user uses these network platforms or applications, the background server usually verifies the user's identity through the verification string (such as verification code, password, password, etc.) associated with the user's identity (such as mobile phone number, user name, username, etc.) The user accounts of users on these network platforms or applications are violated, such as being fraudulently used by others, hacked, etc. [0003] In the conventional technology, in order to ach...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/45G06F16/903
CPCG06F21/45G06F2221/2141
Inventor 周俊
Owner ADVANCED NEW TECH CO LTD