Method for preventing malicious registration by App
A malicious registration and user technology, applied in the Internet field, can solve problems such as junk data and company financial loss
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0028] There are 7 encryption methods, the matrix table has 7 rows, and the encryption matrix table is: {@"1":@"1|9,2|0,3|8,4|3,5| 7,6|2,7|1,8|4,9|5,0|6",
[0029] @"2":@"1|8,2|5,3|7,4|2,5|6,6|3,7|4,8|9,9|0,0|1",
[0030] @"3":@"1|7,2|1,3|6,4|3,5|5,6|4,7|2,8|0,9|8,0|9",
[0031] @"4":@"1|6,2|8,3|1,4|4,5|9,6|5,7|0,8|2,9|3,0|7",
[0032] @"5":@"1|8,2|0,3|4,4|5,5|3,6|6,7|9,8|1,9|7,0|2",
[0033] @"6":@"1|4,2|5,3|3,4|6,5|8,6|7,7|0,8|2,9|9,0|1",
[0034] @"7":@"1|3,2|6,3|4,4|9,5|1,6|8,7|7,8|0,9|2,0|5"}, every One line represents one kind, the number before "|" is replaced by the number after "|".
[0035] Step 1: Open the mobile App, enter the registration interface, enter the mobile phone number, click to get the verification code, and the App will send the mobile phone number to the server through the network; Step 2: After the server receives the information of the mobile phone number, the server will give data feedback to the App, At the same time, the digital code 1 of t...
Embodiment 2
[0037] Step 1: Open the mobile App, enter the registration interface, enter the mobile phone number, click to get the verification code, and the App will send the mobile phone number to the server through the network; Step 2: After the server receives the information of the mobile phone number, the server will give data feedback to the App, At the same time, the digital code 3 of the encryption method is returned, which is the third row in the matrix table. The server sends the verification code 123456 to the customer's mobile phone through the communication operator to which the mobile phone belongs; Step 3: The customer enters the verification code 123456 in the App , while clicking Submit, the App will encrypt the encrypted data code sent by the server through the verification code. The encrypted number is 716354. Step 4: After the server receives the encrypted verification code, the server will Code 3 performs reverse decryption, and the decrypted verification code is 12345...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com