Mobile application security analysis method based on block chain technology
A mobile application and security analysis technology, applied in transmission systems, electrical components, etc., can solve problems such as user and social losses, low processing efficiency, and processing capacity limitations, so as to reduce user and social losses, improve processing efficiency, The effect of improving safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0019] The present invention provides a technical solution: a mobile application security analysis method based on block chain technology, comprising the following steps:
[0020] S1, user registration, the system automatically generates a login ID when registering an account, and the user sets a password by himself. After the registration is completed, real-name authentication is required, and real-name authentication requires real personal information of the user level;
[0021] S2, identity verification. The user logs in to the personal account on the login interface. After the user logs in, the identity authentication module is started to accept the user's access request, and the user is authenticated based on the traditional method. If the authentication is passed, the user's risk is evaluated based on the risk threshold. During evaluation, request that if the user's risk value is within the threshold range, the user passes the authentication and can continue to visit the ...
Embodiment 2
[0029] The present invention provides a technical solution: a mobile application security analysis method based on block chain technology, comprising the following steps:
[0030] S1, identity verification, the user logs in the personal account on the login interface, if there is no account, step 2 is required; after the user logs in, the identity authentication module is started, and the user's access request is accepted, and the user is authenticated based on the traditional method. If the authentication fails, the user If the user fails to pass the authentication, this visit is rejected; forcible intrusion login triggers the abnormal warning module;
[0031] S2, user registration, the system automatically generates a login ID when registering an account, and the user sets a password by himself. After the registration is completed, real-name authentication is required, and real-name authentication requires real personal information of the user level;
[0032] S3, network dat...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com