Unlock instant, AI-driven research and patent intelligence for your innovation.

Information verification method and device, computer equipment and storage medium

A technology of information verification and computer programs, which is applied in the field of security to achieve the effect of improving security

Active Publication Date: 2020-05-26
招银云创信息技术有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the user who has the verification information deliberately leaks the specific content of the verification information, or the user who has the verification information is maliciously stolen the specific content of the verification information, it will cause a very large security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information verification method and device, computer equipment and storage medium
  • Information verification method and device, computer equipment and storage medium
  • Information verification method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0067] In daily life, for some specific information, users need to ensure the security of the information. Generally, users can ensure the security of information by using verification information. Specifically, the user can set a legal verification field for the specific information to be protected. When the user wants to obtain the specific information, he needs to enter the correct legal verification field to pass the information verification and obtain the specific information.

[0068] For example, if a bank administrator wants to protect the information of the entir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an information verification method and device, computer equipment and a storage medium in the technical field of safety. The method comprises the following steps: firstly, sequentially receiving a plurality of first verification fields sent by a first terminal; splicing the plurality of first verification fields to obtain a spliced first verification field; and finally, comparing the spliced first verification field with a pre-stored legal verification field, and when the spliced first verification field is the same as the pre-stored legal verification field, outputting information that the information passes the verification. The security of information verification can be improved.

Description

technical field [0001] The present application relates to the field of security technology, in particular to an information verification method, device, computer equipment and storage medium. Background technique [0002] In daily life, we can ensure the security of information by setting and using verification information. During the process of using the verification information, the specific content of the verification information can be mastered by at least one user. When the specific content of the verification information is intentionally leaked by the user who has the verification information, or the specific content of the verification information is maliciously stolen by the user who has the verification information, a very large security risk will be caused. [0003] Therefore, there is an urgent need for an information verification method that can improve security. Contents of the invention [0004] Based on this, it is necessary to provide an information verif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/44
CPCG06F21/31G06F21/44G06F2221/2133G06F2221/2129
Inventor 陈欣炜
Owner 招银云创信息技术有限公司