Unlock instant, AI-driven research and patent intelligence for your innovation.

A credential correction method, system, data processing terminal and working method thereof

A data processing terminal and data correction technology, which is applied in the field of communication and can solve the problems of insufficient space for placing desktop devices, high client prices, and large space occupation.

Active Publication Date: 2020-10-27
FEITIAN TECHNOLOGIES
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of science and technology, the application of data processing terminals is becoming more and more extensive. In some application fields involving credentials, data processing terminals need to cooperate with plug-ins on the client to perform credential processing, and the client is generally a desktop device. The end price is high and takes up a lot of space, which cannot meet the needs of customers who do not want to use desktop devices or do not have enough space to place desktop devices;
[0003] In order to meet the needs of customers as mentioned above, data processing terminals with networking functions have appeared on the market. Data processing terminals with networking functions can work with servers; but when data processing terminals with networking functions do not have data input functions, customers cannot Using this type of data processing terminal for credential correction, there is an urgent need for a data processing terminal, method and system to solve this problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A credential correction method, system, data processing terminal and working method thereof
  • A credential correction method, system, data processing terminal and working method thereof
  • A credential correction method, system, data processing terminal and working method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] Embodiment 1 of the present invention provides a credential correction method, including the following steps:

[0061] Step 101: When receiving a confirmation operation including user ID, user password, credential revision data and first credential identifier, the user terminal organizes a confirmation operation request according to the confirmation operation; sends a confirmation operation request to the verification platform;

[0062] For example, when receiving a confirmation operation including user ID UserID: 103885064990623, user password PassWD: qas325, credential revision data Num: 0.01, and first credential ID OrderID: 102002060000000913202006271921446172, the user terminal organizes the confirmation operation request {UserID: 10388620634990 ;PassWD:qas325;Num:0.01;OrderID:102002060000000913202006271921446172;Time:1594191007;type:5};向验证平台发送确认操作请求{UserID:103885064990623;PassWD:qas325;Num:0.01;OrderID:102002060000000913202006271921446172;Time:1594191007; type:5};...

Embodiment 2

[0094] Embodiment 2 of the present invention provides a credential correction method, such as figure 1 with figure 2 shown, including the following steps:

[0095] Step 201: When receiving a confirmation operation including the user ID, user password, credential revision data and the first credential identifier, the user terminal organizes the confirmation operation request according to the confirmation operation; sends the confirmation operation request to the verification platform;

[0096] Optionally, step 201 specifically includes: when the user terminal receives a request to open the confirmation operation page, the user terminal displays the confirmation operation page; Confirmation operation on the confirmation operation page; when receiving the user's confirmation operation on the confirmation operation page, organize the confirmation operation request; send the confirmation operation request to the verification platform;

[0097] For example, when the user terminal...

Embodiment 3

[0185] Embodiment 3 of the present invention provides a credential correction system, such as image 3 As shown, the system includes a user terminal 30, a verification platform 40, a data processing terminal 50 and a server 60;

[0186] The user terminal 30 includes a first receiving module 301, a first organizing module 302, a first sending module 303 and a coding display module 304;

[0187] The verification platform 40 includes a second receiving module 401, a first determining module 402, a first obtaining module 403, a platform verification module 404, a second obtaining module 405, a platform updating module 406 and a second sending module 407;

[0188] The data processing terminal 50 includes a scan determination module 501, a third acquisition module 502, a terminal verification module 503, a terminal update module 504, a first prompt module 505, a signature generation module 506, a third sending module 507, a third receiving module 508 and a third receiving module 508. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a credential correction method, system, data processing terminal and working method thereof, and relates to the communication field. The system includes a user terminal, a verification platform, a data processing terminal and a server; the user terminal includes a first receiving module, a first organization module, a first sending module and a code display module; the verification platform includes a second receiving module, a first determination module , a first acquisition module, a platform verification module, a second acquisition module, a platform update module and a second sending module; the data processing terminal includes a scan determination module, a third acquisition module, a terminal verification module, a terminal update module, a first prompt module, Generate a signature module, a third sending module, a third receiving module and a second prompt module; in the method, the data processing terminal is used in combination with the user terminal to perform a credential correction operation; ensure that only after passing the double-layer verification of the verification platform and the data processing terminal can the Complete the credential correction operation, with high security.

Description

technical field [0001] The present invention relates to the communication field, in particular to a credential correction method, system, data processing terminal and working method thereof. Background technique [0002] With the development of science and technology, the application of data processing terminals is becoming more and more extensive. In some application fields involving credentials, data processing terminals need to cooperate with plug-ins on the client to perform credential processing, and the client is generally a desktop device. The end price is high and takes up a lot of space, which cannot meet the needs of customers who do not want to use desktop devices or do not have enough space to place desktop devices; [0003] In order to meet the needs of customers as mentioned above, data processing terminals with networking functions have appeared on the market. Data processing terminals with networking functions can work with servers; but when data processing t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/44G06F21/45H04L9/32
CPCG06F21/31G06F21/44G06F21/45H04L9/3247
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES