Verification processing method and device, equipment, and medium

A processing method and display verification technology, applied in the direction of program control device, electronic digital data processing, computer security device, etc., can solve the problem that the risk of password leakage cannot be effectively reduced

Pending Publication Date: 2020-09-18
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, entering the password through the virtual security keyboard only increases the complexity of password input, and cannot effectively reduce the risk of password leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification processing method and device, equipment, and medium
  • Verification processing method and device, equipment, and medium
  • Verification processing method and device, equipment, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0053] This embodiment of the application involves passwords. A password is a technology used to confuse. A password is generally composed of at least one character in sequence. A password is also called a password string. The characters can include letters, numbers, arithmetic symbols, punctuation marks and other symbols, as well as some functional characters. Symbols, etc.; passwords can be divided into static passwords and dynamic passwords. Static passwords refer to passwords in which t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a verification processing method and device, equipment and a medium. The verification processing method can comprise the steps that a verification page is displayed, the verification page comprises a display area and an input area, the display area is used for displaying M character verification keyboards, the character verification keyboards are read-onlykeyboards, and each character verification keyboard comprises at least one character randomly displayed at a character display position; a to-be-verified password character string input in the input area is obtained, the password character string comprising N characters input in sequence, M and N being positive integers, the characters in the password character string are the characters displayedin the character verification keyboard; and the password character string is verified according to the input sequence of the N characters and the character display positions of the N characters in theM character verification keyboards. By adopting the embodiment of the invention, the security of the password character string can be effectively improved.

Description

technical field [0001] The present application relates to the field of computer technology, specifically to the field of verification processing, and in particular to a verification processing method, a verification processing device, a verification processing device, and a computer-readable storage medium. Background technique [0002] Many application clients (for example, ATM (Automatic Teller Machine, automatic teller machine), online banking client, etc.) will involve the input and verification of passwords when performing highly sensitive authority operations; Peeping, the peeping person can complete password verification based on the password, and then perform highly sensitive authority operations. Therefore, a protection mechanism needs to be set during the password input and verification process to improve the security of the password. A common protection mechanism is to enter a password through a virtual security keyboard when performing a highly sensitive operati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/0488G06F9/451G06F21/60
CPCG06F3/04886G06F21/602G06F9/451
Inventor 苏楠
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products