Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer application program verification method

A technology of application program and verification method, applied in the computer field, can solve the problems that the thief is difficult to escape and the computer application program is easy to leak, and achieves the effect of improving security and solving the problem of easy leakage.

Inactive Publication Date: 2021-06-08
QINGDAO HUANGHAI UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the above-mentioned existing problems, the present invention provides a multi-encrypted computer application program verification method, which greatly improves the security of the application program, and solves the shortcoming that the computer application program is easy to leak. Even if the unlocking is successful, the user needs to The mobile phone is finalized, and once the system finds an error, it can lock the face information of the thief and feed it back to the user. At the same time, the door lock is controlled to make it difficult for the thief to escape

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer application program verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In conjunction with the accompanying drawings, the present invention will be described in further detail.

[0015] Such as figure 1 As shown, a computer application verification method of the present invention includes assignment one 1, verification one 2, assignment two 3, verification two 4, assignment three 5 and verification three 6, the assignment one 1 input X1, the verification one 2. Verify whether X1 is consistent, and if so, enter the link of assignment 23, if not, exit the verification program, and the computer application program is locked; said assignment 23 enters Y1, and said verification 24 verifies whether Y1 is consistent, if it is consistent, Then enter the link of assignment 35, if it does not match, then exit the verification program, and the computer application program is locked; the assignment 35 is input into Z1, and the verification 36 verifies whether Z1 matches, if it matches, it will be transmitted to the user's mobile phone, if it does not ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer application program verification method which comprises the steps of first assignment, first verification, second assignment, second verification, third assignment and third verification, specifically, the first assignment is input into X1, the first verification verifies whether the X1 is consistent or not, if yes, the second assignment link is entered, and if not, the verification program is quitted; the second assignment inputs Y1, the second verification verifies whether Y1 is consistent or not, if yes, the third assignment link is entered, and if not, the verification program is quitted; Z1 is input into the third assignment, whether Z1 is consistent or not is verified through the third verification, if yes, the Z1 is transmitted to the mobile phone of the user, and if not, the verification program is quitted. The invention belongs to the technical field of computers, and particularly relates to a multi-encryption type computer application program verification method which overcomes the defect that a computer application program is easy to divulge, and even if unlocking succeeds, a user mobile phone is needed for final determination. Meanwhile, the face information of the thief can be locked and fed back to the user, and the door lock is controlled, so that the thief is difficult to escape.

Description

technical field [0001] The invention belongs to the technical field of computers, and specifically refers to a method for verifying computer application programs. Background technique [0002] In the prior art, some computer application programs have a high level of confidentiality, and verification codes are generally set when they are enabled, but the application program verification methods for computer network identities usually only require one verification code to enter the network system of the application program , but when the security level of the computer system is very high, the common verification system cannot meet the needs, and now there is no program verification method that can lock the wrong person on the basis of input errors. Contents of the invention [0003] In order to solve the above-mentioned existing problems, the present invention provides a multi-encrypted computer application program verification method, which greatly improves the security of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/45G07C9/00G08B13/196
CPCG06F21/31G06F21/45G07C9/00309G07C9/00563G08B13/196
Inventor 邹翠王泽松崔宪平孙学进杨军
Owner QINGDAO HUANGHAI UNIV