Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for identifying by using verification code

A verification code and verification request technology, applied in the Internet field, can solve the problems of cumbersome work, easy input errors, waste of user time, etc., to achieve the effect of improving verification efficiency, simplifying verification methods, and avoiding verification failures

Inactive Publication Date: 2014-10-15
XIAOMI INC
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This implementation of verification codes is very inconvenient for users
First of all, the work of the user inputting the verification code is cumbersome, wastes the user's time, and easily affects the user's experience of the network application, especially when entering the verification code on a mobile terminal (such as a mobile phone), it will be more inconvenient for the user to operate; secondly , in order to improve the difficulty of machine recognition, some verification codes are too complicated, such as needing to input Chinese characters, or blurring, distorting, or character-gluing the generated verification codes, so that the difficulty for users to input verification codes will increase a lot. It is easy to input errors, resulting in the failure to use the network application normally and reducing the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying by using verification code
  • Method and device for identifying by using verification code
  • Method and device for identifying by using verification code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0144] In this embodiment, the terminal is a computer using a mouse. like Figure 4 shown, including the following steps:

[0145] Step S401, the user sends a request for obtaining a verification code to the server through a click operation;

[0146] Step S402, the server receives the acquisition request sent by the user, and generates the verification code acquisition information for this verification, including the verification identification, the operation object of the verification code, and the operation mode prompt information; for example, the operation object is "A" arranged in sequence in the form of pictures "B" "C" "D" "E" "F" six characters, the corresponding position information is 0x001, 0x002, 0x003, 0x004, 0x005, 0x006, the prompt information of the operation method is: Please drag and drop the exchange character "C" and "D" position;

[0147] Step S403, the server operates the operation object according to the prompt information of the operation mode, and o...

Embodiment 2

[0157] In this embodiment, the terminal is a tablet computer using a touch screen, such as Figure 7 shown, including the following steps:

[0158] Step S701, the user sends a request for obtaining a verification code to the server by touching the screen;

[0159] Step S702, the server receives the acquisition request sent by the user, and generates verification code acquisition information, including verification identification, verification code operation object and operation mode prompt information; for example, the operation object is "A" "B" " C", "D", "E" and "F" are six characters, and the prompt message of the operation method is: Please drag and drop to exchange the positions of the characters "C" and "D";

[0160] Step S703, the server sends the generated verification code acquisition information to the terminal;

[0161] Step S704, after receiving the verification code acquisition information, the terminal displays the operation object and operation mode prompt in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for identifying by using a verification code. The method comprises the steps of: when a request of obtaining the verification code from a terminal is received, generating verification code obtaining information including a verification identifier for the verification, and obtaining an operating object of the verification code and operating mode prompting information; sending the verification code obtaining information to the terminal; receiving a verification request from the terminal, wherein the verification request comprises the verification identifier and a first identification code obtained after operation is performed on the operating object based on the operating mode prompting information. A user is unnecessary to input the verification code manually as the operating object is operated based on the operating mode prompting information of the verification code and the result after the operation is verified. Therefore, the verification mode is simplified, verification failure caused by a manual input error of the user is avoided, the verification efficiency of the verification code is improved, and the user experience is increased.

Description

technical field [0001] The present disclosure relates to the technical field of the Internet, and in particular to a method and device for verification using a verification code. Background technique [0002] At present, when using a network application, a user mostly needs to verify a verification code, and the network application can only be used when the verification code is passed. [0003] In related technologies, the implementation of verification codes is mainly based on user input, including inputting numbers or Chinese characters. The realization mode of this verification code is very inconvenient for the user. First of all, the work of the user inputting the verification code is cumbersome, wastes the user's time, and easily affects the user's experience of the network application, especially when the user enters the verification code on a mobile terminal (such as a mobile phone), it will be more inconvenient for the user to operate; secondly , in order to improv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCG06F21/36H04L9/3226G06F3/0486G06F21/44H04L63/12
Inventor 张华夏翼
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products