Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for verifying identifying code

A verification method and verification code technology, applied in electrical components, transmission systems, etc., can solve problems such as reducing server performance and increasing database operation frequency, and achieve the effect of reducing operation frequency and improving performance

Active Publication Date: 2017-04-19
QINGDAO HISENSE MOBILE COMM TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] It can be seen that the server in the prior art needs to query the database when processing each verification code, which increases the operating frequency of the database, thereby reducing the problem of server performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for verifying identifying code
  • Method and device for verifying identifying code
  • Method and device for verifying identifying code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] As stated in the background art of the present invention, in the prior art, when the server receives each verification code, it needs to query the database, which increases the operating frequency of the database, thereby reducing the performance of the server.

[0045] In view of the above technical problems, the present invention proposes to preset algorithm rules in the server. When there are a large number of verification codes accessing the server, the server first performs algorithm preprocessing on them, filters out illegal verification codes, and sends the filtered verification codes Performing operations on the database reduces the frequency of database operations, thereby improving server performance.

[0046] Such as figure 1 As shown, the flow diagram of a verification code verification method provided by an embodiment of the present invention, it should be noted that before performing the following steps, it is necessary to preset the access link and verification...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and device for verifying an identifying code. The method presets an algorithm rule for a corresponding relation between an access link and the identifying code, calculating the access link of an extraction terminal according to the algorithm rule, verifies a calculation result and the identifying code of the extraction terminal. If a verification result indicates consistency, it means that the identifying code is generated by the access link and the access link and the identifying code are simultaneously imported into a database for matching query. According to the method, the algorithm rule is preset in a server, the server firstly performs algorithm preprocessing on the identifying codes when acquiring the identifying codes, filters out the invalid identifying codes, and sends the left identifying code sent to the database for operation. Thus, the server is prevented from getting access to the database multiple times to verify the identifying code and the operating frequency of the database is reduced, thereby enhancing the server performance.

Description

Technical field [0001] The invention relates to the field of communication technology, in particular to a verification code verification method and equipment. Background technique [0002] A database is a warehouse that organizes, stores and manages data according to a data structure. A cloud disk is an Internet storage tool that provides information storage, reading, and downloading services for enterprises and individuals through the Internet. [0003] With the development of Internet technology, terminals have become accustomed to sharing resources with other terminals through cloud disk servers. When the server receives the resources of the sharer’s terminal, it usually generates an access link and a verification code and feeds it back to the terminal. The terminal shares the link and verification code with other extractor’s terminals. The extractor obtains it by accessing the link and entering the verification code. Shared resources. When the extractor is entering the verifi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/12
Inventor 孙永瑞
Owner QINGDAO HISENSE MOBILE COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products