Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety verification method and device

A safety verification and safety verification technology, which is applied in the field of safety verification methods and devices, can solve problems such as complex technical solutions, low safety factors, and large investment, so as to reduce the probability of hacker attacks, improve safety, and ensure simplicity. Effect

Pending Publication Date: 2020-05-29
FOSHAN HECAI TECH SERVICE
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the drawbacks of the above-mentioned password verification are: low safety factor, easy to be broken by hackers, leading to leakage of important information of the mobile service system
[0005] The defect of the above-mentioned dynamic password verification lies in: the technical scheme is complicated, and corresponding software and hardware of the dynamic password need to be invested, and the initial investment is relatively large
And the dynamic password card needs to be carried with you, which is inconvenient to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification method and device
  • Safety verification method and device
  • Safety verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods.

[0039] In order to ensure the security of mobile services and user information, etc., when a user accesses mobile services or user information through a terminal, for example, when a user accesses a mobile terminal or an approval file in the ERP system, it is necessary to Perform security check operations. For example, when a user requests to access a mobile terminal or an approval document in the ERP system, a security verification command is triggered and handwriting data is entered. In this embodiment, the main body that executes the method for handwriting safety verification of the present invention is preferably a mobile terminal, and in other embodiments of the present invention, it can also be an application program in a mobile terminal, a server of a webpage loaded in a mobile terminal, a mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety verification method, which comprises the following specific steps of: A, when a safety verification instruction is received, obtaining input handwriting data; b, performing similarity comparison on the handwriting data and pre-stored standard handwriting to obtain the similarity between the handwriting data and the pre-stored standard handwriting; c, judging whether the similarity is within an interval of a preset range value or not, If so, judging that the user passes the safety check; If not, judging that the user does not pass the safety check. According tothe safety verification method and device provided by the invention, the probability of hacker attacks is effectively reduced while the simplicity of safety verification operation is ensured, and thesafety of information is improved.

Description

technical field [0001] The invention relates to the technical field of mobile terminal information security, in particular to a security verification method and device. Background technique [0002] With the rapid development of mobile devices, mobile terminal software has also developed rapidly. Mobile terminal software focuses on the processing of mobile services, and the security of mobile services requires a certain security mechanism to guarantee. Different from other mobile application fields with a strong security environment (such as the financial industry, etc.), mobile terminal software only has a security verification of the login mechanism, and lacks reliable security protection methods. If the login mechanism is cracked, the security of the key business of the mobile application (such as the review of important documents) cannot be guaranteed. [0003] At present, in the existing mobile software, the methods for performing security verification of mobile servic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCG06F21/316
Inventor 刘奕刘羽波李银惠潘神保周森华
Owner FOSHAN HECAI TECH SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products