Log-in validation method and device
2013
The execution mode of the invention provides a log-in validation method. For example, the method comprises: responding to received information that a user requests to log in, displaying an identification code for identifying a first terminal so as to facilitate a second terminal to collect the image of the identification code, and thus obtaining the pattern of the identification code, generating a login validation request according to the pattern of the identification code, sending the log-in validation request to a server so as to facilitate the server to obtain the user identity information of the second terminal and the content identified by the identification code according to the log-in validation request, performing log-in validation according to the user identity information of the second terminal, returning validation result to the first terminal identified by the identification code, receiving the validation result returned by the server, and thus achieving the purpose of ensuring the safety of user identity. Furthermore, the execution mode of the invention further provides a log-in validation device.
Keywords:
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
0
References
0
Citations
NaN
KQI