CN107508958A - A kind of method for authenticating and device - Google Patents

A kind of method for authenticating and device Download PDF

Info

Publication number
CN107508958A
CN107508958A CN201610414830.8A CN201610414830A CN107508958A CN 107508958 A CN107508958 A CN 107508958A CN 201610414830 A CN201610414830 A CN 201610414830A CN 107508958 A CN107508958 A CN 107508958A
Authority
CN
China
Prior art keywords
volume
authentication
characteristic information
value
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610414830.8A
Other languages
Chinese (zh)
Other versions
CN107508958B (en
Inventor
朱连洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan Yulong Telecommunication Technology Co Ltd
Original Assignee
Dongguan Yulong Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Yulong Telecommunication Technology Co Ltd filed Critical Dongguan Yulong Telecommunication Technology Co Ltd
Priority to CN201610414830.8A priority Critical patent/CN107508958B/en
Publication of CN107508958A publication Critical patent/CN107508958A/en
Application granted granted Critical
Publication of CN107508958B publication Critical patent/CN107508958B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of method for authenticating and device.This method includes:When performing authentication operations, volume adjusting interface is shown;Obtain the volume-leveling value in the volume adjusting interface;Judge whether the volume-leveling value and the volume standard value pre-set are identical, if so, then judging that authentication passes through, conversely, then judging that authentication does not pass through.The present invention regard the volume value of volume option as authentication password (volume standard value), when authenticating, according to the volume standard value pre-set, adjusts the volume value of volume option, reaches the purpose of fast decryption.By the invention enables other people can not accurate recording or decryption, improve the security of authentication.

Description

A kind of method for authenticating and device
Technical field
The present invention relates to communication technical field, more particularly to a kind of method for authenticating and device.
Background technology
Existing mobile terminal can enter mobile terminal by way of sliding unblock, figure unblock or password unblock User interface.But the authentication mode used in above-mentioned releasing process is excessively simple, glide direction is easily imitated by other people, figure Shape and password are easily known that therefore, existing authentication mode security is low by other people.
The content of the invention
It is low to solve existing authentication mode security it is a primary object of the present invention to provide a kind of method for authenticating and device The problem of.
For above-mentioned technical problem, the present invention solves by the following technical programs:
The invention provides a kind of method for authenticating, including:When performing authentication operations, volume adjusting interface is shown;Obtain Volume-leveling value in the volume adjusting interface;Judge the volume-leveling value and the volume standard value that pre-sets whether phase Together, if so, then judging that authentication passes through, conversely, then judging that authentication does not pass through.
Wherein, before the execution authentication operations, in addition to:The authentication operations are triggered by predetermined trigger mode Perform.
Wherein, the execution that the authentication operations are triggered by predetermined trigger mode, including:By physical button and/ Or virtual key, trigger the execution of the authentication operations.
Wherein, the execution that the authentication operations are triggered by predetermined trigger mode, including:Gather the spy of user's input Reference ceases;Wherein, the characteristic information is biological information, gesture feature information or pressure characteristic information;By the user The characteristic information of input and the characteristic information prestored are matched;If the match is successful, holding for the authentication operations is triggered OK.
Wherein, the volume-leveling value obtained in the volume adjusting interface, including:Obtain the volume adjusting interface In be used for authenticate volume option volume-leveling value.
Present invention also offers a kind of authentication device, including:Display module, for when performing authentication operations, showing sound Measure adjustment interface;Acquisition module, for obtaining the volume-leveling value in the volume adjusting interface;Authentication module, for judging Whether the volume-leveling value and the volume standard value pre-set are identical;If so, then judge that authentication passes through, conversely, then judging Authentication does not pass through.
Wherein, described device also includes trigger module;The trigger module, for before authentication operations are performed, passing through Predetermined trigger mode, trigger the execution of the authentication operations.
Wherein, the trigger module, for by physical button and/or virtual key, triggering holding for the authentication operations OK.
Wherein, the trigger module, is used for:Gather the characteristic information of user's input;Wherein, the characteristic information is biology Characteristic information, gesture feature information or pressure characteristic information;The characteristic information that the user is inputted and the feature prestored Information is matched;If the match is successful, the execution of the authentication operations is triggered.
Wherein, the acquisition module, for obtaining the volume for the volume option for being used for authenticating in the volume adjusting interface Regulated value.
The present invention has the beneficial effect that:
The method for authenticating of the present invention is using the volume value of volume option as authentication password (volume standard value), is being authenticated When, according to the volume standard value pre-set, the volume value of volume option is adjusted, reaches the purpose of fast decryption.By this hair It is bright so that other people can not accurate recording or decryption, improve the security of authentication, add the crypticity and entertaining of authentication Property.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, forms the part of the application, this hair Bright schematic description and description is used to explain the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of method for authenticating according to an embodiment of the invention;
Fig. 2 is the particular flow sheet of method for authenticating according to an embodiment of the invention;
Fig. 3 is the schematic diagram at volume adjusting interface according to an embodiment of the invention;
Fig. 4 is the structure chart of authentication device according to an embodiment of the invention.
Embodiment
The method for authenticating of the present invention is using the volume value of volume option as authentication password (volume standard value), is being authenticated When, according to the volume standard value pre-set, the volume value of volume option is adjusted, reaches the purpose of fast decryption.By this hair It is bright so that other people can not accurate recording or decryption, improve the security of authentication, add the crypticity and entertaining of authentication Property.
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with drawings and the specific embodiments, to this Invention is described in further detail.
According to an embodiment of the invention, there is provided a kind of method for authenticating, Fig. 1 are authentication sides according to an embodiment of the invention The flow chart of method.The executive agent of the present embodiment is mobile terminal.
Step S110, when performing authentication operations, show volume adjusting interface.
Volume adjusting interface includes volume option, can be to the volume option pair by being operated to volume option The volume value answered is adjusted.In the present embodiment, volume value corresponding to volume option is used as authentication password.
Before authentication operations are performed, the execution of the authentication operations is triggered by predetermined trigger mode.
In one embodiment, the execution of authentication operations can be triggered by physical button and/or virtual key.Enter one Step ground, when default physical button and/or virtual key are by carry out predetermined registration operation, triggers the execution of authentication operations.Physics is pressed Key includes:Upper and lower volume key, HOME keys.Such as:Mobile terminal is in screen lock state, and user clicks on HOME keys, triggering authentication behaviour The execution of work, display for a user volume adjusting interface.
In another embodiment, authentication operations, the i.e. spy in user's input can be triggered by way of feature recognition In the case that reference breath meets predetermined condition, the execution of authentication operations is triggered.
Gather the characteristic information of user's input;The characteristic information that the user is inputted and the characteristic information prestored enter Row matching;If the match is successful, the execution of the authentication operations is triggered;If it fails to match, the authentication operations are not triggered Perform.The characteristic information prestored is the characteristic information that validated user is pre-entered and preserved in the terminal.
The characteristic information is biological information, gesture feature information or pressure characteristic information.So, prestore Characteristic information is biological information, gesture feature information or the pressure that validated user is previously entered and preserved in the terminal Characteristic information.
The embodiment of the present invention is not especially limited to the specific category of feature recognition.However, it is to be understood that be:Collection The type of characteristic information is identical with the type of the characteristic information prestored.Such as:The type of the characteristic information prestored is Biological information, then the type of the characteristic information of collection should be biological information.
Specifically, the present embodiment can trigger the execution of authentication operations by way of living things feature recognition.Gather user The biological information of input;The biological information of user's input and the biological information prestored are matched; If the match is successful, the execution of authentication operations is triggered, conversely, not triggering the execution of authentication operations then.Living things feature recognition bag Include but be not limited to:Fingerprint recognition, iris recognition, Application on Voiceprint Recognition, recognition of face and ear recognition.So, biological information bag Include but be not limited to:Fingerprint feature information, iris feature information, vocal print feature information, face characteristic information and ear-drum characteristic information.
Such as:Multiple fingerprint characteristics of user's input simultaneously are gathered by more fingerprint sensors on mobile terminal, will be adopted Multiple fingerprint characteristics of collection are matched with the multiple fingerprint characteristics prestored respectively, if multiple fingerprint characteristics of collection are all The execution of authentication operations so that the match is successful, then can be triggered, conversely, not triggering the execution of authentication operations, and asks user to re-enter Fingerprint.
The present embodiment can also know the execution that method for distinguishing triggers authentication operations by gesture feature.Gather user's input Gesture feature information;The gesture feature information of user's input and the gesture feature information prestored are matched;If With success, then the execution of authentication operations is triggered, conversely, not triggering the execution of authentication operations then.Gesture feature information can embody Go out the motion of user's hand.
The present embodiment can also know the execution that method for distinguishing triggers authentication operations by pressure characteristic.Gather user's input Pressure characteristic information;The pressure characteristic information of user's input and the pressure characteristic information prestored are matched;If With success, then the execution of authentication operations is triggered, conversely, not triggering the execution of authentication operations then.Such as:Set in the terminal Force sensor, pressure is divided into flicking and again by two ranks, the corresponding pressure limit of each rank, sensed by dynamics The pressure of device collection user's input, if the pressure collected is attached most importance to by rank, with the pressure that prestores again by rank phase Match somebody with somebody, then trigger the execution of authentication operations.
Step S120, obtain the volume-leveling value in the volume adjusting interface.
Obtain the volume-leveling value of volume option in the volume adjusting interface.Volume-leveling value refers to that volume option is current Volume value.
Specifically, in the volume adjusting interface of display, including the volume of multiple volume options slides bar.Pressed by physics Key and/or operation of virtual key volume slide the button on bar, to adjust the volume value of volume option.User can drag a certain Volume slides the button on bar, or the volume can be moved by upper and lower volume key and slides button on bar, to adjust the sound Measure the volume value of option.
The quantity of volume option in volume adjusting interface can be one or more, such as:In volume adjusting interface Including:The volume options such as the tinkle of bells, notice, alarm clock, media, system, call.
Obtain in volume adjusting interface and be used in the volume-leveling value of all volume options or acquisition volume adjusting interface The volume-leveling value of the volume option of authentication.Wherein, the volume option for authentication is pre-set in volume adjusting interface 's;Quantity for the volume option of authentication is one or more.
Such as:In the volume options such as the tinkle of bells, notice, alarm clock, media, system, call, only select ringing volume option and Alarm clock volume option is as the volume option for authenticating.
Step S130, judge whether the volume-leveling value and the volume standard value pre-set are identical;If it is, hold Row step S140;If it is not, then perform step S150.
Before authentication operations are performed, the volume option for being used to authenticate in volume adjusting interface is set, and for for reflecting Each volume option of power sets volume standard value and stored.Volume standard value is correct authentication password.In authentication, in advance The volume standard value of storage is used to judge whether the volume-leveling value of user's input is correct.
After authentication operations are performed, if obtaining the sound for the volume option for being used for authenticating in the volume adjusting interface Measure regulated value;Then the volume standard value and volume-leveling value of identical volume option are compared, if identical, judge authentication Pass through;If it is different, then judge that authentication does not pass through.
After authentication operations are performed, if obtaining the volume adjusting of all volume options in the volume adjusting interface Value, then first obtain volume option for authentication in all volume options, then by the volume standard value of identical volume option and Volume-leveling value is compared, if identical, judges that authentication passes through;If it is different, then judge that authentication does not pass through.Adjusted in volume Save in interface, except other volume options before the volume option for authentication, user can also be operated, and regulation is current Volume value, but be not involved in matching in the matching process.
Step S140, judge that authentication passes through.
Authentication passes through, then the volume-leveling value that explanation inputs in volume adjusting interface and the volume standard value pre-set It is identical.
After authentication passes through, it can perform and be operated corresponding to the authentication.Operation includes but is not limited to corresponding to authentication:Screen Unblock operation, decryption oprerations and handover operation.The decryption oprerations include but is not limited to:Decrypted for application, be file decryption, for text Part folder decryption.
Such as:Mobile terminal includes safe mode (secret domain) and general mode, wherein, the safe class of safe mode is high In general mode, in order to which the file ensured in safe mode is not obtained illegally, when being switched to safe mode from general mode Authenticated, only in the case where authentication passes through, it is allowed to be switched to safe mode from general mode.
Step S150, judge that authentication does not pass through.
Authentication is not by the volume-leveling value for illustrating to input in volume adjusting interface and the volume standard value pre-set It is different.In authentication not in the case of, do not perform and operated corresponding to authentication.
Cause authentication not by the reason for be:The user at operation volume adjusting interface is likely to be disabled user, either User has carried out maloperation.At this moment, the volume-leveling value mistake that user can be prompted currently to input, asks user to re-enter volume Regulated value.Can be the number given threshold that user re-enters volume-leveling value, if user re-enters volume-leveling value Number exceedes the threshold value, then is alerted, or other mobile terminals by binding in advance are alarmed.
In order to not influence the normal volume of mobile terminal, in the present embodiment, the volume being adjusted by the user in authentication process The volume-leveling value of option is only used for authenticating, and authentication passes through or authenticated not by the way that the volume-leveling value being conditioned is not to sound Amount option acts, so that the problem of volume value that the present embodiment is not in mobile terminal after being authenticated is changed.
The described method for authenticating of the present embodiment can authenticate to user.The method for authenticating can be applied mobile whole Hold unlocking screen authentication, secret domain switching authentication, start encipheror authentication etc..
The present embodiment adjusts volume value, quick solution manually using the volume value of volume option as authentication password by user It is close, make other people can not accurate recording or decryption, realize dynamic password decryption.The authentication scheme security of the present embodiment Height, and with interest.
A specific embodiment is given below further to illustrate the present invention.Fig. 2 is according to one embodiment of the invention Method for authenticating particular flow sheet.The present embodiment is so that mobile terminal unlocks as an example.
Step S210, display design is carried out to volume adjusting interface.
In order to allow users to volume sliding button quick regulation on bar to relevant position, operate volume in user and slide During button on row bar, slide display scale on bar in volume and identify, and it is in place in volume to slide the Show Button institute behind bar The volume value put, as shown in Figure 3.
Step S220, it is provided for the volume option of authentication and the volume standard value of the volume option.
The volume option that user can be used using selected section or whole volume options as authentication.
As shown in figure 3, the volume option in volume adjusting interface includes:The tinkle of bells, notice, alarm clock, media, system and logical Words.When carrying out authentication operations setting, display for a user volume adjusting interface, user can the tinkle of bells, notice, alarm clock, media, In system and call, select using the tinkle of bells and notice as the volume option for being used to authenticate, and for corresponding to the tinkle of bells and notice setting Volume standard value, such as:In volume adjusting interface, the tinkle of bells and the volume value of notice are all adjusted to 3, complete volume standard value Set.
Step S230, after screen is lighted, identification user's selection whether for unlocking screen;If it is, perform step Rapid S240;If it is not, then perform step S280.
When user chooses unlocking screen, step S240 is performed, authentication operations are carried out, when user does not choose unlocking screen When, step S280 is performed, carries out normal volume adjusting operation.
Step S240, when user chooses unlocking screen, volume adjusting interface is displayed for a user, and obtain for authentication The volume-leveling value of volume option.
When user chooses unlocking screen, volume adjusting interface is displayed for a user, user can be at the volume adjusting interface The volume value of middle regulation volume option.
Further, all volume options all allow user to adjust volume value in the volume adjusting interface, illegal to avoid User is made repeated attempts in volume adjusting interface only for the volume option for authentication, and then acquisition can pass through mirror The correct volume value of power.
Step S250, judge whether the volume-leveling value of volume option is identical with the volume standard value of the volume option;Such as Fruit is then to perform step S260;If it is not, then perform step S270.
Such as:User's selection sets the tinkle of bells and the sound of notice using the tinkle of bells and notice as the volume option for authenticating It is all 3 to measure standard value;In unlocking screen, volume adjusting interface is displayed for a user, it is allowed to which user is in the volume adjusting interface The volume value of each volume option is adjusted, if the tinkle of bells and notice are respectively adjusted to 3 by user, authentication passes through, unlocking screen Success, conversely, authentication is not by unlocking screen failure, asking user to readjust the volume value of volume option.
Step S260, judge that authentication passes through.
Step S270, judge that authentication does not pass through.
Step S280, volume adjusting interface is displayed for a user, operated according to user and carry out volume adjusting.
The present embodiment can also be applied in other application scene, such as:User is that short message sets application lock, in setting Password (volume standard value) is set as follows:In the authentication mode provided, volume adjusting authentication mode is selected, in the sound of ejection Measure in adjustment interface, the tinkle of bells is arranged to 1 lattice, notice is arranged to 2 lattice, and alarm clock is arranged to 3 lattice, and media set 4 lattice;Setting up Into afterwards, unlock interface, i.e. volume adjusting interface are ejected when clicking on short message, if respectively by the tinkle of bells, notice, alarm clock, media Volume value be respectively adjusted to the positions of 1,2,3,4 lattice, then unlock successfully, into short message.
In the present embodiment, only in non-authentication operating process, sound is carried out to the volume option in volume adjusting interface Value is adjusted, and just the volume that mobile terminal is sent can be had an impact.Such as:The tinkle of bells of mobile terminal is arranged to 5 by user Lattice, when carrying out authentication setting, the tinkle of bells is arranged to 1 lattice, in authentication process, user adjusts the tinkle of bells to 1 lattice, and then passes through Authentication, after authentication passes through, the tinkle of bells during mobile terminal jingle bell is still 5 lattice, be adjusted to 1 lattice when will not be because authentication and Change.
The embodiment of the present invention additionally provides a kind of authentication device, as shown in figure 4, being the authentication according to one embodiment of the invention The structure chart of device.
The device includes:
Display module 410, for when performing authentication operations, showing volume adjusting interface.
Acquisition module 420, for obtaining the volume-leveling value in the volume adjusting interface.
Authentication module 430, for judging whether the volume-leveling value and the volume standard value pre-set are identical;If It is then to judge that authentication passes through, conversely, then judging that authentication does not pass through.
The acquisition module 420, the volume for obtaining the volume option for being used for authenticating in the volume adjusting interface are adjusted Section value.
Described device also includes:Trigger module 440;The trigger module 440, for before authentication operations are performed, leading to Cross the execution that predetermined trigger mode triggers the authentication operations.
In one embodiment, the trigger module 440, for by physical button and/or virtual key, described in triggering The execution of authentication operations.
In another embodiment, the trigger module 440, for gathering the characteristic information of user's input;Wherein, the spy Reference breath is biological information, gesture feature information or pressure characteristic information;Deposit the characteristic information of user's input and in advance The characteristic information of storage is matched;If the match is successful, the execution of the authentication operations is triggered.
The function of device described in the present embodiment is described in the embodiment of the method shown in Fig. 1-Fig. 3, therefore Not detailed part, may refer to the related description in previous embodiment, will not be described here in the description of the present embodiment.
Device described in the present embodiment can be set in the terminal, so that the mobile terminal is held based on described device Row authentication operations.Further, the mobile terminal includes being used for the physical button and/or virtual key for triggering authentication operations; The mobile terminal includes the sensor for being used to gather the characteristic information of user's input.
Embodiments of the invention are the foregoing is only, are not intended to limit the invention, for those skilled in the art For member, the present invention can have various modifications and variations.Any modification within the spirit and principles of the invention, being made, Equivalent substitution, improvement etc., should be included within scope of the presently claimed invention.

Claims (10)

  1. A kind of 1. method for authenticating, it is characterised in that including:
    When performing authentication operations, volume adjusting interface is shown;
    Obtain the volume-leveling value in the volume adjusting interface;
    Judge whether the volume-leveling value and the volume standard value pre-set are identical, if so, then judging that authentication passes through, instead It, then judge that authentication does not pass through.
  2. 2. according to the method for claim 1, it is characterised in that before the execution authentication operations, in addition to:By pre- Determine the execution that triggering mode triggers the authentication operations.
  3. 3. according to the method for claim 2, it is characterised in that described that the authentication operations are triggered by predetermined trigger mode Execution, including:
    By physical button and/or virtual key, the execution of the authentication operations is triggered.
  4. 4. according to the method for claim 2, it is characterised in that described that the authentication operations are triggered by predetermined trigger mode Execution, including:
    Gather the characteristic information of user's input;Wherein, the characteristic information is biological information, gesture feature information or pressure Characteristic information;
    The characteristic information that the user is inputted and the characteristic information prestored are matched;
    If the match is successful, the execution of the authentication operations is triggered.
  5. 5. according to the method any one of claim 1-4, it is characterised in that described to obtain in the volume adjusting interface Volume-leveling value, including:
    Obtain the volume-leveling value for the volume option for being used for authenticating in the volume adjusting interface.
  6. A kind of 6. authentication device, it is characterised in that including:
    Display module, for when performing authentication operations, showing volume adjusting interface;
    Acquisition module, for obtaining the volume-leveling value in the volume adjusting interface;
    Authentication module, for judging whether the volume-leveling value and the volume standard value pre-set are identical;If so, then judge Authentication passes through, conversely, then judging that authentication does not pass through.
  7. 7. device according to claim 6, it is characterised in that described device also includes trigger module;
    The trigger module, for before authentication operations are performed, holding for the authentication operations to be triggered by predetermined trigger mode OK.
  8. 8. device according to claim 7, it is characterised in that the trigger module, for passing through physical button and/or void Intend button, trigger the execution of the authentication operations.
  9. 9. device according to claim 7, it is characterised in that the trigger module, be used for:
    Gather the characteristic information of user's input;Wherein, the characteristic information is biological information, gesture feature information or pressure Characteristic information;
    The characteristic information that the user is inputted and the characteristic information prestored are matched;
    If the match is successful, the execution of the authentication operations is triggered.
  10. 10. according to the device any one of claim 6-9, it is characterised in that the acquisition module, it is described for obtaining It is used for the volume-leveling value of volume option authenticated in volume adjusting interface.
CN201610414830.8A 2016-06-14 2016-06-14 Authentication method and device Active CN107508958B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610414830.8A CN107508958B (en) 2016-06-14 2016-06-14 Authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610414830.8A CN107508958B (en) 2016-06-14 2016-06-14 Authentication method and device

Publications (2)

Publication Number Publication Date
CN107508958A true CN107508958A (en) 2017-12-22
CN107508958B CN107508958B (en) 2020-01-10

Family

ID=60678254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610414830.8A Active CN107508958B (en) 2016-06-14 2016-06-14 Authentication method and device

Country Status (1)

Country Link
CN (1) CN107508958B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112286438A (en) * 2020-10-30 2021-01-29 北京小米移动软件有限公司 Touch control method, device, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103020553A (en) * 2012-12-11 2013-04-03 广东欧珀移动通信有限公司 Anti-theft protection method for mobile terminal
CN104284011A (en) * 2013-07-12 2015-01-14 联想(北京)有限公司 Information processing method and electronic device
CN105550549A (en) * 2015-09-02 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Verification processing method and verification processing device
US9916430B1 (en) * 2011-12-08 2018-03-13 Navroop Pal Singh Mitter Authentication system and method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9916430B1 (en) * 2011-12-08 2018-03-13 Navroop Pal Singh Mitter Authentication system and method thereof
CN103020553A (en) * 2012-12-11 2013-04-03 广东欧珀移动通信有限公司 Anti-theft protection method for mobile terminal
CN104284011A (en) * 2013-07-12 2015-01-14 联想(北京)有限公司 Information processing method and electronic device
CN105550549A (en) * 2015-09-02 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Verification processing method and verification processing device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
傅山等: "移动智能终端生物识别发展与挑战", 《移动通信》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112286438A (en) * 2020-10-30 2021-01-29 北京小米移动软件有限公司 Touch control method, device, terminal and storage medium

Also Published As

Publication number Publication date
CN107508958B (en) 2020-01-10

Similar Documents

Publication Publication Date Title
KR102389147B1 (en) Embedded authentication systems in an electronic device
CN104331668B (en) Bad password reminding method and device
EP2709031B1 (en) Gesture- and expression-based authentication
KR20210005210A (en) Implementation of biometric authentication
CN103079000B (en) Method and device for terminal unlocking
CN105574378A (en) Terminal control method and terminal control device
CN104778416B (en) A kind of information concealing method and terminal
JP2005537574A (en) User authentication system and method with strong password
JP2011512580A (en) System and method for accessing tamper-resistant storage in a wireless communication device using biometric data
CN104065823A (en) User mode control method and user mode control system based on iris recognition technology for mobile terminal
CN107644172A (en) The guard method of content displaying and device
CN104363205B (en) Using login method and device
CN105930707A (en) Method and device for switching systems
CN109600347A (en) Control method, device, mobile terminal and the vehicle of vehicle
CN106156562B (en) A kind of private space protective device, mobile terminal and method
CN106372479A (en) Mobile terminal and method of controlling the same
US20140223547A1 (en) Alternate game-like multi-level authentication
CN104219053A (en) Information displaying method, information concealing method and information concealing device
US11626118B2 (en) Vehicle authentication device and vehicle control system
CN106250743B (en) Account switching method and device
CN107508958A (en) A kind of method for authenticating and device
CN105808995B (en) A kind of password prompt method, apparatus and terminal
KR101558762B1 (en) System for providing personalized convenience service and method thereof
CN109284588A (en) Information Authentication method, apparatus and storage medium
CN107784211A (en) Method of password authentication and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant