CN107508958A - A kind of method for authenticating and device - Google Patents
A kind of method for authenticating and device Download PDFInfo
- Publication number
- CN107508958A CN107508958A CN201610414830.8A CN201610414830A CN107508958A CN 107508958 A CN107508958 A CN 107508958A CN 201610414830 A CN201610414830 A CN 201610414830A CN 107508958 A CN107508958 A CN 107508958A
- Authority
- CN
- China
- Prior art keywords
- volume
- authentication
- characteristic information
- value
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of method for authenticating and device.This method includes:When performing authentication operations, volume adjusting interface is shown;Obtain the volume-leveling value in the volume adjusting interface;Judge whether the volume-leveling value and the volume standard value pre-set are identical, if so, then judging that authentication passes through, conversely, then judging that authentication does not pass through.The present invention regard the volume value of volume option as authentication password (volume standard value), when authenticating, according to the volume standard value pre-set, adjusts the volume value of volume option, reaches the purpose of fast decryption.By the invention enables other people can not accurate recording or decryption, improve the security of authentication.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of method for authenticating and device.
Background technology
Existing mobile terminal can enter mobile terminal by way of sliding unblock, figure unblock or password unblock
User interface.But the authentication mode used in above-mentioned releasing process is excessively simple, glide direction is easily imitated by other people, figure
Shape and password are easily known that therefore, existing authentication mode security is low by other people.
The content of the invention
It is low to solve existing authentication mode security it is a primary object of the present invention to provide a kind of method for authenticating and device
The problem of.
For above-mentioned technical problem, the present invention solves by the following technical programs:
The invention provides a kind of method for authenticating, including:When performing authentication operations, volume adjusting interface is shown;Obtain
Volume-leveling value in the volume adjusting interface;Judge the volume-leveling value and the volume standard value that pre-sets whether phase
Together, if so, then judging that authentication passes through, conversely, then judging that authentication does not pass through.
Wherein, before the execution authentication operations, in addition to:The authentication operations are triggered by predetermined trigger mode
Perform.
Wherein, the execution that the authentication operations are triggered by predetermined trigger mode, including:By physical button and/
Or virtual key, trigger the execution of the authentication operations.
Wherein, the execution that the authentication operations are triggered by predetermined trigger mode, including:Gather the spy of user's input
Reference ceases;Wherein, the characteristic information is biological information, gesture feature information or pressure characteristic information;By the user
The characteristic information of input and the characteristic information prestored are matched;If the match is successful, holding for the authentication operations is triggered
OK.
Wherein, the volume-leveling value obtained in the volume adjusting interface, including:Obtain the volume adjusting interface
In be used for authenticate volume option volume-leveling value.
Present invention also offers a kind of authentication device, including:Display module, for when performing authentication operations, showing sound
Measure adjustment interface;Acquisition module, for obtaining the volume-leveling value in the volume adjusting interface;Authentication module, for judging
Whether the volume-leveling value and the volume standard value pre-set are identical;If so, then judge that authentication passes through, conversely, then judging
Authentication does not pass through.
Wherein, described device also includes trigger module;The trigger module, for before authentication operations are performed, passing through
Predetermined trigger mode, trigger the execution of the authentication operations.
Wherein, the trigger module, for by physical button and/or virtual key, triggering holding for the authentication operations
OK.
Wherein, the trigger module, is used for:Gather the characteristic information of user's input;Wherein, the characteristic information is biology
Characteristic information, gesture feature information or pressure characteristic information;The characteristic information that the user is inputted and the feature prestored
Information is matched;If the match is successful, the execution of the authentication operations is triggered.
Wherein, the acquisition module, for obtaining the volume for the volume option for being used for authenticating in the volume adjusting interface
Regulated value.
The present invention has the beneficial effect that:
The method for authenticating of the present invention is using the volume value of volume option as authentication password (volume standard value), is being authenticated
When, according to the volume standard value pre-set, the volume value of volume option is adjusted, reaches the purpose of fast decryption.By this hair
It is bright so that other people can not accurate recording or decryption, improve the security of authentication, add the crypticity and entertaining of authentication
Property.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, forms the part of the application, this hair
Bright schematic description and description is used to explain the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of method for authenticating according to an embodiment of the invention;
Fig. 2 is the particular flow sheet of method for authenticating according to an embodiment of the invention;
Fig. 3 is the schematic diagram at volume adjusting interface according to an embodiment of the invention;
Fig. 4 is the structure chart of authentication device according to an embodiment of the invention.
Embodiment
The method for authenticating of the present invention is using the volume value of volume option as authentication password (volume standard value), is being authenticated
When, according to the volume standard value pre-set, the volume value of volume option is adjusted, reaches the purpose of fast decryption.By this hair
It is bright so that other people can not accurate recording or decryption, improve the security of authentication, add the crypticity and entertaining of authentication
Property.
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with drawings and the specific embodiments, to this
Invention is described in further detail.
According to an embodiment of the invention, there is provided a kind of method for authenticating, Fig. 1 are authentication sides according to an embodiment of the invention
The flow chart of method.The executive agent of the present embodiment is mobile terminal.
Step S110, when performing authentication operations, show volume adjusting interface.
Volume adjusting interface includes volume option, can be to the volume option pair by being operated to volume option
The volume value answered is adjusted.In the present embodiment, volume value corresponding to volume option is used as authentication password.
Before authentication operations are performed, the execution of the authentication operations is triggered by predetermined trigger mode.
In one embodiment, the execution of authentication operations can be triggered by physical button and/or virtual key.Enter one
Step ground, when default physical button and/or virtual key are by carry out predetermined registration operation, triggers the execution of authentication operations.Physics is pressed
Key includes:Upper and lower volume key, HOME keys.Such as:Mobile terminal is in screen lock state, and user clicks on HOME keys, triggering authentication behaviour
The execution of work, display for a user volume adjusting interface.
In another embodiment, authentication operations, the i.e. spy in user's input can be triggered by way of feature recognition
In the case that reference breath meets predetermined condition, the execution of authentication operations is triggered.
Gather the characteristic information of user's input;The characteristic information that the user is inputted and the characteristic information prestored enter
Row matching;If the match is successful, the execution of the authentication operations is triggered;If it fails to match, the authentication operations are not triggered
Perform.The characteristic information prestored is the characteristic information that validated user is pre-entered and preserved in the terminal.
The characteristic information is biological information, gesture feature information or pressure characteristic information.So, prestore
Characteristic information is biological information, gesture feature information or the pressure that validated user is previously entered and preserved in the terminal
Characteristic information.
The embodiment of the present invention is not especially limited to the specific category of feature recognition.However, it is to be understood that be:Collection
The type of characteristic information is identical with the type of the characteristic information prestored.Such as:The type of the characteristic information prestored is
Biological information, then the type of the characteristic information of collection should be biological information.
Specifically, the present embodiment can trigger the execution of authentication operations by way of living things feature recognition.Gather user
The biological information of input;The biological information of user's input and the biological information prestored are matched;
If the match is successful, the execution of authentication operations is triggered, conversely, not triggering the execution of authentication operations then.Living things feature recognition bag
Include but be not limited to:Fingerprint recognition, iris recognition, Application on Voiceprint Recognition, recognition of face and ear recognition.So, biological information bag
Include but be not limited to:Fingerprint feature information, iris feature information, vocal print feature information, face characteristic information and ear-drum characteristic information.
Such as:Multiple fingerprint characteristics of user's input simultaneously are gathered by more fingerprint sensors on mobile terminal, will be adopted
Multiple fingerprint characteristics of collection are matched with the multiple fingerprint characteristics prestored respectively, if multiple fingerprint characteristics of collection are all
The execution of authentication operations so that the match is successful, then can be triggered, conversely, not triggering the execution of authentication operations, and asks user to re-enter
Fingerprint.
The present embodiment can also know the execution that method for distinguishing triggers authentication operations by gesture feature.Gather user's input
Gesture feature information;The gesture feature information of user's input and the gesture feature information prestored are matched;If
With success, then the execution of authentication operations is triggered, conversely, not triggering the execution of authentication operations then.Gesture feature information can embody
Go out the motion of user's hand.
The present embodiment can also know the execution that method for distinguishing triggers authentication operations by pressure characteristic.Gather user's input
Pressure characteristic information;The pressure characteristic information of user's input and the pressure characteristic information prestored are matched;If
With success, then the execution of authentication operations is triggered, conversely, not triggering the execution of authentication operations then.Such as:Set in the terminal
Force sensor, pressure is divided into flicking and again by two ranks, the corresponding pressure limit of each rank, sensed by dynamics
The pressure of device collection user's input, if the pressure collected is attached most importance to by rank, with the pressure that prestores again by rank phase
Match somebody with somebody, then trigger the execution of authentication operations.
Step S120, obtain the volume-leveling value in the volume adjusting interface.
Obtain the volume-leveling value of volume option in the volume adjusting interface.Volume-leveling value refers to that volume option is current
Volume value.
Specifically, in the volume adjusting interface of display, including the volume of multiple volume options slides bar.Pressed by physics
Key and/or operation of virtual key volume slide the button on bar, to adjust the volume value of volume option.User can drag a certain
Volume slides the button on bar, or the volume can be moved by upper and lower volume key and slides button on bar, to adjust the sound
Measure the volume value of option.
The quantity of volume option in volume adjusting interface can be one or more, such as:In volume adjusting interface
Including:The volume options such as the tinkle of bells, notice, alarm clock, media, system, call.
Obtain in volume adjusting interface and be used in the volume-leveling value of all volume options or acquisition volume adjusting interface
The volume-leveling value of the volume option of authentication.Wherein, the volume option for authentication is pre-set in volume adjusting interface
's;Quantity for the volume option of authentication is one or more.
Such as:In the volume options such as the tinkle of bells, notice, alarm clock, media, system, call, only select ringing volume option and
Alarm clock volume option is as the volume option for authenticating.
Step S130, judge whether the volume-leveling value and the volume standard value pre-set are identical;If it is, hold
Row step S140;If it is not, then perform step S150.
Before authentication operations are performed, the volume option for being used to authenticate in volume adjusting interface is set, and for for reflecting
Each volume option of power sets volume standard value and stored.Volume standard value is correct authentication password.In authentication, in advance
The volume standard value of storage is used to judge whether the volume-leveling value of user's input is correct.
After authentication operations are performed, if obtaining the sound for the volume option for being used for authenticating in the volume adjusting interface
Measure regulated value;Then the volume standard value and volume-leveling value of identical volume option are compared, if identical, judge authentication
Pass through;If it is different, then judge that authentication does not pass through.
After authentication operations are performed, if obtaining the volume adjusting of all volume options in the volume adjusting interface
Value, then first obtain volume option for authentication in all volume options, then by the volume standard value of identical volume option and
Volume-leveling value is compared, if identical, judges that authentication passes through;If it is different, then judge that authentication does not pass through.Adjusted in volume
Save in interface, except other volume options before the volume option for authentication, user can also be operated, and regulation is current
Volume value, but be not involved in matching in the matching process.
Step S140, judge that authentication passes through.
Authentication passes through, then the volume-leveling value that explanation inputs in volume adjusting interface and the volume standard value pre-set
It is identical.
After authentication passes through, it can perform and be operated corresponding to the authentication.Operation includes but is not limited to corresponding to authentication:Screen
Unblock operation, decryption oprerations and handover operation.The decryption oprerations include but is not limited to:Decrypted for application, be file decryption, for text
Part folder decryption.
Such as:Mobile terminal includes safe mode (secret domain) and general mode, wherein, the safe class of safe mode is high
In general mode, in order to which the file ensured in safe mode is not obtained illegally, when being switched to safe mode from general mode
Authenticated, only in the case where authentication passes through, it is allowed to be switched to safe mode from general mode.
Step S150, judge that authentication does not pass through.
Authentication is not by the volume-leveling value for illustrating to input in volume adjusting interface and the volume standard value pre-set
It is different.In authentication not in the case of, do not perform and operated corresponding to authentication.
Cause authentication not by the reason for be:The user at operation volume adjusting interface is likely to be disabled user, either
User has carried out maloperation.At this moment, the volume-leveling value mistake that user can be prompted currently to input, asks user to re-enter volume
Regulated value.Can be the number given threshold that user re-enters volume-leveling value, if user re-enters volume-leveling value
Number exceedes the threshold value, then is alerted, or other mobile terminals by binding in advance are alarmed.
In order to not influence the normal volume of mobile terminal, in the present embodiment, the volume being adjusted by the user in authentication process
The volume-leveling value of option is only used for authenticating, and authentication passes through or authenticated not by the way that the volume-leveling value being conditioned is not to sound
Amount option acts, so that the problem of volume value that the present embodiment is not in mobile terminal after being authenticated is changed.
The described method for authenticating of the present embodiment can authenticate to user.The method for authenticating can be applied mobile whole
Hold unlocking screen authentication, secret domain switching authentication, start encipheror authentication etc..
The present embodiment adjusts volume value, quick solution manually using the volume value of volume option as authentication password by user
It is close, make other people can not accurate recording or decryption, realize dynamic password decryption.The authentication scheme security of the present embodiment
Height, and with interest.
A specific embodiment is given below further to illustrate the present invention.Fig. 2 is according to one embodiment of the invention
Method for authenticating particular flow sheet.The present embodiment is so that mobile terminal unlocks as an example.
Step S210, display design is carried out to volume adjusting interface.
In order to allow users to volume sliding button quick regulation on bar to relevant position, operate volume in user and slide
During button on row bar, slide display scale on bar in volume and identify, and it is in place in volume to slide the Show Button institute behind bar
The volume value put, as shown in Figure 3.
Step S220, it is provided for the volume option of authentication and the volume standard value of the volume option.
The volume option that user can be used using selected section or whole volume options as authentication.
As shown in figure 3, the volume option in volume adjusting interface includes:The tinkle of bells, notice, alarm clock, media, system and logical
Words.When carrying out authentication operations setting, display for a user volume adjusting interface, user can the tinkle of bells, notice, alarm clock, media,
In system and call, select using the tinkle of bells and notice as the volume option for being used to authenticate, and for corresponding to the tinkle of bells and notice setting
Volume standard value, such as:In volume adjusting interface, the tinkle of bells and the volume value of notice are all adjusted to 3, complete volume standard value
Set.
Step S230, after screen is lighted, identification user's selection whether for unlocking screen;If it is, perform step
Rapid S240;If it is not, then perform step S280.
When user chooses unlocking screen, step S240 is performed, authentication operations are carried out, when user does not choose unlocking screen
When, step S280 is performed, carries out normal volume adjusting operation.
Step S240, when user chooses unlocking screen, volume adjusting interface is displayed for a user, and obtain for authentication
The volume-leveling value of volume option.
When user chooses unlocking screen, volume adjusting interface is displayed for a user, user can be at the volume adjusting interface
The volume value of middle regulation volume option.
Further, all volume options all allow user to adjust volume value in the volume adjusting interface, illegal to avoid
User is made repeated attempts in volume adjusting interface only for the volume option for authentication, and then acquisition can pass through mirror
The correct volume value of power.
Step S250, judge whether the volume-leveling value of volume option is identical with the volume standard value of the volume option;Such as
Fruit is then to perform step S260;If it is not, then perform step S270.
Such as:User's selection sets the tinkle of bells and the sound of notice using the tinkle of bells and notice as the volume option for authenticating
It is all 3 to measure standard value;In unlocking screen, volume adjusting interface is displayed for a user, it is allowed to which user is in the volume adjusting interface
The volume value of each volume option is adjusted, if the tinkle of bells and notice are respectively adjusted to 3 by user, authentication passes through, unlocking screen
Success, conversely, authentication is not by unlocking screen failure, asking user to readjust the volume value of volume option.
Step S260, judge that authentication passes through.
Step S270, judge that authentication does not pass through.
Step S280, volume adjusting interface is displayed for a user, operated according to user and carry out volume adjusting.
The present embodiment can also be applied in other application scene, such as:User is that short message sets application lock, in setting
Password (volume standard value) is set as follows:In the authentication mode provided, volume adjusting authentication mode is selected, in the sound of ejection
Measure in adjustment interface, the tinkle of bells is arranged to 1 lattice, notice is arranged to 2 lattice, and alarm clock is arranged to 3 lattice, and media set 4 lattice;Setting up
Into afterwards, unlock interface, i.e. volume adjusting interface are ejected when clicking on short message, if respectively by the tinkle of bells, notice, alarm clock, media
Volume value be respectively adjusted to the positions of 1,2,3,4 lattice, then unlock successfully, into short message.
In the present embodiment, only in non-authentication operating process, sound is carried out to the volume option in volume adjusting interface
Value is adjusted, and just the volume that mobile terminal is sent can be had an impact.Such as:The tinkle of bells of mobile terminal is arranged to 5 by user
Lattice, when carrying out authentication setting, the tinkle of bells is arranged to 1 lattice, in authentication process, user adjusts the tinkle of bells to 1 lattice, and then passes through
Authentication, after authentication passes through, the tinkle of bells during mobile terminal jingle bell is still 5 lattice, be adjusted to 1 lattice when will not be because authentication and
Change.
The embodiment of the present invention additionally provides a kind of authentication device, as shown in figure 4, being the authentication according to one embodiment of the invention
The structure chart of device.
The device includes:
Display module 410, for when performing authentication operations, showing volume adjusting interface.
Acquisition module 420, for obtaining the volume-leveling value in the volume adjusting interface.
Authentication module 430, for judging whether the volume-leveling value and the volume standard value pre-set are identical;If
It is then to judge that authentication passes through, conversely, then judging that authentication does not pass through.
The acquisition module 420, the volume for obtaining the volume option for being used for authenticating in the volume adjusting interface are adjusted
Section value.
Described device also includes:Trigger module 440;The trigger module 440, for before authentication operations are performed, leading to
Cross the execution that predetermined trigger mode triggers the authentication operations.
In one embodiment, the trigger module 440, for by physical button and/or virtual key, described in triggering
The execution of authentication operations.
In another embodiment, the trigger module 440, for gathering the characteristic information of user's input;Wherein, the spy
Reference breath is biological information, gesture feature information or pressure characteristic information;Deposit the characteristic information of user's input and in advance
The characteristic information of storage is matched;If the match is successful, the execution of the authentication operations is triggered.
The function of device described in the present embodiment is described in the embodiment of the method shown in Fig. 1-Fig. 3, therefore
Not detailed part, may refer to the related description in previous embodiment, will not be described here in the description of the present embodiment.
Device described in the present embodiment can be set in the terminal, so that the mobile terminal is held based on described device
Row authentication operations.Further, the mobile terminal includes being used for the physical button and/or virtual key for triggering authentication operations;
The mobile terminal includes the sensor for being used to gather the characteristic information of user's input.
Embodiments of the invention are the foregoing is only, are not intended to limit the invention, for those skilled in the art
For member, the present invention can have various modifications and variations.Any modification within the spirit and principles of the invention, being made,
Equivalent substitution, improvement etc., should be included within scope of the presently claimed invention.
Claims (10)
- A kind of 1. method for authenticating, it is characterised in that including:When performing authentication operations, volume adjusting interface is shown;Obtain the volume-leveling value in the volume adjusting interface;Judge whether the volume-leveling value and the volume standard value pre-set are identical, if so, then judging that authentication passes through, instead It, then judge that authentication does not pass through.
- 2. according to the method for claim 1, it is characterised in that before the execution authentication operations, in addition to:By pre- Determine the execution that triggering mode triggers the authentication operations.
- 3. according to the method for claim 2, it is characterised in that described that the authentication operations are triggered by predetermined trigger mode Execution, including:By physical button and/or virtual key, the execution of the authentication operations is triggered.
- 4. according to the method for claim 2, it is characterised in that described that the authentication operations are triggered by predetermined trigger mode Execution, including:Gather the characteristic information of user's input;Wherein, the characteristic information is biological information, gesture feature information or pressure Characteristic information;The characteristic information that the user is inputted and the characteristic information prestored are matched;If the match is successful, the execution of the authentication operations is triggered.
- 5. according to the method any one of claim 1-4, it is characterised in that described to obtain in the volume adjusting interface Volume-leveling value, including:Obtain the volume-leveling value for the volume option for being used for authenticating in the volume adjusting interface.
- A kind of 6. authentication device, it is characterised in that including:Display module, for when performing authentication operations, showing volume adjusting interface;Acquisition module, for obtaining the volume-leveling value in the volume adjusting interface;Authentication module, for judging whether the volume-leveling value and the volume standard value pre-set are identical;If so, then judge Authentication passes through, conversely, then judging that authentication does not pass through.
- 7. device according to claim 6, it is characterised in that described device also includes trigger module;The trigger module, for before authentication operations are performed, holding for the authentication operations to be triggered by predetermined trigger mode OK.
- 8. device according to claim 7, it is characterised in that the trigger module, for passing through physical button and/or void Intend button, trigger the execution of the authentication operations.
- 9. device according to claim 7, it is characterised in that the trigger module, be used for:Gather the characteristic information of user's input;Wherein, the characteristic information is biological information, gesture feature information or pressure Characteristic information;The characteristic information that the user is inputted and the characteristic information prestored are matched;If the match is successful, the execution of the authentication operations is triggered.
- 10. according to the device any one of claim 6-9, it is characterised in that the acquisition module, it is described for obtaining It is used for the volume-leveling value of volume option authenticated in volume adjusting interface.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610414830.8A CN107508958B (en) | 2016-06-14 | 2016-06-14 | Authentication method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610414830.8A CN107508958B (en) | 2016-06-14 | 2016-06-14 | Authentication method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107508958A true CN107508958A (en) | 2017-12-22 |
CN107508958B CN107508958B (en) | 2020-01-10 |
Family
ID=60678254
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610414830.8A Active CN107508958B (en) | 2016-06-14 | 2016-06-14 | Authentication method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107508958B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112286438A (en) * | 2020-10-30 | 2021-01-29 | 北京小米移动软件有限公司 | Touch control method, device, terminal and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103020553A (en) * | 2012-12-11 | 2013-04-03 | 广东欧珀移动通信有限公司 | Anti-theft protection method for mobile terminal |
CN104284011A (en) * | 2013-07-12 | 2015-01-14 | 联想(北京)有限公司 | Information processing method and electronic device |
CN105550549A (en) * | 2015-09-02 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Verification processing method and verification processing device |
US9916430B1 (en) * | 2011-12-08 | 2018-03-13 | Navroop Pal Singh Mitter | Authentication system and method thereof |
-
2016
- 2016-06-14 CN CN201610414830.8A patent/CN107508958B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9916430B1 (en) * | 2011-12-08 | 2018-03-13 | Navroop Pal Singh Mitter | Authentication system and method thereof |
CN103020553A (en) * | 2012-12-11 | 2013-04-03 | 广东欧珀移动通信有限公司 | Anti-theft protection method for mobile terminal |
CN104284011A (en) * | 2013-07-12 | 2015-01-14 | 联想(北京)有限公司 | Information processing method and electronic device |
CN105550549A (en) * | 2015-09-02 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Verification processing method and verification processing device |
Non-Patent Citations (1)
Title |
---|
傅山等: "移动智能终端生物识别发展与挑战", 《移动通信》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112286438A (en) * | 2020-10-30 | 2021-01-29 | 北京小米移动软件有限公司 | Touch control method, device, terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107508958B (en) | 2020-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102389147B1 (en) | Embedded authentication systems in an electronic device | |
CN104331668B (en) | Bad password reminding method and device | |
EP2709031B1 (en) | Gesture- and expression-based authentication | |
KR20210005210A (en) | Implementation of biometric authentication | |
CN103079000B (en) | Method and device for terminal unlocking | |
CN105574378A (en) | Terminal control method and terminal control device | |
CN104778416B (en) | A kind of information concealing method and terminal | |
JP2005537574A (en) | User authentication system and method with strong password | |
JP2011512580A (en) | System and method for accessing tamper-resistant storage in a wireless communication device using biometric data | |
CN104065823A (en) | User mode control method and user mode control system based on iris recognition technology for mobile terminal | |
CN107644172A (en) | The guard method of content displaying and device | |
CN104363205B (en) | Using login method and device | |
CN105930707A (en) | Method and device for switching systems | |
CN109600347A (en) | Control method, device, mobile terminal and the vehicle of vehicle | |
CN106156562B (en) | A kind of private space protective device, mobile terminal and method | |
CN106372479A (en) | Mobile terminal and method of controlling the same | |
US20140223547A1 (en) | Alternate game-like multi-level authentication | |
CN104219053A (en) | Information displaying method, information concealing method and information concealing device | |
US11626118B2 (en) | Vehicle authentication device and vehicle control system | |
CN106250743B (en) | Account switching method and device | |
CN107508958A (en) | A kind of method for authenticating and device | |
CN105808995B (en) | A kind of password prompt method, apparatus and terminal | |
KR101558762B1 (en) | System for providing personalized convenience service and method thereof | |
CN109284588A (en) | Information Authentication method, apparatus and storage medium | |
CN107784211A (en) | Method of password authentication and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |