CN107508958B - Authentication method and device - Google Patents

Authentication method and device Download PDF

Info

Publication number
CN107508958B
CN107508958B CN201610414830.8A CN201610414830A CN107508958B CN 107508958 B CN107508958 B CN 107508958B CN 201610414830 A CN201610414830 A CN 201610414830A CN 107508958 B CN107508958 B CN 107508958B
Authority
CN
China
Prior art keywords
volume
authentication
characteristic information
value
triggering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610414830.8A
Other languages
Chinese (zh)
Other versions
CN107508958A (en
Inventor
朱连洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan Yulong Telecommunication Technology Co Ltd
Original Assignee
Dongguan Yulong Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Yulong Telecommunication Technology Co Ltd filed Critical Dongguan Yulong Telecommunication Technology Co Ltd
Priority to CN201610414830.8A priority Critical patent/CN107508958B/en
Publication of CN107508958A publication Critical patent/CN107508958A/en
Application granted granted Critical
Publication of CN107508958B publication Critical patent/CN107508958B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Abstract

The invention discloses an authentication method and an authentication device. The method comprises the following steps: when the authentication operation is executed, displaying a volume adjusting interface; acquiring a volume adjusting value in the volume adjusting interface; and judging whether the volume adjusting value is the same as a preset volume standard value or not, if so, judging that the authentication is passed, otherwise, judging that the authentication is not passed. The invention takes the volume value of the volume option as an authentication password (volume standard value), and adjusts the volume value of the volume option according to the preset volume standard value during authentication so as to achieve the purpose of quick decryption. By the method and the device, other people cannot accurately record or crack the password, and the security of authentication is improved.

Description

Authentication method and device
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an authentication method and apparatus.
Background
The existing mobile terminal can enter a user interface of the mobile terminal in a sliding unlocking mode, a graphical unlocking mode or a password unlocking mode. However, the authentication method used in the unlocking process is too simple, the sliding direction is easily imitated by others, and the pattern and the password are easily known by others, so the security of the existing authentication method is low.
Disclosure of Invention
The invention mainly aims to provide an authentication method and an authentication device, which aim to solve the problem of low security of the conventional authentication mode.
Aiming at the technical problems, the invention solves the technical problems by the following technical scheme:
the invention provides an authentication method, which comprises the following steps: when the authentication operation is executed, displaying a volume adjusting interface; acquiring a volume adjusting value in the volume adjusting interface; and judging whether the volume adjusting value is the same as a preset volume standard value or not, if so, judging that the authentication is passed, otherwise, judging that the authentication is not passed.
Wherein, before the executing the authentication operation, the method further comprises: and triggering the execution of the authentication operation in a preset triggering mode.
Wherein the triggering the execution of the authentication operation through a predetermined triggering manner includes: and triggering the execution of the authentication operation through a physical key and/or a virtual key.
Wherein the triggering the execution of the authentication operation through a predetermined triggering manner includes: collecting characteristic information input by a user; wherein the characteristic information is biological characteristic information, gesture characteristic information or pressure characteristic information; matching the characteristic information input by the user with the characteristic information stored in advance; and if the matching is successful, triggering the execution of the authentication operation.
Wherein, the acquiring of the volume adjustment value in the volume adjustment interface includes: and acquiring the volume adjusting value of the volume option used for authentication in the volume adjusting interface.
The invention also provides an authentication device, comprising: the display module is used for displaying a volume adjusting interface when the authentication operation is executed; the acquisition module is used for acquiring the volume adjustment value in the volume adjustment interface; the authentication module is used for judging whether the volume adjusting value is the same as a preset volume standard value or not; if yes, the authentication is judged to be passed, otherwise, the authentication is judged not to be passed.
Wherein the device further comprises a triggering module; the triggering module is used for triggering the execution of the authentication operation through a preset triggering mode before the authentication operation is executed.
The triggering module is used for triggering the execution of the authentication operation through a physical key and/or a virtual key.
Wherein the trigger module is configured to: collecting characteristic information input by a user; wherein the characteristic information is biological characteristic information, gesture characteristic information or pressure characteristic information; matching the characteristic information input by the user with the characteristic information stored in advance; and if the matching is successful, triggering the execution of the authentication operation.
The obtaining module is configured to obtain a volume adjustment value of a volume option used for authentication in the volume adjustment interface.
The invention has the following beneficial effects:
the authentication method of the invention takes the volume value of the volume option as an authentication password (volume standard value), and adjusts the volume value of the volume option according to the preset volume standard value during authentication so as to achieve the purpose of quick decryption. The invention ensures that other people cannot accurately record or crack the password, improves the safety of authentication and increases the secrecy and the interestingness of the authentication.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a flow diagram of an authentication method according to one embodiment of the invention;
FIG. 2 is a detailed flow diagram of an authentication method according to an embodiment of the invention;
FIG. 3 is a schematic diagram of a volume adjustment interface according to an embodiment of the invention;
fig. 4 is a block diagram of an authentication apparatus according to an embodiment of the present invention.
Detailed Description
The authentication method of the invention takes the volume value of the volume option as an authentication password (volume standard value), and adjusts the volume value of the volume option according to the preset volume standard value during authentication so as to achieve the purpose of quick decryption. The invention ensures that other people cannot accurately record or crack the password, improves the safety of authentication and increases the secrecy and the interestingness of the authentication.
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail below with reference to the accompanying drawings and specific embodiments.
According to an embodiment of the present invention, an authentication method is provided, and fig. 1 is a flowchart of the authentication method according to an embodiment of the present invention. The execution subject of the embodiment is a mobile terminal.
Step S110, when the authentication operation is executed, a volume adjusting interface is displayed.
The volume adjusting interface comprises a volume option, and the volume value corresponding to the volume option can be adjusted by operating the volume option. In this embodiment, the volume value corresponding to the volume option is used as the authentication password.
Before executing the authentication operation, triggering the execution of the authentication operation through a preset triggering mode.
In one embodiment, the execution of the authentication operation may be triggered by a physical key and/or a virtual key. Further, when the preset physical key and/or the virtual key is/are subjected to preset operation, the execution of the authentication operation is triggered. The physical keys include: up and down volume keys, HOME key. For example: and when the mobile terminal is in a screen locking state, the user clicks an HOME key to trigger the execution of the authentication operation, and a volume adjustment interface is displayed for the user.
In another embodiment, the authentication operation may be triggered by means of feature recognition, i.e. in case the feature information input by the user satisfies a predetermined condition, the execution of the authentication operation is triggered.
Collecting characteristic information input by a user; matching the characteristic information input by the user with the characteristic information stored in advance; if the matching is successful, triggering the execution of the authentication operation; and if the matching fails, not triggering the execution of the authentication operation. The pre-stored characteristic information is the characteristic information which is input and stored in the mobile terminal by a legal user in advance.
The characteristic information is biological characteristic information, gesture characteristic information or pressure characteristic information. Then, the pre-stored feature information is biometric feature information, gesture feature information, or pressure feature information that is input and stored in the mobile terminal by a legitimate user in advance.
The embodiment of the present invention does not specifically limit the specific category of the feature recognition. However, it should be appreciated that: the type of the collected characteristic information is the same as that of the characteristic information stored in advance. For example: the type of the pre-stored feature information is biological feature information, and the type of the collected feature information is biological feature information.
Specifically, the present embodiment may trigger the execution of the authentication operation by means of biometric identification. Collecting biological characteristic information input by a user; matching the biological characteristic information input by the user with the biological characteristic information stored in advance; if the matching is successful, the execution of the authentication operation is triggered, otherwise, the execution of the authentication operation is not triggered. Biometric identification includes, but is not limited to: fingerprint identification, iris identification, voiceprint identification, face identification and ear identification. Then, biometric information includes, but is not limited to: fingerprint characteristic information, iris characteristic information, voiceprint characteristic information, face characteristic information and eardrum characteristic information.
For example: the method comprises the steps that a plurality of fingerprint features input by a user at the same time are collected through a plurality of fingerprint sensors on the mobile terminal, the collected fingerprint features are respectively matched with a plurality of fingerprint features stored in advance, if the collected fingerprint features can be successfully matched, execution of authentication operation is triggered, otherwise, the execution of the authentication operation is not triggered, and the user is requested to input the fingerprint again.
The embodiment can also trigger the execution of the authentication operation through a gesture feature recognition method. Collecting gesture feature information input by a user; matching gesture characteristic information input by a user with gesture characteristic information stored in advance; if the matching is successful, the execution of the authentication operation is triggered, otherwise, the execution of the authentication operation is not triggered. The gesture characteristic information may embody a motion of a user's hand.
The embodiment can also trigger the execution of the authentication operation by a pressure characteristic identification method. Collecting pressure characteristic information input by a user; matching pressure characteristic information input by a user with prestored pressure characteristic information; if the matching is successful, the execution of the authentication operation is triggered, otherwise, the execution of the authentication operation is not triggered. For example: the method comprises the steps that a force sensor is arranged in a mobile terminal, pressure is divided into a light press level and a heavy press level, each level corresponds to a pressure range, pressure input by a user is collected through the force sensor, and if the collected pressure is the heavy press level and is matched with the heavy press level of the pressure stored in advance, execution of authentication operation is triggered.
And step S120, acquiring a volume adjusting value in the volume adjusting interface.
And acquiring the volume adjusting value of the volume option in the volume adjusting interface. The volume adjustment value refers to the current volume value of the volume option.
Specifically, in the displayed volume adjustment interface, a volume slider bar including a plurality of volume options is included. And the volume value of the volume option is adjusted by operating a button on the volume slider through a physical key and/or a virtual key. The user may drag a button on a certain volume slider bar, or may move the button on the volume slider bar through the up and down volume keys to adjust the volume value of the volume option.
The number of volume options in the volume adjustment interface may be one or more, for example: in the volume adjustment interface, comprising: volume options such as ring, announcement, alarm, media, system, call, etc.
And acquiring the volume adjusting values of all volume options in the volume adjusting interface, or acquiring the volume adjusting values of the volume options for authentication in the volume adjusting interface. The volume option for authentication is preset in the volume adjusting interface; the number of volume options for authentication is one or more.
For example: of the volume options for ring, announcement, alarm, media, system, call, etc., only the ring volume option and the alarm volume option are selected as volume options for authentication.
Step S130, judging whether the volume adjusting value is the same as a preset volume standard value; if yes, go to step S140; if not, step S150 is executed.
Before performing the authentication operation, volume options for authentication in the volume adjustment interface are set, and a volume standard value is set and stored for each volume option for authentication. The volume standard value is the correct authentication password. And during authentication, the pre-stored volume standard value is used for judging whether the volume adjusting value input by the user is correct or not.
After the authentication operation is executed, if the volume adjusting value of the volume option used for authentication in the volume adjusting interface is acquired; comparing the volume standard value and the volume adjusting value of the same volume option, and if the volume standard value and the volume adjusting value are the same, judging that the authentication is passed; if not, the authentication is judged not to pass.
After the authentication operation is executed, if the volume adjustment values of all the volume options in the volume adjustment interface are obtained, obtaining the volume options for authentication in all the volume options, then comparing the volume standard values and the volume adjustment values of the same volume options, and if the volume standard values and the volume adjustment values are the same, judging that the authentication is passed; if not, the authentication is judged not to pass. In the volume adjustment interface, besides the other volume options before the volume option for authentication, the user can also operate to adjust the current volume value, but does not participate in the matching process.
Step S140, judging that the authentication is passed.
And if the authentication is passed, the volume adjusting value input in the volume adjusting interface is the same as the preset volume standard value.
After the authentication is passed, the operation corresponding to the authentication can be executed. Authenticating the corresponding operation includes, but is not limited to: screen unlocking operation, decryption operation and switching operation. The decryption operations include, but are not limited to: decrypt for application, decrypt for file, decrypt for folder.
For example: the mobile terminal comprises a security mode (private domain) and a normal mode, wherein the security level of the security mode is higher than that of the normal mode, in order to ensure that files in the security mode are not illegally obtained, authentication is carried out when the security mode is switched to the normal mode, and only in the case that the authentication is passed, the security mode is allowed to be switched to the normal mode.
And step S150, judging that the authentication is not passed.
And if the authentication is not passed, the volume adjusting value input in the volume adjusting interface is different from the preset volume standard value. And in the case of not passing the authentication, not executing the operation corresponding to the authentication.
The reason for the authentication failure is: the user who operates the volume adjustment interface may be an illegal user or a user may perform an erroneous operation. At this time, the user may be prompted that the currently input volume adjustment value is incorrect, and be asked to re-input the volume adjustment value. A threshold may be set for the number of times that the user re-inputs the volume adjustment value, and if the number of times that the user re-inputs the volume adjustment value exceeds the threshold, an alarm may be given, or an alarm may be given through other mobile terminals that are bound in advance.
In order not to affect the normal volume of the mobile terminal, in this embodiment, the volume adjustment value of the volume option adjusted by the user in the authentication process is only used for authentication, the authentication is passed or the authentication is not passed, and the adjusted volume adjustment value does not act on the volume option, so that the problem that the volume value of the mobile terminal is changed after the authentication does not occur in this embodiment.
The authentication method of this embodiment can authenticate the user. The authentication method can be applied to unlocking authentication of a mobile terminal screen, private domain switching authentication, starting encryption program authentication and the like.
In the embodiment, the volume value of the volume option is used as the authentication password, and the user manually adjusts the volume value to quickly decrypt the password, so that other people cannot accurately record or crack the password, and the dynamic password decryption is realized. The authentication scheme of the embodiment is high in safety and interesting.
The invention will be further illustrated by the following specific examples. Fig. 2 is a detailed flowchart of an authentication method according to an embodiment of the present invention. In this embodiment, unlocking of the mobile terminal is taken as an example.
And step S210, carrying out display design on the volume adjustment interface.
In order to enable the user to quickly adjust the button on the volume slider bar to a corresponding position, when the user operates the button on the volume slider bar, a scale mark is displayed on the volume slider bar, and a volume value of the position where the button is located is displayed behind the volume slider bar, as shown in fig. 3.
Step S220, a volume option for authentication and a volume standard value of the volume option are set.
The user may select some or all of the volume options as the volume options for authentication.
As shown in fig. 3, the volume options in the volume adjustment interface include: ring tones, announcements, alarm clocks, media, systems, and conversations. When the authentication operation is set, a volume adjustment interface is displayed for a user, the user can select the ring and the notification as volume options for authentication in the ring, the notification, the alarm clock, the media, the system and the call, and set corresponding volume standard values for the ring and the notification, such as: in the volume adjusting interface, the volume values of the ring tone and the notice are adjusted to 3, and the setting of the volume standard value is completed.
Step S230, after the screen is lighted up, whether the screen selected by the user is unlocked is identified; if yes, go to step S240; if not, go to step S280.
When the user selects the screen to unlock, step S240 is performed to perform an authentication operation, and when the user does not select the screen to unlock, step S280 is performed to perform a normal volume adjustment operation.
Step S240, when the user selects the screen to unlock, displaying a volume adjusting interface for the user, and acquiring a volume adjusting value of the volume option for authentication.
When the user selects the screen unlock, a volume adjustment interface is displayed for the user, in which the user can adjust the volume value of the volume option.
Further, all volume options in the volume adjustment interface allow the user to adjust the volume value, so as to avoid that an illegal user makes repeated attempts in the volume adjustment interface only for the volume option used for authentication, and further obtain a correct volume value capable of passing the authentication.
Step S250, judging whether the volume adjusting value of the volume option is the same as the volume standard value of the volume option; if yes, go to step S260; if not, step S270 is executed.
For example: the user selects the ring tone and the notice as volume options for authentication, and sets the volume standard values of the ring tone and the notice to be 3; and when the screen is unlocked, displaying a volume adjusting interface for the user, allowing the user to adjust the volume value of each volume option in the volume adjusting interface, if the user adjusts the ringtone and the notification to 3 respectively, passing the authentication, successfully unlocking the screen, otherwise, failing to pass the authentication, failing to unlock the screen, and asking the user to readjust the volume value of the volume option.
Step S260, determining that the authentication is passed.
Step S270, judging that the authentication is not passed.
Step S280, displaying a volume adjustment interface for the user, and adjusting the volume according to the user operation.
The present embodiment may also be applied in other application scenarios, for example: the user sets an application lock for the short message, and the password (volume standard value) is set as follows: selecting a volume adjustment authentication mode from the given authentication modes, setting the ring tone into 1 lattice, setting the notification into 2 lattices, setting the alarm clock into 3 lattices and setting the media into 4 lattices in a popped volume adjustment interface; after the setting is finished, popping up an unlocking interface, namely a volume adjusting interface, when the short message is clicked, if the volume values of the ring tone, the notice, the alarm clock and the media are respectively adjusted to the positions of 1, 2, 3 and 4 grids, the unlocking is successful, and the short message is entered.
In this embodiment, only when the volume option in the volume adjustment interface is adjusted by the volume value in the non-authentication operation process, the volume sent by the mobile terminal may be affected. For example: the user sets the ringtone of the mobile terminal to 5 lattices, sets the ringtone to 1 lattice when authentication setting is carried out, adjusts the ringtone to 1 lattice in the authentication process, passes the authentication, and keeps the ringtone of the mobile terminal to 5 lattices after the authentication is passed, so that the ringtone cannot be changed because the ringtone is adjusted to 1 lattice when the authentication is passed.
An embodiment of the present invention further provides an authentication apparatus, as shown in fig. 4, which is a structural diagram of the authentication apparatus according to an embodiment of the present invention.
The device includes:
the display module 410 is configured to display a volume adjustment interface when performing the authentication operation.
An obtaining module 420, configured to obtain a volume adjustment value in the volume adjustment interface.
The authentication module 430 is configured to determine whether the volume adjustment value is the same as a preset volume standard value; if yes, the authentication is judged to be passed, otherwise, the authentication is judged not to be passed.
The obtaining module 420 is configured to obtain a volume adjustment value of a volume option used for authentication in the volume adjustment interface.
The device further comprises: a trigger module 440; the triggering module 440 is configured to trigger the execution of the authentication operation through a predetermined triggering manner before the authentication operation is executed.
In one embodiment, the triggering module 440 is configured to trigger the execution of the authentication operation through a physical key and/or a virtual key.
In another embodiment, the triggering module 440 is configured to collect feature information input by a user; wherein the characteristic information is biological characteristic information, gesture characteristic information or pressure characteristic information; matching the characteristic information input by the user with the characteristic information stored in advance; and if the matching is successful, triggering the execution of the authentication operation.
The functions of the apparatus in this embodiment have already been described in the method embodiments shown in fig. 1 to fig. 3, so that reference may be made to the related descriptions in the foregoing embodiments for details in the description of this embodiment, which are not repeated herein.
The apparatus of this embodiment may be configured in a mobile terminal, so that the mobile terminal performs an authentication operation based on the apparatus. Furthermore, the mobile terminal comprises a physical key and/or a virtual key for triggering authentication operation; the mobile terminal comprises a sensor used for collecting characteristic information input by a user.
The above description is only an example of the present invention, and is not intended to limit the present invention, and it is obvious to those skilled in the art that various modifications and variations can be made in the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the scope of the claims of the present invention.

Claims (10)

1. An authentication method, comprising:
when the authentication operation is executed, displaying a volume adjusting interface;
acquiring a volume adjusting value in the volume adjusting interface;
and judging whether the volume adjusting value is the same as a preset volume standard value or not, if so, judging that the authentication is passed, otherwise, judging that the authentication is not passed.
2. The method of claim 1, prior to said performing an authentication operation, further comprising: and triggering the execution of the authentication operation in a preset triggering mode.
3. The method of claim 2, wherein triggering the execution of the authentication operation by a predetermined trigger comprises:
and triggering the execution of the authentication operation through a physical key and/or a virtual key.
4. The method of claim 2, wherein triggering the execution of the authentication operation by a predetermined trigger comprises:
collecting characteristic information input by a user; wherein the characteristic information is biological characteristic information, gesture characteristic information or pressure characteristic information;
matching the characteristic information input by the user with the characteristic information stored in advance;
and if the matching is successful, triggering the execution of the authentication operation.
5. The method according to any one of claims 1-4, wherein the obtaining of the volume adjustment value in the volume adjustment interface comprises:
and acquiring the volume adjusting value of the volume option used for authentication in the volume adjusting interface.
6. An authentication apparatus, comprising:
the display module is used for displaying a volume adjusting interface when the authentication operation is executed;
the acquisition module is used for acquiring the volume adjustment value in the volume adjustment interface;
the authentication module is used for judging whether the volume adjusting value is the same as a preset volume standard value or not; if yes, the authentication is judged to be passed, otherwise, the authentication is judged not to be passed.
7. The apparatus of claim 6, further comprising a triggering module;
the triggering module is used for triggering the execution of the authentication operation through a preset triggering mode before the authentication operation is executed.
8. The apparatus of claim 7, wherein the triggering module is configured to trigger the performing of the authentication operation through a physical key and/or a virtual key.
9. The apparatus of claim 7, wherein the triggering module is configured to:
collecting characteristic information input by a user; wherein the characteristic information is biological characteristic information, gesture characteristic information or pressure characteristic information;
matching the characteristic information input by the user with the characteristic information stored in advance;
and if the matching is successful, triggering the execution of the authentication operation.
10. The apparatus according to any one of claims 6-9, wherein the obtaining module is configured to obtain the volume adjustment value of the volume option for authentication in the volume adjustment interface.
CN201610414830.8A 2016-06-14 2016-06-14 Authentication method and device Active CN107508958B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610414830.8A CN107508958B (en) 2016-06-14 2016-06-14 Authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610414830.8A CN107508958B (en) 2016-06-14 2016-06-14 Authentication method and device

Publications (2)

Publication Number Publication Date
CN107508958A CN107508958A (en) 2017-12-22
CN107508958B true CN107508958B (en) 2020-01-10

Family

ID=60678254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610414830.8A Active CN107508958B (en) 2016-06-14 2016-06-14 Authentication method and device

Country Status (1)

Country Link
CN (1) CN107508958B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112286438A (en) * 2020-10-30 2021-01-29 北京小米移动软件有限公司 Touch control method, device, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103020553A (en) * 2012-12-11 2013-04-03 广东欧珀移动通信有限公司 Anti-theft protection method for mobile terminal
CN104284011A (en) * 2013-07-12 2015-01-14 联想(北京)有限公司 Information processing method and electronic device
CN105550549A (en) * 2015-09-02 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Verification processing method and verification processing device
US9916430B1 (en) * 2011-12-08 2018-03-13 Navroop Pal Singh Mitter Authentication system and method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9916430B1 (en) * 2011-12-08 2018-03-13 Navroop Pal Singh Mitter Authentication system and method thereof
CN103020553A (en) * 2012-12-11 2013-04-03 广东欧珀移动通信有限公司 Anti-theft protection method for mobile terminal
CN104284011A (en) * 2013-07-12 2015-01-14 联想(北京)有限公司 Information processing method and electronic device
CN105550549A (en) * 2015-09-02 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Verification processing method and verification processing device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
移动智能终端生物识别发展与挑战;傅山等;《移动通信》;20150315(第5期);13-16页 *

Also Published As

Publication number Publication date
CN107508958A (en) 2017-12-22

Similar Documents

Publication Publication Date Title
US10496804B2 (en) Fingerprint authentication method and system, and terminal supporting fingerprint authentication
CN105631275B (en) information display method, information display device and terminal
CN104851164B (en) Intelligent lock with biological feature recognition function and control method thereof
CN104537291A (en) Screen interface unlocking method and screen interface unlocking device
EP3437020B1 (en) Secure storage of fingerprint related elements
CN104065823A (en) User mode control method and user mode control system based on iris recognition technology for mobile terminal
CN105227439B (en) A kind of sharing method and user terminal of associated person information
CN107533598B (en) Input method and device of login password of application program and terminal
CN109671192B (en) Method for unlocking intelligent door lock by utilizing earphone and earphone
CN105405185A (en) Safety verifying method and apparatus thereof
CN109190343B (en) Identity verification safety authentication system based on fingerprint identification
CN107508958B (en) Authentication method and device
CN106657034B (en) Service authentication method and authentication capability open server
CN107437996B (en) Identity authentication method, device and terminal
CN107710673B (en) User identity authentication method and device
CN106534479A (en) Cell phone password protection system based on implicit code identification and implicit conversion
KR101860314B1 (en) Method and system for user authentication using supplementary system
KR102320024B1 (en) Method and apparatus for an authentication based on biological information
CN105808995B (en) A kind of password prompt method, apparatus and terminal
CN105550572A (en) Password modifying method and system
CN105760754A (en) Method and device for processing application notice
JP7240983B2 (en) Authentication system, authentication method, and registration device
CN108668013A (en) mobile terminal unlocking method
KR20150015138A (en) Method and system for providing dynamic password
JP5272544B2 (en) Authentication device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant