Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method, device and electronic equipment

An electronic device and authentication method technology, applied in the field of data security, can solve problems such as inability to guarantee data security in mobile devices, great security, and hidden dangers, and achieve the effect of simple and efficient implementation, good compatibility, and guaranteed security

Active Publication Date: 2015-07-29
LENOVO (BEIJING) LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Current mobile terminals generally support storage mode and synchronization mode through the USB interface. Synchronization operations include synchronizing contacts, schedules, emails, text messages, and applications with other devices; when performing data operations in synchronization mode or storage mode, only It is necessary to connect the mobile terminal with other devices to operate the data in the mobile device. Therefore, there are great security risks and the security of the data in the mobile device cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and electronic equipment
  • Authentication method, device and electronic equipment
  • Authentication method, device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0035] see figure 1 , which is a flowchart of an authentication method according to an embodiment of the present invention. This embodiment is used for a first device, wherein the first device has a locked state and an unlocked state. This process specifically includes:

[0036] Step 101, when the first device is in a locked state, if a predetermined condition is satisfied between the first device and a second device, an authentication request is generated;

[003...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present disclosure provide an authentication method and an electronic device. The method includes: generating by a first device an authentication request if a predetermined condition exists between the first device and a second device, when the first device is in a locking state, wherein the first device has the locking state and a non-locking state; receiving by the first device authentication information, the authentication information being input in response to the authentication request; and authenticating the second device using the authentication information. Through the present disclosure, others cannot directly damage or copy data in the first device in a connection manner such as using a data line even if they get hold of the device, as long as the first device is in the locking state. Thus, the security of the data in the first device is ensured. Since a complex synchronization authentication protocol does not need to be developed by synchronization software and the first device, and the present disclosure is compatible with various commercially available synchronization software, the implementation method is simple and efficient, and the compatibility is good.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to an authentication method, device and electronic equipment. Background technique [0002] Current mobile terminals generally support storage mode and synchronization mode through the USB interface. Synchronization operations include synchronizing contacts, schedules, emails, text messages, and applications with other devices; when performing data operations in synchronization mode or storage mode, only The mobile terminal needs to be connected with other devices to operate on the data in the mobile device. Therefore, there is a great potential safety hazard, and the security of the data in the mobile device cannot be guaranteed. For example, if the user's device is lost or left temporarily, even if the user has set a lock screen password, other people can directly destroy or copy the data on the mobile device through the USB data cable as long as they get the mobile smart de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06F21/62
CPCG06F21/30G06F21/44
Inventor 刘永锋申江涛李俊
Owner LENOVO (BEIJING) LTD