Safety verification method and equipment

A technology of security verification and verification method, applied in the field of security verification method and equipment, can solve the problem of inability to take into account the convenience of operation and user information security, and achieve the effect of increasing the convenience of operation and protecting the security.

Inactive Publication Date: 2012-09-19
BEIJING BENY WAVE SCI & TECH
View PDF4 Cites 83 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiments of the present invention is to provide a security verification method and device to solve the problem that the single password verification in the prior art cannot take into account the convenience of operation and the security of user information in different application scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification method and equipment
  • Safety verification method and equipment
  • Safety verification method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] figure 1 It is a schematic flowchart of a security verification method provided by an embodiment of the present invention. This method is applicable to devices and various mobile terminals, such as mobile phones and tablet computers, whose application environments may change. Such as figure 1 As shown, the security verification method includes:

[0055] Step 10: Determine the current application scenario and the information type of the current operation.

[0056] For example, the security verification device determines the current application scenario and the information type of the current operation. The current application scene is the current application scene of the device. For example, the application scene can be divided into several categories such as work scene, family scene, entertainment scene, etc., and can also be classified in other ways according to actual needs. The type of information currently operated is the type of information currently operated by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety verification method and equipment. The safety verification method comprises the following steps of: determining a current application scene and an information type of current operation; determining a safety verification mode corresponding to the current application scene and the information type of the current operation according to a mapping relation among the pre-supposed application scene, the information type and the safety verification mode; and performing safety verification according to the corresponding safety verification mode. By adopting the technical scheme, the pre-supposed safety verification mode matched with the current application scene is selected according to the application scene in which a user is located. According to the dynamic safety verification mode, the operation convenience of the user in a safe environment can be enhanced, and the safety of private information and data of the user in an unsafe environment can also be protected as far as possible.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of communications, and in particular, to a security verification method and device. Background technique [0002] With the rapid development of communication technology and mobile Internet, the functions of mobile devices are becoming more and more powerful, and the scope and environment of use are becoming more and more diverse. People use mobile devices to save more and more contact information, store communication information, save private photos, save some important documents, and even realize online payment and online shopping through mobile devices. The existing security protection method only uses a simple and single password verification for identity verification. No matter the user uses it in a home scene or a public place with a large number of people, the same password verification method is used. [0003] If the user has enabled the above types of password verification ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/00G06K9/00G10L17/00G06F21/30
Inventor 党志立
Owner BEIJING BENY WAVE SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products