Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for authentication of mobile terminal

A mobile terminal and identity verification technology, applied in the field of mobile Internet, can solve problems such as illegal user embezzlement, achieve the effect of preventing user privacy from leaking, improving user experience, and ensuring information security

Active Publication Date: 2015-08-05
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current problem is that the mobile terminal does not have any special identification and response to the user. No matter what user is, the mobile terminal can be used mainly by correct operation, such as entering the correct password. If the mobile terminal does not set a password, Or other users know to use the password or the password is stolen, once the mobile terminal is lost, it may be stolen by illegal users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for authentication of mobile terminal
  • Method and system for authentication of mobile terminal
  • Method and system for authentication of mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.

[0016] In the description of the present invention, it should be understood that the terms "first", "second" and so on are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance. In addition, in the description of the present invention, unless otherwise specified, "plurality" means two or more.

[0017] Any process or m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for authentication of a mobile terminal. The method includes: a cloud end server acquires a user's application information according to a preset time interval; the cloud end server analyzes whether the user of the mobile terminal is abnormal or not according to a plurality of acquired user's application information; if so, the cloud end server transmits an authentication instruction to the mobile terminal; and the cloud end server receives the authentication information returned according to the authentication instruction by the mobile terminal, the cloud end server allows the user to continue to use the mobile terminal if the authentication information is correct, or else, the cloud end serve activates a self-locking program in the mobile terminal to lock the mobile terminal. By the method, authentication can be performed to users according to application habits of users, privacy disclosure of users due to the fact that the mobile terminal is lost or stolen can be prevented effectively, information safety is guaranteed, and users' experience is improved.

Description

technical field [0001] The invention relates to the technical field of mobile Internet, in particular to a method and system for identity verification of a mobile terminal. Background technique [0002] At present, when using a mobile terminal, a user generally sets a password for using the mobile terminal, and the user can use the mobile terminal by inputting the correct password. The current problem is that the mobile terminal does not have any special identification and response to the user. No matter what user is, the mobile terminal can be used mainly by correct operation, such as entering the correct password. If the mobile terminal does not set a password, Or other users know to use the password or the password is stolen, and once the mobile terminal is lost, it may be embezzled by unscrupulous users. Contents of the invention [0003] The aim of the present invention is to solve at least one of said technical drawbacks. [0004] For this reason, an object of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L29/08H04W12/68
Inventor 刘娟
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More