Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User authentication method of electronic device

A user authentication and electronic equipment technology, applied in the field of electronic equipment user authentication, can solve the problems of user memory, low security, overlapping authentication speed of fingerprint authentication, etc., to achieve ease of use and fun, high security, novel use The effect of experience

Inactive Publication Date: 2013-04-10
HUAQIN TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are many ways of user authentication in the prior art, such as the most traditional password input authentication, its defect is that the user needs to memorize the password, and when the password is wrongly recorded, it often leads to the failure to use the electronic device normally
There are also fingerprint authentication, touch screen sliding authentication, pattern authentication, etc. in the prior art, but they all have defects, such as fingerprint authentication has the defects of overlapping on the screen and low authentication speed; sliding unlock, which can be operated by any person, has low security Defects; mode unlocking has the defect of complicated mode operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method of electronic device
  • User authentication method of electronic device
  • User authentication method of electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] Such as Figure 1 to Figure 3 As shown, this embodiment provides an electronic device user authentication method, including the following steps:

[0027] S11 pre-stores authorized color information;

[0028] S12 input color information to be certified;

[0029] S13 compares the color information to be authenticated with the pre-stored authorized color information, and when the two are the same, execute the operation that passes the authentication; when the two are different, execute the operation that does not pass the authentication.

[0030] This embodiment provides a user authentication method of an electronic device through color information verification. As long as the color information to be authenticated input by the user is consistent with the pre-stored authorized color information, authentication can be implemented and the operation passed the authentication can be performed. Those skilled in the art can understand that the operation through authentication c...

Embodiment 2

[0041] Such as Figure 4 to Figure 6 As shown, this embodiment provides an electronic device user authentication method, including the following steps:

[0042] S21 pre-stores authorized quantity information and authorized color information;

[0043] S22 input quantity information to be certified and color information to be certified;

[0044] S23 compares the color information to be authenticated with the pre-stored authorized color information, and when the two are the same, execute step S24;

[0045] S24 compares the quantity information to be authenticated with the pre-stored authorized quantity information, and when the two are the same, execute the operation that passes the authentication; when the two are not the same, execute the operation that does not pass the authentication;

[0046]This embodiment provides an electronic device user authentication method through color information and quantity information, which not only requires that the color information to be au...

Embodiment 3

[0057] Such as Figure 7 to Figure 9 As shown, this embodiment provides an electronic device user authentication method, including the following steps:

[0058] S31 pre-stores authorized shape information and authorized color information;

[0059] S32 input shape information to be certified and color information to be certified;

[0060] S33 compares the color information to be authenticated with the pre-stored authorized color information, and when the two are the same, execute step S34;

[0061] S34 compares the shape information to be authenticated with the pre-stored authorized shape information, and when the two are the same, execute the operation that passes the authentication; when the two are different, execute the operation that does not pass the authentication;

[0062] This embodiment provides an electronic device user authentication method through color information and shape information, which not only requires that the color information to be authenticated input...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user authentication method of an electronic device. The user authentication method comprises the following steps of S11, pre-storing authorized color information; S12, inputting to-be-authenticated color information; and S13, comparing the to-be-authenticated color information with the pre-stored authorized color information, executing the operation of passing the authentication if the to-be-authenticated color information and the pre-stored authorized color information are the same, and executing the operation of failing in authentication if the to-be-authenticated color information and the pre-stored authorized color information are not the same. According to the user authentication method of the electronic device, provided by the invention, many defects of an authentication method in the prior art are overcome, not only are usability and enjoyment stronger, but also the safety performance is high, and novel using experience can be supplied for a user.

Description

technical field [0001] The invention relates to the field of electronic communication, in particular to a method for authenticating users of electronic equipment. Background technique [0002] With the rapid development of communication technology, the use of electronic devices, especially mobile terminals, in people's daily life is becoming more and more important. Important information such as call records and contacts are often stored in electronic devices, which makes user authentication of electronic devices particularly important. There are many ways of user authentication in the prior art, such as the most traditional password input authentication, its defect is that the user needs to memorize the password, and when the password is wrongly recorded, it often leads to failure to use the electronic device normally. There are also fingerprint authentication, touch screen sliding authentication, pattern authentication, etc. in the prior art, but they all have defects, su...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
Inventor 李柯材
Owner HUAQIN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products