Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety verification method and device

A technology for security verification and location information, applied in electrical components, transmission systems, etc., can solve the problems of cumbersome operation, easy cracking of password authentication, limited security verification, etc. Effect

Active Publication Date: 2013-08-14
XIAOMI INC
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention discloses a security verification method and device to solve the problem that slide unlocking and password authentication are easy to crack, face recognition is affected by technology maturity and light, the operation is cumbersome, and the whole picture is used as the carrier of information for security verification. Validation, which limits the security validation to questions of the form

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification method and device
  • Safety verification method and device
  • Safety verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] A security verification method disclosed in the embodiment of the present invention is introduced in detail.

[0072] refer to figure 1 , shows a flowchart of a security verification method in an embodiment of the present invention.

[0073] Step 100, obtaining security verification question information.

[0074] The above security verification question information corresponds to the multimedia data.

[0075] The above security verification question information may include information such as questions to be answered during security verification, question numbers, and validity periods of questions.

[0076] The above multimedia data can be audio data, such as Moving Picture Experts Group Audio Layer III (MP3) files, etc.; it can also be audio and video data, such as Audio Video Interleaved (AVI) documents etc.

[0077] The above security verification question information may correspond to preset audio data; the above security verification question information may al...

Embodiment 2

[0088] A security verification method disclosed in the embodiment of the present invention is introduced in detail.

[0089] refer to figure 2 , shows a flowchart of a security verification method in an embodiment of the present invention.

[0090] Step 200, acquire multimedia data, and divide the multimedia data into segment information.

[0091] The above multimedia data may be audio data, may be video data, and may also be audio and video data.

[0092] The above fragment information may be the content of the frame of the multimedia data, the attribute of the frame or the relationship between the frames and so on.

[0093] Dividing the multimedia data into segment information may divide the multimedia data into several segments according to the playing time length of the multimedia data. For example, the multimedia data is an mp3 file with a playing time of 30 seconds. The mp3 file can be divided into a segment every 3 seconds and marked with 0, 1, 2...9 to obtain 10 se...

Embodiment 3

[0132] A security verification method disclosed in the embodiment of the present invention is introduced in detail.

[0133] refer to image 3 , shows a flowchart of a security verification method in an embodiment of the present invention.

[0134] Step 300, downloading a plurality of safety verification question information, and correspondingly downloading the multimedia data of the above plurality of safety verification question information.

[0135] The above multiple security verification question information and corresponding multimedia data may be stored in a pre-established question database. The above multimedia data may be pre-cut into multiple parts.

[0136] The above question bank may include: a multimedia table (table_media), a multimedia data segmentation definition table (table_media_block) and a question definition table (table_question).

[0137] Among them, the main structure of the multimedia table (table_media) is:

[0138] "media_id

[0139] integer p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a safety verification method and device, and solves the problems that slide unlocking and password authentication are easy to crack, the face recognition is influenced by technology maturity and light, the operation is cumbersome, and the form of safety verification is limited since the overall picture serves as an information carrier to be subjected to safety verification. The safety verification method comprises the following steps: acquiring safety verification problem information, leading the safety verification problem information to correspond to multi-media data; receiving the safety verification reply information of the safety verification problem information and safely verifying; and causing the safety verification reply information to be related with the multi-media data. Through the embodiment of the invention, the safety verification is carried out through replying the safety verification problem data corresponding to the multi-media data, the diversion of the safety verification can be realized, the safety verification process is simple and easy to understand, and the operation step is simple and convenient.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of communication, and also to the field of security verification, and in particular, to a method and device for security verification. Background technique [0002] Today, with the rapid development of science and technology, especially with the rapid development of Internet technology, smart phones have become an indispensable tool for people. The carrying of social relations such as communication, shopping, payment, information collection, and address book all rely on smartphones. As an important terminal for user's invisibility and security, smart phone has no doubt about its importance and security. It also brings a variety of user authentication methods. Such as: slide to unlock, password authentication, face recognition, etc., but the above-mentioned security verification schemes are either easy to be cracked, or the operation is cumbersome, and it is not easy to promote and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 陈启亮王斌欧金粱郑志光
Owner XIAOMI INC