Unlock instant, AI-driven research and patent intelligence for your innovation.

Authorization identification method and user terminal

A technology of user terminal and identification method, which is applied in the field of information processing, can solve the problem of low security of authority identification method, and achieve the effect of protecting security and improving security

Inactive Publication Date: 2016-11-02
BEIJING BENY WAVE SCI & TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides an authority identification method and a user terminal to overcome the problem of low security of the authority identification method in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization identification method and user terminal
  • Authorization identification method and user terminal
  • Authorization identification method and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The user terminal described in each embodiment of the present invention may be a smart phone (Smart Phone), a notebook computer, a tablet computer, a portable equipment (Portable Equipment) and other devices.

[0024] figure 1 It is a flow chart of Embodiment 1 of the authorization identification method of the present invention, such as figure 1 As shown, the method of this embodiment may include:

[0025] Step 101, the user terminal collects signature information of the user, and the signature information includes fingerprint data and / or signature data.

[0026] Specifically, the signature data may include the structural features of each word in the signature and the dynamic features of the signature.

[0027] Step 102, the user terminal determines the authority of the user according to the signature information.

[0028] Specifically, the signature information collected in step 101 may be matched with the signature information in the pre-saved samples to determine ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a permission identification method and a user terminal, wherein the method includes: the user terminal collects signature information of the user, and the signature information includes fingerprint data and / or signature data; the user terminal determines the user's identity according to the signature information Authority: the user terminal determines available services according to the user's authority, and displays the available services for the user. The authority identification method and user terminal provided by the present invention can overcome the problem of low security of the authority identification method in the prior art.

Description

technical field [0001] The present invention relates to information processing technology, and in particular to an authorization identification method and a user terminal. Background technique [0002] With the development of electronics and information technology, the security of electronic equipment and information has become an important issue in this field. [0003] For user terminals, such as smartphones, traditional authorization identification usually uses methods such as passwords and swiping screens. For example, the user can use various functions of the user terminal only after entering the correct password or swiping the screen according to the correct trajectory. [0004] However, this permission identification method is easy to be cracked, and the security is not high. Contents of the invention [0005] The invention provides an authorization identification method and a user terminal to overcome the problem of low security of the authorization identification ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31
Inventor 杨喆
Owner BEIJING BENY WAVE SCI & TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More