Unlock instant, AI-driven research and patent intelligence for your innovation.

Verification method specific to applications, terminal and system

A verification method and terminal technology, applied in the field of communication, can solve problems such as use safety, and achieve the effect of ensuring use safety

Active Publication Date: 2015-05-06
ADVANCED NEW TECH CO LTD
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The main purpose of this application is to provide an application-specific verification method, terminal and system to solve the problem of using security of applications on the terminal existing in the prior art, wherein:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method specific to applications, terminal and system
  • Verification method specific to applications, terminal and system
  • Verification method specific to applications, terminal and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The main idea of ​​this application is to provide an application-specific verification method, which utilizes the near-field communication function of the terminal, and when a specific operation of an application on the terminal is started, detects whether there is a device within the effective distance of the near-field communication of the terminal. The specific near-field device corresponding to the specific operation is used to determine whether the specific operation can be released, thereby ensuring the security of the application on the terminal.

[0019] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure provides a method, terminal, and system for authentication with respect to an application. The present techniques may be applicable at a terminal with near-field communication function. When a particular operation of the application is triggered, a near-field device within a certain distance of a terminal is detected. An identification of the near-field device is obtained. The identification is sent to a server to request the server to determine whether the near-field device is a particular near-field device corresponding to the particular operation. A result of authentication performed by the server according to the identification is obtained. A following processing is applied to the particular operation according to the result of authentication. The present techniques ensure safety of operations of the application operated at the terminal.

Description

technical field [0001] The present application relates to the communication field, and in particular to an application-oriented verification method, terminal and system. Background technique [0002] With the development of communication technology, mobile terminals are more and more favored by the majority of users, and the functions of mobile terminals are becoming more and more powerful, especially mobile phones, which have developed to the stage of smart phones that can be compared with computers. Currently, various applications (Apps) developed for various mobile terminals emerge in an endless stream. However, when a user uses an application (App) on a mobile terminal such as a mobile phone, various verification operations are often required. For example, when logging in to a user account, a login password is required for verification, and when interacting with other users, a third-party password is required. The verification code sent by the interactive platform, etc....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04B5/00G06F21/12H04W4/80
CPCH04L63/0876H04L63/101H04W4/80H04L63/0853H04W12/08H04W12/068H04L63/0492H04L63/08
Inventor 叶东
Owner ADVANCED NEW TECH CO LTD