Android intelligent terminal security authentication method

A security authentication, smart terminal technology, applied in the field of Android smart terminal security authentication, can solve the problems of unpopularity, inconvenient user operation, forgery, etc.

Active Publication Date: 2015-10-21
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, there are some problems in the above-mentioned authentication technologies: authentication based on the user's knowledge requires the user's password, which is easily stolen by people around him when entering; based on all authentication of the user, the user needs to use additional hardware for each authentication , which brings great inconvenience to users. Therefore, authentication devices such as smart cards are basically only used on desktop PCs, and are not popular in the field of Android smart terminals. Authentication based on user biometric information requires a large amount of calculations and often requires Special hardware support has not yet been popularized on Android smart terminals; authentication based on hardware features, although hardware features such as MAC addresses are unique, are still relatively easy to be stolen and forged, and most of the time Android smart terminals pass 2 / 3 / 4G data traffic access service, there is no MAC address at this time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android intelligent terminal security authentication method
  • Android intelligent terminal security authentication method
  • Android intelligent terminal security authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0060] The present invention provides a kind of Android intelligent terminal security authentication method, described method comprises the following steps:

[0061] Step 1: Obtain setting information and form user fingerprints;

[0062] Step 2: Match and authenticate the user's fingerprint;

[0063] Step 3: Update the fingerprint reserved in the background of the server and record the update information.

[0064] In the step 1, (such as figure 1 ) through the API interface to obtain the setting information, and combine the obtained setting information to form a dictionary form of key-value pairs as the user fingerprint.

[0065] The setting information includes a list of optional ring tones, phone ring tones, SMS tones, notification tones, user wallpapers, user input methods, lock screen patterns, and the hour system; specifically:

[0066] (1) The data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an Android intelligent terminal security authentication method. The method comprises following steps of acquiring setting information, and forming user fingerprint; performing matching authentication on the user fingerprint; and upgrading reserved fingerprint in a server background and recording upgrading information. According to the Android intelligent terminal security authentication method, on the basis of a user name password authentication manner, the setting information is acquired, the user fingerprint is formed, and different fingerprint matching strategies are made according to different security requirements, so that the whole security authentication is user-friendly.

Description

technical field [0001] The invention relates to an authentication method, in particular to an Android intelligent terminal security authentication method. Background technique [0002] In recent years, with the rapid development of Internet technology and Android smart terminals, more and more people access the Internet through Android smart terminals to complete daily work and study activities. Although the mobile Internet service is convenient and efficient, it also faces various security threats. The user's password is easily stolen, which leads to the theft of the user's identity and brings losses to the user. In response to existing security problems, new authentication techniques are gradually becoming an important research field. [0003] Currently in the field of information security, authentication technologies are generally based on the following factors: [0004] 1) Known by the user: information known by the user, such as passwords, etc.; [0005] 2) User-owne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04M1/725
CPCH04L63/0861H04M1/72403
Inventor 黄秀丽林为民马媛媛何高峰陈亚东时坚汪晨陈璐张波
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products