Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User authentication method and device and terminal equipment

A user authentication and user technology, applied in the direction of digital data authentication, etc., can solve problems such as hidden safety hazards, achieve the effect of ensuring safety, eliminating hidden safety hazards, and achieving simple effects

Inactive Publication Date: 2015-11-25
黄熙镜
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to at least solve one of the above-mentioned technical defects, especially the problem of great security risks in user authentication only by matching the original password

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and device and terminal equipment
  • User authentication method and device and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0023] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It should be unde...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user authentication way. The user authentication way comprises the following steps: detecting an authentication triggering event, and acquiring an original password sequence and a preset operation mechanism in response to the authentication triggering event; generating a random sequence based on the original password sequence, and supplying the random sequence to a user; performing operation processing according to the original password sequence and the random sequence through an operation mechanism to generate a first password sequence; receiving a second password sequence input by the user based on the random sequence; and judging whether or not the first password sequence is consistent with the second password sequence, and executing a corresponding operation according to a judgment result. Through the technical scheme provided by the invention, user authentication is performed by inputting of a password sequence valid once instead of simple inputting of an original password. The password sequence input by the user is only valid once, and passwords stolen by other persons are invalid passwords even if the passwords are stolen illegally by the other persons when the user performs password inputting, so that the security of the original password is ensured, and the potential safety hazard caused by stealing of the original password is eliminated.

Description

technical field [0001] The present invention relates to the technical field of terminal equipment, in particular, the present invention relates to a user authentication method, device and terminal equipment. Background technique [0002] With the rapid development of computer software and hardware technology, terminal equipment has higher and higher processing capabilities, and is used in a wide range of fields in all walks of life. Accompanying it, security issues such as ensuring users' normal access to the system are becoming more and more serious. important. In the terminal equipment related to the financial system, such as bank ATMs, ATMs, POS (point of sale, sales terminal) machines, mobile terminal payment applications, such as mobile banking, etc., in order to protect the security of funds, it is necessary to judge user input Password and other information for user authentication. In mobile terminal devices related to the mobile Internet, such as mobile phones, tab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/46
Inventor 黄熙镜
Owner 黄熙镜
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More