Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and terminal

A terminal and authentication technology, applied in the field of security control, can solve problems such as trouble and achieve the effect of enhancing security

Inactive Publication Date: 2016-01-20
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the weakness of the password authentication method is very obvious: once the password is stolen or the user loses the password, the situation will be very troublesome, requiring the administrator to re-modify the user password, and manually verify the legal identity of the user before changing the password

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and terminal
  • Authentication method and terminal
  • Authentication method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0036] The embodiment of the present invention discloses an authentication method and a terminal, by identifying the Morse code corresponding to the user's input operation, and according to the Morse code and the third operation used to characterize the character interval in the input operation The character corresponding to the input operation is determined, and if the character matches the preset password, the authentication is successful, which can ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an authentication method. The method comprises: receiving an input operation used for inputting a password, wherein the input operation comprises a first operation carrying first information and / or a second operation carrying second information, and a third operation; identifying a Morse code corresponding to the input operation, wherein the first information and the second information correspond to a dot and a dash in the Morse code respectively, and the third operation is used for representing a character spacing in the Morse code; according to the third operation and the Morse code, determining a character corresponding to the input operation; and determining whether the character matches a preset password, wherein if yes, authentication succeeds. Implementing the foregoing scheme can enhance authentication security.

Description

technical field [0001] The invention relates to the field of security control, in particular to an authentication method and a terminal. Background technique [0002] Authentication refers to verifying whether a user has the right to access the system. Especially for the Internet of Things and the Internet of Vehicles, if you want to realize remote operation, you need remote authentication authority, and then obtain the control right. In the prior art, authentication is usually verified through passwords. The premise of this method is that each user who obtains a password has been authorized. When a user is created, a password is assigned to the user. The user's password can be specified by the administrator or applied by the user. [0003] However, the weakness of the password authentication method is very obvious: once the password is stolen or the user loses the password, the situation will be very troublesome, requiring the administrator to re-modify the user password...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/32
CPCG06F21/31G06F21/32
Inventor 周福家
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products