Login authentication processing method and device as well as terminal equipment

A technology of login verification and processing method, which is applied in the field of login verification processing method, device and terminal equipment, which can solve problems such as inability to guarantee user property security, and achieve the effect of improving account security and property security

Inactive Publication Date: 2016-03-23
XIAOMI INC
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if other people know the unlock password or unlock pattern of the mobile terminal, they can also use it at will, which makes the basic function of protecting user information invalid and cannot guarantee the safety of the user's property.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login authentication processing method and device as well as terminal equipment
  • Login authentication processing method and device as well as terminal equipment
  • Login authentication processing method and device as well as terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0048] figure 1 It is a flow chart showing a login verification processing method according to an exemplary embodiment. Such as figure 1 As shown, the login verification processing method involved in this embodiment is used in a terminal device, which can be, for example, a mobile phone, a tablet computer, a desktop or a notebook, or other devices with a system lock function or a login passwor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a login authentication processing method and device as well as terminal equipment. The login authentication processing method comprises steps as follows: first facial feature information of a to-be-authenticated user is acquired, first facial action information of the to-be-authenticated user is collected in the pre-set time period of acquisition of the first facial feature information, and when the first facial feature information and a stored second facial feature information of the to-be-authenticated user are matched and the first facial action information and a stored second facial action information of the to-be-authenticated user are matched, the to-be-authenticated user passes the authentication. According to the technical scheme, the to-be-authenticated user passes the authentication under the condition that both the facial feature information and the facial action information of the to-be-authenticated user are authenticated successfully, so that the problem of user account security damage caused by the fact the terminal equipment can be used randomly due to password leakage is effectively solved, and account security and property security of the user of the terminal equipment are effectively improved.

Description

technical field [0001] The present disclosure relates to the field of communication technologies, and in particular, to a login verification processing method, device, and terminal equipment. Background technique [0002] With the development of science and technology, mobile terminals, such as mobile phones or tablet computers, have not only become indispensable communication devices in people's daily life, but also with the maturity of mobile terminal technology, it is relatively difficult to lock the system or set a login password for the application. Common basic functions for protecting user information. [0003] In related technologies, system locking or application program login is mainly performed by inputting a password or an unlocking pattern to unlock and log in. However, if other people know the unlocking password or unlocking pattern and other passwords of the mobile terminal, they can also use it at will, which makes the basic function of protecting user infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 陈志军侯文迪龙飞
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products