Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and terminal equipment

An identity verification method and technology for terminal equipment, which are applied in the field of identity verification methods and terminal equipment, can solve the problems of low reliability, peeping to obtain passwords, etc., and achieve the effects of high reliability, saving user costs, and improving user experience.

Active Publication Date: 2019-06-07
SHENZHEN IQOO COMM SOFTWARE
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Although the pattern encryption method is simple and intuitive, it is easy to be peeped by others to obtain the password, and the reliability is the lowest

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and terminal equipment
  • Authentication method and terminal equipment
  • Authentication method and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the technical problems, technical solutions and beneficial effects solved by the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0025] When ordinal numerals such as "first" and "second" are mentioned in the embodiments of the present invention, unless they really express the meaning of order according to the context, it should be understood that they are only used for distinction.

[0026] Such as figure 1 Shown is a schematic flow chart of the first embodiment of the identity verification method of the present invention. Including S101-S103.

[0027] S101. Generate a verification question and a verification password corresponding to the instruction information according to the instruction info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of data security of terminals, and discloses an identity authentication method. The identity authentication method comprises the following steps of: according to instruction information received by terminal equipment within a pre-set time, generating an authentication problem and an authentication password corresponding to the instruction information; receiving an identity authentication request of a user, and pushing the authentication problem and options, wherein the options at least include an authentication password option; and judging that identity authentication of the user is successful if the received option selected by the user is matched with the authentication password. The invention further discloses the terminal equipment for realizing the method. According to the embodiment of the invention, the memory burden of the user on the password can be avoided; the equipment purchase cost of the user is reduced; the encryption reliability is improved; and the use experience is improved.

Description

technical field [0001] The invention relates to the field of terminal data security, in particular to an identity verification method and terminal equipment. Background technique [0002] With the intelligent development of terminal equipment, the functions that terminal equipment can realize are increasing day by day. Most of these functions, such as online payment, office work, and message interaction, involve user privacy and rights, and need to be encrypted by passwords to prevent important information from leaking. [0003] Currently commonly used encryption methods include encryption through fixed passwords, fingerprint encryption, pattern encryption, etc. However, they each have their own shortcomings: [0004] Encrypting with a fixed password is the most commonly used encryption method. Users are accustomed to setting different passwords for different applications. Multiple passwords can easily confuse the user and increase the user's memory burden. At the same time,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/083
Inventor 蔡云涛
Owner SHENZHEN IQOO COMM SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products