Hidden type authentication device and method

An implicit authentication and authentication device technology, applied in the Internet field, can solve the problems of mobile terminals affecting user experience, etc., and achieve the effects of improving user experience, simplifying authentication strategies, and ensuring security

Inactive Publication Date: 2016-11-23
NUBIA TECHNOLOGY CO LTD
View PDF3 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide an implicit authentication device and method, aiming to solve the technical problem that the mandatory authentication policy of the mobile terminal affects the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hidden type authentication device and method
  • Hidden type authentication device and method
  • Hidden type authentication device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0045] A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating description of the present invention and has no specific meaning by itself. Therefore, "module" and "component" may be used mixedly.

[0046] Mobile terminals may be implemented in various forms. For example, terminals described in the present invention may include devices such as mobile phones, smart phones, notebook computers, digital broadcast receivers, PDAs (Personal Digital Assistants), PADs (Tablet Computers), PMPs (Portable Multimedia Players), navigation devices, etc. mobile terminals and fixed terminals such as digital TVs, desktop c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hidden type authentication device. The device comprises an acquiring module, a classifying module and an authorization module, wherein the acquiring module is used for acquiring user behaviors in a process of inputting a control instruction if the control instruction for opening a pre-set user interface of a mobile terminal is received; the classifying module is used for classifying the user behaviors based on a pre-configured classifying device and acquiring a Boolean value returned back by the classifying device; and the authorization module is used for judging that the mobile terminal enters an authorization mode if the Boolean value is real, and opening the user interface. The invention further discloses a hidden type authentication method. With the adoption of the hidden type authentication device and method, an authentication strategy of the mobile terminal is simplified and the authentication of user authorities can be realized through collecting the user behaviors; and a user does not need to be forced to repeatedly input decrypting information and user experience is improved.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to an implicit authentication device and method. Background technique [0002] With the development of the mobile Internet, the popularity of mobile terminals is getting higher and higher, and has become an indispensable tool in people's daily work and life. Since the mobile terminal contains a large amount of private information of the user, such as bank information, contacts, short messages, personal photos, etc., certain security measures are required to prevent illegal use by unauthorized users. [0003] At present, mobile terminals use various authentication mechanisms, such as digital passwords, image passwords, eye pattern recognition, fingerprint recognition, etc., all of which require users to input corresponding decryption information each time they use the terminal. However, due to short and frequent use of the mobile terminal, some users are unwilling to input unlo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31H04M1/725
CPCG06F21/316H04M2203/6045H04M1/72463
Inventor 王浩
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products