Authentication method and authentication system for mobile terminal

A mobile terminal and authentication technology, applied in the field of information security, can solve the problems of high cost, weak confidentiality, and easy cracking of the login interface, and achieve the effects of stable performance, complete protection, and no cost.

Active Publication Date: 2020-12-01
SHENZHEN TENCENT COMP SYST CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the purpose of the present invention is to provide an authentication method and an authentication system, which can solve the technical problems of the login interface in the prior art that are easy to crack, high cost, and low confidentiality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and authentication system for mobile terminal
  • Authentication method and authentication system for mobile terminal
  • Authentication method and authentication system for mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] see figure 1 , which is a schematic flowchart of an authentication method for a mobile terminal. The authentication method shown is mainly applied to mobile phones, and can also be applied to other smart terminals with a dial-up function, such as smart glasses, smart watches, etc., which are not listed here.

[0031] The authentication method includes the following steps:

[0032] In step S101, a character group input by a dial pad is received.

[0033] It can be understood that, the interface of the dial pad is usually set with a total of 12 characters from 0 to 9, * and # to choose from. The dial includes: a push-button dial, a dial displayed on a touch screen, and a projection dial.

[0034] In step S102, it is analyzed whether the character group contains an interface authentication password. Wherein, if the character group includes the interface authentication password, execute step S103; if the character group does not include the interface authentication pass...

Embodiment 2

[0052] see figure 2 , which is a schematic flowchart of an authentication method for a mobile terminal. The authentication method shown is mainly applied to mobile phones, and can also be applied to other smart terminals with a dial-up function, such as smart glasses, smart watches, etc., which are not listed here.

[0053] Understandably, figure 2 yes figure 1 Flow optimization of the authentication method shown. Among them, in order to reflect the figure 1 Zhongyuan steps with figure 2 The difference between the optimization steps in , the original step starts with S10, and the optimization step starts with S20. The following steps are performed in the order in which they appear, unless otherwise indicated.

[0054] In step S201, an interface authentication password is preset, and a mobile terminal interface corresponding to the interface authentication password is specified, and the interface includes at least one application program.

[0055]It can be understood ...

Embodiment 3

[0077] see image 3 , shows the block diagram of the authentication system. The authentication system 100 includes: a setting module 10 , a receiving module 20 , an analysis module 30 , a verification module 40 , an interface module 50 , and a reset module 60 .

[0078] Specifically, the setting module 10 is configured to preset an interface authentication password, and designate a mobile terminal interface corresponding to the interface authentication password, and the interface includes at least one application program.

[0079] It can be understood that each interface authentication password corresponds to an interface of a mobile terminal, and there are multiple application programs in different interfaces. The number of the application program is defined by the user, for example, the number of the railway ticket booking program is 12306 or 003.

[0080] Wherein, the interface authentication password includes at least one preset character, wherein the preset character ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an authentication method and authentication system for a mobile terminal, comprising: receiving a character group input by a dial pad; analyzing whether the character group contains an interface authentication password; when the interface authentication password is included, verifying Whether the interface authentication password is correct; when the interface authentication password is correct, obtain the interface of the mobile terminal corresponding to the interface authentication password; display the interface of the mobile terminal. The invention omits the traditional user login interface by inputting the interface authentication password in the dial key, has more thorough protection function for privacy, stable performance and no extra cost.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to an authentication method and an authentication system for a mobile terminal. Background technique [0002] With the popularity of mobile phones, more and more customer information, especially personal privacy, will be directly related or bound to mobile applications, such as: mobile banking, instant messaging software, office email, shopping websites, etc. [0003] Usually, mobile phones will protect privacy through authentication. Among them, the way of authentication is generally through a character group password composed of a group of numbers or letters, a graphic password with a certain touch sequence, or an input fingerprint password. [0004] However, the above authentication method needs to design a special authentication interface or hardware, which is not only costly, but also can only provide a layer of protection. That is, once a malicious occupant ob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12H04M1/725H04W12/06H04W12/069
Inventor 任杰
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products