Unlock instant, AI-driven research and patent intelligence for your innovation.

Mobile phone user authentication method and device

A user authentication and mobile phone technology, applied in the field of communications, can solve the problems of difficult password memory and poor experience, and achieve the effect of improving convenience, improving security, and avoiding leakage.

Active Publication Date: 2019-11-01
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since most users do not often log in to the online business hall, for most users, the password of the online business hall is not easy to remember, resulting in poor experience for users to log in to the online business hall for inquiries or business processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone user authentication method and device
  • Mobile phone user authentication method and device
  • Mobile phone user authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure.

[0064] figure 1 It is a flow chart of a mobile phone user authentication method shown according to an exemplary embodiment, as shown in figure 1 As shown, the method is used in a mobile phone and includes the following steps.

[0065] In step S11, when it is detected that the user requests to access a menu item in the STK menu corresponding to the SIM card, request data corresponding to the menu item is generated.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure relates to a mobile phone user authentication method and device. The method includes: when detecting that the user requests to access a menu item in the STK menu corresponding to the SIM card, generating request data corresponding to the menu item; determining security data corresponding to the menu item in the SIM card according to the request data; according to the menu item and The security data sends an HTTP request to the server, so that the server authenticates the HTTP request and determines the authentication result; receives the HTTP response result returned by the server according to the authentication result; and displays the HTTP response result. The mobile phone user authentication method and device provided according to the present disclosure can improve the convenience of mobile phone user authentication, save user time, improve user operation security, avoid leaking user privacy information, and do not require users to memorize passwords for online business halls , can improve user experience.

Description

technical field [0001] The present disclosure relates to the technical field of communication, and in particular to a mobile phone user authentication method and device. Background technique [0002] When the user wants to inquire about the details of the mobile phone bill, or handle services such as changing the tariff package, the following methods are generally used at present. The first method is that the user takes the certificate to the business hall for inquiry or business processing, but this method is more time-consuming. The second method is that the user dials the customer service hotline to inquire or handle business through the customer service. This method sometimes needs to provide some authentication information to the customer service, such as ID number, birthday, etc., resulting in easy disclosure of personal privacy information. The third method is to log in to the online business hall to operate. However, when the user inquires about the details of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/20H04W12/06
CPCH04W8/205H04W12/06
Inventor 申宏刚亢彦军代琳
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD