Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety verification method and safety verification device

A security verification and preset technology, applied in computer security devices, digital data authentication, instruments, etc., can solve problems such as low user information security, avoid privacy leakage, improve information security, and reduce the possibility of being cracked Effect

Active Publication Date: 2019-11-19
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method is relatively easy to crack, and the user's information security is still low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification method and safety verification device
  • Safety verification method and safety verification device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Embodiments of the present invention provide a security verification method and a mobile terminal, which can avoid disclosure of personal privacy of users.

[0024] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0025] The terms "comprising" and "having" and any variations thereof in the description and claims of the present invention and the above drawings are intended to cover a n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed in the embodiments of the present application are a safety verification method and a safety verification device. A method of an embodiment of the present application comprises: receiving settings for an unlocking condition; detecting whether an object satisfies a preset condition; when it is detected that the object satisfies the preset condition, a mobile terminal setting the object into a hidden state or a failed state; receiving a signal; determining whether the signal satisfies the unlocking condition; and when the signal satisfies the unlocking condition, the mobile terminal switching the object into a normal state.

Description

technical field [0001] The invention relates to the field of terminals, in particular to a safety verification method and a safety verification device. Background technique [0002] With the development of mobile phones, users' daily life is increasingly inseparable from mobile phones. With the development of technology, the storage function of the mobile phone is becoming more and more powerful, so a large amount of personal information of the user is often stored in the user's mobile phone. Then, when the user's mobile phone is lost, other people can obtain the user's personal privacy from the mobile phone, causing the user's personal information to leak. [0003] An existing solution is to require an unlock password to enter the desktop of the mobile phone after the screen is locked. However, this method is relatively easy to crack, and the user's information security is still relatively low. Contents of the invention [0004] Embodiments of the present invention pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/30H04M1/725
CPCH04M1/72469G06F3/0488G06F21/00
Inventor 湛长兰
Owner TENCENT TECH (SHENZHEN) CO LTD