Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, application and computing device for authenticating identity

A computing device and identity technology, applied in the direction of digital data authentication, etc., can solve the problems of easy detection, cumbersome user operation, error-prone, etc., and achieve the effect of improving security, increasing fun and randomness, and improving user experience

Active Publication Date: 2019-11-12
CHEZHI HULIAN BEIJING SCI & TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, if the password unlocking or gesture unlocking method is set too simple, the user's unlocking operation process is easy to be noticed, and there are certain information security risks.
If the unlock password or gesture unlock method is set too complicated, the user operation is cumbersome and error-prone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, application and computing device for authenticating identity
  • Method, application and computing device for authenticating identity
  • Method, application and computing device for authenticating identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0025] figure 1 is a block diagram of a computing device 100 according to some embodiments of the invention. Here, the computing device can be implemented as various intelligent hardware such as a mobile phone, a tablet computer, or a control center of an intelligent express cabinet. Typically, computing device 100 may include memory interface 102 , one or more data processors, graphics processors, and / or central processing unit 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity verifying method and application and computing equipment. The identity verifying method is suitable for executing in the computing equipment. The computing equipment is provided with a password sequence including at least one character. The method includes the following steps that display positions, in the user interface, of identification elements in an identification set are randomly allocated, wherein the identification set includes the characters in the password sequence; after the display positions are randomly allocated each time, one is selected according to the character order in the password sequence, user input is received, and whether user input this time is consistent with preset operation corresponding to the display position of the character selected this time or not is judged. When it is determined that user input is consistent with the corresponding preset operation, whether the targeted character this time is the last one in the password sequence or not is judged; when it is determined that the character is the last one, the step of randomly allocating the display positions, in the user interface, of the identification elements in the identification set continues to be executed.

Description

technical field [0001] The invention relates to the field of computing equipment, in particular to an identity verification method, application and computing equipment. Background technique [0002] With the rapid development of electronic devices and Internet technologies, computing devices with touch screens such as smart phones and tablet computers have become indispensable devices in people's lives. Computing devices require authentication for unlocking, payment, and more. [0003] Currently, authentication operations can be done through gestures, passwords, or a combination of the two. For example, a computing device may be configured to slide to unlock. As another example, a computing device may be unlocked by a combination of numbers and letters. For another example, the computing device may be unlocked by judging user input in the gesture input interface. [0004] However, there are some problems with existing authentication methods. For example, if the password...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/36
CPCG06F21/31G06F21/36
Inventor 宋强
Owner CHEZHI HULIAN BEIJING SCI & TECH CO LTD