Safety certificate method, device and system

A technology of security authentication and security equipment, applied in digital data authentication, telephone communication, electrical components, etc., can solve the problem that passwords cannot effectively identify information owners, and achieve the effect of improving security

Inactive Publication Date: 2017-07-28
四川阵风科技有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, the method of setting a password on the mobile phone is generally used to protect the personal information security of the mobile phone, but the password itself cannot effectively identify the owner of the information. No matter who it is, as long as the correct password is entered, the mobile phone can be opened.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety certificate method, device and system
  • Safety certificate method, device and system
  • Safety certificate method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] See image 3, a flow chart of the steps of a security authentication method provided by an embodiment of the present invention, which is applied to a mobile device, and the method includes:

[0033] Step S510, after the mobile device is turned on, search for the security device according to the identification information of the security device stored in advance in the mobile device.

[0034] If a security device corresponding to the stored identification information of the security device is found within a preset time, a wireless connection is performed with the found security device.

[0035] If no security device corresponding to the stored identification information of the security device is found within a preset time, the mobile device enters a screen-locked state.

[0036] The application software pre-stores identification information of the security device and account information bound to the identification information. Wherein, the identification information ma...

Embodiment 2

[0068] See Figure 6 , is a structural block diagram of a security authentication device provided by a preferred embodiment of the present invention. The security authentication apparatus 600 is applied to the mobile device 100 . The devices include:

[0069] The first search unit 610 is configured to search for a security device according to the identification information of the security device stored in advance in the mobile device after the mobile device is turned on.

[0070] If a security device corresponding to the stored identification information of the security device is found within a preset time, a wireless connection is performed with the found security device.

[0071] If no security device corresponding to the stored identification information of the security device is found within a preset time, the mobile device enters a screen-locked state.

[0072] The second search unit 611 is configured to find multiple security devices on the mobile device according to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety certificate method, device and system, and relates to the field of mobile communication. The safety certificate method is applied to mobile equipment, and comprises the steps of before canceling screen lock, receiving verification information input by a user through the mobile equipment; obtaining identification information of safety equipment connected with the mobile equipment in a wireless mode, wherein the identification information is used for solely identifying the safety equipment; matching the verification information and the identification information, and if the verification information and the identification information successfully match, canceling the screen lock. According to the safety certificate method, device and system, only on the condition that wireless connection is established between the mobile equipment and the safety equipment, and only when the verification information input by the user and the identification information of the safety equipment successfully match, the locked state of a mobile terminal is canceled, and thus the safety of the mobile terminal is improved.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular to a security authentication method, device and system. Background technique [0002] With the rapid development of computer technology, communication technology and other related technologies, mobile devices such as mobile phones are playing an increasingly important role in people's lives. More and more mobile phone-based applications have emerged as the times require, and more and more personal information is stored in the mobile phone, and a lot of information related to personal privacy and property is also stored in the mobile phone. Once the user's mobile phone is lost, the leakage of the information stored in the mobile phone will bring irreparable losses to the user. Therefore, how to effectively protect personal information in mobile phones has become an important issue. [0003] In the prior art, the method of setting a password on the mobile phone is general...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/32G06F21/36H04M1/67H04M1/725
CPCG06F21/31G06F21/32G06F21/36H04M1/67H04M1/72463
Inventor 林峰
Owner 四川阵风科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products