Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for adjusting identity authentication mode

An identity authentication and input method technology, applied in the field of electronic terminals, can solve the problems of inconvenient unlocking and inconvenience for users to use identity authentication methods, and achieve the effect of convenient identity authentication.

Inactive Publication Date: 2017-09-22
SAMSUNG GUANGZHOU MOBILE R&D CENT +1
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, electronic terminals or users often set identity authentication methods for unlocking, payment and other scenarios that require a high level of security protection, but in some cases, it is not convenient for users to use the set identity authentication methods
For example, when the user sets the fingerprint authentication method as the authentication method for unlocking the screen of the electronic terminal, it is inconvenient to unlock it when using a stylus or wearing conductive gloves in winter.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for adjusting identity authentication mode
  • Method and apparatus for adjusting identity authentication mode
  • Method and apparatus for adjusting identity authentication mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like numerals refer to like parts throughout. The embodiments are described below in order to explain the present invention by referring to the figures.

[0037] figure 1 A flowchart showing a method for adjusting an identity authentication method according to an exemplary embodiment of the present invention. The method can be executed by an electronic terminal, and can also be realized by a computer program. For example, the method can be executed by an application installed in the electronic terminal, or by a function program implemented in an operating system of the electronic terminal. Here, as an example, the electronic terminal may be a mobile communication terminal (such as a smart phone), a smart wearable device (such as a smart watch), a personal computer, a tablet computer, a game console, a digital multimedia ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and an apparatus for adjusting an identity authentication mode are provided. The method comprises: (A) detecting a current input mode to the electronic terminal performed by a user; (B) determining whether a first identity authentication mode as the current default identity authentication mode is applicable to the current input mode; and (C) when it is determined that the first identity authentication mode as the current default identity authentication mode is not applicable to the current input mode, adjusting the current default identity authentication mode. According to the method and the apparatus, identity authentication for the user can be facilitated.

Description

technical field [0001] The present invention generally relates to the field of electronic terminals, and more specifically, relates to a method and device for adjusting identity authentication methods for electronic terminals. Background technique [0002] With the development of information technology and the rise of the Internet, information security has gradually received extensive attention. Identity authentication technology is the first hurdle of information security protection and plays a vital role. Therefore, electronic terminals or users often set identity authentication methods for unlocking, payment and other scenarios that require a high level of security protection, but in some cases, it is inconvenient for users to use the set identity authentication methods. For example, when the user sets the fingerprint authentication method as the authentication method for unlocking the screen of the electronic terminal, it is inconvenient to unlock it when using a stylus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F3/0488G06F3/044
CPCG06F21/31G06F3/044G06F3/0488
Inventor 梁嘉燕
Owner SAMSUNG GUANGZHOU MOBILE R&D CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products