Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and device and information generating method and device used for authentication

An authentication method and authentication device technology, applied in the field of information security, can solve problems such as single interface and low authentication reliability, and achieve the effects of increasing difficulty, realizing diversification, and improving authentication reliability

Inactive Publication Date:
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides an authentication method and device to solve the problem of low authentication reliability due to the single gesture password input interface used in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device and information generating method and device used for authentication
  • Authentication method and device and information generating method and device used for authentication
  • Authentication method and device and information generating method and device used for authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0043] The solution of the present application may be used for authentication, for example, for authenticating the second user when the second user (that is, the user to be authenticated) performs a specific operation. The specific operation may be: screen unlocking operation, login operation, personal information modification operation, payment opera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses an authentication method and device and an information generating method and device used for authentication. The methods and the devices solve the problem that authentication reliability is low because gesture password input interfaces adopted in the prior art are single. The authentication method includes: displaying a picture pre-designated by a first user; detecting an interaction operation of a second user on the picture; generating interaction operation information of the second user according to the detected interaction operation of the second user; and authenticating whether the second user is the first user through carrying out matching on the interaction operation information of the second user and standard information, wherein the standard information is generated according to an interaction operation of the first user for the picture.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular to an authentication, an information generation method and device for authentication. Background technique [0002] With the rapid development of information technology, information security has been paid more and more attention by users. Authentication is a common means to ensure information security. [0003] Taking the authentication performed by the terminal of the first user as an example, the first user may pre-set standard information (such as a password) for authentication. After setting the standard information, the terminal may, according to the standard information, The user who performs a specific operation (called: the second user) performs authentication. If the second user can input the standard information correctly, the terminal can authenticate the second user as the first user; otherwise, the terminal can determine that the second user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36
CPCG06F21/36G06F21/316G06F3/04883H04L9/3226H04W12/06H04W12/68G06F3/01G06F7/00G06T1/00
Inventor 孙小凯