Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Input authentication method

An input verification and user technology, which is applied in the field where the time interval of password input is the verification basis, and can solve problems such as insufficient security

Inactive Publication Date: 2018-03-16
赖德伦 +1
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the problem of insufficient security in the unlocking verification technology of electronic devices mentioned above, and provide an input verification method to strengthen the strength of unlocking verification and improve security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Input authentication method
  • Input authentication method
  • Input authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to describe the technical content, purpose and effect of the present invention in detail, the following examples are listed and described in detail with the accompanying drawings.

[0020] like figure 1 , figure 2 and image 3 as shown, figure 1 For the password verification flow chart, figure 2 For the password verification step, image 3 It is a schematic diagram of the tolerance interval for time distance verification, please also refer to figure 1 and figure 2 illustrate, figure 1 Each process in the corresponding figure 2 The detailed description of the steps can make the input verification method of the present invention clear flow diagram, as well as the corresponding step description of the flow and the relationship between each step. First, from the description of the sensing unit 1 in the flow chart and the corresponding step S601, the input verification method of the present invention senses and reads the decrypted data DD input by the us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An input authentication method for verifying an accuracy of a password data inputted by a user, comprising the steps providing a sensing unit for sensing and reading a decryption data inputted by theuser; providing a timing unit used for calculating decryption time intervals lapsed between decryption passwords of the decryption data; providing a recording unit for recording predefined encryptiondata and corresponding encryption time intervals as well as the decryption data and the decryption time intervals corresponding to the decryption passwords; providing a password verification unit forcomparing whether the encryption data matches with the decryption data inputted; and providing a time interval verification unit for generating a number of tolerance intervals based on the predefinedtolerance degrees set by the user in order to determine whether the decryption data inputted by the user is accurate based on whether the decryption time intervals inputted by the user are within thecorresponding tolerance intervals.

Description

technical field [0001] The invention relates to an input verification method, in particular to a verification basis method for the time interval of password input. Background technique [0002] In the modern society where mobile devices are widely used, smart mobile electronic devices such as smart phones, personal digital assistants (PDAs), and tablet computers have become an indispensable part of people's lives. Therefore, in order to take into account personal data issues such as personal privacy and information security, generally, the above-mentioned personal electronic devices are equipped with a locking protection mechanism to prevent people other than the owner of the electronic device from stealing or viewing the data at will, or to prevent electronic devices from When the device is in standby, due to accidental touch in the pocket or pouch, the user must operate the tool through the screen or keyboard to release the locking mechanism of the electronic device. More...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/36
CPCG06F21/31G06F21/36G06F2221/2137G06F21/602G06F3/0488
Inventor 赖德伦戴文凯
Owner 赖德伦
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products