Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for safety verification and mobile terminal

A technology for security verification and verification of information, applied in digital data authentication, input/output process of data processing, instruments, etc., can solve problems such as user information leakage and economic loss

Active Publication Date: 2018-03-30
VIVO MOBILE COMM CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a method of security verification to solve the problem of leakage of user information and even economic losses in the prior art when encountering identity verification scenarios that may violate the user's subjective wishes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for safety verification and mobile terminal
  • Method and device for safety verification and mobile terminal
  • Method and device for safety verification and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Such as figure 1 As shown, the embodiment of the present application provides a method for security verification. The execution body of the method may be a terminal device. The terminal device may be a personal computer or other mobile terminal device such as a mobile phone or a tablet computer. The terminal device A terminal device that can be used by a user. The method can be used in the process of performing biometric verification on the terminal device or user identity, and can also be applied in processing such as disabling or invalidating the biometric verification information currently used in the terminal device. The method specifically may include the following steps:

[0047] In step S102, it is determined whether the acquired touch screen operation is a predetermined operation.

[0048] Among them, the touch screen operation can include multiple types, which can be set according to the actual situation, such as, click operation, slide operation, press opera...

Embodiment 2

[0063] Such as figure 2 As shown, the embodiment of the present application provides a method for security verification. The execution body of the method may be a terminal device. The terminal device may be a personal computer or other mobile terminal device such as a mobile phone or a tablet computer. The terminal device A terminal device that can be used by a user. The method can be used in the process of performing biometric verification on the terminal device or user identity, and can also be applied in processing such as disabling or invalidating the biometric verification information currently used in the terminal device.

[0064] This embodiment describes in detail the process of disabling or invalidating the biometric verification information currently used in the terminal device or its corresponding verification method, in order to ensure that in some special cases (such as when the user is , coma, incapacity, etc.) or the user is conscious but coerced / coerced (such...

Embodiment 3

[0124] The above is the security verification method provided by the embodiment of the present application. Based on the same idea, the embodiment of the present application also provides a security verification device, such as Figure 5 shown.

[0125] The device for safety verification includes: a judging module 501, a biometric verification module 502 and a safety verification module 503, wherein:

[0126] A judging module 501, configured to judge whether the received touch screen operation is a predetermined operation;

[0127] A biometric verification module 502, configured to obtain biometric verification information input by the user if the touch screen operation is not the predetermined operation, and verify the biometric verification information;

[0128] A security verification module 503, configured to execute verification processing corresponding to the predetermined operation if the touch screen operation is the predetermined operation.

[0129] In the embodimen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and device for safety verification and a mobile terminal. The method includes the steps of judging whether or not a received touch screen operation is a preset operation; if not, acquiring biometric verification information input by a user, and conducting verification on the biometric verification information; if yes, executing verification treatment corresponding to the preset operation. By using the method and device for safety verification and the mobile terminal, it can be ensured that files or data stored in a terminal device cannot be leaked, so that the safety of user information and property is improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a security verification method, device and mobile terminal. Background technique [0002] With the development of terminal technology, the security of user data stored in terminal equipment is more and more valued by users. For this reason, many terminal equipment are equipped with biometric modules. Through biometric identification (such as fingerprint recognition, facial recognition, Voiceprint recognition or iris recognition, etc.) to perform identity verification and access control on users to ensure the security of user information, and also bring convenience to user identity verification. Taking fingerprint recognition as an example, users only need to place their fingers on the fingerprint recognition User authentication and access control can be performed on the module without cumbersome settings and memorizing digital passwords or gesture graphic passwords. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06Q20/40
CPCG06F21/32G06Q20/40145G06F2221/2137G06F2221/2133G06F3/04883G06F2203/04104G06V40/10G06V40/1365G06V40/53
Inventor 董云霞
Owner VIVO MOBILE COMM CO LTD