Method and device for safety verification and mobile terminal
A technology for security verification and verification of information, applied in digital data authentication, input/output process of data processing, instruments, etc., can solve problems such as user information leakage and economic loss
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] Such as figure 1 As shown, the embodiment of the present application provides a method for security verification. The execution body of the method may be a terminal device. The terminal device may be a personal computer or other mobile terminal device such as a mobile phone or a tablet computer. The terminal device A terminal device that can be used by a user. The method can be used in the process of performing biometric verification on the terminal device or user identity, and can also be applied in processing such as disabling or invalidating the biometric verification information currently used in the terminal device. The method specifically may include the following steps:
[0047] In step S102, it is determined whether the acquired touch screen operation is a predetermined operation.
[0048] Among them, the touch screen operation can include multiple types, which can be set according to the actual situation, such as, click operation, slide operation, press opera...
Embodiment 2
[0063] Such as figure 2 As shown, the embodiment of the present application provides a method for security verification. The execution body of the method may be a terminal device. The terminal device may be a personal computer or other mobile terminal device such as a mobile phone or a tablet computer. The terminal device A terminal device that can be used by a user. The method can be used in the process of performing biometric verification on the terminal device or user identity, and can also be applied in processing such as disabling or invalidating the biometric verification information currently used in the terminal device.
[0064] This embodiment describes in detail the process of disabling or invalidating the biometric verification information currently used in the terminal device or its corresponding verification method, in order to ensure that in some special cases (such as when the user is , coma, incapacity, etc.) or the user is conscious but coerced / coerced (such...
Embodiment 3
[0124] The above is the security verification method provided by the embodiment of the present application. Based on the same idea, the embodiment of the present application also provides a security verification device, such as Figure 5 shown.
[0125] The device for safety verification includes: a judging module 501, a biometric verification module 502 and a safety verification module 503, wherein:
[0126] A judging module 501, configured to judge whether the received touch screen operation is a predetermined operation;
[0127] A biometric verification module 502, configured to obtain biometric verification information input by the user if the touch screen operation is not the predetermined operation, and verify the biometric verification information;
[0128] A security verification module 503, configured to execute verification processing corresponding to the predetermined operation if the touch screen operation is the predetermined operation.
[0129] In the embodimen...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


