User authentication method, mobile terminal, server and computer readable storage medium
A user authentication and mobile terminal technology, applied in the field of communications, can solve the problems of easily breaking down servers and leaking user information, and achieve the effect of improving security and reducing costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0081] like image 3 As shown, it is a schematic flowchart of a user authentication method proposed in the first embodiment of the present invention. The user authentication method of this embodiment is applied to a mobile terminal, and the mobile terminal is implemented based on the hardware structure of the above mobile terminal and the communication network system. Once the method of this embodiment is triggered by the user, the process in this embodiment will be automatically run through the mobile terminal, wherein each step can be executed in sequence as shown in the flow chart, or it can be multi-step according to the actual situation. The steps are carried out at the same time, and are not limited here. The information processing method includes the following steps:
[0082] Step 310, acquiring the user's operation instruction on the mobile terminal;
[0083] Step 320, extracting feature data corresponding to the operation instruction;
[0084] Step 330, sending the ...
no. 2 example
[0114] like Figure 6 As shown, it is a schematic flowchart of a user authentication method proposed in the second embodiment of the present invention. The user authentication method in this embodiment is applied to a server, and a communication connection is established between the server and the above-mentioned mobile terminal. Once the method of this embodiment is triggered by the user, the process in this embodiment will be automatically run through the mobile terminal, wherein each step can be executed in sequence as shown in the flow chart, or it can be multi-step according to the actual situation. The steps are carried out at the same time, and are not limited here. The information processing method includes the following steps:
[0115] Step 610, receiving feature data of the operation instruction sent by the mobile terminal;
[0116] Step 620, calculating mathematical features corresponding to the feature data;
[0117] Step 630, judging whether the mathematical fea...
no. 3 example
[0138] The mobile terminal provided by the third embodiment of the present invention is based on the first embodiment and figure 1 , the mobile terminal includes a first processor 110 and a first memory 109; wherein,
[0139] The first processor 110 is used to execute the user authentication program stored in the first memory 109, so as to realize the following steps:
[0140] Obtain the user's operation instructions on the mobile terminal;
[0141] extracting feature data corresponding to the operation instruction;
[0142] sending the characteristic data to the server;
[0143] Judging whether to receive a response sent by the server to verify that the feature data is passed, if yes, the user authentication is passed, and if not, the user authentication fails.
[0144] Through the above embodiments, when the user’s operation instruction on the mobile terminal is obtained, the feature data corresponding to the operation instruction is extracted, and the feature data is sen...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


