Unlock instant, AI-driven research and patent intelligence for your innovation.

User authentication method, mobile terminal, server and computer readable storage medium

A user authentication and mobile terminal technology, applied in the field of communications, can solve the problems of easily breaking down servers and leaking user information, and achieve the effect of improving security and reducing costs

Active Publication Date: 2018-08-14
深圳市马博士网络科技有限公司
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The main purpose of the present invention is to propose a user authentication method, a mobile terminal, a server and a computer-readable storage medium, aiming to solve the security problem of logging in to the user account and leaking the user information once hackers attack the user information and the problem of easy hacking. down server problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method, mobile terminal, server and computer readable storage medium
  • User authentication method, mobile terminal, server and computer readable storage medium
  • User authentication method, mobile terminal, server and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0081] like image 3 As shown, it is a schematic flowchart of a user authentication method proposed in the first embodiment of the present invention. The user authentication method of this embodiment is applied to a mobile terminal, and the mobile terminal is implemented based on the hardware structure of the above mobile terminal and the communication network system. Once the method of this embodiment is triggered by the user, the process in this embodiment will be automatically run through the mobile terminal, wherein each step can be executed in sequence as shown in the flow chart, or it can be multi-step according to the actual situation. The steps are carried out at the same time, and are not limited here. The information processing method includes the following steps:

[0082] Step 310, acquiring the user's operation instruction on the mobile terminal;

[0083] Step 320, extracting feature data corresponding to the operation instruction;

[0084] Step 330, sending the ...

no. 2 example

[0114] like Figure 6 As shown, it is a schematic flowchart of a user authentication method proposed in the second embodiment of the present invention. The user authentication method in this embodiment is applied to a server, and a communication connection is established between the server and the above-mentioned mobile terminal. Once the method of this embodiment is triggered by the user, the process in this embodiment will be automatically run through the mobile terminal, wherein each step can be executed in sequence as shown in the flow chart, or it can be multi-step according to the actual situation. The steps are carried out at the same time, and are not limited here. The information processing method includes the following steps:

[0115] Step 610, receiving feature data of the operation instruction sent by the mobile terminal;

[0116] Step 620, calculating mathematical features corresponding to the feature data;

[0117] Step 630, judging whether the mathematical fea...

no. 3 example

[0138] The mobile terminal provided by the third embodiment of the present invention is based on the first embodiment and figure 1 , the mobile terminal includes a first processor 110 and a first memory 109; wherein,

[0139] The first processor 110 is used to execute the user authentication program stored in the first memory 109, so as to realize the following steps:

[0140] Obtain the user's operation instructions on the mobile terminal;

[0141] extracting feature data corresponding to the operation instruction;

[0142] sending the characteristic data to the server;

[0143] Judging whether to receive a response sent by the server to verify that the feature data is passed, if yes, the user authentication is passed, and if not, the user authentication fails.

[0144] Through the above embodiments, when the user’s operation instruction on the mobile terminal is obtained, the feature data corresponding to the operation instruction is extracted, and the feature data is sen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user authentication method. The method comprises the following steps: obtaining an operation instruction of a user on a mobile terminal; extracting feature data correspondingto the operation instruction; transmitting the feature data to a server; and when response indicating the pass of the verification of the feature data sent by the server is received, indicating thatthe user authentication passes, or otherwise, indicating that the user authentication fails. In addition, the invention further discloses a mobile terminal, a server and a computer readable storage medium. By adoption of the user authentication method disclosed by the invention, a hacker can be effectively prevented from logging in a user account in a script manner, thereby improving the securityof the user login, and meanwhile, the cost of the product is effectively reduced as the times of sending short message verification codes are reduced.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a user authentication method, a mobile terminal, a server and a computer-readable storage medium. Background technique [0002] With the continuous improvement of hacker technology, the security issues of user authentication are also undergoing more and more tests. Although authentication technologies such as face recognition and fingerprint recognition have been produced, almost all devices still need to support user name and password authentication methods for login. In this way, once the user name and password of the user are compromised by hackers, they will face a great security risk. Hackers can log in on other devices. In order to prevent such security issues, some current products will use a scheme that requires a mobile phone verification code to log in on a new device. [0003] However, existing solutions have at least the following problems: [0004] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 倪秉炬
Owner 深圳市马博士网络科技有限公司