A mobile terminal screenshot authentication method and system

A mobile terminal and authentication system technology, which is applied in the field of mobile terminal screenshot authentication methods and systems, can solve the problems that it is difficult for users to effectively supervise screen capture actions, without supervision, etc., and achieve the effect of improving real effectiveness, effective monitoring and management.

Active Publication Date: 2021-03-19
EASTCOMPEACE TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As an open environment, the mobile terminal system is difficult to effectively supervise the user's screen capture actions. Even if the terminal manufacturer has its own user account system, it cannot force the user to log in to the account to use the terminal.
Therefore, the sharing and dissemination of screenshots in Internet social applications is in a normalized and unsupervised state

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile terminal screenshot authentication method and system
  • A mobile terminal screenshot authentication method and system
  • A mobile terminal screenshot authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] Please refer to the attached figure 1, is a schematic flowchart of a mobile terminal screenshot authentication method provided in Embodiment 1 of the present invention. This method is applicable to the scene where a customer takes a screenshot of the screen content on a mobile terminal, and the method is executed by a mobile terminal screenshot authentication system. The mobile terminal screenshot authentication system includes a mobile terminal, a SIM card set in the mobile terminal, a security authentication platform and a trusted service platform, and the SIM card stores authentication applications downloaded through the trusted service platform. The method specifically includes the following steps:

[0054] S101. When the mobile terminal detects a screen capture operation triggered by a user, it sends a security authentication request message to the security authentication platform.

[0055] S102. The security authentication platform sends the security authenticati...

Embodiment 2

[0113] Please refer to the attached Figure 5 , is a schematic structural diagram of a mobile terminal screenshot authentication system provided in Embodiment 2 of the present invention, and the device is suitable for executing the mobile terminal screenshot authentication method provided in the embodiment of the present invention.

[0114] Described system comprises mobile terminal 51, the SIM card 52 that is arranged in described mobile terminal 51, security authentication platform 53 and trusted service platform 54, and described SIM card 52 stores the authentication that is downloaded by described trusted service platform 54. apply 55;

[0115] The mobile terminal 51 is configured to send a security authentication request message to the security authentication platform 53 when detecting a screenshot operation triggered by a user;

[0116] The security authentication platform 53 is used to send the security authentication request message to the SIM card 52 through the SMS ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile terminal screen capture authentication method and system. The method comprises the following steps that when a mobile terminal detects a screen capture operation, a security authentication request message is sent to a security authentication platform; the security authentication platform forwards the security authentication request message to an SIM card, and the SIM card sends the security authentication request message to an authentication application for performing authentication; the authentication application analyzes the security authentication request message and prompts a user to perform confirmation; the authentication application receives a confirmation result, signs verification data, and sends a signature result and the confirmation result backto the security authentication platform; the security certification platform is used for carrying out signature verification on the signature result, and if the signature verification is passed and the confirmation result is confirmed, the security authentication platform signs and issues a certificate, generates a new signature picture, and returns an authentication success result to the mobile terminal; and the mobile terminal displays the new signature picture for the user to store or share. The authenticity and effectiveness of a screen capture picture of the mobile terminal in an open environment are improved, and the propagation of an internet information source can be effectively monitored and managed to a certain extent.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular to a mobile terminal screenshot authentication method and system. Background technique [0002] As the entrance for users to access the mobile Internet, mobile terminals are convenient for users to use, but to a certain extent, there is also the current situation of insufficient control over information dissemination. For example, when a user discovers breaking news on the Internet, without verifying the authenticity of the information, he can easily share it through the common method of terminal screen capture, which accelerates the spread of bad information such as Internet fraud and Internet rumors to a certain extent. [0003] In the era of smart phones, the terminal screen capture function has appeared, and the screen capture methods are different. The core is the process that the mobile terminal operating system reads the screen to fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04M1/72454H04M1/72469G06F21/36
CPCG06F21/36H04L63/08H04L63/0823H04L63/0853H04L63/0876H04M1/72454H04M1/72469
Inventor 周向涛
Owner EASTCOMPEACE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products