Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for verifying password and mobile terminal applying same

A mobile terminal and password verification technology, applied in a method and the field of mobile terminals using the method, can solve the problems of leaving password traces and other problems, and achieve the effect of fast input and high matching degree

Active Publication Date: 2012-03-07
ZTE CORP
View PDF1 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The present invention provides a method for generating a password, which is used to solve the technical problem of leaving password traces on the screen when entering keys and on the screen when generating a password in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying password and mobile terminal applying same
  • Method for verifying password and mobile terminal applying same
  • Method for verifying password and mobile terminal applying same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The implementation principle, specific implementation process and corresponding beneficial effects of the technical solutions in the embodiments of the present application will be described in detail, clearly and completely in conjunction with each of the accompanying drawings in the description.

[0072] Please refer to the attached figure 1 , is a flow chart of generating a password in the embodiment of this application.

[0073] Step 101, generating a password generation request;

[0074] In the specific implementation process, there are two ways to generate a password generation request:

[0075] The first method is to firstly receive the first tap signal generated by the user tapping the mobile terminal, the first tap signal includes the first position information of the tap operation on the mobile terminal, and then based on the first tap signal A location information, judging whether the first location corresponding to the first location information belongs to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for verifying a password, which is applied to a mobile terminal. The method comprises the following steps of: generating a password verification request; detecting first displacement information generated on an X axis, second displacement information generated on a Y axis and third displacement information generated on a Z axis aiming at each operation in at least one operation of the mobile terminal based on the password verification request; acquiring at least one multi-dimensional trace information of the mobile terminal in a three-dimensional space based on the first displacement information, the second displacement information and the third displacement information of each operation and processing the at least one multi-dimensional trace information to acquire the password to be verified; and comparing the verification password stored in the mobile terminal with the password to be verified so as to generate a verification result.

Description

technical field [0001] The invention relates to the field of electronic terminals, in particular to a method for verifying passwords and a mobile terminal using the method. Background technique [0002] With the continuous development of modern information technology, people rely more and more on electronic information equipment. In daily life, they often store some important data or information in the electronic equipment they carry with them. [0003] In order to ensure the security of important data or information in electronic devices, the following two methods are generally adopted to implement password management. [0004] 1. The password is managed by keys. The user generates a corresponding password sequence by inputting a specified key, and then verifies the user's identity according to the password sequence; [0005] 2. Use the touch screen to manage passwords. The user clicks on a specific position on the touch screen to generate a specified password, and then ve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F3/023G06F21/45
CPCG06F21/36
Inventor 刘雪芹
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products