Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity verifying method and mobile terminal

A technology for identity verification and mobile terminals, applied in the field of identity verification and mobile terminals, can solve problems such as inability to balance security and user experience, and achieve the effect of overcoming the inability to balance security and user experience

Inactive Publication Date: 2017-09-08
北京明华联盟科技有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of this, the embodiment of the present invention provides an identity verification method, device, and mobile terminal to solve the problem that the identity verification method provided by the prior art cannot balance security and user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verifying method and mobile terminal
  • Identity verifying method and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] figure 1 It shows a schematic flow of the identity verification method provided by Embodiment 1 of the present invention, which is applied to a mobile terminal, and is described in detail as follows:

[0078] In step S101, a preset policy for selecting an identity verification scheme is read.

[0079] In the embodiment of the present invention, an identity authentication scheme selection strategy may be preset, and the identity authentication scheme selection strategy includes a security priority selection strategy and a convenience and quickness priority strategy. Before identity verification, the mobile terminal can read the identity verification scheme selection policy, and use different identity verification schemes for identity verification according to the identity verification scheme selection policy.

[0080] In step S102, if the authentication scheme selection strategy is a security priority strategy, the hardware medium-based hardware SE authentication scheme...

Embodiment 2

[0097] figure 2 A schematic block diagram of the mobile terminal 2 provided by Embodiment 2 of the present invention is shown, and for convenience of description, only parts related to the embodiment of the present invention are shown. The mobile terminal 2 includes: a policy reading module 21 , a first identity verification module 22 and a second identity verification module 23 .

[0098] Wherein, the strategy reading module 21 is used to read the preset identity verification scheme selection strategy;

[0099] The first identity verification module 22 is configured to preferentially adopt a hardware SE identity verification scheme based on a hardware medium for identity verification if the identity verification scheme selection strategy is a security priority strategy;

[0100] The second identity verification module 23 is configured to preferentially adopt an identity verification plan based on non-hardware media for identity verification if the identity verification sche...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is applied to the communication technology field and provides an identity verifying method and a mobile terminal, wherein the method comprises: accessing the preset identity verifying scheme selecting strategies; if the identity verifying scheme selecting strategies are security priority strategies, then prioritizing the hardware-based hardware SE identity verifying scheme for identity verification; and if the identity verifying scheme selecting strategies are convenient and fast priority strategies, prioritizing the non-hardware-based identity verifying scheme for identity verification. With the method and the mobile terminal, it is possible to prioritize the safest hardware-based hardware SE identity verifying scheme for identity verification and prioritize the non-hardware-based identity verifying scheme for identity verification, meaning that both safety and use experience are considered and overcoming the problem that in the prior art for identity verification, the safety and the use experience cannot be accommodated.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to an identity verification method and a mobile terminal. Background technique [0002] At present, in the process of mobile payment, in order to ensure security, there are various security schemes to ensure the legitimacy of user identity. These security assurance schemes have different operation modes and security levels, and can be applied to different application scenarios. [0003] Among them, the hardware security module (Secure Element, SE) authentication scheme based on the hardware medium is more secure and reliable due to the special hardware medium, but requires additional hardware overhead, and the operating experience may be worse. [0004] Authentication schemes based on non-hardware media, such as soft TOKEN schemes and other schemes, such as mobile phone verification code schemes, are more convenient than hardware SE schemes, but may be less secure...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40
Inventor 陈柳章
Owner 北京明华联盟科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products