Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and apparatus

An authentication and successful authentication technology, applied in the field of communication, can solve the problems of lack of portability and fun, achieve the effect of solving the lack of portability and fun, increasing fun and portability, and improving user experience

Inactive Publication Date: 2017-12-12
ZTE CORP
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Embodiments of the present invention provide an authentication method and device to at least solve the problems of insufficient portability and interest in the authentication process of related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and apparatus
  • Authentication method and apparatus
  • Authentication method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking running on a mobile terminal as an example, figure 1 It is a hardware structural block diagram of a mobile terminal of an authentication method in the embodiment of the present invention. Such as figure 1 As shown, the mobile terminal 10 may include one or more (only one is shown in the figure) processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), for A memory 104 for storing data, and a transmission device 106 for communication functions. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above-mentioned electronic device. For example, the mobile terminal 10 may also include a ratio figure 1 mo...

Embodiment 2

[0064] An authentication device is also provided in this embodiment, and the device is used to implement the above embodiments and preferred implementation modes, and what has been explained will not be repeated here. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0065] image 3 is a structural block diagram of an authentication device according to an embodiment of the present invention, which can be set on a terminal, such as a mobile phone or a tablet, such as image 3 As shown, the device includes:

[0066] A display module 30, configured to display random elements, and the random elements are used to represent random content;

[0067] Receiving module 32, for receiving voice information;

...

Embodiment 3

[0082] This embodiment is an optional embodiment according to the present invention, and is used to describe the solution of the present invention in detail:

[0083] This embodiment provides a safe and convenient method for unlocking and directly entering the program. The terminal shown in this embodiment includes a setting unit, a voice processing unit, a control unit, and a display unit, wherein,

[0084] Setting unit: set the functional area or specific coordinate point, you can choose to set an unlocking area or specific coordinate point, which is used for unlocking when the user locks the screen. You can also set an area or coordinate point that directly enters the corresponding program, which is used to enter the corresponding program while unlocking. This setting is optional. If the user does not set it, then the default unlock function will be used. After unlocking, it will enter the main standby interface. . The selection of the content of the random element in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method and apparatus. The method comprises the steps of displaying a random element, wherein the random element is used for representing random contents; receiving voice information; judging whether contents of the voice information are consistent with the random contents represented by the random element or not; and when the contents of the voice information are consistent with the random contents represented by the random element, determining that the authentication succeeds. The problem of portability and interestingness deficiency in an authentication process in related technologies is solved.

Description

technical field [0001] The present invention relates to the communication field, in particular to an authentication method and device. Background technique [0002] The terminal unlocking technology in the related art is relatively simple, and the security is not enough to be interesting, and the security is not enough to be interesting. At present, most terminal implementation methods are to unlock first, and then choose to enter the corresponding program, which is inefficient. Now users pay more and more attention to the security and convenience of mobile phones, and a solution is needed to better improve user experience. . [0003] The problem caused by this is that there is only one layer of security protection for entering the application. Once the user's voiceprint is copied and cracked, the terminal will be unsafe. Moreover, there is no function to unlock the screen, which requires the user to operate after unlocking, which is not convenient. [0004] The terminal u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06K9/62
CPCG06F21/32G06F18/22G06F3/0488G10L15/22
Inventor 石磊
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products