Safety verification method and device and mobile terminal

A technology for security verification and mobile terminals, which is applied in the field of devices and mobile terminals, and security verification methods, and can solve problems such as inability to meet mobile terminal security verification

Inactive Publication Date: 2018-10-30
VIVO MOBILE COMM CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a security verification method and device to solve the problem that the existing technical solutions cannot satisfy the security verification of mobile terminals in different scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification method and device and mobile terminal
  • Safety verification method and device and mobile terminal
  • Safety verification method and device and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] refer to figure 1 , shows a flow chart of steps of a security verification method provided by an embodiment of the present invention, the security verification method can be applied to a mobile terminal, and may specifically include the following steps:

[0028] Step 101: Obtain scene verification parameters when a verification instruction operated by a user is detected.

[0029] The password protection method in the embodiments of the present invention can be applied to mobile terminals, and the mobile terminals can include mobile electronic devices such as mobile phones and PADs.

[0030] The scene verification parameter may include at least one of a time parameter, a location parameter, an application type parameter and a payment amount parameter.

[0031] It can be understood that any one of the above parameters may be selected as the scene verification parameter, or a combination of various parameters may be selected, which is not limited in this embodiment of the...

Embodiment 2

[0063] refer to figure 2 , shows a flow chart of steps of a security verification method provided by an embodiment of the present invention, the security verification method can be applied to a mobile terminal, and may specifically include the following steps:

[0064] Step 201: Collect at least one piece of vital sign information of the user after receiving the user's verification input instruction.

[0065] In the embodiment of the present invention, the verification entry instruction can be an instruction for the user to click on a certain biometric entry (such as fingerprint entry, etc.), or it can be the user's input of biometric voice information, and the system can perform real-time monitoring. When entering an instruction, at least one vital sign information of the user is collected.

[0066] When the user enters a certain vital sign information, a button that requires the user to enter other vital sign information can pop up on the display screen of the mobile termi...

Embodiment 3

[0102] refer to image 3 , which shows a schematic structural diagram of a security verification device provided by an embodiment of the present invention, which may specifically include:

[0103] The verification parameter acquisition module 310 is used to obtain the scene verification parameters when monitoring the verification instruction of the user operation; the false recognition rate calculation module 320 is used to determine the false recognition rate according to the scene verification parameters; the security verification module 330 is used for A corresponding verification method is determined according to the false recognition rate, so as to perform security verification on the identity of the user.

[0104] Preferably, the scene verification parameters include at least one of time parameters, location parameters, application type parameters and payment amount parameters.

[0105] Preferably, the false recognition rate determination module 320 includes: a safety f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety verification method and device. The method comprises the steps that when a verification instruction operated by a user is monitored, scene verification parameters are acquired; the false accept rate is determined according to the scene verification parameters; a corresponding verification mode is determined according to the false accept rate to carry out safety verification on the identity of the user. According to the safety verification method and device, different safety verification modes can be adopted for carrying out safety verification in different scenes, and the need that mobile terminal safety verification cannot be carried out in different scenes in the scheme of the prior art is met.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a safety verification method, device and mobile terminal. Background technique [0002] At present, with the rapid development of communication technology, mobile phones occupy a large proportion in people's lives, for example, users pay, transfer money and so on through mobile phones. [0003] With the deep involvement of mobile phones in people's lives, more and more information and operations related to security or privacy are collected in mobile phones, such as secure unlocking, Alipay payment, WeChat payment, private photo albums, business documents, etc. When people are in these scenarios with security verification requirements, they usually choose to use encrypted information such as passwords, fingerprints, voiceprints, or faces for security verification. [0004] After the pre-set verification method is set on the mobile phone, security verification is perf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/725G06Q20/38G06Q20/40
CPCG06Q20/382G06Q20/40145H04M1/72454H04M1/72463
Inventor 韩旭王耀
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products