Supercharge Your Innovation With Domain-Expert AI Agents!

Authentication method, authentication device and intelligent terminal device

A technology of smart terminal equipment and authentication methods, applied in the field of smart terminals, can solve problems such as dirty fingers and inconvenient fingers, and achieve the effect of timely and effective unlocking and locking screen operations

Inactive Publication Date: 2019-11-12
SHENZHEN LUCKYSTAR TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiments of the present invention provide an authentication method, an authentication device, and an intelligent terminal device, so as to solve the problems in the prior art that the user cannot conveniently, timely and effectively perform intelligent terminal authentication under special circumstances such as inconvenient fingers or dirty fingers. Issues with unlocking and locking the screen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, authentication device and intelligent terminal device
  • Authentication method, authentication device and intelligent terminal device
  • Authentication method, authentication device and intelligent terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] see figure 1 , which is a schematic flowchart of an authentication method for an intelligent terminal device provided in an embodiment of the present invention, the method may include the following steps:

[0047] Step 101. Obtain authentication information of the user, the authentication information being voice information or somatosensory action information;

[0048] In a specific application, the user's voice and somatosensory motion can be collected respectively through the voice collection device and the somatosensory motion collection device, and the corresponding sound information and somatosensory motion information can be extracted from the sound and somatosensory motion.

[0049] Step 102, comparing the authentication information with the pre-stored authentication information, and judging whether they are consistent;

[0050] It should be noted that there may be multiple pre-stored authentication information, that is, multiple voice information and multiple s...

Embodiment 2

[0058] When the authentication information is somatosensory action information, it is relatively easy to have a security hole. For example, the unlocking body motion set by the user of the target smart terminal is as a finger sliding up, and in some cases, the user who is not the target smart terminal happens to make the same gesture, and the target smart terminal receives the unlocking body motion, The unlock operation will be performed. In this way, the security of the target smart terminal will be lower.

[0059] In order to further improve the security of the target smart terminal, voice authentication can be performed on the basis of somatosensory motion authentication.

[0060] Therefore, based on the first embodiment above, see figure 2 , between the above step 102 and step 103 may also include:

[0061] Step 102-1. When the authentication information is motion information, after the authentication information is compared with the pre-stored authentication informati...

Embodiment 3

[0066] Based on any of the above embodiments, see image 3 , after comparing the above-mentioned authentication information with the pre-stored authentication information and judging whether they are consistent, the following steps may also be included:

[0067] Step 301, if the authentication information is inconsistent with the pre-stored authentication information, send a prompt message to prompt the user to re-enter the authentication information;

[0068] Step 302, when the number of times of authentication inconsistencies reaches a preset number, send an alarm message to a preset user in a preset manner.

[0069] It should be noted that the above-mentioned preset method may be, but not limited to, email, short message, etc., and the preset user refers to a pre-designated recipient of the alarm information. The preset number of times can be manually set according to actual needs. Generally, the preset number of times can be set to 3 or 5 times.

[0070] see Figure 4 ,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is applicable to the technical field of intelligent terminals, and provides an authentication method, an authentication device and intelligent terminal device. The authentication methodcomprises the following steps: acquiring authentication information of a user, the authentication information being sound information or somatosensory action information; comparing the authenticationinformation with pre-stored authentication information, and judging whether the authentication information is consistent with the pre-stored authentication information or not; and when the authentication information is consistent with the pre-stored authentication information, correspondingly controlling the target intelligent terminal to enter an unlocking state or a screen locking state according to the authentication information. According to the embodiment of the invention, through obtaining sound information or somatosensory action information of a user, the intelligent terminal device is authenticated, the unlocking and screen locking operations of the intelligent terminal device can be completed without manually contacting the intelligent terminal device, and the unlocking and screen locking operations of the intelligent terminal device can be conveniently, timely and effectively carried out under the special conditions that fingers are inconvenient or not clean and the like.

Description

technical field [0001] The embodiments of the present invention belong to the technical field of intelligent terminals, and in particular relate to an authentication method, an authentication device, and an intelligent terminal equipment for an intelligent terminal equipment. Background technique [0002] With the rapid development of smart terminal technology, the application of smart terminal devices is becoming more and more extensive. [0003] At present, most of the unlocking methods of smart terminal devices are contact-based. For example, password unlocking, fingerprint unlocking or remote control, etc. In addition, the lock screen of the smart terminal is also touch-based, for example, manually pressing the power button, finger touch, and the like. Although contact unlocking and screen locking can enable users to turn on and off smart terminal devices more conveniently, when users are in special situations such as inconvenient fingers or dirty fingers, the method o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/32
CPCG06F21/31G06F21/32
Inventor 吴建雄刘馨洪坤
Owner SHENZHEN LUCKYSTAR TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More