Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile phone terminal APP identity authentication method

An identity authentication and mobile phone technology, which is applied in the field of information security, can solve the problems of no secondary identity authentication means, multiple expenses, etc., and achieve the effect of reducing costs and facilitating management

Active Publication Date: 2020-09-08
北京弘远博学科技有限公司
View PDF21 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of smart phones, APPs with different functional application scenarios are gradually increasing. In normal use, users can perform all operations after entering their login account and login password. After the user's login account and login password are leaked, There is no corresponding secondary identity authentication means for operations that require authentication, which causes information security issues. At the same time, if you use face recognition for identity authentication every time you perform an operation that requires authentication, it will generate more costs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with examples. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the protection content of the present invention.

[0020] A method for mobile terminal APP identity authentication, comprising the following manufacturing steps:

[0021] In the first step, when the mobile phone APP is installed, the basic information of the mobile phone is obtained, and the user's identity authentication matrix data is established and stored in the cloud;

[0022] In the second step, when the APP on the mobile phone needs to perform authentication operations, the APP reads the local data and compares it with the cloud identity authentication matrix data;

[0023] The third step is to complete identity authentication or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of information security, in particular to a mobile phone APP identity authentication method. The method comprises the following steps: when a user needs to perform authentication operation by using a mobile phone APP; the local data read by the APP is read and checked; the probability of operation of the user is calculated; therefore, the information security canbe ensured; the cost generated by calling face recognition is reduced; easy management is realized, according to the invention, all operations can be carried out after a user inputs a login account and a login password in the use of the existing mobile phone APP; after a login account and a login password of a user are leaked, no corresponding secondary identity authentication means is availableduring operation needing to be authenticated, so that the information security problem is caused, and meanwhile, when the operation needing to be authenticated is carried out each time, more expensesare generated due to the fact that identity authentication is carried out by calling face recognition.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for identity authentication of a mobile terminal APP. Background technique [0002] With the development of smart phones, APPs with different functions and application scenarios are gradually increasing. In regular use, users can perform all operations after entering their login account and password. After the user's login account and login password are leaked, There is no corresponding secondary identity authentication means when performing operations that require authentication, which causes information security issues. At the same time, if you use face recognition for identity authentication every time you perform an operation that requires authentication, more costs will be incurred. Contents of the invention [0003] The present invention aims at the above problems, and provides a method for mobile terminal APP identity authentication, comprising the following ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04W8/18H04W12/00H04W12/06G06F21/31G06F21/32
CPCH04W8/183H04W12/06H04L67/1097G06F21/31G06F21/32Y02D30/70
Inventor 高峰
Owner 北京弘远博学科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products