USER AUTHENTICATION METHOD AND DEVICE AND TERMINAL
Embodiments of the present invention provide a user authentication method, an authentication apparatus, and a terminal. The method includes: determining first-type authentication information and second-type authentication information that are of a terminal, where the first-type authentication inform...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Embodiments of the present invention provide a user authentication method, an authentication apparatus, and a terminal. The method includes: determining first-type authentication information and second-type authentication information that are of a terminal, where the first-type authentication information includes specific attribute information that is in specific attribute information of an interaction object corresponding to a specific interaction behavior of the terminal and whose occurrence frequency within a preset time falls in a preset range, and the second-type authentication information is used to interfere with selection, by the user of the terminal, of the first-type authentication information; presenting an authentication challenge set to the user of the terminal; receiving an identification result obtained by identifying the authentication challenge set by the user of the terminal; and determining an authentication result according to an identification correctness rate of the first-type authentication information in the identification result. According to the user authentication method, the authentication apparatus, and the terminal in the embodiments of the present invention, authentication information is dynamically generated by using information about an interaction object that is in the terminal and whose occurrence frequency within a preset time is preset, to perform authentication on a user, which reduces a memory price of memorizing the authentication information by the user, and further has a anti-peeping capability. |
---|