发明名称 Authentication method and electronic device
摘要 Embodiments of the present disclosure provide an authentication method and an electronic device. The method includes: generating by a first device an authentication request if a predetermined condition exists between the first device and a second device, when the first device is in a locking state, wherein the first device has the locking state and a non-locking state; receiving by the first device authentication information, the authentication information being input in response to the authentication request; and authenticating the second device using the authentication information. Through the present disclosure, others cannot directly damage or copy data in the first device in a connection manner such as using a data line even if they get hold of the device, as long as the first device is in the locking state. Thus, the security of the data in the first device is ensured. Since a complex synchronization authentication protocol does not need to be developed by synchronization software and the first device, and the present disclosure is compatible with various commercially available synchronization software, the implementation method is simple and efficient, and the compatibility is good.
申请公布号 US9323908(B2) 申请公布日期 2016.04.26
申请号 US201113976283 申请日期 2011.12.22
申请人 Beijing Lenovo Software Ltd.;Lenovo (Beijing) Limited 发明人 Liu Yongfeng;Shen Jiangtao;Li Jun
分类号 G06F21/30;G06F21/44 主分类号 G06F21/30
代理机构 Westman, Champlin & Koehler, P.A. 代理人 Westman, Champlin & Koehler, P.A.
主权项 1. An authentication method implemented at a first device, wherein the first device is a mobile device connectable with or disconnectable from a second device, the method comprises: generating by the first device an authentication request if a predetermined condition exists between the first device and the second device, when the first device is in a locking state, wherein the first device has the locking state and a non-locking state; presenting on the first device the authentication request to a user; receiving by the first device authentication information, the authentication information being input by the user on the first device in response to the authentication request; and authenticating by the first device the second device using the authentication information to determine whether a data read and/or write operation of the second device on the first device is allowed.
地址 Beijing CN
您可能感兴趣的专利