CN104573437A - Information authentication method, device and terminal - Google Patents

Information authentication method, device and terminal Download PDF

Info

Publication number
CN104573437A
CN104573437A CN201310505220.5A CN201310505220A CN104573437A CN 104573437 A CN104573437 A CN 104573437A CN 201310505220 A CN201310505220 A CN 201310505220A CN 104573437 A CN104573437 A CN 104573437A
Authority
CN
China
Prior art keywords
terminal
drag
candidate answers
dragging
proper operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310505220.5A
Other languages
Chinese (zh)
Other versions
CN104573437B (en
Inventor
唐艳平
陈梦
陈荣
刘飞飞
陈远斌
孙增昕
董梁
李德春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201310505220.5A priority Critical patent/CN104573437B/en
Publication of CN104573437A publication Critical patent/CN104573437A/en
Application granted granted Critical
Publication of CN104573437B publication Critical patent/CN104573437B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/0486Drag-and-drop

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses an information authentication method, device and terminal and belongs to the technical field of network safety. The method includes: displaying an information authentication interface which comprises a question graph and at least two candidate answer graphs; receiving a dragging signal for dragging the candidate answer graph to the question graph; detecting whether the dragging operation is correct or not; if so, determining that the authentication is passed. The method has the advantages that the problem that the current authentication operation is completed by a person or other terminals cannot be judged accurately in the prior art is solved, the information authentication interface which cannot be completed by other terminals can be provided, and only the person can pass the authentication.

Description

Information authentication method, device and terminal
Technical field
The present invention relates to technical field of network security, particularly a kind of information authentication method, device and terminal.
Background technology
Along with the high speed development of the communication technology, huge numbers of families have been come in internet.In internet, in order to avoid the attack of hacker, wooden horse and Malware, authentification of message has become and has ensured network security and one of technological means of often using.
Please refer to Fig. 1, it illustrates the certification schematic diagram of existing a kind of information authentication method when carrying out authentification of message, this information authentication method can comprise: certificate server contains the authentication interface of identifying code to terminal providing package, terminal demonstration comprises the authentication interface of identifying code, and receives the identifying code that user inputs in authentication interface; The identifying code that terminal transmission and reception are arrived is to certificate server, and whether certificate server detects the identifying code received and mate with the identifying code provided in authentication interface; If testing result for coupling, then send certification by information to terminal, terminal receive certification by information after continue to provide service.
Realizing in process of the present invention, inventor finds prior art, and at least there are the following problems:
Because identifying code is made up of character usually, and character can be obtained by the identification of picture and text recognition technology by other terminal, so above-mentioned information authentication method accurately can not judge that this authentication operation has been come by people or come by other terminal.
Summary of the invention
The information authentication method provided to solve prior art accurately can not judge that this authentication operation is the problem come by people or come by other terminal, embodiments provides a kind of information authentication method, device and terminal.Described technical scheme is as follows:
First aspect, provides a kind of information authentication method, and described method comprises:
Display authentification of message interface, described authentification of message interface comprises problem figure and at least two candidate answers figures;
Receive and drag the dragging signal of candidate answers figure to described problem figure;
Whether the described candidate answers figure of detection dragging is proper operation to the drag operation of described problem figure;
If testing result is for being proper operation, then determine that described certification is passed through.
In the first possible implementation of first aspect, whether the described candidate answers figure of described detection dragging is proper operation to the drag operation of described problem figure, comprising:
Whether the described candidate answers figure of detection dragging is drag the dragging track of correct option figure to described problem figure to the dragging track of described problem figure;
If testing result is be drag the dragging track of correct option figure to described problem figure, then determine that described drag operation is proper operation.
In the implementation that the second of first aspect is possible, whether the described candidate answers figure of described detection dragging is proper operation to the drag operation of described problem figure, comprising:
Detect whether the described candidate answers figure dragged is the correct option figure corresponding with described problem figure;
If testing result is be the correct option figure corresponding with described problem figure, then determine that described drag operation is proper operation.
In the third possible implementation of first aspect, described detection drags before whether described candidate answers figure to the drag operation of described problem figure be proper operation, and described method also comprises:
Detect and drag the terminal of described candidate answers figure to the dragging track of described problem figure whether in the presumptive area based on described problem figure location;
If testing result is in the presumptive area based on described problem figure location, then performs described detection and drag the step whether described candidate answers figure to the drag operation of described problem figure is proper operation.
In the 4th kind of possible implementation of first aspect, before described display authentification of message interface, described method also comprises:
Gather finger print information;
Detect described finger print information whether to mate with predetermined fingerprint information;
If testing result is coupling, then perform the step at described display authentification of message interface.
In the 5th kind of possible implementation of first aspect, described detection drags after whether described candidate answers figure to the drag operation of described problem figure be proper operation, and described method also comprises:
Add up the number of times that the drag operation detected within a predetermined period of time is not proper operation;
When adding up the number of times obtained and reaching pre-determined number, the continuation locking described authentification of message performs.
Second aspect, provides a kind of information authenticating apparatus, and described device comprises:
Interface display module, for showing authentification of message interface, described authentification of message interface comprises problem figure and at least two candidate answers figures;
Signal receiving module, drags the dragging signal of candidate answers figure to described problem figure for receiving;
For detecting, operation detection module, drags whether described candidate answers figure to the drag operation of described problem figure is proper operation;
Certification, by module, for when the testing result of described operation detection module is for being proper operation, determines that described certification is passed through.
In the first possible implementation of second aspect, described operation detection module, comprising:
Track detection unit, whether for detecting, to drag described candidate answers figure to the dragging track of described problem figure be drag the dragging track of correct option figure to described problem figure;
First determining unit, for being be, when dragging correct option figure to the dragging track of described problem figure, determine that described drag operation is proper operation in the testing result of described track detection unit.
In the implementation that the second of second aspect is possible, described operation detection module, comprising:
Graphics detection unit, for detecting whether the described candidate answers figure of dragging is the correct option figure corresponding with described problem figure;
Second determining unit, for being, when being the correct option figure corresponding with described problem figure, determine that described drag operation is proper operation in the testing result of described graphics detection unit.
In the third possible implementation of second aspect, described device also comprises:
Drop point detection module, drags the terminal of described candidate answers figure to the dragging track of described problem figure whether in the presumptive area based on described problem figure location for detecting;
Described operation detection module, during for being in the testing result of described drop point detection module in the presumptive area based on described problem figure location, performing described detection and dragging the step whether described candidate answers figure to the drag operation of described problem figure is proper operation.
In the 4th kind of possible implementation of second aspect, described device also comprises:
Finger print acquisition module, for gathering finger print information;
Whether finger print detecting module, mate with predetermined fingerprint information for the described finger print information detecting described finger print acquisition module collection;
Described interface display module, also for when the testing result of described finger print detecting module is for coupling, performs the step at described display authentification of message interface.
In the 5th kind of possible implementation of second aspect, described device also comprises:
Number of times statistical module, for adding up the number of times that the drag operation detected within a predetermined period of time is not proper operation;
Certification locking module, when the number of times for obtaining in described number of times statistical module counts reaches pre-determined number, the continuation locking described authentification of message performs.
The third aspect, provides a kind of terminal, and described terminal comprises the various possible information authenticating apparatus described in implementation of second aspect and second aspect.
The beneficial effect of the technical scheme that the embodiment of the present invention provides is:
By display authentification of message interface, receive and drag the dragging signal of candidate answers figure to problem figure, and detect and drag whether candidate answers figure to the drag operation of problem figure is proper operation, thus when testing result is for being proper operation, determine that certification is passed through; Solve in prior art and accurately can not judge that this authentication operation is the problem come by people or come by other terminal, reach the authentification of message interface that other terminal self can be provided cannot to complete certification, make when certification by time carry out authentification of message user can only be people and can not be the effect of other terminal.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the display schematic diagram of the information authentication method that prior art provides;
Fig. 2 is the method flow diagram of the information authentication method that one embodiment of the invention provides;
Fig. 3 A is the method flow diagram of the information authentication method that another embodiment of the present invention provides;
Fig. 3 B is the display schematic diagram at the authentification of message interface that another embodiment of the present invention provides;
Fig. 3 C is another display schematic diagram at the authentification of message interface that another embodiment of the present invention provides;
Fig. 3 D is a display schematic diagram again at the authentification of message interface that another embodiment of the present invention provides;
Fig. 3 E is the display schematic diagram of the dragging candidate answers figure that provides of another embodiment of the present invention to the dragging track of problem figure;
Fig. 3 F is a display schematic diagram again at the authentification of message interface that another embodiment of the present invention provides;
Fig. 3 G is a display schematic diagram again at the authentification of message interface that another embodiment of the present invention provides;
Fig. 4 is the method flow diagram of the information authentication method that yet another embodiment of the invention provides;
Fig. 5 is the block diagram of the information authenticating apparatus that one embodiment of the invention provides;
Fig. 6 A is the block diagram of the information authenticating apparatus that another embodiment of the present invention provides;
Fig. 6 B is another block diagram of the information authenticating apparatus that another embodiment of the present invention provides;
Fig. 6 C is a block diagram again of the information authenticating apparatus that another embodiment of the present invention provides;
Fig. 7 is the block diagram of the terminal that one embodiment of the invention provides.
Embodiment
In order to make the object, technical solutions and advantages of the present invention clearly, below in conjunction with accompanying drawing, the present invention is described in further detail, and obviously, described embodiment is only a part of embodiment of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
Please refer to Fig. 2, it illustrates the method flow diagram of the information authentication method that one embodiment of the invention provides, this information authentication method may be used in the communication terminal of such as mobile phone, panel computer, personal digital assistant, desktop computer or notebook computer and so on, and this information authentication method can comprise:
Step 201, display authentification of message interface;
Wherein, authentification of message interface comprises problem figure and at least two candidate answers figures.
Step 202, receives and drags the dragging signal of candidate answers figure to problem figure;
Step 203, whether detection dragging candidate answers figure is proper operation to the drag operation of problem figure;
Step 204, if testing result is for being proper operation, then determines that certification is passed through.
In sum, the information authentication method that the present embodiment provides, by display authentification of message interface, receive and drag the dragging signal of candidate answers figure to problem figure, and detect and drag whether candidate answers figure to the drag operation of problem figure is proper operation, thus when testing result is for being proper operation, determine that certification is passed through; Solve in prior art and accurately can not judge that this authentication operation is the problem come by people or come by other terminal, reach the authentification of message interface that other terminal self can be provided cannot to complete certification, make when certification by time carry out authentification of message user can only be people and can not be the effect of other terminal.
Please refer to Fig. 3 A, it illustrates the method flow diagram of the information authentication method that another embodiment of the present invention provides, this information authentication method may be used in the terminal of such as mobile phone, panel computer, personal digital assistant, desktop computer or notebook computer and so on, and this information authentication method can comprise:
Step 301, display authentification of message interface;
Terminal can show authentification of message interface.Wherein, authentification of message interface comprises problem figure and at least two candidate answers figures; Such as, please refer to Fig. 3 B, it illustrates a kind of display schematic diagram of possible authentification of message interface.
Concrete, frequently access a certain website user or under the environment that some security requirement is higher, in order to avoid being subject to the attack of hacker thus ensureing network security, usually need to carry out authentification of message, so terminal can show authentification of message interface accordingly.Such as; use terminal from a certain website during frequent download file user, whether website is come by people to detect this down operation, thus ensures that the Internet resources of oneself are not stolen by hacker; website understands configuration information certification usually, and now terminal can show authentification of message interface.
But, in order to avoid lawless person completes certification thus the problem of threaten network security according to the authorization prompt of terminal, when a certain terminal needs to carry out authentification of message, this terminal can also send authentication request to other terminal with its binding, other terminal, after receiving authentication request, shows authentification of message interface.Wherein, other terminal of binding can be provided with the terminal that can realize the application program of authentication function of binding with the application program of request authentication, such as, the application program that can realize authentication function is installed in user mobile phone, the a certain chat software that this application program and user use is bound, then when user logs in this chat software in computer, whether user's operation to detect this register, computer can send authentication request to user mobile phone, accordingly, user mobile phone can receive authentication request, and after receiving authentication request, show authentification of message interface.
It should be noted that, in order to help user to complete authentification of message, the operation instruction to each candidate answers figure can also be comprised in authentification of message interface, such as please refer to Fig. 3 C, being illustrated as ' clown Le Le can be helped to block the sun ' for ' sunbonnet '; Being illustrated as ' can keep off the rain for clown Le Le ' for ' umbrella '; Being illustrated as ' warming ' for ' overcoat '.
Step 302, receives and drags the dragging signal of candidate answers figure to problem figure;
User can carry out corresponding authentication operation according to the displaying contents in authentification of message interface, also namely when authentification of message interface comprises problem figure and at least two candidate answers figures, user the particular problem indicated by problem figure can drag corresponding candidate answers figure on problem figure, and corresponding terminal can receive and drag the dragging signal of candidate answers figure to problem figure.
Such as, in the authentification of message interface shown in Fig. 3 C, user can according to ' current state of clown Le Le ' drags corresponding stage property and carried out certification with it to it, and accordingly, terminal can receive and drag stage property to ' the dragging signal of clown Le Le '; Concrete, when ' when clown Le Le ' is under the burning sun, illustrate that ' the current needs one of clown Le Le ' push up sunbonnet and carry out sunshade, now user can drag ' sunbonnet ' to ' clown Le Le ' comes for it creates a slice cool place, and terminal can receive dragging ' sunbonnet ' accordingly to ' the dragging signal of clown Le Le '; When ' when clown Le Le ' drenches with rain, illustrate that ' the current umbrella that needs of clown Le Le ' carrys out rain cover, now user can drag ' umbrella ' to ' clown Le Le ' comes for its rain cover, and terminal can receive dragging ' umbrella ' accordingly to ' the dragging signal of clown Le Le '; And work as ' when clown Le Le ' is in snow sky, illustrate current ' clown Le Le ' may terribly cold needs warming, now user can drag ' overcoat ' to ' clown Le Le ', terminal can receive dragging ' overcoat ' accordingly to ' the dragging signal of clown Le Le '.
Step 303, detects and drags the candidate answers figure terminal to the dragging track of problem figure whether in the presumptive area of locating based on problem figure;
Receive in terminal and drag after signal, terminal can detect and drag the terminal of candidate answers figure to the dragging track of problem figure whether in the presumptive area of locating based on problem figure.
Concrete, because some stage properties have its specific use-pattern, such as, sunbonnet is used to be worn on head, when it is dragged to ' during the foot areas of clown Le Le ', be incorrect obviously, so drag after signal receiving in terminal, terminal can detect and drag the terminal of candidate answers figure to the dragging track of problem figure whether in the presumptive area of locating based on problem figure.When actual realization, terminal can prestore different problem figure and drag candidate answers figure to the corresponding relation of terminal in the region of locating based on problem figure between residing region dragging track during problem figure, and corresponding terminal can perform detection according to the corresponding relation prestored.
Such as, in the corresponding relation that terminal prestores, when problem figure is that ' when clown Le Le ' is in the figure under the sun, the region dragging the terminal of candidate answers figure to the dragging track of problem figure residing in the region of locating based on problem figure is problem figure 1/2 region, region to 3/4 from top to bottom; So when the problem figure in authentification of message interface be ' when clown Le Le ' is in the figure under the sun, terminal can detect drag track terminal whether in problem figure 1/2 region, region to 3/4 from top to bottom, specifically please refer to Fig. 3 D.
It should be noted that, this step is optional step, and when practical application, terminal directly can perform step 304, and the present embodiment does not limit this.
Step 304, if testing result is in the presumptive area of locating based on problem figure, then performs to detect and drags the step whether candidate answers figure to the drag operation of problem figure is proper operation;
If the testing result of terminal is in the presumptive area of locating based on problem figure, then terminal can perform to detect and drag the step whether candidate answers figure to the drag operation of problem figure is proper operation.
Concrete, terminal detect drag candidate answers figure to the drag operation of problem figure be whether the step of proper operation can comprise in the following two kinds implementation any one:
The first possible implementation can comprise:
The first, whether detection dragging candidate answers figure is drag the dragging track of correct option figure to problem figure to the dragging track of problem figure;
Concrete, user drags track at dragging candidate answers figure to forming one during problem figure, and also namely terminal, when reception drags signal, can get accordingly and drag the dragging track of candidate answers figure to problem figure; But the position residing in authentification of message interface due to different candidate answers figure is different, thus user to drag different candidate answers figure also different to the starting point of dragging track during problem figure; Simultaneously due to user drags same candidate answers figure to the dragged path of problem figure also can be different, so in order to detect user, this drags whether candidate answers figure to the drag operation of problem figure is proper operation, and terminal can detect and drag whether candidate answers figure to the dragging track of problem figure is drag the dragging track of correct option figure to problem figure.
When actual realization, terminal can prestore the dragging track between different problem figure and correct option figure in a database, and corresponding terminal can detect according to pre-stored data storehouse.Such as, the track that the dragging track corresponding with the problem figure shown in Fig. 3 D that terminal prestores is the bold portion shown in Fig. 3 E, so when the problem figure in authentification of message interface is the problems referred to above figure, terminal can detect and drag the track whether candidate answers figure to the dragging track of problem figure is bold portion in Fig. 3 E.
The second, if testing result is be drag correct option figure to the dragging track of problem figure, then determine that drag operation is proper operation.
If the track of the testing result of terminal for being the bold portion shown in Fig. 3 E, that is to say and drag the dragging track of correct option figure to problem figure, then terminal can determine that drag operation is proper operation.
And if the track of the testing result of terminal for not being the bold portion shown in Fig. 3 E, but the dragging track of wherein dotted portion, then now terminal can determine that drag operation is not proper operation.Wherein, wherein several possibility situations that in Fig. 3 E, the dragging track of dotted portion just draws in order to auxiliary understanding, implementation the present embodiment possible to other will not enumerate.
The possible implementation of the second can comprise:
The first, detect whether the candidate answers figure dragged is the correct option figure corresponding with problem figure;
Concrete, due to the candidate answers figure that different problem figures is corresponding unique, so when terminal detects whether drag candidate answers figure to the drag operation of problem figure be proper operation, whether the candidate answers figure that terminal can detect dragging is the correct option figure corresponding with problem figure.
When actual realization, terminal can prestore the corresponding relation between different problem figure and correct option figure, so when terminal performs detecting step, terminal can detect according to the corresponding relation prestored.Such as, the correct option figure that the problem figure shown in Fig. 3 E that prestores of terminal is corresponding is ' sunbonnet '; The correct option figure that problem figure shown in Fig. 3 F is corresponding is then ' umbrella ' etc.; The correct option figure that problem figure shown in Fig. 3 G is corresponding is ' overcoat '.
The second, if testing result is be the correct option figure corresponding with problem figure, determine that drag operation is proper operation.
If the testing result of terminal is be the correct option figure corresponding with problem figure, such as, authentification of message interface is the authentication interface shown in Fig. 3 E, then, when the candidate answers figure that terminal detects dragging is exactly ' sunbonnet ', terminal can determine that drag operation is proper operation.
And if the testing result of terminal is be not the correct option figure corresponding with problem figure, such as, authentification of message interface is the authentication interface shown in Fig. 3 E, terminal detects that the candidate answers figure of dragging is ' umbrella ' and is not ' sunbonnet ', and now terminal can determine that drag operation is not proper operation.
Step 305, if testing result is for being proper operation, then determines that certification is passed through.
When the testing result of step 304 is for being proper operation, terminal can determine that certification is passed through.
Concrete, when terminal is when directly showing authentification of message interface, in the testing result of terminal for after being proper operation, terminal can directly pass through and the task of asking before continuing execution in certification; Such as, carry out authentification of message when terminal is and frequently downloads in a certain website, then, when the testing result of terminal is for being proper operation, terminal can perform downloading task; And when terminal be receive the authentication request that sends from a certain application program after show authentication interface, then in the testing result of terminal for after being proper operation, terminal can send certification by information to this application program, so as this application program receive certification by information after continue to provide service.
If the testing result of terminal is for being not proper operation, then terminal can determine that this certification can't pass.But, cause certification to be refused in order to avoid the maloperation due to user, terminal is when testing result is for being not proper operation, can also again show authentification of message interface, and receive drag candidate answers figure to problem figure dragging signal after, whether continuation detection dragging candidate answers figure is proper operation to the drag operation of problem figure, thus when testing result is for being proper operation, determines that certification is passed through.Meanwhile, in order to avoid lawless person is by repeatedly attempting by certification, terminal can also arrange the maximum attemptable number of times of user within a predetermined period of time, also namely can perform following steps:
The first, add up the number of times that the drag operation detected within a predetermined period of time is not proper operation;
First, terminal can add up the number of times that the drag operation detected within a predetermined period of time is not proper operation.When actual realization, terminal is when detecting that drag operation is not proper operation, and number of times can be added 1 by terminal, and statistics total degree within a predetermined period of time.
The second, when adding up the number of times obtained and reaching pre-determined number, the continuation of locking information certification performs.
When terminal add up the number of times obtained reach pre-determined number time, terminal can locking information certification continuation perform.
Such as, if predetermined amount of time is one day, pre-determined number is 3 times, then terminal add up the total degree obtained reach 3 times time, terminal can locking information certification continuation perform.
In sum, the information authentication method that the present embodiment provides, by display authentification of message interface, receive and drag the dragging signal of candidate answers figure to problem figure, and detect and drag whether candidate answers figure to the drag operation of problem figure is proper operation, thus when testing result is for being proper operation, determine that certification is passed through; Solve in prior art and accurately can not judge that this authentication operation is the problem come by people or come by other terminal, reach the authentification of message interface that other terminal self can be provided cannot to complete certification, make when certification by time carry out authentification of message user can only be people and can not be the effect of other terminal.Simultaneously, the present embodiment first detects and drags the candidate answers figure terminal to the dragging track of problem figure whether in the presumptive area of locating based on problem figure, thus only when testing result is in presumptive area, perform subsequent step, and when testing result is not in presumptive area, terminate this flow process, greatly reduce the process complexity of terminal when authentification of message.
Please refer to Fig. 4, it illustrates the method flow diagram of the information authentication method that yet another embodiment of the invention provides, this information authentication method may be used in the terminal of such as mobile phone, panel computer, personal digital assistant, desktop computer or notebook computer and so on; And with above-described embodiment unlike, in the present embodiment, before terminal demonstration authentification of message interface, terminal first can gather finger print information, after finger print identifying passes through, show authentification of message interface again; This information authentication method can comprise:
Step 401, gathers finger print information;
With above-described embodiment unlike, in the present embodiment when needs carry out authentification of message, terminal first can gather the finger print information of user.Concrete, terminal can gather the finger print information of user by fingerprint sensor.Wherein fingerprint sensor can be the sensor of terminal built-in, and also can be the sensor in the utility appliance be connected with terminal, the present embodiment limit this.
Such as, when user uses a certain chat software, to be usurped by other people to prevent the personal account of user thus cause leakage of personal information, when this personal account is attempted logging in, the terminal logging in this personal account can send authentication request, there is provided the terminal of authentication function accordingly after receiving authentication request, display reminding user inputs the prompting interface of finger print information, and gathers the finger print information of user's input.
Whether step 402, detect finger print information and mate with predetermined fingerprint information;
After terminal collects finger print information, whether terminal can detect the finger print information collected and mate with predetermined fingerprint information.
Step 403, if testing result is coupling, then performs the step at display authentification of message interface;
If the testing result of terminal is coupling, then illustrate it is user's operation, now terminal can perform the step at display authentification of message interface.Wherein, authentification of message interface comprises problem figure and at least two candidate answers figures.
It should be noted that, can also comprise the operation instruction to each candidate answers figure in authentification of message interface, the step 301 of this and above-described embodiment is similar, and the present embodiment does not repeat them here.
Step 404, receives and drags the dragging signal of candidate answers figure to problem figure;
User can carry out corresponding authentication operation according to the displaying contents in authentification of message interface, also namely when authentification of message interface comprises problem figure and at least two candidate answers figures, user the particular problem indicated by problem figure can drag corresponding candidate answers figure on problem figure, and corresponding terminal can receive and drag the dragging signal of candidate answers figure to problem figure.
It should be noted that, when terminal is the terminal using touch-screen, user normally drags candidate answers figure to problem figure by finger, so in order to reduce the complexity of terminal when authentification of message, whether terminal also can directly show authentification of message interface, drags candidate answers figure gather the finger print information of user to during problem figure user, and detect finger print information and mate with predetermined fingerprint information, thus when testing result is for coupling, perform step 405; This that is, step 401 and step 402 can perform by any instant before step 405, and the present embodiment specifically performs moment to it and do not limit.
Step 405, detects and drags the candidate answers figure terminal to the dragging track of problem figure whether in the presumptive area of locating based on problem figure;
Receive in terminal and drag after signal, terminal can detect and drag the terminal of candidate answers figure to the dragging track of problem figure whether in the presumptive area of locating based on problem figure.
Step 406, if testing result is in the presumptive area of locating based on problem figure, then performs to detect and drags the step whether candidate answers figure to the drag operation of problem figure is proper operation;
If the testing result of terminal is in the presumptive area of locating based on problem figure, then terminal can perform to detect and drag the step whether candidate answers figure to the drag operation of problem figure is proper operation.
Concrete, terminal detect drag candidate answers figure to the drag operation of problem figure be whether the step of proper operation can comprise in the following two kinds implementation any one:
The first possible implementation can comprise:
The first, whether detection dragging candidate answers figure is drag the dragging track of correct option figure to problem figure to the dragging track of problem figure;
Concrete, user drags track at dragging candidate answers figure to forming one during problem figure, and also namely terminal, when reception drags signal, can get accordingly and drag the dragging track of candidate answers figure to problem figure, but, the position residing in authentification of message interface due to different candidate answers figure is different, also namely user to drag different candidate answers figure also different to the starting point of dragging track during problem figure, and user drags same candidate answers figure to the dragged path of problem figure also can be different, so in order to detect user, this drags whether candidate answers figure to the drag operation of problem figure is proper operation, terminal can detect and drag whether candidate answers figure to the dragging track of problem figure is drag the dragging track of correct option figure to problem figure.
The second, if testing result is be drag correct option figure to the dragging track of problem figure, then determine that drag operation is proper operation.
If the track of the testing result of terminal for being the bold portion shown in Fig. 3 E, that is to say and drag the dragging track of correct option figure to problem figure, then terminal can determine that drag operation is proper operation.
And if the testing result of terminal is not the track of the realization part shown in Fig. 3 E, but the dragging track of wherein dotted portion, then now terminal can determine that drag operation is not proper operation.
The possible implementation of the second can comprise:
The first, detect whether the candidate answers figure dragged is the correct option figure corresponding with problem figure;
Concrete, due to the candidate answers figure that different problem figures is corresponding unique, so when terminal detects whether drag candidate answers figure to the drag operation of problem figure be proper operation, whether the candidate answers figure that terminal can detect dragging is the correct option figure corresponding with problem figure.
When actual realization, terminal can prestore the corresponding relation between different problem figure and correct option figure, so when terminal performs detecting step, terminal can detect according to the corresponding relation prestored.
The second, if testing result is be the correct option figure corresponding with problem figure, then determine that drag operation is proper operation.
Step 407, if testing result is for being proper operation, then determines that certification is passed through.
Concrete, when terminal is when directly showing authentification of message interface, in the testing result of terminal for after being proper operation, terminal can directly pass through and the task of asking before continuing execution in certification; Such as, carry out authentification of message when terminal is and frequently downloads in a certain website, then, when the testing result of terminal is for being proper operation, terminal can perform downloading task; And when terminal be receive the authentication request that sends from a certain application program after show authentication interface, then in the testing result of terminal for after being proper operation, terminal can send certification by information to this application program, so as this application program receive certification by information after continue to provide service.
If the testing result of terminal is for being not proper operation, then terminal can determine that this certification can't pass.But, cause certification to be refused in order to avoid the maloperation due to user, terminal is when testing result is for being not proper operation, terminal can also show authentification of message interface again, and receive drag candidate answers figure to problem figure dragging signal after, whether continuation detection dragging candidate answers figure is proper operation to the drag operation of problem figure, when testing result is for being proper operation, determines that certification is passed through.Meanwhile, in order to avoid lawless person is by repeatedly attempting by certification, terminal can also arrange the maximum attemptable number of times of user within a predetermined period of time, also namely can perform following steps:
The first, add up the number of times that the drag operation detected within a predetermined period of time is not proper operation;
First, terminal can add up the number of times that the drag operation detected within a predetermined period of time is not proper operation.When actual realization, terminal is when detecting that drag operation is not proper operation, and number of times can be added 1 by terminal, and statistics total degree within a predetermined period of time.
The second, when adding up the number of times obtained and reaching pre-determined number, the continuation of locking information certification performs.
When terminal add up the number of times obtained reach pre-determined number time, terminal can locking information certification continuation perform.
It should be noted that, the step 302 in step 404 to the detailed technology details and above-described embodiment of step 407 is similar to step 305, and the present embodiment does not repeat them here.
In sum, the information authentication method that the present embodiment provides, by display authentification of message interface, receive and drag the dragging signal of candidate answers figure to problem figure, and detect and drag whether candidate answers figure to the drag operation of problem figure is proper operation, thus when testing result is for being proper operation, determine that certification is passed through; Solve in prior art and accurately can not judge that this authentication operation is the problem come by people or come by other terminal, reach the authentification of message interface that other terminal self can be provided cannot to complete certification, make when certification by time carry out authentification of message user can only be people and can not be the effect of other terminal.
The present embodiment first detects and drags the candidate answers figure terminal to the dragging track of problem figure whether in the presumptive area of locating based on problem figure, thus only when testing result is in presumptive area, perform subsequent step, and when testing result is not in presumptive area, terminate this flow process, greatly reduce the process complexity of terminal when authentification of message.
Whether the present embodiment mates with predetermined fingerprint information by detecting the finger print information gathered, thus whether the people that can judge to carry out authentification of message is the user after mandate, improves the degree of accuracy of authentification of message.
Please refer to Fig. 5, it illustrates the block diagram of the information authenticating apparatus that the embodiment of the present invention provides, it is all or part of that this information authenticating apparatus can realize becoming in terminal by software, hardware or both combinations, and this information authenticating apparatus can comprise: interface display module 510, signal receiving module 520, operation detection module 530 and certification are by module 540;
Interface display module 510, for showing authentification of message interface, described authentification of message interface comprises problem figure and at least two candidate answers figures;
Signal receiving module 520, drags the dragging signal of candidate answers figure to described problem figure for receiving;
For detecting, operation detection module 530, drags whether described candidate answers figure to the drag operation of described problem figure is proper operation;
Certification, by module 540, for when the testing result of described operation detection module 530 is for being proper operation, determines that described certification is passed through.
In sum, the information authenticating apparatus that the present embodiment provides, by display authentification of message interface, receive and drag the dragging signal of candidate answers figure to problem figure, and detect and drag whether candidate answers figure to the drag operation of problem figure is proper operation, thus when testing result is for being proper operation, determine that certification is passed through; Solve in prior art and accurately can not judge that this authentication operation is the problem come by people or come by other terminal, reach the authentification of message interface that other terminal self can be provided cannot to complete certification, make when certification by time carry out authentification of message user can only be people and can not be the effect of other terminal.
Please refer to Fig. 6 A, it illustrates the block diagram of the information authenticating apparatus that another embodiment of the present invention provides, it is all or part of that this information authenticating apparatus can realize becoming in terminal by software, hardware or both combinations, and this information authenticating apparatus can comprise: interface display module 610, signal receiving module 620, operation detection module 630 and certification are by module 640;
Interface display module 610, for showing authentification of message interface, described authentification of message interface comprises problem figure and at least two candidate answers figures;
Signal receiving module 620, drags the dragging signal of candidate answers figure to described problem figure for receiving;
For detecting, operation detection module 630, drags whether described candidate answers figure to the drag operation of described problem figure is proper operation;
Certification, by module 640, for when the testing result of described operation detection module 630 is for being proper operation, determines that described certification is passed through.
Please refer to Fig. 6 B, in the first possible implementation of the present embodiment, described operation detection module 630, comprising:
Track detection unit 631, whether for detecting, to drag described candidate answers figure to the dragging track of described problem figure be drag the dragging track of correct option figure to described problem figure;
First determining unit 632, for being be, when dragging correct option figure to the dragging track of described problem figure, determine that described drag operation is proper operation in the testing result of described track detection unit 631.
Please refer to Fig. 6 C, in the implementation that the second of the present embodiment is possible, described operation detection module 630, comprising:
Graphics detection unit 633, for detecting whether the described candidate answers figure of dragging is the correct option figure corresponding with described problem figure;
Second determining unit 634, for being, when being the correct option figure corresponding with described problem figure, determine that described drag operation is proper operation in the testing result of described graphics detection unit.
In the third possible implementation of the present embodiment, described device also comprises: drop point detection module 650;
Drop point detection module 650, drags the terminal of described candidate answers figure to the dragging track of described problem figure whether in the presumptive area based on described problem figure location for detecting;
Described operation detection module 630, during for being in the testing result of described drop point detection module 650 in the presumptive area based on described problem figure location, performing described detection and dragging the step whether described candidate answers figure to the drag operation of described problem figure is proper operation.
In the 4th kind of possible implementation of the present embodiment, described device also comprises: finger print acquisition module 660 and finger print detecting module 670;
Finger print acquisition module 660, for gathering finger print information;
Finger print detecting module 670, whether the described finger print information gathered for detecting described finger print acquisition module 660 mates with predetermined fingerprint information;
Described interface display module 610, also for when the testing result of described finger print detecting module 670 is for coupling, performs the step at described display authentification of message interface.
In the 5th kind of possible implementation of the present embodiment, described device also comprises: number of times statistical module 680 and certification locking module 690;
Number of times statistical module 680, for adding up the number of times that the drag operation detected within a predetermined period of time is not proper operation;
Certification locking module 690, for add up at described number of times statistical module 680 number of times obtained reach pre-determined number time, lock described authentification of message continuation perform.
In sum, the information authenticating apparatus that the present embodiment provides, by display authentification of message interface, receive and drag the dragging signal of candidate answers figure to problem figure, and detect and drag whether candidate answers figure to the drag operation of problem figure is proper operation, thus when testing result is for being proper operation, determine that certification is passed through; Solve in prior art and accurately can not judge that this authentication operation is the problem come by people or come by other terminal, reach the authentification of message interface that other terminal self can be provided cannot to complete certification, make when certification by time carry out authentification of message user can only be people and can not be the effect of other terminal.
Please refer to Fig. 7, it illustrates the block diagram of the terminal that the embodiment of the present invention provides, the information authentication method that this terminal provides for implementing above-described embodiment, terminal in the embodiment of the present invention can comprise one or more following ingredient: for performing computer program instructions to complete the processor of various flow process and method, for information and stored program instruction random access memory (RAM) and ROM (read-only memory) (ROM), for storing the storer of data and information, I/O equipment, interface, antenna etc.Specifically:
Terminal 700 can comprise RF(Radio Frequency, radio frequency) parts such as circuit 710, storer 720, input block 730, display unit 740, sensor 750, voicefrequency circuit 760, WiFi (wireless fidelity, Wireless Fidelity) module 770, processor 780, power supply 782, camera 790.It will be understood by those skilled in the art that the restriction of the not structure paired terminal of the terminal structure shown in Fig. 7, the parts more more or less than diagram can be comprised, or combine some parts, or different parts are arranged.
Concrete introduction is carried out below in conjunction with Fig. 7 each component parts to terminal 700:
RF circuit 710 can be used for receiving and sending messages or in communication process, the reception of signal and transmission, especially, after being received by the downlink information of base station, process to processor 780; In addition, the up data of design are sent to base station.Usually, RF circuit includes but not limited to antenna, at least one amplifier, transceiver, coupling mechanism, LNA(Low Noise Amplifier, low noise amplifier), diplexer etc.In addition, RF circuit 710 can also by radio communication and network and other devices communicatings.Described radio communication can use arbitrary communication standard or agreement, include but not limited to GSM (Global System of Mobile communication, global system for mobile communications), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, Wideband Code Division Multiple Access (WCDMA)), LTE (Long Term Evolution, Long Term Evolution), Email, SMS (Short Messaging Service, Short Message Service) etc.
Storer 720 can be used for storing software program and module, and processor 780 is stored in software program and the module of storer 720 by running, thus performs various function application and the data processing of terminal 700.Storer 720 mainly can comprise storage program district and store data field, and wherein, storage program district can store operating system, application program (such as sound-playing function, image player function etc.) etc. needed at least one function; Store data field and can store the data (such as voice data, phone directory etc.) etc. created according to the use of terminal 700.In addition, storer 720 can comprise high-speed random access memory, can also comprise nonvolatile memory, such as at least one disk memory, flush memory device or other volatile solid-state parts.
Input block 730 can be used for the numeral or the character information that receive input, and generation arranges with the user of terminal 700 and function controls the input of relevant key signals.Particularly, input block 730 can comprise contact panel 731 and other input equipments 732.Contact panel 731, also referred to as touch-screen, user can be collected or neighbouring touch operation (such as user uses any applicable object or the operations of annex on contact panel 731 or near contact panel 731 such as finger, stylus) thereon, and drive corresponding coupling arrangement according to the formula preset.Optionally, contact panel 731 can comprise touch detecting apparatus and touch controller two parts.Wherein, touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation brings, and sends signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and converts it to contact coordinate, then gives processor 780, and the order that energy receiving processor 780 is sent also is performed.In addition, the polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave can be adopted to realize contact panel 731.Except contact panel 731, input block 730 can also comprise other input equipments 732.Particularly, other input equipments 732 can include but not limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, control lever etc.
Display unit 740 can be used for the various menus showing information or the information being supplied to user and the terminal 700 inputted by user.Display unit 740 can comprise display panel 741, optionally, the form such as LCD (Liquid Crystal Display, liquid crystal display), OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) can be adopted to configure display panel 741.Further, contact panel 731 can cover display panel 741, when contact panel 731 detects thereon or after neighbouring touch operation, send processor 780 to determine the type of touch event, on display panel 741, provide corresponding vision to export with preprocessor 780 according to the type of touch event.Although in the figure 7, contact panel 731 and display panel 741 be as two independently parts to realize input and the input function of terminal 700, but in certain embodiments, can by integrated to contact panel 731 and display panel 741 and realize the input and output function of terminal 700.
Terminal 700 also can comprise at least one sensor 750, such as gyro sensor, magnetic induction sensor, optical sensor, motion sensor and other sensors.Particularly, optical sensor can comprise ambient light sensor and proximity transducer, and wherein, ambient light sensor the light and shade of environmentally light can regulate the brightness of display panel 741, proximity transducer when terminal 750 moves in one's ear, can cut out display panel 741 and/or backlight.As the one of motion sensor; acceleration transducer can detect the size of all directions (are generally three axles) acceleration; size and the direction of gravity can be detected time static, can be used for the application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating) of identification terminal attitude, Vibration identification correlation function (such as passometer, knock) etc.; As for terminal 700 also other sensors such as configurable barometer, hygrometer, thermometer, infrared ray sensor, do not repeat them here.
Voicefrequency circuit 760, loudspeaker 761, microphone 762 can provide the audio interface between user and terminal 700.Voicefrequency circuit 760 can by receive voice data conversion after electric signal, be transferred to loudspeaker 761, by loudspeaker 761 be converted to voice signal export; On the other hand, the voice signal of collection is converted to electric signal by microphone 762, voice data is converted to after being received by voicefrequency circuit 760, after again voice data output processor 780 being processed, through RF circuit 710 to send to such as another terminal, or export voice data to storer 720 to process further.
WiFi belongs to short range wireless transmission technology, and terminal 700 can help user to send and receive e-mail by WiFi module 770, browse webpage and access streaming video etc., and its broadband internet wireless for user provides is accessed.Although Fig. 7 shows WiFi module 770, be understandable that, it does not belong to must forming of terminal 700, can omit in the scope of essence not changing invention as required completely.
Processor 780 is control centers of terminal 700, utilize the various piece of various interface and the whole terminal of connection, software program in storer 720 and/or module is stored in by running or performing, and call the data be stored in storer 720, perform various function and the process data of terminal 700, thus integral monitoring is carried out to terminal.Optionally, processor 780 can comprise one or more processing unit; Preferably, processor 780 accessible site application processor and modem processor, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor mainly processes radio communication.Be understandable that, above-mentioned modem processor also can not be integrated in processor 780.
Terminal 700 also comprises the power supply 782(such as battery of powering to all parts), preferably, power supply can be connected with processor 782 logic by power-supply management system, thus realizes the functions such as management charging, electric discharge and power managed by power-supply management system.
Camera 790 is generally made up of camera lens, imageing sensor, interface, digital signal processor, CPU, display screen etc.Wherein, camera lens is fixed on the top of imageing sensor, manually can change focusing by adjustable lens; Imageing sensor is equivalent to " film " of traditional camera, is the heart of camera collection image; Interface is used for camera to utilize winding displacement, board to board connector, spring connected mode to be connected with terminal mainboard, and the image of collection is sent to described storer 720; Digital signal processor is processed the image gathered by mathematical operation, the analog image of collection is converted to digital picture and sends to storer 720 by interface.
Although not shown, terminal 700 can also comprise bluetooth module etc., does not repeat them here.
Terminal 700, except comprising one or more processor 780, also includes storer, and one or more module, and one or more module stores in storer, and is configured to be performed by one or more processor.One or more program above-mentioned has following function:
Display authentification of message interface, described authentification of message interface comprises problem figure and at least two candidate answers figures;
Receive and drag the dragging signal of candidate answers figure to described problem figure;
Whether the described candidate answers figure of detection dragging is proper operation to the drag operation of described problem figure;
If testing result is for being proper operation, then determine that described certification is passed through.
In the first possible implementation of the present embodiment, whether the described candidate answers figure of described detection dragging is proper operation to the drag operation of described problem figure, comprising:
Whether the described candidate answers figure of detection dragging is drag the dragging track of correct option figure to described problem figure to the dragging track of described problem figure;
If testing result is be drag the dragging track of correct option figure to described problem figure, then determine that described drag operation is proper operation.
In the implementation that the second of the present embodiment is possible, whether the described candidate answers figure of described detection dragging is proper operation to the drag operation of described problem figure, comprising:
Detect whether the described candidate answers figure dragged is the correct option figure corresponding with described problem figure;
If testing result is be the correct option figure corresponding with described problem figure, then determine that described drag operation is proper operation.
In the third possible implementation of the present embodiment, described detection drags before whether described candidate answers figure to the drag operation of described problem figure be proper operation, and described method also comprises:
Detect and drag the terminal of described candidate answers figure to the dragging track of described problem figure whether in the presumptive area based on described problem figure location;
If testing result is in the presumptive area based on described problem figure location, then performs described detection and drag the step whether described candidate answers figure to the drag operation of described problem figure is proper operation.
In the 4th kind of possible implementation of the present embodiment, before described display authentification of message interface, described method also comprises:
Gather finger print information;
Detect described finger print information whether to mate with predetermined fingerprint information;
If testing result is coupling, then perform the step at described display authentification of message interface.
In the 5th kind of possible implementation of the present embodiment, described detection drags after whether described candidate answers figure to the drag operation of described problem figure be proper operation, and described method also comprises:
Add up the number of times that the drag operation detected within a predetermined period of time is not proper operation;
When adding up the number of times obtained and reaching pre-determined number, the continuation locking described authentification of message performs.
In sum, the terminal that the present embodiment provides, by display authentification of message interface, receive and drag the dragging signal of candidate answers figure to problem figure, and detect and drag whether candidate answers figure to the drag operation of problem figure is proper operation, thus when testing result is for being proper operation, determine that certification is passed through; Solve in prior art and accurately can not judge that this authentication operation is the problem come by people or come by other terminal, reach the authentification of message interface that other terminal self can be provided cannot to complete certification, make when certification by time carry out authentification of message user can only be people and can not be the effect of other terminal.
It should be noted that: the information authenticating apparatus that above-described embodiment provides and terminal are when carrying out authentification of message, only be illustrated with the division of above-mentioned each functional module, in practical application, can distribute as required and by above-mentioned functions and be completed by different functional modules, inner structure by equipment is divided into different functional modules, to complete all or part of function described above.In addition, the embodiment of the method for the information authenticating apparatus that above-described embodiment provides and terminal and information authentication method belongs to same design, and its specific implementation process refers to embodiment of the method, repeats no more here.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can have been come by hardware, the hardware that also can carry out instruction relevant by program completes, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium mentioned can be ROM (read-only memory), disk or CD etc.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (13)

1. an information authentication method, is characterized in that, described method comprises:
Display authentification of message interface, described authentification of message interface comprises problem figure and at least two candidate answers figures;
Receive and drag the dragging signal of candidate answers figure to described problem figure;
Whether the described candidate answers figure of detection dragging is proper operation to the drag operation of described problem figure;
If testing result is for being proper operation, then determine that described certification is passed through.
2. method according to claim 1, is characterized in that, whether the described candidate answers figure of described detection dragging is proper operation to the drag operation of described problem figure, comprising:
Whether the described candidate answers figure of detection dragging is drag the dragging track of correct option figure to described problem figure to the dragging track of described problem figure;
If testing result is be drag the dragging track of correct option figure to described problem figure, then determine that described drag operation is proper operation.
3. method according to claim 1, is characterized in that, whether the described candidate answers figure of described detection dragging is proper operation to the drag operation of described problem figure, comprising:
Detect whether the described candidate answers figure dragged is the correct option figure corresponding with described problem figure;
If testing result is be the correct option figure corresponding with described problem figure, then determine that described drag operation is proper operation.
4. according to the arbitrary described method of claims 1 to 3, it is characterized in that, described detection drags before whether described candidate answers figure to the drag operation of described problem figure be proper operation, and described method also comprises:
Detect and drag the terminal of described candidate answers figure to the dragging track of described problem figure whether in the presumptive area based on described problem figure location;
If testing result is in the presumptive area based on described problem figure location, then performs described detection and drag the step whether described candidate answers figure to the drag operation of described problem figure is proper operation.
5., according to the arbitrary described method of claims 1 to 3, it is characterized in that, before described display authentification of message interface, described method also comprises:
Gather finger print information;
Detect described finger print information whether to mate with predetermined fingerprint information;
If testing result is coupling, then perform the step at described display authentification of message interface.
6. according to the arbitrary described method of claims 1 to 3, it is characterized in that, described detection drags after whether described candidate answers figure to the drag operation of described problem figure be proper operation, and described method also comprises:
Add up the number of times that the drag operation detected within a predetermined period of time is not proper operation;
When adding up the number of times obtained and reaching pre-determined number, the continuation locking described authentification of message performs.
7. an information authenticating apparatus, is characterized in that, described device comprises:
Interface display module, for showing authentification of message interface, described authentification of message interface comprises problem figure and at least two candidate answers figures;
Signal receiving module, drags the dragging signal of candidate answers figure to described problem figure for receiving;
For detecting, operation detection module, drags whether described candidate answers figure to the drag operation of described problem figure is proper operation;
Certification, by module, for when the testing result of described operation detection module is for being proper operation, determines that described certification is passed through.
8. device according to claim 7, is characterized in that, described operation detection module, comprising:
Track detection unit, whether for detecting, to drag described candidate answers figure to the dragging track of described problem figure be drag the dragging track of correct option figure to described problem figure;
First determining unit, for being be, when dragging correct option figure to the dragging track of described problem figure, determine that described drag operation is proper operation in the testing result of described track detection unit.
9. device according to claim 7, is characterized in that, described operation detection module, comprising:
Graphics detection unit, for detecting whether the described candidate answers figure of dragging is the correct option figure corresponding with described problem figure;
Second determining unit, for being, when being the correct option figure corresponding with described problem figure, determine that described drag operation is proper operation in the testing result of described graphics detection unit.
10., according to the arbitrary described device of claim 7 to 9, it is characterized in that, described device also comprises:
Drop point detection module, drags the terminal of described candidate answers figure to the dragging track of described problem figure whether in the presumptive area based on described problem figure location for detecting;
Described operation detection module, time also for being in the testing result of described drop point detection module in the presumptive area based on described problem figure location, performing described detection and dragging the step whether described candidate answers figure to the drag operation of described problem figure is proper operation.
11. according to the arbitrary described device of claim 7 to 9, and it is characterized in that, described device also comprises:
Finger print acquisition module, for gathering finger print information;
Whether finger print detecting module, mate with predetermined fingerprint information for the described finger print information detecting described finger print acquisition module collection;
Described interface display module, also for when the testing result of described finger print detecting module is for coupling, performs the step at described display authentification of message interface.
12. according to the arbitrary described device of claim 7 to 9, and it is characterized in that, described device also comprises:
Number of times statistical module, for adding up the number of times that the drag operation detected within a predetermined period of time is not proper operation;
Certification locking module, when the number of times for obtaining in described number of times statistical module counts reaches pre-determined number, the continuation locking described authentification of message performs.
13. 1 kinds of terminals, is characterized in that, it comprise as arbitrary in claim 7 to 12 as described in information authenticating apparatus.
CN201310505220.5A 2013-10-23 2013-10-23 Information authentication method, device and terminal Active CN104573437B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310505220.5A CN104573437B (en) 2013-10-23 2013-10-23 Information authentication method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310505220.5A CN104573437B (en) 2013-10-23 2013-10-23 Information authentication method, device and terminal

Publications (2)

Publication Number Publication Date
CN104573437A true CN104573437A (en) 2015-04-29
CN104573437B CN104573437B (en) 2018-12-28

Family

ID=53089479

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310505220.5A Active CN104573437B (en) 2013-10-23 2013-10-23 Information authentication method, device and terminal

Country Status (1)

Country Link
CN (1) CN104573437B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635681A (en) * 2015-12-30 2016-06-01 广州励丰文化科技股份有限公司 Monitoring method and system in wearable device and multi-microphone scenes
CN105657348A (en) * 2015-12-30 2016-06-08 广州励丰文化科技股份有限公司 Automatic monitoring method and system applied in multi-microphone scene
CN107301337A (en) * 2016-04-14 2017-10-27 腾讯科技(深圳)有限公司 Information Authentication method and apparatus
CN107483208A (en) * 2016-06-08 2017-12-15 中国移动通信有限公司研究院 Generation, verification method and the device of identifying code picture
CN110138800A (en) * 2019-05-30 2019-08-16 北京金山云网络技术有限公司 Interface alternation and its verification method, log on request generation and verification method and device
CN110198328A (en) * 2018-03-05 2019-09-03 腾讯科技(深圳)有限公司 Client recognition methods, device, computer equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102375651A (en) * 2010-08-13 2012-03-14 Tcl集团股份有限公司 Method for unlocking portable electronic equipment
WO2012028773A9 (en) * 2010-09-01 2012-05-31 Nokia Corporation Mode switching
CN102566881A (en) * 2010-12-31 2012-07-11 宏碁股份有限公司 Method for unlocking screen and executing application program
CN102592254A (en) * 2011-10-25 2012-07-18 上海博路信息技术有限公司 Identifying code system based on image splicing
CN102664903A (en) * 2012-05-16 2012-09-12 李明 Network user identifying method and system
CN103139204A (en) * 2012-12-19 2013-06-05 姚爱军 Network identifying code method and system
CN103259785A (en) * 2013-04-11 2013-08-21 深圳市深信服电子科技有限公司 Authentication method and system of virtual token

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102375651A (en) * 2010-08-13 2012-03-14 Tcl集团股份有限公司 Method for unlocking portable electronic equipment
WO2012028773A9 (en) * 2010-09-01 2012-05-31 Nokia Corporation Mode switching
CN102566881A (en) * 2010-12-31 2012-07-11 宏碁股份有限公司 Method for unlocking screen and executing application program
CN102592254A (en) * 2011-10-25 2012-07-18 上海博路信息技术有限公司 Identifying code system based on image splicing
CN102664903A (en) * 2012-05-16 2012-09-12 李明 Network user identifying method and system
CN103139204A (en) * 2012-12-19 2013-06-05 姚爱军 Network identifying code method and system
CN103259785A (en) * 2013-04-11 2013-08-21 深圳市深信服电子科技有限公司 Authentication method and system of virtual token

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635681A (en) * 2015-12-30 2016-06-01 广州励丰文化科技股份有限公司 Monitoring method and system in wearable device and multi-microphone scenes
CN105657348A (en) * 2015-12-30 2016-06-08 广州励丰文化科技股份有限公司 Automatic monitoring method and system applied in multi-microphone scene
CN107301337A (en) * 2016-04-14 2017-10-27 腾讯科技(深圳)有限公司 Information Authentication method and apparatus
CN107483208A (en) * 2016-06-08 2017-12-15 中国移动通信有限公司研究院 Generation, verification method and the device of identifying code picture
CN110198328A (en) * 2018-03-05 2019-09-03 腾讯科技(深圳)有限公司 Client recognition methods, device, computer equipment and storage medium
CN110138800A (en) * 2019-05-30 2019-08-16 北京金山云网络技术有限公司 Interface alternation and its verification method, log on request generation and verification method and device

Also Published As

Publication number Publication date
CN104573437B (en) 2018-12-28

Similar Documents

Publication Publication Date Title
CN104618217B (en) Share method, terminal, server and the system of resource
CN106778175B (en) Interface locking method and device and terminal equipment
CN104852885B (en) Method, device and system for verifying verification code
US20150302215A1 (en) Sensitive operation verification method, terminal device, server, and verification system
US20170316781A1 (en) Remote electronic service requesting and processing method, server, and terminal
CN104780164A (en) Method and device for operating game client
CN107292235B (en) fingerprint acquisition method and related product
CN103310004A (en) Method, device and equipment for displaying number of unread messages
CN108834132B (en) Data transmission method and equipment and related medium product
CN107465841B (en) Fault information reporting method and terminal
CN104135728B (en) Method for connecting network and device
CN107451450B (en) Biometric identification method and related product
CN104158790A (en) User login method, device and equipment
CN109937583A (en) The method and terminal of data sharing
CN106331370A (en) Data transmission method and terminal device
CN104573437A (en) Information authentication method, device and terminal
CN106131930A (en) A kind of WiFi network connection control method, device and terminal
CN104850406A (en) Page switching method and device
CN105653220B (en) Screen data display method and device in remote control
CN104407804A (en) Screen capturing method and screen capturing device as well as electronic device
CN104298666A (en) Web page sharing method and web page sharing device
CN108604265A (en) The method and terminal device of outline management application program usage time
CN104065693A (en) Method, device and system for accessing network data in webpage applications
CN104991699A (en) Video display control method and apparatus
CN104104656A (en) Account retrieving method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant