CN106301778A - Auth method, device, system and user terminal - Google Patents

Auth method, device, system and user terminal Download PDF

Info

Publication number
CN106301778A
CN106301778A CN201510257214.1A CN201510257214A CN106301778A CN 106301778 A CN106301778 A CN 106301778A CN 201510257214 A CN201510257214 A CN 201510257214A CN 106301778 A CN106301778 A CN 106301778A
Authority
CN
China
Prior art keywords
user
eigenvalue
operating habit
module
user terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201510257214.1A
Other languages
Chinese (zh)
Inventor
张义重
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510257214.1A priority Critical patent/CN106301778A/en
Priority to PCT/CN2015/085465 priority patent/WO2016183937A1/en
Publication of CN106301778A publication Critical patent/CN106301778A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention provides a kind of auth method, device, system and user terminal.Wherein, the method includes: obtain active user's operating habit eigenvalue to the operation that user terminal is carried out;The historical operation of operating habit eigenvalue with user is accustomed to eigenvalue compare;Deviation value between operating habit eigenvalue and historical operation custom eigenvalue is in the case of preset range is outer, and checking active user is disabled user.By the present invention, solve the problem using user cipher checking user identity safety low, improve the safety of subscriber authentication.

Description

Auth method, device, system and user terminal
Technical field
The present invention relates to the communications field, in particular to a kind of auth method, device, system and user eventually End.
Background technology
The arrival in mobile interchange epoch, the popular main trend having become mobile phone market of smart mobile phone.This kind of intelligent movable The appearance of terminal changes the life style of a lot of people and the demand to Conventional communication instrument.Smart mobile phone has the most almost become this The representative configuration that the individual epoch are indispensable.Nowadays, the feature that smart mobile phone is portable with it, intelligent etc. so that it is amusement, Commercial affairs, time news and the application function such as service on can better meet consumer's experience to mobile interchange.
Meanwhile, the information security of smart mobile phone also becomes the problem that user cannot avoid.Such as: user is applied by mobile phone Program (APP) carries out the information of bank transfer, Taobao's shopping, person-to-person communication, social activity etc. all can the risk being stolen. If mobile phone is lost, these information all can become other people unjustified enrichment chance.
But, in the related, rely solely on the modes such as such as password authentification to identify the legitimacy of user, user In the case of password is revealed or user cipher is cracked, there is no guarantee that the Information Security of user terminal.
For the problem that the safety using user cipher checking user identity is low, effective solution is the most not yet proposed.
Summary of the invention
In order to solve above-mentioned technical problem, the invention provides a kind of auth method, device, system and user eventually End.
According to an aspect of the invention, it is provided a kind of auth method, including: obtain active user to user eventually The operating habit eigenvalue of the operation that end is carried out;Historical operation custom eigenvalue by described operating habit eigenvalue with user Compare;It is accustomed to the deviation value between eigenvalue in preset range at described operating habit eigenvalue and described historical operation In the case of Wai, verify that described active user is disabled user.
Preferably, obtain described active user the described operating habit eigenvalue of the operation that described user terminal is carried out is included: Collect the operating habit of described active user;According to described operating habit, calculate described operating habit eigenvalue;Wherein, Described operating habit includes at least one of: application program that user uses, the unlocking screen gesture/password of user, The habitual gesture of user, the habitual continuous operation gesture of user.
Preferably, obtain described active user to the described operating habit eigenvalue of the operation that described user terminal is carried out it After, described method also includes: the described operating habit eigenvalue obtained in the scheduled time is stored as described historical operation and practises Used eigenvalue.
Preferably, described method also includes: receiving user's configuration, wherein, described user is configured to arrange described deviation The described preset range of value.
Preferably, after verifying that described active user is disabled user, described method also includes: freeze described user eventually Data in end.
Preferably, after the data in freezing described user terminal, described method also includes: gather described active user Identification information;Judge that described identification information is the most consistent with default identification information;In judged result it is In the case of Yi Zhi, the data in described user terminal of thawing.
According to another aspect of the present invention, additionally provide a kind of authentication means, including: acquisition module, it is used for obtaining Take active user's operating habit eigenvalue to the operation that user terminal is carried out;Comparison module, for by described operating habit Eigenvalue compares with the historical operation custom eigenvalue of user;Authentication module, at described operating habit eigenvalue And the deviation value between described historical operation custom eigenvalue is in the case of preset range is outer, verifies that described active user is Disabled user.
Preferably, described acquisition module includes: collector unit, for collecting the operating habit of described active user;Calculate Unit, for according to described operating habit, calculates described operating habit eigenvalue;Wherein, described operating habit include with At least one lower: application program that user uses, the unlocking screen gesture/password of user, the habitual gesture of user, The habitual continuous operation gesture of user.
Preferably, described device also includes: memory module, for the described operating habit feature that will obtain in the scheduled time Value is stored as described historical operation custom eigenvalue.
Preferably, described device also includes: receiver module, is used for receiving user's configuration, and wherein, described user configures use In the described preset range arranging described deviation value.
Preferably, described device also includes: freeze module, for freezing the data in described user terminal.
Preferably, described device also includes: acquisition module, for gathering the identification information of described active user;Sentence Disconnected module, is used for judging that described identification information is the most consistent with default identification information;Defrosting module, is used for Judged result be consistent in the case of, the data in described user terminal of thawing.
According to another aspect of the present invention, additionally provide a kind of user terminal, including: above-mentioned authentication means.
According to another aspect of the present invention, additionally provide a kind of authentication system, including: user terminal and service end, Wherein: described user terminal includes: acquisition module, for obtaining active user's operation to the operation that user terminal is carried out Custom and/or operating habit eigenvalue;And sending module, for by special to described operating habit and/or described operating habit Value indicative sends to service end;Described service end, including: comparison module, for according to described operating habit, calculate operation Custom eigenvalue, and/or, the historical operation of described operating habit eigenvalue with user is accustomed to eigenvalue and compares; And authentication module, exist for the deviation value being accustomed between eigenvalue at described operating habit eigenvalue and described historical operation In the case of preset range is outer, verify that described active user is disabled user.
Preferably, the described acquisition module of described user terminal includes: collector unit, for collecting described active user's Operating habit;Computing unit, for according to described operating habit, calculates described operating habit eigenvalue;Or described clothes The described comparison module of business end includes: computing unit, for according to described operating habit, calculates operating habit eigenvalue; Comparing unit, compares for the historical operation of described operating habit eigenvalue with user is accustomed to eigenvalue;Wherein, Described operating habit includes at least one of: application program that user uses, the unlocking screen gesture/password of user, The habitual gesture of user, the habitual continuous operation gesture of user.
Preferably, described service end also includes: memory module, special for the described operating habit that will obtain in the scheduled time Value indicative is stored as described historical operation custom eigenvalue.
Preferably, described user terminal also includes: receiver module, is used for receiving user's configuration, and wherein, described user joins Put the described preset range for arranging described deviation value;Wherein, the described sending module of described user terminal be additionally operable to by Described user configures transmission to described service end.
Preferably, described service end also includes: sending module, is used for sending a command to described user terminal;Described user Terminal also includes: freeze module, for according to described instruction, freezes the data in described user terminal.
Preferably, described user terminal also includes: acquisition module, for gathering the identification information of described active user; Judge module, is used for judging that described identification information is the most consistent with default identification information;Defrosting module, is used for In the case of judged result is consistent, the data in described user terminal of thawing.
By the present invention, use and obtain active user's operating habit eigenvalue to the operation that user terminal is carried out;Will operation Custom eigenvalue compares with the historical operation custom eigenvalue of user;It is accustomed to historical operation at operating habit eigenvalue Deviation value between eigenvalue is in the case of preset range is outer, and checking active user is the mode of disabled user, solves Use the problem that the safety of user cipher checking user identity is low, improve the safety of subscriber authentication.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, the present invention Schematic description and description be used for explaining the present invention, be not intended that inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of auth method according to embodiments of the present invention;
Fig. 2 is the structural representation of authentication means according to embodiments of the present invention;
Fig. 3 is the preferred structure schematic diagram one of authentication means according to embodiments of the present invention;
Fig. 4 is the preferred structure schematic diagram two of authentication means according to embodiments of the present invention;
Fig. 5 is the preferred structure schematic diagram three of authentication means according to embodiments of the present invention;
Fig. 6 is the preferred structure schematic diagram four of authentication means according to embodiments of the present invention;
Fig. 7 is the preferred structure schematic diagram five of authentication means according to embodiments of the present invention;
Fig. 8 is the structural representation of authentication system according to embodiments of the present invention;
Fig. 9 is the preferred structure schematic diagram one of authentication system according to embodiments of the present invention;
Figure 10 is the preferred structure schematic diagram two of authentication system according to embodiments of the present invention;
Figure 11 is the preferred structure schematic diagram three of authentication system according to embodiments of the present invention;
Figure 12 is the preferred structure schematic diagram four of authentication system according to embodiments of the present invention;
Figure 13 is the preferred structure schematic diagram five of authentication system according to embodiments of the present invention;
Figure 14 is the preferred structure schematic diagram six of authentication system according to embodiments of the present invention;
Figure 15 is operating habit storage organization schematic diagram one according to the preferred embodiment of the invention;
Figure 16 is operating habit storage organization schematic diagram two according to the preferred embodiment of the invention;
Figure 17 is operating habit storage organization schematic diagram three according to the preferred embodiment of the invention;
Figure 18 is operating habit storage organization schematic diagram four according to the preferred embodiment of the invention.
Detailed description of the invention
Below with reference to accompanying drawing and describe the present invention in detail in conjunction with the embodiments.It should be noted that in the feelings do not conflicted Under condition, the embodiment in the application and the feature in embodiment can be mutually combined.
Other features and advantages of the present invention will illustrate in the following description, and, partly become from description It is clear that or understand by implementing the present invention.The purpose of the present invention and other advantages can be by the explanations write Structure specifically noted in book, claims and accompanying drawing realizes and obtains.
In order to make those skilled in the art be more fully understood that the present invention program, attached below in conjunction with in the embodiment of the present invention Figure, is clearly and completely described the technical scheme in the embodiment of the present invention, it is clear that described embodiment is only It is the embodiment of a present invention part rather than whole embodiments.Based on the embodiment in the present invention, this area is common The every other embodiment that technical staff is obtained under not making creative work premise, all should belong to the present invention and protect The scope protected.
Embodiments providing a kind of auth method, Fig. 1 is auth method according to embodiments of the present invention Flow chart, as it is shown in figure 1, this flow process comprises the steps:
Step S102, obtains active user's operating habit eigenvalue to the operation that user terminal is carried out;
Step S104, is accustomed to eigenvalue by the historical operation of operating habit eigenvalue with user and compares;
Step S106, is accustomed to the deviation value between eigenvalue outside preset range at operating habit eigenvalue and historical operation In the case of, checking active user is disabled user.
By above-mentioned steps, use the mode comparing user habit eigenvalue with historical operation custom eigenvalue, such that it is able to During user uses user terminal, carry out authentication, solve the safety using user cipher checking user identity The problem that property is low, improves the safety of subscriber authentication.
Preferably, in above-mentioned steps S102, in order to obtain the operating habit eigenvalue of user operation, can first collect Active user uses the operating habit of user terminal, and according to these operating habits according to default algorithm, calculates operation Custom eigenvalue.
Preferably, above-mentioned operating habit can include but not limited at least one of: application program that user uses, Unlocking screen gesture/the password of user, the habitual gesture of user, the habitual continuous operation gesture of user.
Preferably, above-mentioned historical operation custom eigenvalue be according to user during the use of certain time collected Operating habit eigenvalue, these operating habit eigenvalues can be used to characterize the operating habit of specific user.Therefore, in step After rapid S102, it is also possible to the operating habit eigenvalue obtained in the scheduled time is stored as historical operation custom eigenvalue. Wherein, historical operation custom eigenvalue can store on the subscriber terminal, it is also possible to storage service end on a network In.Pass through which, it is provided that the acquisition methods of a kind of historical operation custom eigenvalue and storage mode.
Preferably, in order to make user terminal be applicable to different safe classes, in the above-mentioned methods, it is also possible to by with Family arranges the preset range of deviation value.Such as, subscriber equipment can receive user's configuration, and configure according to user and arrange The preset range of deviation value.
Preferably, in order to ensure the safety of user data, after checking active user is disabled user, i.e. can freeze Data in knot user terminal, thus avoid the leakage of data in user terminal.
Preferably, a kind of method that said method additionally provides data of thawing.Such as, before using user terminal, can First to register the identification information of user in user terminal, and the identification information of user can be stored in spy Fixed storage position, to ensure that identification information will not be lost due to reasons such as brush machines.Data quilt at user terminal After freezing, user can realize the defrosting of data by re-entering identification information.Such as: user terminal is adopted The identification information of collection active user, and judge that identification information is the most consistent with the default identification information of storage, And in the case of judged result is consistent, the data in defrosting user terminal.
Wherein, above-mentioned identification information includes but not limited to: the proof of identification information that gathered by near-field communication, logical Cross the biological information etc. that biological characteristic recognition module gathers.
Additionally provide a kind of authentication means in the present embodiment, be used for realizing above-described embodiment and preferred implementation, Carried out repeating no more of explanation, below the module related in this device had been illustrated.As used below, Term " module " can realize the software of predetermined function and/or the combination of hardware.Although the device described by following example is relatively Realize with software goodly, but hardware, or the realization of the combination of software and hardware also may and be contemplated.
Fig. 2 is the structural representation of authentication means according to embodiments of the present invention, as in figure 2 it is shown, this device includes: Acquisition module 22, comparison module 24 and authentication module 26, wherein, acquisition module 22, be used for obtaining active user to The operating habit eigenvalue of the operation that family terminal is carried out;Comparison module 24, coupled to acquisition module 22, for operating Custom eigenvalue compares with the historical operation custom eigenvalue of user;Authentication module 26, coupled to comparison module 24, For the deviation value between operating habit eigenvalue and historical operation custom eigenvalue in the case of preset range is outer, test Card active user is disabled user.
Fig. 3 is the preferred structure schematic diagram one of authentication means according to embodiments of the present invention, as it is shown on figure 3, preferably Ground, acquisition module 22 includes: collector unit 222, for collecting the operating habit of active user;Computing unit 224, It coupled to collector unit 222, for according to operating habit, calculate operating habit eigenvalue.
Preferably, operating habit includes at least one of: application program that user uses, the unlocking screen gesture of user / password, the habitual gesture of user, the habitual continuous operation gesture of user.
Fig. 4 is the preferred structure schematic diagram two of authentication means according to embodiments of the present invention, as shown in Figure 4, preferably Ground, device also includes: memory module 42, coupled to acquisition module 22 and comparison module 24, for by the scheduled time The operating habit eigenvalue obtained is stored as historical operation custom eigenvalue.
Fig. 5 is the preferred structure schematic diagram three of authentication means according to embodiments of the present invention, as it is shown in figure 5, preferably Ground, device also includes: receiver module 52, coupled to comparison module 24, is used for receiving user's configuration, wherein, user It is configured to arrange the preset range of deviation value.
Fig. 6 is the preferred structure schematic diagram four of authentication means according to embodiments of the present invention, as shown in Figure 6, preferably Ground, device also includes: freeze module 62, coupled to authentication module 26, for freezing the data in user terminal.
Fig. 7 is the preferred structure schematic diagram five of authentication means according to embodiments of the present invention, as it is shown in fig. 7, preferably Ground, device also includes: acquisition module 72, for gathering the identification information of active user;Judge module 74, coupling It is bonded to acquisition module 72, is used for judging that identification information is the most consistent with default identification information;Defrosting module 76, It coupled to judge module 74, be used in the case of judged result is consistent, the data in defrosting user terminal.
The present embodiment additionally provides a kind of user terminal, including: above-mentioned authentication means.
Preferably, above-mentioned user terminal is the handheld device with touch control operation screen.
The present embodiment additionally provides a kind of authentication system, is used for realizing above-described embodiment and preferred implementation, Carried out repeating no more of explanation, below the module related in this device was illustrated.
Fig. 8 is the structural representation of authentication system according to embodiments of the present invention, and as shown in Figure 8, this system includes: User terminal 82 and service end 84, wherein:
User terminal 82 includes: acquisition module 822, for obtaining active user to the operation that user terminal 82 is carried out Operating habit and/or operating habit eigenvalue;And sending module 824, it coupled to acquisition module 822 and comparison module 842, for operating habit and/or operating habit eigenvalue are sent to service end 84;
Service end 84, including comparison module 842, for according to operating habit, calculates operating habit eigenvalue, and/ Or, the historical operation of operating habit eigenvalue with user is accustomed to eigenvalue and compares;And authentication module 844, coupling It is bonded to comparison module 842, is presetting for the deviation value being accustomed between eigenvalue at operating habit eigenvalue and historical operation In the case of extraneous, checking active user is disabled user.
Visible, by the way, operating habit eigenvalue can be calculated in user terminal 82, it is also possible in service End 84 calculates operating habit eigenvalue.The comparison of operating habit eigenvalue and historical operation custom eigenvalue can be User terminal 82 is carried out to carry out in service end 84, it is preferable that use in service end in the present system The mode compared in 84.
Fig. 9 is the preferred structure schematic diagram one of authentication system according to embodiments of the present invention, as it is shown in figure 9, preferably Ground, the acquisition module 822 of user terminal 82 includes: collector unit 8222, for collecting the operating habit of active user; Computing unit 8224, coupled to collector unit 8222, for according to operating habit, calculates operating habit eigenvalue;Clothes The comparison module 842 of business end 84 includes: comparing unit 8424, for the history behaviour by operating habit eigenvalue with user Make custom eigenvalue to compare.
Figure 10 is the preferred structure schematic diagram two of authentication system according to embodiments of the present invention, as shown in Figure 10, excellent Selection of land, the acquisition module 822 of user terminal 82 includes: collector unit 8222, practises for collecting the operation of active user Used;The comparison module 842 of service end 84 includes: computing unit 8422, for according to operating habit, calculates operation and practises Used eigenvalue;Comparing unit 8424, coupled to computing unit 8422, for going through operating habit eigenvalue and user History operating habit eigenvalue compares.
Preferably, operating habit includes at least one of: application program that user uses, the unlocking screen gesture of user / password, the habitual gesture of user, the habitual continuous operation gesture of user.
Figure 11 is the preferred structure schematic diagram three of authentication system according to embodiments of the present invention, as shown in figure 11, excellent Selection of land, service end 84 also includes: memory module 112, coupled to what comparison module 842 obtained within by the scheduled time Operating habit eigenvalue is stored as historical operation custom eigenvalue.
Figure 12 is the preferred structure schematic diagram four of authentication system according to embodiments of the present invention, as shown in figure 12, excellent Selection of land, user terminal 82 also includes: receiver module 122, coupled to comparison module 842 by sending module 824, uses In receiving user's configuration, wherein, user is configured to arrange the preset range of deviation value;Wherein, user terminal 82 Sending module 824 is additionally operable to user configure transmission to service end 84.
Figure 13 is the preferred structure schematic diagram five of authentication system according to embodiments of the present invention, as shown in figure 13, excellent Selection of land, service end 84 also includes: sending module 132, coupled to authentication module 844 and freezes module 134, for sending out Send instruction to user terminal 82;User terminal 82 also includes: freeze module 134, for according to instruction, freezes user Data in terminal 82.For example, it is possible to authenticating to active user in the case of disabled user, service end 84 is actively Send a command to user terminal 82 to freeze the data of user terminal 82;Or, receive user's in service end 84 Instruction, thus the instruction of freezing data is sent to user terminal 82.Can be easily to user terminal 82 by which Carry out data-frozen;And then ensure the safety of user data.
Figure 14 is the preferred structure schematic diagram six of authentication system according to embodiments of the present invention, as shown in figure 14, excellent Selection of land, user terminal 82 also includes: acquisition module 142, for gathering the identification information of active user;Judge mould Block 144, coupled to acquisition module 142, is used for judging that identification information is the most consistent with default identification information; Defrosting module 146, coupled to judge module 144, is used in the case of judged result is consistent, defrosting user terminal Data in 82.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to be Unit is individually physically present, it is also possible to two or more unit are integrated in a unit.Above-mentioned integrated list Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
In order to the description making the embodiment of the present invention is clearer, it is described below in conjunction with preferred embodiment and illustrates.
The preferred embodiment of the present invention provides a kind of based on cloud computing functional realiey smart mobile phone (being equivalent to above-mentioned user terminal) Theft preventing method, in order to the application antitheft for smart mobile phone, it is achieved the stolen rear data of smart mobile phone are the most frozen.
Its step includes:
Step A, identification authentication, after buying mobile phone, preset identity information is to mobile phone.Preferably, if mobile phone change uses Person needs to scan original identity information, then the user identity that typing is new.
Step B, collects antitheft data (being equivalent to above-mentioned historical operation custom eigenvalue), and each user uses mobile phone Having different operating habits, mobile phone can gather user operation habits, including the APP of user use every day, unlocking screen Gesture, other habitual gestures.
Step C, data analysis, calculate the eigenvalue of user every day (on being equivalent to according to the data collecting operating habit State operating habit eigenvalue), then user characteristics value is preserved this locality.Preferably, the user characteristics value brush machine of preservation is not Can lose.Or, operating habit data upload to cloud platform, and cloud platform (being equivalent to above-mentioned service end) calculates user behaviour Make custom eigenvalue.
Step D, starts anti-theft modes, collects nearest a period of time (such as, 5 days or 10 days) user operation habits Data, enable anti-theft modes.
Step E, subscription authentication, every day the eigenvalue of user operation habits is authenticated: enter with nearest historical data Row compares, and when eigenvalue and the history feature value deviation of user operation are bigger, mobile phone enters missing mode, missing mode All data will be freezed, and prompting will re-authenticate identity, and need to scan identity card and complete data defrosting.Or, using In the case of mobile phone is authenticated by cloud platform, when cloud platform detects subscription authentication failure, notice mobile phone enters to be lost Pattern.
Step F, mobile phone preset identity card identification module, when the data of mobile phone are frozen, permissible by scanning identity card Release frozen state.
Seen from the above description, the technology that the preferred embodiment of the present invention proposes realizes, and needs preset identification authentication in mobile phone Module, realizes antitheft mobile phone step by identification authentication module and includes:
Step one, subscriber identity information typing
When user uses mobile phone for the first time, read identity information write identification authentication module by scanning identity card, if user Change user needs to scan original identity information, then the user identity information that typing is new, completes validated user and recorded Identification authentication module.
Step 2, antitheft data collection
Identification authentication module collects antitheft data every day, arranges the antitheft data cycle according to user's request, such as: the cycle sets Putting 10 days, the antitheft data on such same day compare with regard to the antitheft data with nearest 10 days.Every day all can update antitheft data, It is saved in identification authentication module.
Step 3, antitheft data are constituted
Each user uses mobile phone to have different operating habits, and antitheft data are just made up of these different operating habits, User operation habits includes:
1) commonly used APP, such as: Netease's news, Taobao's client, China Merchants Bank's client etc. is applied, and beats Open these application and will produce operation data.
2) unlocking screen gesture, the password of each user setup is different, and the gesture of generation is the most different, and these passwords unlock Gesture also produces operation data.It should be noted that screen lock is also a kind of APP.
3) habitual gesture, each APP is usually fixing in screen position, and commonly used will generation certain position is practised Used gesture, all can produce differentiation operation data including dynamics during operation.
4) secondary custom gesture, the operating habit of user is much continuous print, such as: use the user of microblogging, typically Operation is that first gesture clicks on microblogging, and the gesture of second refreshes microblogging;The when of playing game, first gesture is to open Game, second gesture is to select Game Menu, and even the three, the 4th gestures are also fixing, and such continuous print is grasped Make a sign with the hand and just create secondary custom gesture.
Additionally, user habit is not limited only to above-mentioned several aspect, it is also possible to be function key, make a phone call, send short messages.Always Different user operation habits different, all can produce differentiation data.
Step 4, antitheft data analysis
After antitheft data are saved in identification authentication module, these data will not be lost, and brush machine situation also will not be lost, then The eigenvalue of user's operating habit every day is calculated by eigenvalue algorithm.
Or, antitheft data are uploaded to cloud platform every day, cloud platform calculates user operation habits according to eigenvalue algorithm Eigenvalue.
If it is considered that user security, after the complete eigenvalue of local computing, then user characteristics value can be done once encrypt, so After upload to cloud platform, cloud platform authenticates the most again.
Each action of user includes application identities, gesture, position, time, as shown in figure 15.Wherein, Mei Geying With there being unique mark;Gesture includes swiping up and down, function key, click on, double-click, the action such as swipe for a long time;Position Putting is exactly the track of gesture.
Each application just produces a series of movements, as shown in figure 16 when continuous operation.
Every day, user can use multiple application, and operating system is multitask execution, the action that such every day produces such as figure Shown in 17.
The gesture of user is substantially stationary, and conventional having swipes up and down, function key, click on, double-click, swipe for a long time. These gestures are all repeating every day.So, user characteristics value is calculated as shown in figure 18.
Step 5, anti-theft modes start
When, after antitheft data collection 5 days or 10 days, user can enable anti-theft modes.
Step 6, subscription authentication
The eigenvalue of user operation habits is authenticated by every day, and authentication mode is the performance characteristic value and of the user on the same day Near history feature value compares, and when the eigenvalue of user operation and history feature value deviation are bigger, mobile phone enters to be lost Disabling mode, will freeze all data when mobile phone is in missing mode, and prompting re-authenticates identity, need to scan identity card Complete data to thaw.
Or, when cloud platform detects subscription authentication failure, notice mobile phone enters missing mode.
Step 7, Authentication is set
Authentication can also be adjusted according to the deviation size of user's current characteristic value and history feature value.Authentication is the highest Safety is the highest, if the critically important grade of can heightening of the data in mobile phone, the most more convenient user is according to the data of oneself Importance adaptation Authentication.
In sum, by the above embodiment of the present invention and preferred embodiment, can be according to the difference of user operation habits Carry out identification authentication, can also dynamically adjust authentication according to the deviation size of user's current characteristic value and history feature value simultaneously Grade.User can also log in cloud platform at any time and immediately freeze mobile phone, thaws and needs identification authentication, so, picks up mobile phone People cannot do any operation, thus very effective protect user profile.
In another embodiment, additionally providing a kind of software, this software is used for performing above-described embodiment and being preferable to carry out Technical scheme described in mode.
In another embodiment, additionally providing a kind of storage medium, in this storage medium, storage has above-mentioned software, should Storage medium includes but not limited to: CD, floppy disk, hard disk, scratch pad memory etc..
It should be noted that term " first " in description and claims of this specification and above-mentioned accompanying drawing, " second " Etc. being for distinguishing similar object, without being used for describing specific order or precedence.Should be appreciated that so use Object can exchange in the appropriate case, in order to embodiments of the invention described herein can be with except here illustrating Or the order enforcement beyond those described.Additionally, term " includes " and " having " and their any deformation, it is intended that Be to cover non-exclusive comprising, such as, contain series of steps or the process of unit, method, system, product or Equipment is not necessarily limited to those steps or the unit clearly listed, but can include the most clearly listing or for these Other step that process, method, product or equipment are intrinsic or unit.
Obviously, those skilled in the art should be understood that each module of the above-mentioned present invention or each step can be with general Calculating device to realize, they can concentrate on single calculating device, or be distributed in multiple calculating device and formed Network on, alternatively, they can realize, it is thus possible to by them with calculating the executable program code of device Storage is performed by calculating device in the storage device, and in some cases, can hold with the order being different from herein Step shown or described by row, or they are fabricated to respectively each integrated circuit modules, or by many in them Individual module or step are fabricated to single integrated circuit module and realize.So, the present invention is not restricted to any specific hardware Combine with software.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the technology of this area For personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, that is made is any Amendment, equivalent, improvement etc., should be included within the scope of the present invention.

Claims (19)

1. an auth method, it is characterised in that including:
Obtain active user's operating habit eigenvalue to the operation that user terminal is carried out;
The historical operation of described operating habit eigenvalue with user is accustomed to eigenvalue compare;
It is accustomed to the deviation value between eigenvalue in preset range at described operating habit eigenvalue and described historical operation In the case of Wai, verify that described active user is disabled user.
Method the most according to claim 1, it is characterised in that obtain described active user and described user terminal is carried out The described operating habit eigenvalue of operation include:
Collect the operating habit of described active user;
According to described operating habit, calculate described operating habit eigenvalue;
Wherein, described operating habit includes at least one of:
The application program of user's use, the unlocking screen gesture/password of user, the habitual gesture of user, user Habitual continuous operation gesture.
Method the most according to claim 1, it is characterised in that described user terminal is entered obtaining described active user After the described operating habit eigenvalue of the operation of row, described method also includes:
The described operating habit eigenvalue obtained in the scheduled time is stored as described historical operation custom eigenvalue.
Method the most according to claim 1, it is characterised in that described method also includes:
Receiving user's configuration, wherein, described user is configured to arrange the described preset range of described deviation value.
Method the most according to any one of claim 1 to 4, it is characterised in that verifying that described active user is non- After method user, described method also includes:
Freeze the data in described user terminal.
Method the most according to claim 5, it is characterised in that after the data in freezing described user terminal, institute Method of stating also includes:
Gather the identification information of described active user;
Judge that described identification information is the most consistent with default identification information;
In the case of judged result is consistent, the data in described user terminal of thawing.
7. an authentication means, it is characterised in that including:
Acquisition module, for obtaining active user's operating habit eigenvalue to the operation that user terminal is carried out;
Comparison module, compares for the historical operation of described operating habit eigenvalue with user is accustomed to eigenvalue;
Authentication module, for being accustomed to the deviation between eigenvalue at described operating habit eigenvalue and described historical operation It is worth in the case of preset range is outer, verifies that described active user is disabled user.
Device the most according to claim 7, it is characterised in that described acquisition module includes:
Collector unit, for collecting the operating habit of described active user;
Computing unit, for according to described operating habit, calculates described operating habit eigenvalue;
Wherein, described operating habit includes at least one of:
The application program of user's use, the unlocking screen gesture/password of user, the habitual gesture of user, user Habitual continuous operation gesture.
Device the most according to claim 7, it is characterised in that described device also includes:
Memory module, for being stored as described historical operation by the described operating habit eigenvalue obtained in the scheduled time Custom eigenvalue.
Device the most according to claim 7, it is characterised in that described device also includes:
Receiver module, is used for receiving user's configuration, and wherein, described user is configured to arrange the institute of described deviation value State preset range.
11. according to the device according to any one of claim 7 to 10, it is characterised in that described device also includes:
Freeze module, for freezing the data in described user terminal.
12. devices according to claim 11, it is characterised in that described device also includes:
Acquisition module, for gathering the identification information of described active user;
Judge module, is used for judging that described identification information is the most consistent with default identification information;
Defrosting module, is used in the case of judged result is consistent, the data in described user terminal of thawing.
13. 1 kinds of user terminals, it is characterised in that including: the authentication dress as according to any one of claim 7 to 12 Put.
14. 1 kinds of authentication systems, it is characterised in that including: user terminal and service end, wherein:
Described user terminal includes: acquisition module, for obtaining the active user behaviour to the operation that user terminal is carried out Make to be accustomed to and/or operating habit eigenvalue;And sending module, for by described operating habit and/or described operation Custom eigenvalue sends to service end;
Described service end, including: comparison module, for according to described operating habit, calculate operating habit eigenvalue, And/or, the historical operation of described operating habit eigenvalue with user is accustomed to eigenvalue and compares;And checking Module, is presetting for the deviation value being accustomed between eigenvalue at described operating habit eigenvalue and described historical operation In the case of extraneous, verify that described active user is disabled user.
15. systems according to claim 14, it is characterised in that
The described acquisition module of described user terminal includes: collector unit, for collecting the operation of described active user Custom;Computing unit, for according to described operating habit, calculates described operating habit eigenvalue;Or
The described comparison module of described service end includes: computing unit, for according to described operating habit, calculates behaviour Make custom eigenvalue;Comparing unit, for the historical operation custom feature by described operating habit eigenvalue with user Value compares;
Wherein, described operating habit includes at least one of:
The application program of user's use, the unlocking screen gesture/password of user, the habitual gesture of user, user Habitual continuous operation gesture.
16. systems according to claim 14, it is characterised in that described service end also includes:
Memory module, for being stored as described historical operation by the described operating habit eigenvalue obtained in the scheduled time Custom eigenvalue.
17. systems according to claim 14, it is characterised in that described user terminal also includes:
Receiver module, is used for receiving user's configuration, and wherein, described user is configured to arrange the institute of described deviation value State preset range;
Wherein, the described sending module of described user terminal is additionally operable to described user configure transmission to described service end.
18. according to the system according to any one of claim 14 to 17, it is characterised in that
Described service end also includes: sending module, is used for sending a command to described user terminal;
Described user terminal also includes: freeze module, for according to described instruction, freezes in described user terminal Data.
19. systems according to claim 18, it is characterised in that described user terminal also includes:
Acquisition module, for gathering the identification information of described active user;
Judge module, is used for judging that described identification information is the most consistent with default identification information;
Defrosting module, is used in the case of judged result is consistent, the data in described user terminal of thawing.
CN201510257214.1A 2015-05-19 2015-05-19 Auth method, device, system and user terminal Withdrawn CN106301778A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510257214.1A CN106301778A (en) 2015-05-19 2015-05-19 Auth method, device, system and user terminal
PCT/CN2015/085465 WO2016183937A1 (en) 2015-05-19 2015-07-29 Identity authentication method, device and system, and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510257214.1A CN106301778A (en) 2015-05-19 2015-05-19 Auth method, device, system and user terminal

Publications (1)

Publication Number Publication Date
CN106301778A true CN106301778A (en) 2017-01-04

Family

ID=57319325

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510257214.1A Withdrawn CN106301778A (en) 2015-05-19 2015-05-19 Auth method, device, system and user terminal

Country Status (2)

Country Link
CN (1) CN106301778A (en)
WO (1) WO2016183937A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107463812A (en) * 2017-07-05 2017-12-12 北京奇安信科技有限公司 A kind of electronic equipment safety defense method and device
CN108234454A (en) * 2017-12-13 2018-06-29 中国银联股份有限公司 A kind of identity identifying method, server and client device
CN108363915A (en) * 2018-02-08 2018-08-03 广东欧珀移动通信有限公司 unlocking method, mobile terminal and computer readable storage medium
CN109618342A (en) * 2018-12-27 2019-04-12 上海碳蓝网络科技有限公司 It is a kind of for determining the method and apparatus of the operation permission information of user
CN110210201A (en) * 2019-05-31 2019-09-06 联想(北京)有限公司 User identification method, customer identification device and electronic equipment
CN110381144A (en) * 2019-07-22 2019-10-25 中国联合网络通信集团有限公司 Charging authentication method and mobile terminal based on legitimate user's charging habit
CN111125745A (en) * 2019-10-10 2020-05-08 深圳龙之牌汽车有限公司 Block chain-based data management system for Internet
CN111132139A (en) * 2019-12-13 2020-05-08 西安易朴通讯技术有限公司 Anti-theft control method and intelligent wearable device
CN111147653A (en) * 2018-10-16 2020-05-12 奇酷互联网络科技(深圳)有限公司 Mobile terminal, information security protection method thereof and storage medium
CN111245799A (en) * 2020-01-02 2020-06-05 腾讯科技(深圳)有限公司 Information monitoring method and device and readable storage medium
CN111723349A (en) * 2019-03-18 2020-09-29 顺丰科技有限公司 User identification method, device, equipment and storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110930161A (en) * 2019-12-04 2020-03-27 中国银行股份有限公司 Method for determining operation time of business operation and self-service business operation equipment
CN113568434B (en) * 2021-08-26 2024-03-12 中国人民解放军空军军医大学 Unmanned aerial vehicle flight control system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103955637A (en) * 2014-04-09 2014-07-30 可牛网络技术(北京)有限公司 Identification method and device for user identity of mobile terminal
CN104021358A (en) * 2014-05-30 2014-09-03 可牛网络技术(北京)有限公司 Anti-theft control method and device for mobile terminal
CN104318138A (en) * 2014-09-30 2015-01-28 杭州同盾科技有限公司 Method and device for verifying identity of user
CN104361303A (en) * 2014-10-22 2015-02-18 小米科技有限责任公司 Terminal exception processing method and device and electronic equipment
CN104580091A (en) * 2013-10-21 2015-04-29 深圳市腾讯计算机系统有限公司 Identity verification method, device and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580091A (en) * 2013-10-21 2015-04-29 深圳市腾讯计算机系统有限公司 Identity verification method, device and system
CN103955637A (en) * 2014-04-09 2014-07-30 可牛网络技术(北京)有限公司 Identification method and device for user identity of mobile terminal
CN104021358A (en) * 2014-05-30 2014-09-03 可牛网络技术(北京)有限公司 Anti-theft control method and device for mobile terminal
CN104318138A (en) * 2014-09-30 2015-01-28 杭州同盾科技有限公司 Method and device for verifying identity of user
CN104361303A (en) * 2014-10-22 2015-02-18 小米科技有限责任公司 Terminal exception processing method and device and electronic equipment

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107463812A (en) * 2017-07-05 2017-12-12 北京奇安信科技有限公司 A kind of electronic equipment safety defense method and device
CN108234454A (en) * 2017-12-13 2018-06-29 中国银联股份有限公司 A kind of identity identifying method, server and client device
WO2019114246A1 (en) * 2017-12-13 2019-06-20 中国银联股份有限公司 Identity authentication method, server and client device
CN108234454B (en) * 2017-12-13 2020-12-18 中国银联股份有限公司 Identity authentication method, server and client device
TWI701932B (en) * 2017-12-13 2020-08-11 大陸商中國銀聯股份有限公司 Identity authentication method, server and client equipment
CN108363915A (en) * 2018-02-08 2018-08-03 广东欧珀移动通信有限公司 unlocking method, mobile terminal and computer readable storage medium
CN111147653A (en) * 2018-10-16 2020-05-12 奇酷互联网络科技(深圳)有限公司 Mobile terminal, information security protection method thereof and storage medium
CN109618342A (en) * 2018-12-27 2019-04-12 上海碳蓝网络科技有限公司 It is a kind of for determining the method and apparatus of the operation permission information of user
CN111723349A (en) * 2019-03-18 2020-09-29 顺丰科技有限公司 User identification method, device, equipment and storage medium
CN110210201A (en) * 2019-05-31 2019-09-06 联想(北京)有限公司 User identification method, customer identification device and electronic equipment
CN110381144A (en) * 2019-07-22 2019-10-25 中国联合网络通信集团有限公司 Charging authentication method and mobile terminal based on legitimate user's charging habit
CN111125745A (en) * 2019-10-10 2020-05-08 深圳龙之牌汽车有限公司 Block chain-based data management system for Internet
CN111132139A (en) * 2019-12-13 2020-05-08 西安易朴通讯技术有限公司 Anti-theft control method and intelligent wearable device
CN111245799A (en) * 2020-01-02 2020-06-05 腾讯科技(深圳)有限公司 Information monitoring method and device and readable storage medium
CN111245799B (en) * 2020-01-02 2022-01-11 腾讯科技(深圳)有限公司 Information monitoring method and device and readable storage medium

Also Published As

Publication number Publication date
WO2016183937A1 (en) 2016-11-24

Similar Documents

Publication Publication Date Title
CN106301778A (en) Auth method, device, system and user terminal
US10009327B2 (en) Technologies for secure storage and use of biometric authentication information
CN104700268B (en) A kind of method of mobile payment and mobile device
CN104303481B (en) Method and apparatus for the certification of long-range portable wireless apparatus
CN206522020U (en) A kind of intelligent door lock and system
CN205883297U (en) Number of account login system based on people's face and fingerprint identification
WO2005101977A2 (en) Multi-factor security system with portable devices and security kernels
CN109615738A (en) Door lock management method, device, electronic equipment and storage medium
CN103106736A (en) Identity authentication method, terminal and server
CN107222373A (en) Control method, system, terminal, FIDO servers and the safety means of smart home
US20180227754A1 (en) Wearable data device with deactivation security feature
CN108322310A (en) It is a kind of to utilize safety equipment Card Reader login method and Security Login System
CN105868610A (en) Method and system for realizing user authentication through biological characteristic information
CN108200037A (en) A kind of method and system that safety operation is performed using safety equipment
CN108322507A (en) A kind of method and system executing safety operation using safety equipment
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN109409044A (en) A kind of verifying interface display method and terminal
CN108337235A (en) A kind of method and system executing safety operation using safety equipment
CN109955934A (en) Electric vehicle identity authorization system and method
CN106097486B (en) A kind of verification method of gate inhibition's password based on sonic transmissions and verification system
Hossain et al. Implementing Biometric or Graphical Password Authentication in a Universal Three-Factor Authentication System
CN106304052A (en) A kind of method of secure communication, device, terminal and client identification module card
JP2005215870A (en) Single sign-on method and system using rfid
CN108322440A (en) It is a kind of to utilize safety equipment Card Reader login method and Security Login System
CN106815907A (en) A kind of method and intelligent access control system based on picture password management intelligent entrance guard

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20170104

WW01 Invention patent application withdrawn after publication