CN106845180B - Verify method, application and the calculating equipment of identity - Google Patents
Verify method, application and the calculating equipment of identity Download PDFInfo
- Publication number
- CN106845180B CN106845180B CN201710014983.8A CN201710014983A CN106845180B CN 106845180 B CN106845180 B CN 106845180B CN 201710014983 A CN201710014983 A CN 201710014983A CN 106845180 B CN106845180 B CN 106845180B
- Authority
- CN
- China
- Prior art keywords
- symbol
- display position
- randomly assigned
- user interface
- logo collection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention discloses the method for verifying identity, application and calculate equipment.Wherein, the method for verifying identity is suitable for executing in calculating equipment.The calculating device configuration has the keying sequence comprising at least one symbol, and this method includes the following steps.It is randomly assigned logo collection marking elements display position in the user interface.Wherein the logo collection includes symbol in keying sequence.After being randomly assigned display position every time, one is chosen according to the sequence of symbol in keying sequence, receive and judges whether this user input is consistent with predetermined operation corresponding to the display position of this chosen symbol.When determining consistent with corresponding predetermined operation, judge whether this targeted symbol is last position in keying sequence.Determine it is non-last when, continue to execute be randomly assigned logo collection marking elements in the user interface display position the step of.
Description
Technical field
The present invention relates to calculate apparatus field, more particularly to method, application and the calculating equipment of verifying identity.
Background technique
With the rapid development of electronic equipment and Internet technology, smart phone, tablet computer etc. have touch screen
Calculating equipment have become people life in essential equipment.Calculate equipment unlock, payment etc. links require into
Row authentication.
Currently, authentication operation can be realized by modes such as gestures, password or a combination of both.It is set for example, calculating
It is standby to can be configured as sliding unlock (slide to unlock) mode.It can be by number and letter in another example calculating equipment
Combination be unlocked.In another example calculating equipment can be unlocked by judge in gesture input interface that user inputs.
However, there are some problems for existing authentication mode.If for example, password unlock or gesture unlocking manner
It is set too simply, the unlock operating process of user is easy to be noticeable, and there are certain information security hidden danger.If unlocking pin or
If person's gesture unlocking manner is set too complicated, user's operation is cumbersome and easy error.
For this purpose, the invention proposes a kind of new identity validation technology schemes.
Summary of the invention
The present invention provides a kind of technical solution of new authentication, with try hard to solve the problems, such as among the above at least one.
According to an aspect of the invention, there is provided a kind of method for verifying identity, suitable for being executed in calculating equipment.It should
Calculating device configuration has the keying sequence comprising at least one symbol, and this method includes the following steps.It is randomly assigned logo collection
Marking elements display position in the user interface.Wherein the logo collection includes symbol in keying sequence.At random point every time
Behind display position, choose one according to the sequence of symbol in keying sequence, receive and judge this user input whether with this
Predetermined operation corresponding to the display position of secondary chosen symbol is consistent.When determining consistent with corresponding predetermined operation, sentence
Whether this targeted symbol that breaks is last position in keying sequence.Determine it is non-last when, continue to execute and be randomly assigned
Logo collection marking elements in the user interface display position the step of, until determining that last in keying sequence is corresponding
It is consistent that user inputs predetermined operation corresponding with the symbol display position.
Optionally, in the method for verifying identity according to the present invention, identification element is given configured with to be allocated in user interface
The predetermined position of element.Be randomly assigned logo collection marking elements in the user interface display position the step of include: random point
It is shown with logo collection marking elements with the mapping relations one by one in predetermined position in user interface and in each position corresponding
Marker element.Each marker element is any in following in logo collection: number, letter, picture and colouring information.
Optionally, in the method for verifying identity according to the present invention, predetermined position is distributed in a ring in user interface, should
User interface is also configured with the target object in annular spread region.For example, target object is shown as safety box icon.
Optionally, corresponding with the display position of chosen symbol pre- in the method for verifying identity according to the present invention
Determining gesture is to drag the gesture of the symbol to the target object position.
Optionally, corresponding with the display position of chosen symbol pre- in the method for verifying identity according to the present invention
Determine the gesture that gesture is display position of the dragging target object to the symbol.
Optionally, in the method for verifying identity according to the present invention, calculating equipment is mobile terminal, with chosen symbol
The corresponding predetermined operation in display position be to accelerate to move this and move end along the direction from the target object to display position
The operation at end.
Optionally, in the method for verifying identity according to the present invention, the last symbol pair in determining keying sequence
When the user's input prearranged gesture corresponding with the position that the symbol is distributed answered is consistent, this method further includes executing correspondence to pass through
The operation of authentication.
Optionally, in the method for verifying identity according to the present invention, identification element in logo collection is randomly assigned in execution
Before the step of plain display position in the user interface, calculates equipment and be in interface lock state.It corresponds to through authentication
Operation includes releasing the interface lock state.
Another aspect according to the present invention provides a kind of application for verifying identity, suitable for executing in calculating equipment.The meter
It calculates equipment and is configured with the keying sequence comprising at least one symbol.The application includes allocation unit and authentication unit.Distribution is single
Member is suitable for being randomly assigned logo collection marking elements display position in the user interface.Wherein, which includes password
Symbol in sequence.Authentication unit is suitable for after allocation unit is randomly assigned display position every time, according to symbol in keying sequence
Sequence chooses one, receives and judges whether this user input is predetermined corresponding to the display position with this chosen symbol
Operation is consistent.When determining consistent with corresponding predetermined operation, authentication unit judges whether this targeted symbol is password
Last position in sequence.Determine it is non-last when, authentication unit instruction allocation unit continues to execute and is randomly assigned identification sets
Close marking elements in the user interface display position the step of, until determining that the corresponding user of last in keying sequence is defeated
It is consistent to enter predetermined operation corresponding with the symbol display position.
According to an aspect of the present invention, a kind of calculating equipment is provided, including at least one processor and including calculating
At least one processor of machine program instruction.At least one processor and computer program instructions be configured as at least one
Reason device makes to calculate the method that equipment executes verifying identity according to the present invention together.
The technical solution of verifying identity according to the present invention can carry out user for each in keying sequence in user
Before input, it is randomly assigned the display position of logo collection.It illustrates, the element of logo collection can be in the present invention
The various modes such as number, letter, color and picture.User's input can be greatly improved in technical solution of the present invention on this basis
Safety when gesture (gesture is consistent when authentication each different from traditional user).In addition, by being randomly assigned to show
Show position and determines the gestures direction that user needs to input according to the distribution situation of display position and target object, it is of the invention
Technical solution can increase the interest and randomness of user's input, to improve user experience.
Detailed description of the invention
To the accomplishment of the foregoing and related purposes, certain illustrative sides are described herein in conjunction with following description and drawings
Face, these aspects indicate the various modes that can practice principles disclosed herein, and all aspects and its equivalent aspect
It is intended to fall in the range of theme claimed.Read following detailed description in conjunction with the accompanying drawings, the disclosure it is above-mentioned
And other purposes, feature and advantage will be apparent.Throughout the disclosure, identical appended drawing reference generally refers to identical
Component or element.
Fig. 1 is the structural block diagram of calculating equipment 100 according to some embodiments of the invention;
Fig. 2 shows the flow charts of the method 200 of verifying identity according to some embodiments of the invention;
Fig. 3 shows the interface schematic diagram after executing a step S210 according to an embodiment of the present invention;
Fig. 4 shows the schematic diagram of the method 400 of verifying identity according to some embodiments of the invention;And
Fig. 5 shows the schematic diagram of the application 500 of verifying identity according to some embodiments of the invention.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
Fig. 1 is the structural block diagram of calculating equipment 100 according to some embodiments of the invention.Here, calculating equipment can be by
It is embodied as the various Intelligent hardwares such as the control centre of mobile phone, tablet computer or intelligent express delivery cabinet.Typically, equipment 100 is calculated
It may include memory interface 102, one or more data processor, image processor and/or central processing unit 104, with
And peripheral interface 106.
Memory interface 102, one or more processors 104 and/or peripheral interface 106 either discrete component,
It can integrate in one or more integrated circuits.In calculating equipment 100, various elements can pass through one or more communication
Bus or signal wire couple.Sensor, equipment and subsystem may be coupled to peripheral interface 106, a variety of to help to realize
Function.For example, motion sensor 110, light sensor 112 and range sensor 114 may be coupled to peripheral interface 106, with
Facilitate the functions such as orientation, illumination and ranging.Other sensors 116 can equally be connected with peripheral interface 106, such as positioning system
(such as GPS receiver), temperature sensor, biometric sensor or other sensor devices, it is possible thereby to help to implement correlation
Function.
Camera sub-system 120 and optical sensor 122 can be used for the camera of convenient such as record photos and video clips
The realization of function, wherein the camera sub-system and optical sensor for example can be charge-coupled device (CCD) or complementary gold
Belong to oxide semiconductor (CMOS) optical sensor.It can help to realize by one or more radio communication subsystems 124
Communication function, wherein radio communication subsystem may include radio-frequency transmitter and transmitter and/or light (such as infrared) receiver
And transmitter.The particular design and embodiment of radio communication subsystem 124 can depend on calculating equipment 100 is supported one
A or multiple communication networks.For example, calculate equipment 100 may include be designed to support 3G, 4G, GSM network, GPRS network,
EDGE network, Wi-Fi or WiMax network and BlueboothTMThe communication subsystem 124 of network.Audio subsystem 126 can be with
It is coupled with loudspeaker 128 and microphone 130, to help to implement to enable the function of voice, such as speech recognition, voice are multiple
System, digital record and telephony feature.
I/O subsystem 140 may include touch screen controller 142 and/or other one or more input controllers 144.
Touch screen controller 142 may be coupled to touch screen 146.For example, the touch screen 146 and touch screen controller 142 can be with
The contact carried out therewith and movement or pause are detected using any one of a variety of touch-sensing technologies, wherein sensing skill
Art includes but is not limited to capacitive character, resistive, infrared and surface acoustic wave technique.Other one or more input controllers 144
May be coupled to other input/control devicess 148, for example, one or more buttons, rocker switch, thumb wheel, infrared port,
The pointer device of USB port, and/or stylus etc.One or more of button (not shown)s may include for controlling
The up/down button of 130 volume of loudspeaker 128 and/or microphone.
Memory interface 102 can be coupled with memory 150.The memory 150 may include that high random access is deposited
Reservoir and/or nonvolatile memory, such as one or more disk storage equipments, one or more optical storage apparatus, and/
Or flash memories (such as NAND, NOR).Memory 150 can store an operating system 172, for example, Android, iOS or
The operating system of Windows Phone etc.The operating system 172 may include for handling basic system services and execution
The instruction of task dependent on hardware.Memory 150 can also be stored using 174.It, can be from memory in mobile device operation
Load operating system 172 in 150, and executed by processor 104.At runtime using 174, can also add from memory 150
It carries, and is executed by processor 104.It operates on operating system using 174, is provided using operating system and bottom hardware
Interface realizes the various desired functions of user, such as instant messaging, web page browsing, pictures management.Using 174 can be independently of
What operating system provided, it is also possible to what operating system carried.In addition, when being mounted in calculating equipment 100 using 174,
Drive module can be added to operating system 172.
In general, calculating equipment 100 by use, touch screen 146 can be used to show multiple user interfaces.Here institute
The user interface of finger includes but is not limited to text, webpage, icon (for example including the user interface pair including various virtual keys
As), video, animation etc..The state of user interface is the state for calculating equipment 100 and responding user's input in a predefined manner.In
In some embodiments, the state of user interface includes lock state and unlocked state.When user interface is in the unlocked state, meter
Calculating equipment 100 can detecte and respond those user's inputs corresponding with user interface interaction.For example, user's input includes leading
Boat, activates or closes a variety of applications etc. data input.In other words, calculating equipment 100 can carry out normally in the unlocked state
Operation, predetermined operation set can be executed with the contact of touch screen 146 in response to user.And it calculates equipment 100 and is in lock
It, only can for example to unlock gesture, calendar, network state etc. limited for display portion in the user interface of lock state when determining state
User interface object, and can close or hide the multiple user interface objects shown when unlocked.
The method of verifying identity of the invention is suitable for executing in above-mentioned calculating equipment 100, but not limited to this.Here, body
The typical scene of part verifying is, for example, unlock, APP opening or payment verification etc..Below with reference to Fig. 2 and Fig. 3 to verifying identity
Scheme is illustrated.
Fig. 2 shows the flow charts of the method 200 of verifying identity according to some embodiments of the invention.Method 200 is suitable for
It is executed in calculating equipment (100).In addition, method 200 can also need authentication ATM or intelligent express delivery cabinet etc. are various
Equipment in use, if these device configurations have touch-sensitive display device.In general, calculating equipment is carrying out authentication behaviour
Before work, configured with the keying sequence comprising at least one symbol.Here, each symbol for example can be number in keying sequence
Word, letter, picture or colouring information etc., the present invention are without limitation.It should be noted that the embodiment of the present invention can be with
Using the keying sequence of a variety of known manner configuring computing devices, the present invention is without limitation.On this basis, equipment is calculated
It can verify whether user's input meets keying sequence by execution method 200.
Specifically, according to the sequence of keying sequence, successively for each symbol in keying sequence, method 200 can be executed
Step S210.In step S210, it is randomly assigned logo collection marking elements display position in the user interface.Here, it marks
Knowing set includes symbol in keying sequence.
In an embodiment in accordance with the invention, the predetermined position to be allocated to marker element is configured in user interface.
The quantity in predetermined position is consistent with number of elements in logo collection.Identification sets can be randomly assigned in the step S210 of the present embodiment
The mapping relations one by one in predetermined position in marking elements and user interface are closed, and show corresponding identification element in each position
Element.
In another embodiment according to the present invention, the pre-determined bit to be allocated to marker element is configured in user interface
It sets.Predetermined position quantity is less than element sum in logo collection.On this basis, the step S210 of the present embodiment can first from
Sum identical marker element in predetermined position is selected in logo collection.Here, selected marker element needs to include this institute
For symbol.Then, in step S210, the mapping one by one for being randomly assigned selected marker element and predetermined position is closed
System.
In another embodiment according to the present invention, the pre-determined bit of multiple marker element sums is configured in user interface
It sets.On this basis, marker element can be randomly assigned marker element to predetermined position by step S210.Here, each mark
Element can uniquely occupy a predetermined position.
In another embodiment according to the present invention, configured with one for showing the predetermined of marker element in user interface
Region.The step S210 of the present embodiment can be by marker element random display in predetermined areas.Typically, for the ease of with
Mark shown in each position is checked at family, has space between any two predetermined position (i.e. the two is not overlapped).Except this it
Outside, the present invention does not do excessive limitation to the position distribution in presumptive area.
In another embodiment according to the present invention, the quantity in predetermined position is consistent with number of elements in logo collection.In advance
Positioning is set for example can be arranged in a ring.Fig. 3 shows boundary of the calculating equipment of the present embodiment after executing a step S210
Face schematic diagram.As shown in figure 3, logo collection (number 0-9 i.e. in figure) is not traditional interface layout mode, but random point
Position with each number.It should be strongly noted that the target " being randomly assigned " in the present invention is to allow execute step every time
When S210, at least part of display position of marker element is different from display position when last execution step S210.Therefore,
It mode is randomly assigned in the present invention in step S210 can be various well known to be randomly assigned algorithm.In addition, for example upper primary
Display position on the basis of execute shifting function (i.e. along the display position of pointer or mobile logo element counterclockwise), can also be with
It is considered as of the invention being randomly assigned mode.It should be appreciated that on the basis of the above embodiments, it is any that position change may be implemented
The method of salary distribution changed should all be considered to belong to of the invention be randomly assigned mode.In addition, for distinct symbols in keying sequence and
The process for the step S210 being performed a plurality of times, the mode of being randomly assigned can be every time identical, or selects different distribution sides every time
Formula.For example, keying sequence can be set to " 14235 ", totally 5.In for step S210 performed by symbol " 1 ", mark
Know set to need to include symbol " 1 ".Logo collection for example may include 0-9 totally 10 numbers.
After executing step S210 every time, method 200 enters step S220, receives and judges this user input (i.e.
This executes received user's input after step S210) whether with this execute targeted this institute of symbol of step S210
Position (i.e. the display position of the symbol) corresponding predetermined operation of distribution is consistent.Here, targeted symbol is according to password
Symbol sequential selection in sequence.In fact, select the operation of keying sequence that can complete in step S210 in the present invention,
It can be completed in step S220, the invention is not limited in this regard.
In an embodiment as illustrated in figure 3, a target object is also configured in user interface, and (what is shown in figure " protects
Dangerous case ").Predetermined operation can be the input of drag target object to the symbol display position, or drag symbol to target pair
The display position of elephant.For scheming position shown by marking elements " 1 ", the corresponding predetermined operation in the position is, for example, to drag
" 1 " is into safety box, or drags the display position of safety box to " 1 ".In addition, calculating equipment shown in Fig. 3 is mobile terminal.
In the fig. 3 embodiment, predetermined operation can also be that moving this along the direction acceleration from target object to display position moves
The operation of terminal.For example, " 1 " is located at the upper left of safety box, predetermined operation is to move this along upper left acceleration to move end
End.It should be noted that predetermined operation is not limited to shown in above-described embodiment, it is also possible to for example click the operation of shown symbol.
When step S220 determines that user's input is consistent with predetermined operation, method 200 can execute step S230.In step
In S230, judge whether this targeted symbol is last position in keying sequence.If it is determined that last non-position, method
200 can be continuing with next semiology analysis step S210 and S220, until determining for last position symbol in keying sequence
It is consistent that number corresponding user inputs predetermined operation corresponding with the position that the symbol is distributed.In other words, method 200 passes through multiple
Step S210 and S220 completion are executed to the verification operation of entire keying sequence.
To sum up, 200 it can be inputted for each progress user in keying sequence in user according to the method for the present invention
Before, it is randomly assigned the display position of logo collection.In this way, method 200 of the invention can increase peace when user inputs operation
Full property (gesture is consistent when authentication each different from traditional user), and the entertaining of user's input can also be increased
Property, so as to which user experience is greatly improved.
Fig. 4 shows the schematic diagram of the method 400 of verifying identity according to some embodiments of the invention.As shown in figure 4, side
Method 400 includes step S410, S420 and S430.Here, step S410 to the S430 reality with step S210 to S230 in Fig. 2 respectively
It is consistent to apply mode, which is not described herein again.
Optionally, it when method 400 does not receive or determine inconsistent with predetermined operation in the step s 420, can terminate
This authentication.In yet another embodiment, when not receiving or determine inconsistent with predetermined operation in the step s 420,
Method 400 can be continuing with corresponding semiology analysis step S210 and step S220, until predetermined number of failed (for example, 3
It is secondary, but not limited to this) when terminating method 400.In addition, method 400 can when determining inconsistent with predetermined operation in the step s 420
With display reminding information in the user interface.
Determine that last symbol corresponding user input in keying sequence is distributed with the symbol in step S430
After the corresponding predetermined operation in position is consistent, step S440 is can also be performed in method 400.In step S440, executes correspondence and pass through
The operation of authentication.According to an embodiment of the present invention, the implement scene of method 400 is unlock link.That is, executing step
Before S410, calculates equipment and be in interface lock state.Correspondingly, the operation of step S440 is to release interface lock state.Root
According to another embodiment of the invention, the implement scene of method 400 is payment verification link.Correspondingly, the operation of step S440 is
It executes through the delivery operation after verifying.To sum up, the implement scene depending on method 400, step S440 can be configured as
Implement corresponding operation, the present invention is without limitation.
Fig. 5 shows the schematic diagram of the application 500 of verifying identity according to some embodiments of the invention.It is suitable for using 500
It resides in and calculates in equipment.Depending on specific application scenarios, application 500 can also be used as the one of application for independent utility
A component.For example, application 500 can be used as a part of operating system when being used in the unlock link of mobile phone using 500.
In another example application 500 can be used as the component of the APP when application 500 is used in the payment verification link for the APP that for example does shopping
One of.
As shown in figure 5, including allocation unit 510 and authentication unit 520 using 500.
Allocation unit 510 is suitable for being randomly assigned logo collection marking elements display position in the user interface.Wherein should
Logo collection includes symbol in keying sequence.Wherein, each marker element is any in following in logo collection: number, word
Female, picture and colouring information.Each symbol belongs to the logo collection in keying sequence.In an embodiment in accordance with the invention,
The predetermined position to be allocated to the marker element is configured in user interface.Allocation unit 510 is suitable for being randomly assigned identification sets
It closes marking elements and shows corresponding marker element with the mapping relations one by one in predetermined position in user interface and in each position.
Authentication unit 520 is suitable for after each execution of allocation unit 510 is randomly assigned the operation of display position, receives and sentences
The corresponding predetermined operation in this user input position that whether this is distributed with targeted symbol of breaking is consistent.Here, targeted
Symbol to be chosen one according to the sequence of symbol in keying sequence.
In an embodiment in accordance with the invention, predetermined position is distributed in a ring in user interface.The user interface is also matched
It is equipped with the target object being located in annular spread region.Target object is, for example, safety box icon, but not limited to this.In a reality
It applies in example, predetermined operation corresponding with the display position of chosen symbol is to drag the gesture of the symbol to target object position.
In yet another embodiment, predetermined operation corresponding with the display position of chosen symbol is drag target object to the symbol
The gesture of display position.In yet another embodiment, calculating equipment is mobile terminal.Predetermined operation be along from target object to
The direction of display position accelerates the operation of the mobile mobile terminal.
When determining consistent with corresponding predetermined operation, authentication unit 520 judges whether this targeted symbol is close
Last position in code sequence.
Determine it is non-last when, authentication unit 520 indicates that allocation unit 510 continues to execute and is randomly assigned to show next time
The operation for showing position, until determining, the corresponding user of last symbol inputs the position distributed with the symbol in keying sequence
Corresponding predetermined operation is consistent.
Optionally, the position that the corresponding user's input of last symbol is distributed with the symbol in determining keying sequence
When corresponding predetermined operation is consistent, authentication unit 520 is further adapted for executing the corresponding operation for passing through authentication.In one embodiment
In, application 500 is applied to unlocking screen link.Before allocation unit 510 executes operation, calculates equipment and be in interface locking
State.Correspondingly, the operation that correspondence performed by authentication unit 520 passes through authentication is to release the interface lock state.It answers
Method 400 is referred to 500 more specific embodiments, which is not described herein again.
A9, the method as described in any one of A1-8, wherein the corresponding use of last symbol in determining keying sequence
When input predetermined operation corresponding with the position that the symbol is distributed in family is consistent, this method further include: execute correspondence and passes through identity
The operation of verifying.
A10, the method as described in A9, wherein be randomly assigned logo collection marking elements in user circle described in the execution
In face the step of display position before, the calculating equipment is in interface lock state;
The operation that the correspondence passes through authentication includes: to release the interface lock state.
A12, the application as described in A11, wherein configured with to be allocated to the pre- of the marker element in the user interface
Positioning is set, and the allocation unit is suitable for being randomly assigned logo collection marking elements according to following manner showing in the user interface
Position:
It is randomly assigned the mapping relations one by one of logo collection marking elements and predetermined position in user interface and each
Position shows corresponding marker element.
A13, the application as described in A11 or A12, wherein each marker element is any in following in the logo collection
Kind: number, letter, picture and colouring information.
A14, the application as described in A12, wherein predetermined position is distributed in a ring in the user interface, the user interface
It is also configured with the target object being located in annular spread region.
A15, the application as described in A14, wherein the target object is shown as safety box icon.
A16, the application as described in A14 or 15, wherein predetermined operation corresponding with the display position of chosen symbol is to drag
Move the gesture of the symbol to the target object position.
A17, the application as described in A14 or 15, wherein predetermined operation corresponding with the display position of chosen symbol is to drag
Move the gesture of the target object to the display position of the symbol.
A18, the application as described in A14 or 15, wherein the calculating equipment is mobile terminal, aobvious with chosen symbol
Show that the corresponding predetermined operation in position is to accelerate to move the mobile terminal along the direction from the target object to display position
Operation.
A19, the application as described in any one of A10-16, wherein determined in the authentication unit last in keying sequence
When the corresponding user's input of one symbol predetermined operation corresponding with the position that the symbol is distributed is consistent, it is further adapted for executing correspondence
Pass through the operation of authentication.
A20, the application as described in A17, wherein the allocation unit be randomly assigned logo collection marking elements with
In the interface of family before display position, the calculating equipment is in interface lock state;
The authentication unit is suitable for executing the corresponding operation by authentication according to following manner: releasing interface locking
State.
Various technologies described herein are realized together in combination with hardware or software or their combination.To the present invention
Method and apparatus or the process and apparatus of the present invention some aspects or part can take insertion tangible media, such as it is soft
The form of program code (instructing) in disk, CD-ROM, hard disk drive or other any machine readable storage mediums,
Wherein when program is loaded into the machine of such as computer etc, and is executed by the machine, the machine becomes to practice this hair
Bright equipment.
In the case where program code executes on programmable computers, calculates equipment and generally comprise processor, processor
Readable storage medium (including volatile and non-volatile memory and or memory element), at least one input unit, and extremely
A few output device.Wherein, memory is configured for storage program code;Processor is configured for according to the memory
Instruction in the said program code of middle storage, the method for executing verifying identity of the invention.
By way of example and not limitation, computer-readable medium includes computer storage media and communication media.It calculates
Machine readable medium includes computer storage media and communication media.Computer storage medium storage such as computer-readable instruction,
The information such as data structure, program module or other data.Communication media is generally modulated with carrier wave or other transmission mechanisms etc.
Data-signal processed passes to embody computer readable instructions, data structure, program module or other data including any information
Pass medium.Above any combination is also included within the scope of computer-readable medium.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, knot is not been shown in detail
Structure and technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, In
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims than feature more features expressly recited in each claim.More precisely, as following
As claims reflect, inventive aspect is all features less than single embodiment disclosed above.Therefore, it abides by
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
As a separate embodiment of the present invention.
Those skilled in the art should understand that the module of the equipment in example disclosed herein or unit or groups
Part can be arranged in equipment as depicted in this embodiment, or alternatively can be positioned at and the equipment in the example
In different one or more equipment.Module in aforementioned exemplary can be combined into a module or furthermore be segmented into multiple
Submodule.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
Meaning one of can in any combination mode come using.
In addition, be described as herein can be by the processor of computer system or by executing by some in the embodiment
The combination of method or method element that other devices of the function are implemented.Therefore, have for implementing the method or method
The processor of the necessary instruction of element forms the device for implementing this method or method element.In addition, Installation practice
Element described in this is the example of following device: the device be used for implement as in order to implement the purpose of the invention element performed by
Function.
As used in this, unless specifically stated, come using ordinal number " first ", " second ", " third " etc.
Description plain objects, which are merely representative of, is related to the different instances of similar object, and is not intended to imply that the object being described in this way must
Must have the time it is upper, spatially, sequence aspect or given sequence in any other manner.
Although the embodiment according to limited quantity describes the present invention, above description, the art are benefited from
It is interior it is clear for the skilled person that in the scope of the present invention thus described, it can be envisaged that other embodiments.Additionally, it should be noted that
Language used in this specification primarily to readable and introduction purpose and select, rather than in order to explain or limit
Determine subject of the present invention and selects.Therefore, without departing from the scope and spirit of the appended claims, for this
Many modifications and changes are obvious for the those of ordinary skill of technical field.For the scope of the present invention, to this
Invent done disclosure be it is illustrative and not restrictive, it is intended that the scope of the present invention be defined by the claims appended hereto.
Claims (7)
1. a kind of method for verifying identity, suitable for executing in calculating equipment, which has comprising at least one symbol
Number keying sequence, this method comprises:
It is randomly assigned logo collection marking elements display position in the user interface, wherein the logo collection includes keying sequence
Middle symbol;
After being randomly assigned display position every time, one is chosen according to the sequence of symbol in keying sequence, receives and judges this
Whether user's input is consistent with predetermined operation corresponding to the display position of this chosen symbol;
When determining consistent with corresponding predetermined operation, judge whether this targeted symbol is last in keying sequence
Position;
Determine it is non-last when, continue to execute and be randomly assigned logo collection marking elements display position in the user interface
The step of, until determining that the corresponding user of last in keying sequence inputs predetermined operation one corresponding with symbol display position
It causes, and then executes the corresponding operation by authentication;And
When determining inconsistent with corresponding predetermined operation, this authentication is terminated;
Wherein, the predetermined position to be allocated to the marker element is configured in the user interface, it is described to be randomly assigned to identify
Set marking elements in the user interface display position the step of include:
It is randomly assigned the mapping relations one by one of logo collection marking elements and predetermined position in user interface and in each position
Show corresponding marker element;
Predetermined position is distributed in a ring in the user interface, which is also configured with the mesh in annular spread region
Object is marked, the target object is shown as safety box icon, and predetermined operation corresponding with the display position of chosen symbol is to drag
Move the gesture of the symbol to the target object position;And
If the calculating equipment is mobile terminal, predetermined operation corresponding with the display position of chosen symbol is along from described
The direction of target object to display position accelerates the operation of the mobile mobile terminal.
2. the method for claim 1, wherein each marker element is any in following in the logo collection: number
Word, letter, picture and colouring information.
3. being the method for claim 1, wherein randomly assigned logo collection marking elements in user circle described in the execution
In face the step of display position before, the calculating equipment is in interface lock state;
The operation that the correspondence passes through authentication includes: to release the interface lock state.
4. a kind of application for verifying identity, suitable for executing in calculating equipment, which is configured with comprising at least one
The keying sequence of symbol, the application include:
Allocation unit, suitable for being randomly assigned logo collection marking elements display position in the user interface, the wherein identification sets
Closing includes symbol in keying sequence;
Authentication unit, suitable for being selected according to the sequence of symbol in keying sequence after allocation unit is randomly assigned display position every time
In one, receive and judge this user input whether predetermined operation one corresponding to the display position with this chosen symbol
It causes,
When determining consistent with corresponding predetermined operation, judge whether this targeted symbol is last in keying sequence
Position,
Determine it is non-last when, instruction allocation unit continues to execute and is randomly assigned logo collection marking elements in user circle
In face the step of display position, until determining that the corresponding user's input of last in keying sequence is corresponding with symbol display position
Predetermined operation it is consistent, and then execute the corresponding operation for passing through authentication;And
When determining inconsistent with corresponding predetermined operation, this authentication is terminated;
Wherein, the predetermined position to be allocated to the marker element is configured in the user interface, the allocation unit is suitable for
Logo collection marking elements display position in the user interface is randomly assigned according to following manner:
It is randomly assigned the mapping relations one by one of logo collection marking elements and predetermined position in user interface and in each position
Show corresponding marker element;
Predetermined position is distributed in a ring in the user interface, which is also configured with the mesh in annular spread region
Object is marked, the target object is shown as safety box icon, and predetermined operation corresponding with the display position of chosen symbol is to drag
Move the gesture of the symbol to the target object position;And
If the calculating equipment is mobile terminal, predetermined operation corresponding with the display position of chosen symbol is along from described
The direction of target object to display position accelerates the operation of the mobile mobile terminal.
5. application as claimed in claim 4, wherein each marker element is any in following in the logo collection: number
Word, letter, picture and colouring information.
6. application as claimed in claim 4, wherein the allocation unit be randomly assigned logo collection marking elements with
In the interface of family before display position, the calculating equipment is in interface lock state;
The authentication unit is suitable for executing the corresponding operation by authentication according to following manner: releasing the interface and locks shape
State.
7. a kind of calculating equipment, comprising:
At least one processor;And
At least one processor including computer program instructions;
At least one processor and the computer program instructions are configured as making together at least one described processor
It obtains the calculating equipment and executes method as claimed in any one of claims 1-3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710014983.8A CN106845180B (en) | 2017-01-09 | 2017-01-09 | Verify method, application and the calculating equipment of identity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710014983.8A CN106845180B (en) | 2017-01-09 | 2017-01-09 | Verify method, application and the calculating equipment of identity |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106845180A CN106845180A (en) | 2017-06-13 |
CN106845180B true CN106845180B (en) | 2019-11-12 |
Family
ID=59117326
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710014983.8A Active CN106845180B (en) | 2017-01-09 | 2017-01-09 | Verify method, application and the calculating equipment of identity |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106845180B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109902482A (en) * | 2017-12-07 | 2019-06-18 | 厦门雅迅网络股份有限公司 | A kind of New Graphics cipher-code input method, terminal device and storage medium |
CN109118215B (en) * | 2018-06-12 | 2021-04-27 | 创新先进技术有限公司 | Payment processing method and device and server |
CN110033545A (en) * | 2019-04-19 | 2019-07-19 | 中山市乐喜电子科技有限公司 | Equipment unlocking method and intelligent door lock |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104679418A (en) * | 2013-11-26 | 2015-06-03 | 富泰华工业(深圳)有限公司 | Screen unlocking system and method and touch display device |
CN105589647A (en) * | 2014-10-24 | 2016-05-18 | 富泰华工业(深圳)有限公司 | Unlocking system and method |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2749985B1 (en) * | 2012-12-27 | 2017-06-14 | Vodafone Holding GmbH | Unlocking a screen of a portable device |
CN104516645A (en) * | 2013-09-26 | 2015-04-15 | 上海斐讯数据通信技术有限公司 | Electronic device unlocking method |
-
2017
- 2017-01-09 CN CN201710014983.8A patent/CN106845180B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104679418A (en) * | 2013-11-26 | 2015-06-03 | 富泰华工业(深圳)有限公司 | Screen unlocking system and method and touch display device |
CN105589647A (en) * | 2014-10-24 | 2016-05-18 | 富泰华工业(深圳)有限公司 | Unlocking system and method |
Also Published As
Publication number | Publication date |
---|---|
CN106845180A (en) | 2017-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107402663B (en) | Fingerprint verification method and electronic device for executing the method | |
US9760707B2 (en) | Unlocking electronic devices using touchscreen input gestures | |
US10764280B2 (en) | Method and apparatus for authentication based on fingerprint recognition | |
US9507928B2 (en) | Preventing the discovery of access codes | |
US8997215B2 (en) | Authentication using multi-tier multi-class objects | |
US20150047017A1 (en) | Mobile device and method of controlling therefor | |
KR20190085543A (en) | Method and apparatus for generating security questions and verifying identities | |
KR20140099293A (en) | Secure authorization | |
CN103902881A (en) | Method for managing security for applications and an electronic device thereof | |
CN104641339A (en) | Protection for unintentional inputs | |
CN111814885B (en) | Method, system, device and medium for managing image frames | |
CN105677140A (en) | Method and apparatus for arranging objects according to content of background image | |
JP6682628B2 (en) | Method, system and apparatus for process triggering | |
CN105706100A (en) | Directional touch unlocking for electronic devices | |
CN105678147B (en) | Touch operation method and device | |
CN106845180B (en) | Verify method, application and the calculating equipment of identity | |
CN104318185B (en) | A kind of application control method, equipment and mobile terminal | |
EP3447666B1 (en) | Processing fingerprint information | |
CN104769601A (en) | Method for recognition of user identity and electronic equipment | |
CN105094652B (en) | Touch screen unlocking method and device, electronic equipment, display and mobile terminal | |
CN105243304B (en) | A kind of unlocking method and device of mobile terminal | |
CN105808032B (en) | Focus control method and device based on android control | |
CN105303096A (en) | Symbol selection for swipe based authentication | |
CN105786370A (en) | Method and device for unlocking user interface | |
CN109271770A (en) | Auth method, equipment and the storage medium of smartwatch |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |