CN109117616B - Verification method and device, electronic equipment and computer readable storage medium - Google Patents

Verification method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN109117616B
CN109117616B CN201810869929.6A CN201810869929A CN109117616B CN 109117616 B CN109117616 B CN 109117616B CN 201810869929 A CN201810869929 A CN 201810869929A CN 109117616 B CN109117616 B CN 109117616B
Authority
CN
China
Prior art keywords
verification
interface
fingerprint
electronic device
fingerprint feature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810869929.6A
Other languages
Chinese (zh)
Other versions
CN109117616A (en
Inventor
林进全
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810869929.6A priority Critical patent/CN109117616B/en
Publication of CN109117616A publication Critical patent/CN109117616A/en
Application granted granted Critical
Publication of CN109117616B publication Critical patent/CN109117616B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application relates to a verification method and device, an electronic device and a computer readable storage medium. The method comprises the following steps: the method comprises the steps of acquiring a first fingerprint feature acquired when a first verification interface is touched, acquiring a touch track of the first fingerprint feature in the first verification interface, and when the first fingerprint feature is matched with a first legal fingerprint feature and the touch track is matched with a prestored touch track, successfully verifying the first fingerprint feature. And when the first fingerprint characteristic is matched with the first legal fingerprint characteristic and the touch track is matched with the prestored touch track, the verification is successful. By combining the fingerprint characteristics with the touch trajectory, the security of the verification is improved.

Description

Verification method and device, electronic equipment and computer readable storage medium
Technical Field
The present application relates to the field of mobile communications technologies, and in particular, to a verification method and apparatus, an electronic device, and a computer-readable storage medium.
Background
Electronic devices have become an essential tool in people's lives. In order to protect personal privacy, many verification methods are often set on the electronic device, for example, the electronic device is set with a password verification method, a power-on password, a screen unlock password, a payment password, and the like. The traditional verification mode is that verification information is input through a keyboard or a pattern, the electronic equipment can verify the input information, and after the verification is passed, the electronic equipment can be started, unlocked and paid successfully.
However, most authentication methods are used to authenticate information by allowing a user to directly enter information based on an input keyboard of an electronic device. The traditional verification method has the problem of low safety.
Disclosure of Invention
The embodiment of the application provides a verification method, a verification device, electronic equipment and a computer-readable storage medium, and the verification safety can be improved.
A method of authentication, comprising:
acquiring a first fingerprint characteristic acquired when a first verification interface is touched;
acquiring a touch track of the first fingerprint feature in the first verification interface;
and when the first fingerprint features are matched with the first legal fingerprint features and the touch track is matched with a prestored touch track, the first verification is successful.
An authentication apparatus comprising:
the fingerprint characteristic acquisition module is used for acquiring a first fingerprint characteristic acquired when the first verification interface is touched;
the touch track acquisition module is used for acquiring a touch track of the first fingerprint feature in the first verification interface;
and the verification module is used for successfully verifying when the first fingerprint characteristic is matched with the first legal fingerprint characteristic and the touch track is matched with a prestored touch track.
An electronic device comprising a memory and a processor, the memory having stored therein a computer program that, when executed by the processor, causes the processor to perform the steps of:
acquiring a first fingerprint characteristic acquired when a first verification interface is touched;
acquiring a touch track of the first fingerprint feature in the first verification interface;
and when the first fingerprint features are matched with the first legal fingerprint features and the touch track is matched with a prestored touch track, the first verification is successful.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
acquiring a first fingerprint characteristic acquired when a first verification interface is touched;
acquiring a touch track of the first fingerprint feature in the first verification interface;
and when the first fingerprint features are matched with the first legal fingerprint features and the touch track is matched with a prestored touch track, the first verification is successful.
According to the verification method and device, the electronic device and the computer readable storage medium, the first fingerprint feature acquired when the first verification interface is touched is acquired, the touch track of the first fingerprint feature in the first verification interface is acquired, and when the first fingerprint feature is matched with the first legal fingerprint feature and the touch track is matched with the pre-stored touch track, the first verification is successful. And when the first fingerprint characteristic is matched with the first legal fingerprint characteristic and the touch track is matched with the prestored touch track, the verification is successful. By combining the fingerprint characteristics with the touch trajectory, the security of the verification is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a diagram of an application environment of a verification method in one embodiment;
FIG. 2 is a schematic diagram of an electronic device in one embodiment;
FIG. 3 is a flow diagram of a verification method in one embodiment;
FIG. 4 is a schematic diagram of a first verification interface in one embodiment;
FIG. 5 is a diagram illustrating an interface for using a first valid fingerprint corresponding to an application type, in accordance with an embodiment;
FIG. 6 is a flowchart of a method for associating a first valid fingerprint with a pre-stored touch trajectory in accordance with one embodiment;
FIG. 7 is a schematic diagram of an interface for associating a first valid fingerprint with a pre-stored touch trajectory according to an embodiment;
FIG. 8 is a flow diagram of a method for re-verifying based on a time since a first verification was successful in one embodiment;
FIG. 9 is a flowchart of a method for performing verification in different verification manners according to a timing duration in one embodiment;
FIG. 10 is a flow diagram of a method for performing authentication using a first authentication method in one embodiment;
FIG. 11 is a schematic diagram of an interface for performing verification using the first verification approach in one embodiment;
FIG. 12 is a flow diagram of a method for performing authentication using a second authentication method in one embodiment;
FIG. 13 is a schematic diagram of an interface for performing verification using the second verification approach in one embodiment;
FIG. 14 is a schematic diagram of an interface for displaying first content in one embodiment;
FIG. 15 is an interface diagram showing second content in one embodiment;
FIG. 16 is a block diagram showing the structure of an authentication apparatus according to an embodiment;
fig. 17 is a block diagram of a partial structure of a cellular phone in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish one element from another. For example, a first verification interface may be referred to as a second verification interface, and similarly, a second verification interface may be referred to as a first verification interface, without departing from the scope of the present application. The first verification interface and the second verification interface are both verification interfaces, but are not the same verification interface.
Fig. 1 is a schematic diagram of an application environment of an image processing method in an embodiment. As shown in fig. 1, the application environment includes an electronic device 100, where the electronic device 100 may obtain a first fingerprint feature acquired when the first verification interface is touched, and obtain a touch trajectory of the first fingerprint feature in the first verification interface, and when the first fingerprint feature matches the first valid fingerprint feature and the touch trajectory matches a pre-stored touch trajectory, the electronic device 100 may obtain a result of successful verification. The electronic device 100 may be a smartphone, a tablet, a personal digital assistant, a wearable device, or the like.
In one embodiment, as shown in FIG. 2, a schematic diagram of an internal structure of an electronic device is provided. The electronic device includes a processor, a memory, a display, and a network interface connected by a system bus. Wherein, the processor is used for providing calculation and control capability and supporting the operation of the whole electronic equipment. The memory is used for storing data, programs, and/or instruction codes, and the like, and at least one computer program is stored on the memory, and the computer program can be executed by the processor to realize the verification method suitable for the electronic device provided in the embodiment of the application. The Memory may include a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random-Access-Memory (RAM). For example, in one embodiment, the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The computer program can be executed by a processor for implementing an authentication method provided by various embodiments of the present application. The internal memory provides a cached execution environment for the operating system and computer programs in the non-volatile storage medium. The display may be used to display information, such as to display a verification interface, and the like. The network interface may be an ethernet card or a wireless network card, etc. for communicating with an external electronic device, such as a server.
Those skilled in the art will appreciate that the architecture shown in fig. 2 is a block diagram of only a portion of the architecture associated with the subject application, and does not constitute a limitation on the electronic devices to which the subject application may be applied, and that a particular electronic device may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, there is provided an authentication method, for example, applied to the electronic device, as shown in fig. 3, the method includes the following steps:
step 302, a first fingerprint feature collected when the first verification interface is touched is obtained.
The first verification interface can be a verification interface when the screen of the electronic device is unlocked, or can be a verification interface displayed when the screen enters an application program after being unlocked. Numbers, characters, patterns and the like for verification can be displayed on the first verification interface. The first fingerprint characteristic is lines generated by convex and concave unevenness on the front skin at the tail end of the finger, and the lines are regularly arranged to form different line types.
The electronic device may perform real-time detection on the first verification interface. When the first verification interface is detected to be touched, light rays emitted by the display screen can penetrate through the cover plate to illuminate the fingerprint textures touching the first verification interface, and fingerprint reflection light rays penetrate through the screen and return to the sensor. At this point, the electronic device may capture a first fingerprint feature touching the first verification interface. Among them, the display screen may be an Organic Light-Emitting semiconductor OLED (Organic Light-Emitting Diode) screen.
In one embodiment, the electronic device may employ an off-screen fingerprint technique when acquiring the first fingerprint feature. Fingerprint technique is through the pressure fingerprint induction module that utilizes electronic equipment's display screen below to set up, and the processor that electronic equipment was sent to the first fingerprint characteristic of gathering to the pressure fingerprint induction module, and electronic equipment's processor can match the legal fingerprint characteristic of prestoring in with received first fingerprint characteristic and the electronic equipment. When electronic equipment is adopting fingerprint technique under the screen, electronic equipment's display screen can be the OLED screen, the OLED screen can initiatively send light, light can illuminate the fingerprint that touches first verification interface, the light of fingerprint reflection can return on the pressure fingerprint response module of OLED screen below, pressure fingerprint response module can be connected with electronic equipment's treater through serial Peripheral interface SPI (serial Peripheral interface), the treater that the first fingerprint characteristic that will gather is sent electronic equipment.
Step 304, acquiring a touch track of the first fingerprint feature in the first verification interface.
The touch trajectory refers to a series of uninterrupted imprints formed by fingerprints of a finger when the finger slides on a screen of the electronic device. The touch trajectory may also be a start contact point, a end contact point of a finger, and a sliding trajectory connecting the start contact point and the end contact point. After the electronic device acquires the first fingerprint feature acquired by touching the first verification interface, a touch track of the first fingerprint feature in the first verification interface can be acquired. The electronic device may further acquire a first fingerprint feature that generates a touch trajectory after acquiring the touch trajectory that touches the first verification interface. The electronic device can also acquire a touch trajectory touching the first verification interface and the first fingerprint feature at the same time.
And step 306, when the first fingerprint feature is matched with the first legal fingerprint feature and the touch track is matched with the prestored touch track, the first verification is successful.
The first fingerprint feature may be collected before the first fingerprint feature is collected, and the first fingerprint feature collected in advance may be stored in the electronic device. After the electronic device acquires the first fingerprint feature, the matching degree of the first fingerprint feature and the first legal fingerprint feature can be calculated. The electronic device can compare the fingerprint lines, the fingerprint patterns and other features of the first fingerprint feature with the fingerprint lines, the fingerprint patterns and other features of the first legal fingerprint feature to obtain the matching degree. When the matching degree reaches a matching threshold, the electronic device may determine that the first fingerprint feature matches the first legitimate fingerprint feature. For example, when the degree of match reaches 80%, the electronic device may determine that the first fingerprint feature matches the first legitimate fingerprint feature.
The pre-stored touch trajectory is acquired before the touch trajectory is acquired, and the pre-acquired pre-stored touch trajectory may be stored in the electronic device. After the electronic equipment acquires the touch track, the matching degree can be calculated according to the touch track and the sliding tracks of the starting contact point, the terminal contact point, the connection starting contact point and the terminal contact point in the prestored touch track. Similarly, when the matching degree reaches the matching threshold, the electronic device may determine that the touch trajectory matches the pre-stored touch trajectory.
When the electronic equipment judges that the first fingerprint features are matched with the first legal fingerprint features and judges that the touch track is matched with the prestored touch track, the first verification is successful.
The method comprises the steps of acquiring a touch track of a first fingerprint feature in a first verification interface by acquiring the first fingerprint feature acquired when the first verification interface is touched, and when the first fingerprint feature is matched with a first legal fingerprint feature and the touch track is matched with a pre-stored touch track, the first verification is successful. By combining the fingerprint characteristics with the touch trajectory, the security of the verification is improved.
In one embodiment, when the electronic device acquires the fingerprint feature, the electronic device may simultaneously acquire a pressing force value of the fingerprint feature in the verification interface. A pressure sensor can be arranged below a screen of the electronic device, and the pressure sensor can detect the pressing operation of the fingerprint features in the verification interface. The preset pressing force threshold may be stored in the electronic device, and the pressing force threshold may be a specific value or a range. The user can set the pressing force threshold through the electronic device, and the pressing force threshold can also be set when the electronic device is shipped. When a pressure sensor in the electronic device detects a pressing operation, a pressing force value generated by the pressing operation may be acquired. Wherein the pressure sensor may detect the pressing operation when the pressing force value of the pressure sensor is non-zero. The electronic equipment can compare the acquired pressing force value with a preset pressing force threshold, when the acquired pressing force value meets the preset pressing force threshold, the electronic equipment can match the fingerprint features generating the pressing force value with legal fingerprint features, can also match the touch track of the fingerprint features generating the pressing force value in a verification interface with a prestored touch track, and when the fingerprint features are matched with the touch track, the verification is successful.
In one embodiment, the electronic device may also time the pressing operation while obtaining the pressing force value. The electronic device may start timing when the pressure sensor detects the pressing operation until the electronic device may end timing when the pressing operation ends. The electronic device may further store a preset duration threshold, and similarly, the duration threshold may be a specific value or a range. The user can set the duration threshold value through the electronic equipment, and the duration threshold value can also be set when the electronic equipment leaves a factory. The electronic equipment can calculate the duration of the pressing operation according to the timing starting time and the timing ending time, compare the calculated duration of the pressing operation with a preset duration threshold, when the duration of the pressing operation meets the preset duration threshold, the electronic equipment can match the fingerprint features generating the pressing operation with legal fingerprint features, match the touch tracks of the fingerprint features generating the pressing force value in a verification interface with prestored touch tracks, and when the fingerprint features and the touch tracks are matched, the verification is successful. Specifically, the electronic device may display a timer in the screen when the pressure sensor detects the pressing operation, where the timer may start timing when the pressure sensor detects the pressing operation, and stop timing when the pressing operation is finished.
In one embodiment, a verification method provided may further include a combination of verifying the pressing force value, verifying the pressing time duration, verifying the fingerprint feature, and verifying the touch trajectory, which is not limited herein.
In one embodiment, the provided verification method further includes a process of displaying a first verification interface, which specifically includes: and when the first verification instruction is detected, displaying a first verification interface according to the first verification instruction, wherein the first verification instruction is generated according to the triggering operation of the application program.
The first verification instruction may be used to trigger the electronic device to perform the first verification, and the first verification instruction may be generated according to a triggering operation on the application program. For example, when the user clicks a password payment control in the payment application, the electronic device may generate a first verification instruction according to a trigger operation of the user on the application. The first verification interface may be a pattern verification interface, and may also be a number or character verification interface.
The electronic equipment can detect the operation of the user in real time and generate a first verification instruction. For example, the electronic device may detect an operation of pressing an unlock key by a user, and generate a first verification instruction according to the operation of pressing the unlock key by the user. When the electronic device detects the first verification instruction, the electronic device may present the first verification interface according to the detected first verification instruction.
As shown in FIG. 4, in one embodiment, a schematic of a first verification interface is provided. Taking the first verification interface as the pattern verification interface as an example, as shown in fig. 4, each contact required for pattern verification is shown in the first verification interface 400, and the number of the contacts may be 9, 16, and the like. One contact can be used as a starting contact, one contact can be used as a terminal contact, a plurality of intermediate contacts can be provided, and the electronic equipment can verify the sliding tracks connecting the starting contact, the intermediate contacts and the terminal contacts.
In an embodiment, the provided verification method may further include a process of generating a verification instruction, specifically including: when the opening of the application program is detected, a first verification instruction is generated.
The electronic device may detect the installed application. The electronic device may detect whether the application is started, and when it is detected that the application is started, the electronic device may generate a first verification instruction. Specifically, the electronic device may detect a designated application. The designated application program can be designated by a user, and the electronic device can also be set according to the security level of the application program. For example, the security requirement of the payment application is high, and the electronic device may set that the payment application generates the first verification instruction when the payment application is started. The user can set the address book application program, and when the electronic equipment detects that the address book application program is opened, a first verification instruction can be generated.
The process of generating the validation instruction may further include: when the application program is detected to be switched from the background to the foreground, a first verification instruction is generated.
The electronic device may also detect the running of the application. Specifically, the electronic device may use a listener to listen for a foreground-background switch of an application. Taking the android system as an example, the electronic device may use an ActivityLifecycleCallbacks () interface in the application program to monitor foreground and background switching of the application program, so as to detect whether the application program is switched from a background to a foreground or from the foreground to the background. The electronic device may generate a first validation instruction when the electronic device detects that the application switches from background to foreground. For example, the electronic device may generate the first validation instruction when the application for payment switches from background to foreground.
The process of generating the validation instruction may further include: when detecting that a specified function in the application program is triggered, generating a first verification instruction.
The designated function of the application program can be designated by a user or automatically designated by the electronic equipment according to the priority of the function of the application program. The specific function of the application program is triggered, namely the specific function of the application program is started, and the electronic equipment can generate a first verification instruction when detecting that the specific function in the application program is triggered. For example, the designated function in the payment application is to enter a payment password, and the electronic device may generate the first validation instruction when the electronic device detects that the entered payment password in the payment application is triggered.
In an embodiment, the provided verification method may further include a process of acquiring a corresponding first valid fingerprint feature according to the application type, specifically including: the method comprises the steps of obtaining the type of an application program and obtaining a first legal fingerprint characteristic corresponding to the type of the application program.
The type of application may be distinguished according to the use of the application. For example, the type of application may be a game-like application, a music-like application, a video-like application, a payment-like application, and so forth. The electronic device can acquire the type of the application program and acquire a first legal fingerprint corresponding to the type of the application program according to the type of the application program. For example, the type of the application program acquired by the electronic device is a payment application, and a first legal fingerprint feature corresponding to the payment application is an a fingerprint feature; the type of the application program acquired by the electronic equipment is a video application, and the first legal fingerprint feature corresponding to the video application is a B fingerprint feature.
The method comprises the steps of obtaining the type of an application program and obtaining a first legal fingerprint characteristic corresponding to the type of the application program. For application programs with different types, different first legal fingerprint features are correspondingly used, and the security of fingerprint verification is improved.
In one embodiment, as shown in FIG. 5, an interface diagram is provided that maps different application types to different first legitimate fingerprints. There may be multiple applications on the electronic device that may be categorized by type. As shown in fig. 5, the application interface 500 is divided into a game application, a music application, a video application, and a payment application according to the type of the application.
After the electronic equipment acquires the type of the application program, the electronic equipment can also acquire a first legal fingerprint characteristic corresponding to the type of the application program. For example, the first valid fingerprint feature corresponding to the game application is the a fingerprint feature 510, the first valid fingerprint feature corresponding to the music application is the B fingerprint feature 520, the first valid fingerprint feature corresponding to the video application is the C fingerprint feature 530, and the first valid fingerprint feature corresponding to the payment application is the D fingerprint feature 540. When the electronic equipment detects that the application program is triggered, the corresponding first legal fingerprint feature can be acquired according to the type of the application program, so that verification is performed. For example, when the electronic device detects that the payment treasure application is triggered, it may be obtained that the type of the payment treasure application program is a payment type application, and then the first legal fingerprint feature corresponding to the payment type application is the D fingerprint feature 540, and the electronic device may perform verification according to the obtained D fingerprint feature 540.
As shown in fig. 6, in an embodiment, the provided verification method may further include a process of corresponding the first valid fingerprint feature to the pre-stored touch trajectory, specifically including:
step 602, when the first fingerprint feature matches the first valid fingerprint feature, obtaining a pre-stored touch trajectory corresponding to the first valid fingerprint feature.
The first legal fingerprint features can be multiple, and each first legal fingerprint feature corresponds to a prestored touch track. The pre-stored touch tracks corresponding to different first legal fingerprint features may be different.
The electronic equipment can compare the fingerprint lines, the fingerprint patterns and other features of the first fingerprint feature with the fingerprint lines, the fingerprint patterns and other features of the first legal fingerprint feature, and when the electronic equipment judges that the first fingerprint feature is matched with the first legal fingerprint feature according to the matching degree, the prestored touch track corresponding to the first legal fingerprint feature can be acquired.
In step 604, if the touch trajectory matches the pre-stored touch trajectory, the first verification is successful.
The electronic device can acquire a pre-stored touch track corresponding to the first legal fingerprint feature and can also acquire a touch track in the first verification interface by using the first fingerprint feature. The electronic device may compare the acquired pre-stored touch trajectory with the touch trajectory, and when the touch trajectory matches the pre-stored touch trajectory, the first verification is successful.
And when the first fingerprint characteristic is matched with the first legal fingerprint characteristic, acquiring a prestored touch track corresponding to the first legal fingerprint characteristic, and if the touch track is matched with the prestored touch track, successfully verifying. The first legal fingerprint features correspond to the pre-stored touch tracks, and different fingerprint features correspond to different touch tracks, so that the verification safety can be improved.
As shown in FIG. 7, in one embodiment, an interface diagram is provided that corresponds the first valid fingerprint feature to a pre-stored touch trajectory. Different first legitimate fingerprint features may correspond to different pre-stored touch trajectories. As shown in fig. 7, in the first interface 710, the first valid fingerprint feature acquired by the electronic device is an a fingerprint feature 712, and the pre-stored touch trajectory corresponding to the a fingerprint feature 712 is an a touch trajectory 714. When the first fingerprint feature matches the a-fingerprint feature 712, the electronic device may obtain a touch trajectory corresponding to the a-fingerprint feature, and when the obtained touch trajectory matches the a-touch trajectory 714, the first verification is successful. Likewise, in the second interface 720, the pre-stored touch trajectory corresponding to the B fingerprint feature 722 is a B touch trajectory 724. The different first legal fingerprint features correspond to different pre-stored touch tracks.
In an embodiment, as shown in fig. 8, the provided verification method may further include a process of performing re-verification according to a time from the success of the first verification, specifically including:
step 802, when the first verification interface is successfully verified, timing is started.
When the electronic device obtains a result that the first verification interface is successfully verified, the electronic device may start a timer, and start timing from a time when the result that the first verification interface is successfully verified is obtained.
And 804, when a second verification instruction is detected and the timing duration exceeds a duration threshold, displaying a second verification interface according to the second verification instruction, and verifying according to the second verification interface.
The second verification instruction is detected by the electronic equipment after the first verification interface is verified successfully. When the first validation instruction is generated when the electronic device detects that the application is turned on, the second validation instruction may be generated when the electronic device detects that a specified function in the application is triggered. For example, the electronic device may generate a first validation instruction when a payment bank is detected to be turned on, and may generate a second validation instruction when a payment function in the payment bank is triggered. When the first verification instruction is generated when the electronic device detects that the application program is triggered for the first time, the second verification instruction may be generated when the electronic device detects that the application program is triggered for the second time. For example, the electronic device may generate a first validation instruction when it is detected that panning was triggered for the first time, and may generate a second validation instruction when panning was triggered again after exiting the panning application. When the first verification instruction is generated when the electronic device is unlocked, the second verification instruction may be generated when the electronic device detects that the application program is triggered for the first time. For example, when the electronic device is in a screen locking state, a first verification instruction may be generated for unlocking the electronic device, and after unlocking, when the payment apparatus is triggered for the first time, the electronic device may generate a second verification instruction. The duration threshold may be a specific value set by the user, for example, the duration threshold may be 5 seconds. The second verification interface may be a pattern verification interface, and may also be a number or character verification interface.
When the first verification interface is verified successfully, the electronic device may start a timer to start timing, when the second verification instruction is detected, the timer in the electronic device may stop timing, and the electronic device may calculate a timing duration between a timing start time and a timing stop time. When the timing duration calculated by the electronic device exceeds the duration threshold, the electronic device may present a second verification interface. The electronic device may be verified according to the presented second verification interface.
When the first verification interface is verified successfully, timing is started; and when the second verification instruction is detected and the timing duration exceeds the duration threshold, displaying a second verification interface according to the second verification instruction, and verifying according to the second verification interface. By calculating the timing duration between the successful verification of the first verification interface and the detection of the second verification instruction, the second verification is carried out when the timing duration exceeds the duration threshold, so that the verification safety is improved.
As shown in fig. 9, in an embodiment, the provided verification method may further include a process of performing verification in different verification manners according to the timing duration, specifically including:
and 902, when a second verification instruction is detected and the timing duration is greater than the first duration threshold and less than the second duration threshold, verifying in a second verification interface in a first verification mode.
The duration threshold may include a first duration threshold and a second duration threshold, and the first duration threshold is less than the second duration threshold. When the electronic device detects the second verification instruction, the timing duration between when the first verification interface is successfully verified and when the second verification instruction is detected can be calculated. The electronic device may compare the calculated timing length with the first length threshold and the second length threshold, and when the timing length is greater than the first length threshold and less than the second length threshold, the electronic device may perform verification in the second verification interface in the first verification manner. For example, the first time threshold is 4 seconds, the second time threshold is 8 seconds, when the electronic device detects the second verification instruction, the calculated timing time between when the verification of the first verification interface is successful and when the verification of the second verification instruction is detected is 5 seconds, the timing time is 5 seconds longer than the first time threshold by 4 seconds and shorter than the second time threshold by 8 seconds, and the electronic device can perform verification in the second interface through the first verification mode.
And 904, when the second verification instruction is detected and the timing duration is greater than the second duration threshold, verifying in a second verification interface in a second verification mode.
Similarly, when the electronic device detects the second verification instruction, the timing duration between when the verification of the first verification interface is successful and when the second verification instruction is detected may be calculated. The electronic device may compare the calculated timing length with the first length threshold and the second length threshold, and when the timing length is greater than the second length threshold, the electronic device may perform verification in the second verification interface in the second verification manner. For example, the first time threshold is 4 seconds, the second time threshold is 8 seconds, when the electronic device detects the second verification instruction, the calculated timing time between when the verification of the first verification interface is successful and when the verification of the second verification instruction is detected is 9 seconds, the timing time 9 seconds is greater than the second time threshold by 8 seconds, and the electronic device can perform verification in the second interface through the second verification mode.
And when the second verification instruction is detected and the timing duration is greater than the second duration threshold, verifying in the second verification interface in the second verification mode. The electronic equipment selects different verification modes to verify in the second verification interface according to the comparison result of the timing duration with the first duration threshold and the second duration threshold, so that the verification safety can be improved.
In an embodiment, as shown in fig. 10, the provided verification method may further include a process of performing verification by using a first verification method, specifically including:
step 1002, obtaining target data input through a virtual keyboard in a second verification interface.
The second verification interface may include a virtual keyboard. The virtual keyboard is a software simulation keyboard and is a key virtual keyboard which can be used on a touch screen. The target data may be a number, a character, or a combination of a number and a character entered by the user through the virtual keyboard. When the electronic device detects that the user inputs through the virtual keyboard in the second verification interface, the electronic device may acquire target data input through the virtual keyboard in the second verification interface.
Step 1004, when the target data is the same as the reference data, the second verification is successful, otherwise, the second verification fails.
The reference data is input before the target data, and the target data input in advance may be stored in the electronic device. After the electronic device acquires the target data, the acquired target data can be compared with the reference data, when the target data is the same as the reference data, the second verification is successful, otherwise, the second verification fails. For example, the reference data stored in the electronic device is 15195good, the target data acquired by the electronic device is 15195good, the electronic device may compare the reference data 15195good with the target data 15195good, and the reference data 15195good is the same as the target data 15195good, then the second verification is successful.
And acquiring target data input through a virtual keyboard in a second verification interface, wherein when the target data is the same as the reference data, the second verification is successful, and otherwise, the second verification fails. By acquiring the target data input by the virtual keyboard and comparing the difference between the input target data and the reference data, the verification result of whether the second verification is successful is obtained, and the safety and the accuracy of the verification can be improved.
As shown in fig. 11, in one embodiment, an interface schematic for verification using the first verification means is provided. The second verification interface 1100 includes an input box 1110 and a virtual keyboard 1120. When the electronic device detects the second verification instruction, and the timing duration is greater than the first duration threshold and less than the second duration threshold, the electronic device may display the second verification interface 1100. The electronic device may acquire the target data input through the virtual keyboard 1120 and compare the target data with the reference data, and when the target data is the same as the reference data, the second verification is successful.
In an embodiment, as shown in fig. 12, the provided verification method may further include a process of performing verification by using a second verification method, specifically including:
step 1202, collecting a second fingerprint feature of the touch virtual keyboard, and acquiring target data input through the virtual keyboard.
The second fingerprint feature is acquired when the electronic device detects that the virtual keyboard is touched. When the second verification interface is displayed, the electronic device can acquire a second fingerprint feature of the touch virtual keyboard, and the electronic device can also acquire target data input by the second fingerprint feature through the virtual keyboard.
Step 1204, when the second fingerprint feature matches the second valid fingerprint feature and the target data is the same as the reference data, the second verification is successful, otherwise, the second verification fails.
The second valid fingerprint feature may be collected before collecting the second fingerprint feature, and the second valid fingerprint feature collected in advance may be stored in the electronic device. After the electronic equipment acquires the second fingerprint characteristic, the characteristics of fingerprint lines, fingerprint patterns and the like of the second fingerprint characteristic can be compared with the fingerprint lines, fingerprint patterns and the like of the second legal fingerprint characteristic, and the matching degree is calculated. The electronic device can determine whether the second fingerprint feature matches the second legitimate fingerprint feature according to the calculated matching degree. The electronic device may further compare the obtained target data with the reference data, and when the second fingerprint feature matches the second legitimate fingerprint feature and the obtained target data is the same as the reference data, the second verification is successful, otherwise the second verification fails.
And when the second fingerprint feature is matched with the second legal fingerprint feature and the target data is the same as the reference data, the second verification is successful, otherwise, the second verification fails. The second fingerprint characteristic of the touch virtual keyboard is combined with the target data input through the virtual keyboard to carry out second verification, so that the safety and the accuracy of verification can be improved.
In another embodiment, the provided verification method may further include a process of performing verification using a second verification method, specifically including: and acquiring a second fingerprint characteristic of a preset key in the touch virtual keyboard, acquiring target data input through the virtual keyboard when the second fingerprint characteristic is matched with a second legal fingerprint characteristic, and successfully verifying the target data when the target data is the same as the legal data, otherwise, failing to verify the target data.
The preset key may be a key of a preset virtual keyboard. The electronic equipment can acquire second fingerprint characteristics of preset keys in the touch virtual keyboard, and can compare the fingerprint lines, the fingerprint patterns and other characteristics of the second fingerprint characteristics with the fingerprint lines, the fingerprint patterns and other characteristics of second legal fingerprint characteristics and calculate the matching degree. The electronic device can determine whether the second fingerprint feature matches the second legitimate fingerprint feature according to the calculated matching degree. The electronic device may further compare the obtained target data with the reference data, and when the second fingerprint feature matches the second legitimate fingerprint feature and the obtained target data is the same as the reference data, the second verification is successful, otherwise the second verification fails.
For example, the preset key may be a number key "0" in a virtual keyboard, the virtual keyboard of the electronic device may be in a locked state, when it is detected that the number key "0" in the virtual keyboard is touched, the electronic device may acquire a second fingerprint feature of the touched number key "0", and when the second fingerprint feature matches with a second legal fingerprint feature, the virtual keyboard may be switched from the locked state to an unlocked state. And then, the electronic equipment compares the acquired target data with the reference data, and when the second fingerprint features are matched with the second legal fingerprint features and the acquired target data are the same as the reference data, the second verification is successful, otherwise, the second verification fails.
As shown in fig. 13, in one embodiment, an interface schematic for verification using the second verification means is provided. The second verification interface 1300 includes an input box 1310 and a virtual keyboard 1330. When the electronic device detects the second verification instruction and the timing duration is greater than the second duration threshold, the electronic device may perform verification in the second verification interface in the second verification manner and display the second verification interface 1300. After the electronic device presents the second verification interface 1300, when the virtual keyboard 1330 is detected to be touched, the electronic device may capture the second fingerprint feature 1320 of the virtual keyboard 1330, and the electronic device may further calculate a matching degree of the captured second fingerprint feature 1320 and the second valid fingerprint feature. The electronic device may acquire target data input through the virtual keyboard 1330 and compare the acquired target data with reference data. When the second fingerprint features 1320 match the second legitimate fingerprint features and the obtained target data is the same as the reference data, the second verification is successful, otherwise the second verification fails. For example, the second legitimate fingerprint feature stored in the electronic device is the a fingerprint feature and the stored reference data is 15195 good. The matching degree of the second fingerprint characteristics acquired by the electronic equipment and the A fingerprint characteristics reaches 80%, namely the second fingerprint characteristics are matched with the second legal fingerprint characteristics, the target data acquired by the electronic equipment is 15195good, and the target data is the same as the stored reference data, and the second verification is passed.
In an embodiment, the provided verification method may further include a process of displaying different contents according to a verification result, specifically including: and when the first verification is successful, displaying the first content, and when the first verification is unsuccessful, displaying the second content, wherein the data contained in the first content is more than the data contained in the second content.
The first content and the second content refer to contents displayed in a display screen of the electronic device, and data included in the first content is more than data included in the second content. When the first verification is successful, the electronic device may display the first content in the display screen. When the first verification is unsuccessful, the electronic device may display the second content in the display screen. For example, when detecting that the address book application program is started, the electronic device may generate a first verification instruction and perform first verification, and when the first verification is successful, the electronic device may display a first contact list, where the first contact list may include 10 contacts; when the first verification is unsuccessful, a second contact list may be presented on the electronic device, where there may be 5 contacts in the second contact list. For another example, the electronic device is in a screen locking state, when the electronic device is unlocked according to the first verification instruction, first verification can be performed, and after the first verification is successful, the electronic device can display icons of 6 application programs; when the first authentication is unsuccessful, the electronic device may present icons of the 3 applications.
And when the first verification is successful, displaying the first content, and when the first verification is unsuccessful, displaying the second content, wherein the data contained in the first content is more than the data contained in the second content. Different contents are displayed according to different verification results, and the verification safety can be improved.
In one embodiment, as shown in FIG. 14, an interface diagram is provided that presents first content. When the first verification is successful, the electronic device may present the first content. Taking the address book application as an example, when the first verification is successful, the electronic device may display the first content interface 1400 in the display screen, and eight contacts exist in the address book application in the first content interface 1400. In contrast to the second content interface 1500 illustrated in fig. 15, more contacts are shown in the first content interface 1400 than in the second content interface 1500. As shown in FIG. 15, in one embodiment, an interface diagram is provided that presents the second content. When the first verification is unsuccessful, the electronic device may present the second content. Taking the address book application as an example, when the first verification is unsuccessful, the electronic device may display the second content interface 1500 in the display screen, and in the second content interface 1500, four contacts exist in the address book application. In contrast to the first content interface 1400 illustrated in fig. 14, the second content interface 1500 shows fewer contacts than the first content interface 1400.
In one embodiment, a verification method is provided, and the specific steps for implementing the method are as follows:
first, the electronic device may obtain a type of an application program and obtain a first valid fingerprint feature corresponding to the type of the application program. The electronic device can acquire the type of the application program and acquire a first legal fingerprint corresponding to the type of the application program according to the type of the application program. The types of the application programs are different, and the corresponding first legal fingerprints are different.
And then, when the electronic equipment detects at least one of the conditions that the application program is started, the application program is switched from the background to the foreground, and the specified function in the application program is triggered, generating a first verification instruction.
When the electronic equipment detects a first verification instruction, a first verification interface is displayed according to the first verification instruction, wherein the first verification instruction is generated according to the triggering operation of the application program. The electronic equipment can detect the electronic equipment in real time, and when the first verification instruction is detected, the electronic equipment can display the first verification interface according to the detected first verification instruction.
Next, the electronic device may obtain a first fingerprint feature captured when the first verification interface is touched. When the first verification interface is detected to be touched, light rays emitted by the display screen can penetrate through the cover plate to illuminate the fingerprint textures touching the first verification interface, and fingerprint reflection light rays penetrate through the screen and return to the sensor. At this point, the electronic device may capture a first fingerprint feature touching the first verification interface. After the electronic device acquires the first fingerprint feature acquired by touching the first verification interface, a touch track of the first fingerprint feature in the first verification interface can be acquired.
The electronic device can adopt an under-screen fingerprint technology when acquiring the first fingerprint feature. Fingerprint technique is through the pressure fingerprint induction module that utilizes electronic equipment's display screen below to set up, and the processor that electronic equipment was sent to the first fingerprint characteristic of gathering to the pressure fingerprint induction module, and electronic equipment's processor can match the legal fingerprint characteristic of prestoring in with received first fingerprint characteristic and the electronic equipment.
And when the first fingerprint characteristic is matched with the first legal fingerprint characteristic and the touch track is matched with the prestored touch track, the first verification is successful. When the first fingerprint feature matches the first valid fingerprint feature, the electronic device may obtain a pre-stored touch trajectory corresponding to the first valid fingerprint feature. And if the touch track is matched with the prestored touch track, the first verification is successful.
When the first verification interface is verified successfully, the electronic equipment starts timing. When the second verification instruction is detected and the timing duration exceeds the duration threshold, the electronic device can display a second verification interface according to the second verification instruction and perform verification according to the second verification interface. When the second verification instruction is detected, and the timing duration is greater than the first duration threshold and less than the second duration threshold, the electronic device can perform verification in the second verification interface through the first verification mode. When the second verification instruction is detected and the timing duration is greater than the second duration threshold, the electronic device can perform verification in the second verification interface through a second verification mode.
When the electronic device is verified in the first verification mode, the electronic device can acquire target data input through a virtual keyboard in the second verification interface. And when the target data is the same as the reference data, the second verification is successful, otherwise, the second verification fails.
When the electronic device adopts the second verification mode for verification, the electronic device can acquire the second fingerprint characteristic of the touch virtual keyboard and acquire the target data input through the virtual keyboard. And when the second fingerprint features are matched with the second legal fingerprint features and the target data is the same as the reference data, the second verification is successful, otherwise, the second verification fails.
Then, when the first verification is successful, the electronic device may present the first content, and when the first verification is unsuccessful, the electronic device may present the second content, wherein the first content includes more data than the second content.
The method comprises the steps of acquiring a touch track of a first fingerprint feature in a first verification interface by acquiring the first fingerprint feature acquired when the first verification interface is touched, and when the first fingerprint feature is matched with a first legal fingerprint feature and the touch track is matched with a pre-stored touch track, the first verification is successful. The method comprises the steps of acquiring a touch track of a first fingerprint feature in a first verification interface by acquiring the first fingerprint feature acquired when the first verification interface is touched, and successfully verifying when the first fingerprint feature is matched with a first legal fingerprint feature and the touch track is matched with a prestored touch track. By combining the fingerprint characteristics with the touch trajectory, the security of the verification is improved.
It should be understood that, although the steps in the respective flowcharts described above are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in each of the flowcharts described above may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or the stages is not necessarily sequential, but may be performed alternately or alternatingly with other steps or at least a portion of the sub-steps or stages of other steps.
Fig. 16 is a block diagram showing the structure of an authentication apparatus according to an embodiment, as shown in fig. 16, the apparatus including: a fingerprint feature obtaining module 1610, a touch trajectory obtaining module 1620, and a verification module 1630, wherein:
a fingerprint feature obtaining module 1610, configured to obtain a first fingerprint feature collected when the first verification interface is touched.
The touch trajectory acquiring module 1620 is configured to acquire a touch trajectory of the first fingerprint feature in the first verification interface.
The verification module 1630 is configured to, when the first fingerprint feature matches the first valid fingerprint feature and the touch trajectory matches the pre-stored touch trajectory, verify the first fingerprint feature successfully.
In one embodiment, a verification apparatus is provided that may further include a first verification interface presentation module. The first verification interface display module is used for displaying the first verification interface according to a first verification instruction when the first verification instruction is detected, wherein the first verification instruction is generated according to triggering operation of an application program.
In one embodiment, a verification apparatus is provided that may further include a first verification instruction generation module. The first verification instruction generation module is used for generating a first verification instruction when the opening of the application program is detected.
In another embodiment, the first verification instruction generation module is further configured to generate the first verification instruction when it is detected that the application program switches from background to foreground.
In a further embodiment, the first verification instruction generation module is further configured to generate the first verification instruction when detecting that a specified function in the application is triggered.
In one embodiment, the fingerprint feature obtaining module 1610 is further configured to obtain a type of the application program and obtain a first valid fingerprint feature corresponding to the type of the application program.
In an embodiment, the verification module 1630 is further configured to obtain a pre-stored touch trajectory corresponding to the first valid fingerprint feature when the first fingerprint feature matches the first valid fingerprint feature, and if the touch trajectory matches the pre-stored touch trajectory, the first verification is successful.
In one embodiment, a verification apparatus provided may further include a timing module and a second verification interface display module, wherein:
and the timing module is used for starting timing when the first verification interface is verified successfully.
And the second verification interface display module is used for displaying the second verification interface according to the second verification instruction and verifying according to the second verification interface when the second verification instruction is detected and the timing duration exceeds the duration threshold.
In one embodiment, the duration threshold includes a first duration threshold and a second duration threshold, and the first duration threshold is less than the second duration threshold. The provided authentication apparatus may further include a first authentication module and a second authentication module, wherein:
and the first verification module is used for verifying in the second verification interface in a first verification mode when the second verification instruction is detected and the timing duration is greater than the first duration threshold and less than the second duration threshold.
And the second verification module is used for verifying in a second verification interface in a second verification mode when a second verification instruction is detected and the timing duration is greater than a second duration threshold.
In one embodiment, the second verification interface is a verification interface that includes a virtual keyboard. The first verification module is further used for obtaining target data input through a virtual keyboard in the second verification interface, when the target data are the same as the reference data, the second verification is successful, and otherwise, the second verification fails.
In one embodiment, the second verification interface is a verification interface that includes a virtual keyboard. The second verification module is further used for acquiring a second fingerprint feature of the touch virtual keyboard and acquiring target data input through the virtual keyboard, when the second fingerprint feature is matched with a second legal fingerprint feature and the target data is the same as the reference data, the second verification is successful, otherwise, the second verification fails.
In one embodiment, a verification apparatus is provided that may further include a first content presentation module and a second content presentation module, wherein:
and the first content display module is used for displaying the first content when the first verification is successful.
And the second content display module is used for displaying the second content when the first verification is unsuccessful.
Wherein the first content contains more data than the second content.
The division of the modules in the verification apparatus is merely for illustration, and in other embodiments, the verification apparatus may be divided into different modules as needed to complete all or part of the functions of the verification apparatus.
For the specific definition of the verification device, reference may be made to the above definition of the verification method, which is not described herein again. The modules in the verification device can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
The respective modules in the authentication apparatus provided in the embodiments of the present application may be implemented in the form of a computer program. The computer program may be run on a terminal or a server. The program modules constituted by the computer program may be stored on the memory of the terminal or the server. Which when executed by a processor, performs the steps of the method described in the embodiments of the present application.
The embodiment of the application also provides a computer readable storage medium. One or more non-transitory computer-readable storage media containing computer-executable instructions that, when executed by one or more processors, cause the processors to perform the steps of the authentication method.
A computer program product comprising instructions which, when run on a computer, cause the computer to perform a method of authentication.
The embodiment of the application also provides the electronic equipment. As shown in fig. 17, for convenience of explanation, only the portions related to the embodiments of the present application are shown, and details of the specific techniques are not disclosed, please refer to the method portion of the embodiments of the present application. The electronic device may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a vehicle-mounted computer, a wearable device, and the like, taking the electronic device as the mobile phone as an example:
fig. 17 is a block diagram of a partial architecture of a mobile phone related to an electronic device provided in an embodiment of the present application. Referring to fig. 17, the handset includes: touch screen 1710, application 1720, frame fingerprinting service 1730, hardware abstraction fingerprinting service 1740, trusted application ta (trusted application) verification 1750, and hardware module 1760. Those skilled in the art will appreciate that the handset configuration shown in fig. 17 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The touch screen 1710 can be used to display the first verification interface and the second verification interface. The touch screen 1710 can also be used for showing verification modes, when the mobile phone detects that the first verification interface is touched, light emitted by the display screen can penetrate through the touch screen 1710 to illuminate fingerprint textures touching the first verification interface and reflect the light to return to the sensor through the touch screen 1710, and accordingly, the mobile phone collects first fingerprint characteristics. When the cell phone detects that the first fingerprint feature slides on the touch screen 1710, the cell phone may acquire a touch trajectory formed in the touch screen 1710. After the mobile phone is unlocked, when it is detected that an icon of an application program in the touch screen 1710 is triggered, the mobile phone may generate a first verification instruction according to the trigger, and then display a first verification interface in the touch screen 1710.
An authentication interface and fingerprint logic processing module 1724 may be included in application 1720. The verification interface may include a virtual keyboard 1722 for inputting target data and reference data. When there is a press event on the touchscreen 1710, the fingerprint logic processing module 1724 is configured to send a notification to the frame fingerprinting service 1730 that there is a press event on the touchscreen 1710.
The frame fingerprinting service 1730 may be used to receive notifications sent by the fingerprint logic processing module 1724 that there is a press event on the touchscreen 1710. The framework fingerprinting service 1730 may also be used to send the verification results obtained by the hardware abstraction fingerprinting service 1740 to the fingerprinting logic processing module 1724.
The hardware abstraction fingerprint service 1740 may be configured to receive a notification that the touch screen 1710 sent by the framework fingerprint service 1730 has a press event, and trigger the hardware module 1760 to collect fingerprint features according to the received notification. After receiving the fingerprint features collected by the hardware module 1760, the hardware abstract fingerprint service 1740 may send the fingerprint features to the TA check 1750 for checking. The hardware abstraction fingerprinting service 1740 may also send the received verification results to the framework fingerprinting service 1730.
TA check 1750 may receive the image feature sent by hardware abstract fingerprint service 1740, check the image feature, and send the verification result to abstract fingerprint service 1740.
After receiving the trigger command of the hardware abstract fingerprint service 1740, the hardware module 1760 may collect fingerprint features and send the collected fingerprint features to the hardware abstract fingerprint service.
Any reference to memory, storage, database, or other medium used herein may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms, such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method of authentication, comprising:
acquiring a first fingerprint characteristic acquired when a first verification interface is touched;
acquiring a touch track of the first fingerprint feature in the first verification interface;
acquiring the type of an application program, and acquiring a first legal fingerprint characteristic corresponding to the type of the application program;
when the first fingerprint feature is matched with the first legal fingerprint feature and the touch track is matched with a prestored touch track, the first verification is successful;
when the first verification interface is verified successfully, timing is started; when a second verification instruction is detected, and the timing duration is greater than the first duration threshold and less than the second duration threshold, verifying in a second verification interface in a first verification mode; wherein the second verification instruction is generated according to a trigger operation on an application program;
and when the second verification instruction is detected and the timing duration is greater than a second duration threshold, verifying in a second verification interface in a second verification mode.
2. The method of claim 1, wherein prior to obtaining the first fingerprint feature captured when the first verification interface was touched, the method further comprises:
when a first verification instruction is detected, displaying the first verification interface according to the first verification instruction; wherein the first verification instruction is generated according to a trigger operation on an application program.
3. The method of claim 2, wherein prior to presenting the first verification interface in accordance with the first verification instruction when the first verification instruction is detected, the method further comprises at least one of:
when detecting that the application program is started, generating a first verification instruction;
when the application program is detected to be switched from a background to a foreground, generating a first verification instruction;
when detecting that a specified function in the application program is triggered, generating a first verification instruction.
4. The method of claim 1, wherein when the first fingerprint feature matches a first valid fingerprint feature and the touch trajectory matches a pre-stored touch trajectory, the first verification is successful, comprising:
when the first fingerprint characteristic is matched with a first legal fingerprint characteristic, acquiring a prestored touch track corresponding to the first legal fingerprint characteristic;
and if the touch track is matched with the prestored touch track, the first verification is successful.
5. The method of claim 1, wherein the second verification interface is a verification interface comprising a virtual keyboard;
the verifying in the second verification interface by the first verification mode comprises the following steps:
acquiring target data input through a virtual keyboard in the second verification interface;
when the target data is the same as the reference data, the second verification is successful; otherwise, the second verification fails.
6. The method of claim 1, wherein the second verification interface is a verification interface comprising a virtual keyboard;
the verifying in the second verification interface by the second verification mode includes:
acquiring a second fingerprint characteristic of touching the virtual keyboard, and acquiring target data input through the virtual keyboard;
when the second fingerprint feature is matched with a second legal fingerprint feature and the target data is the same as the reference data, the second verification is successful; otherwise, the second verification fails.
7. The method of claim 1, further comprising:
when the first verification is successful, displaying the first content;
when the first verification is unsuccessful, displaying the second content;
wherein the first content includes more data than the second content.
8. An authentication apparatus, comprising:
the fingerprint characteristic acquisition module is used for acquiring a first fingerprint characteristic acquired when the first verification interface is touched;
the touch track acquisition module is used for acquiring a touch track of the first fingerprint feature in the first verification interface;
the fingerprint feature acquisition module is used for acquiring the type of an application program and acquiring a first legal fingerprint feature corresponding to the type of the application program;
the verification module is used for successfully verifying when the first fingerprint characteristic is matched with the first legal fingerprint characteristic and the touch track is matched with a prestored touch track;
the timing module is used for starting timing when the first verification interface is verified successfully;
the first verification module is used for verifying in the second verification interface in a first verification mode when a second verification instruction is detected and the timing duration is greater than a first duration threshold and less than a second duration threshold; wherein the second verification instruction is generated according to a trigger operation on an application program;
and the second verification module is used for verifying in a second verification interface in a second verification mode when a second verification instruction is detected and the timing duration is greater than a second duration threshold.
9. An electronic device comprising a memory and a processor, the memory having stored therein a computer program that, when executed by the processor, causes the processor to perform the steps of the authentication method according to any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN201810869929.6A 2018-08-02 2018-08-02 Verification method and device, electronic equipment and computer readable storage medium Active CN109117616B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810869929.6A CN109117616B (en) 2018-08-02 2018-08-02 Verification method and device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810869929.6A CN109117616B (en) 2018-08-02 2018-08-02 Verification method and device, electronic equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN109117616A CN109117616A (en) 2019-01-01
CN109117616B true CN109117616B (en) 2021-03-02

Family

ID=64851659

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810869929.6A Active CN109117616B (en) 2018-08-02 2018-08-02 Verification method and device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109117616B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020186481A1 (en) * 2019-03-20 2020-09-24 深圳市汇顶科技股份有限公司 Fingerprint collection method and system, and electronic device
CN110503026B (en) * 2019-08-19 2022-03-22 Oppo(重庆)智能科技有限公司 Fingerprint data calibration method and device based on fingerprint mold pressing detection system
CN111882719A (en) * 2020-07-31 2020-11-03 孙忠飞 Password anti-theft method and device based on dynamic password and intelligent lockset
CN114611084B (en) * 2022-05-11 2022-08-16 深圳市德航智能技术有限公司 Data security protection method based on tablet computer
WO2024015034A1 (en) * 2022-07-14 2024-01-18 Novayen Enerji̇ Yazilim Üreti̇m Dağitim Pazarlama Li̇mi̇ted Şi̇rketi̇ Scrollable and time sensitive six biometric key password generation and authentication machine

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103092503A (en) * 2012-10-11 2013-05-08 百度在线网络技术(北京)有限公司 Unlocking and verification method for mobile terminal and unlocking and verification device
CN104376239A (en) * 2014-11-26 2015-02-25 小米科技有限责任公司 Terminal unlocking method and device
CN104915582A (en) * 2015-05-28 2015-09-16 努比亚技术有限公司 Unlocking method and unlocking device
CN108171031A (en) * 2017-11-28 2018-06-15 北京珠穆朗玛移动通信有限公司 A kind of method for controlling mobile terminal, mobile terminal and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104715178B (en) * 2013-12-11 2020-04-03 深圳富泰宏精密工业有限公司 Unlocking system and method of electronic device
CN106570383A (en) * 2016-11-15 2017-04-19 广东欧珀移动通信有限公司 Unlocking method and apparatus for mobile terminal, and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103092503A (en) * 2012-10-11 2013-05-08 百度在线网络技术(北京)有限公司 Unlocking and verification method for mobile terminal and unlocking and verification device
CN104376239A (en) * 2014-11-26 2015-02-25 小米科技有限责任公司 Terminal unlocking method and device
CN104915582A (en) * 2015-05-28 2015-09-16 努比亚技术有限公司 Unlocking method and unlocking device
CN108171031A (en) * 2017-11-28 2018-06-15 北京珠穆朗玛移动通信有限公司 A kind of method for controlling mobile terminal, mobile terminal and storage medium

Also Published As

Publication number Publication date
CN109117616A (en) 2019-01-01

Similar Documents

Publication Publication Date Title
CN109117616B (en) Verification method and device, electronic equipment and computer readable storage medium
EP3428819B1 (en) Mobile security countermeasures
CN109165940B (en) Anti-theft method and device and electronic equipment
CN105825382B (en) Mobile payment method and electronic equipment
EP3147768B1 (en) Screen interface unlocking method and screen interface unlocking device
US9384369B2 (en) Information processing method and electronic device
AU2013205396B2 (en) Methods and Systems for Conducting Smart Card Transactions
CN107689936B (en) Security verification system, method and device for login account
CN105678147B (en) Touch operation method and device
US10282532B2 (en) Secure storage of fingerprint related elements
US9483682B1 (en) Fingerprint recognition method and device thereof
CN105608357A (en) Fingerprint verification method, fingerprint verification device and terminal
JP2023549934A (en) Method and apparatus for user recognition
CN107085694B (en) Information display processing method and device
CN105678137A (en) Method and device for identity recognition
US10936706B2 (en) Biometric authentication
CN106529232A (en) Startup method and device
CN112966249A (en) Multi-user account switching method and device, computer equipment and medium
US10095911B2 (en) Methods, devices, and computer-readable mediums for verifying a fingerprint
CN110222492B (en) System switching method and device, computer equipment and computer readable storage medium
CN106446719B (en) Method for preventing eSIM file from being tampered and mobile terminal
CN110636493B (en) Information backup method, device and equipment of virtual SIM card and storage medium
CN109583168B (en) Unlocking control method and electronic device
CN104838680B (en) Implementation method, system and the communication terminal of virtual user identifying card
CN106156586B (en) Control method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant