CN110245477B - Information verification method, device, equipment and storage medium - Google Patents

Information verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN110245477B
CN110245477B CN201910471978.9A CN201910471978A CN110245477B CN 110245477 B CN110245477 B CN 110245477B CN 201910471978 A CN201910471978 A CN 201910471978A CN 110245477 B CN110245477 B CN 110245477B
Authority
CN
China
Prior art keywords
information
input
hard disk
sample
mechanical hard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910471978.9A
Other languages
Chinese (zh)
Other versions
CN110245477A (en
Inventor
过晓冰
王云浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201910471978.9A priority Critical patent/CN110245477B/en
Publication of CN110245477A publication Critical patent/CN110245477A/en
Application granted granted Critical
Publication of CN110245477B publication Critical patent/CN110245477B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Abstract

The embodiment of the application discloses an information verification method, which is applied to a terminal, wherein the terminal comprises the following steps: a mechanical hard disk; the method comprises the following steps: receiving an instruction, and triggering the mechanical hard disk to enter a write-in state to obtain write-in information if the instruction meets a preset condition; responding to the instruction, and acquiring input information corresponding to an input operation; and detecting whether the input operation passes verification or not according to the written information and the input information. The embodiment of the application also discloses an information verification device, equipment and a storage medium.

Description

Information verification method, device, equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of computers, and relates to but is not limited to an information verification method, an information verification device, information verification equipment and a storage medium.
Background
In the related art, personal computers, web pages, etc. have a lot of verification of real behavior interaction of users in order to prevent automatic login, including but not limited to: recognizing characters, letters, pictures and the like; simple mathematical problems to calculate, etc. However, as the ways of verifying the real behavior interaction of the user are more and more, the corresponding artificial intelligence algorithm is more and more complex, and the implementation is very difficult.
Disclosure of Invention
The embodiment of the application provides an information verification method, an information verification device, information verification equipment and a storage medium.
The technical scheme of the embodiment of the application is realized as follows:
in a first aspect, an embodiment of the present application provides an information verification method, where the method is applied to a terminal, and the terminal includes: a mechanical hard disk; the method comprises the following steps:
receiving an instruction, and triggering the mechanical hard disk to enter a write-in state to obtain write-in information if the instruction meets a preset condition;
responding to the instruction, and acquiring input information corresponding to an input operation;
and detecting whether the input operation passes verification or not according to the written information and the input information.
In a second aspect, an embodiment of the present application provides an information verification apparatus, including: the device comprises a first acquisition module, a second acquisition module and a detection module; wherein the content of the first and second substances,
the first acquisition module is used for receiving an instruction, and triggering the mechanical hard disk to enter a write-in state to acquire write-in information if the instruction meets a preset condition;
the second obtaining module is used for responding to the instruction and obtaining input information corresponding to an input operation;
and the detection module is used for detecting whether the input operation passes the verification or not according to the written information and the input information.
In a third aspect, an embodiment of the present application further provides an information verification apparatus, including: a mechanical hard disk, a processor, and a memory for storing a computer program capable of running on the processor; the processor is used for executing the information verification method when the computer program is run.
In a fourth aspect, the present application further provides a storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the information verification method.
In the embodiment of the application, an instruction is received, and if the instruction meets a preset condition, the mechanical hard disk is triggered to enter a write-in state to obtain write-in information; responding to the instruction, and acquiring input information corresponding to an input operation; detecting whether the input operation passes verification or not according to the written information and the input information; therefore, the information verification is simple and convenient to realize, and the verification result is accurate.
Drawings
In the drawings, which are not necessarily drawn to scale, like reference numerals may describe similar components in different views. Like reference numerals having different letter suffixes may represent different examples of similar components. The drawings illustrate generally, by way of example, but not by way of limitation, various embodiments discussed herein.
Fig. 1 is a schematic flow chart of an implementation of an information verification method according to an embodiment of the present application;
fig. 2 is a schematic flow chart illustrating an implementation of the information verification method according to the embodiment of the present application;
fig. 3 is a schematic flow chart of an implementation of the information verification method according to the embodiment of the present application;
fig. 4 is a schematic flow chart of an implementation of the information verification method according to the embodiment of the present application;
fig. 5 is a first schematic diagram illustrating an information verification method in the prior art according to an embodiment of the present application;
fig. 6 is a second schematic diagram illustrating an information verification method in the prior art according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an information verification apparatus according to an embodiment of the present application;
fig. 8 is a schematic hardware structure diagram of an information verification apparatus according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, specific technical solutions of the present application will be described in further detail below with reference to the accompanying drawings in the embodiments of the present application. The following examples are intended to illustrate the present application but are not intended to limit the scope of the present application.
In describing the embodiments of the present application in detail, the cross-sectional views illustrating the structure of the device are not enlarged partially in a general scale for convenience of illustration, and the schematic drawings are only examples, which should not limit the scope of the present application. In addition, the three-dimensional dimensions of length, width and depth should be included in the actual fabrication.
The embodiment of the application provides an information verification method, which is applied to electronic equipment for implementing the information verification method, wherein each functional module in the electronic equipment can be cooperatively realized by hardware resources of the electronic equipment (such as terminal equipment and a server), such as computing resources of a processor and the like, detection resources of a sensor and the like, and communication resources.
The electronic device may be any electronic device with information processing capability, and in one embodiment, the electronic device may be an intelligent terminal, for example, a mobile terminal with wireless communication capability such as a notebook, an AR device, or the like. In another embodiment, the electronic device may also be a computing-capable terminal device that is not mobile, such as a desktop computer, a server, etc.
Of course, the embodiments of the present application are not limited to being provided as methods and hardware, and may be provided as a storage medium (storing instructions for executing the information verification method provided by the embodiments of the present application) in various implementations.
Fig. 1 is a schematic view of an implementation flow of an information verification method in an embodiment of the present application, where the information verification method is applied to a terminal, and the terminal includes: mechanical hard disk, as shown in fig. 1, the method includes the following steps:
step 101: receiving an instruction, and triggering the mechanical hard disk to enter a write-in state to obtain write-in information if the instruction meets a preset condition;
here, the information verification method according to the embodiment of the present application is applied to a terminal, for example: the method comprises the steps that a notebook computer, a desktop computer and the like receive an instruction on a terminal, if the received instruction meets a preset condition, a mechanical hard disk is triggered to enter a writing state, and the terminal acquires writing information written into the mechanical hard disk.
The instruction may be an instruction generated when the user operates on the terminal, such as: and clicking an input box displayed on a display interface of the terminal to generate the command. In the embodiment of the present application, an instruction is not limited.
Here, the preset condition may be stored in the terminal in advance, or may be obtained from the server when the terminal receives an instruction, and the preset condition is not limited in the embodiment of the present application.
When the instruction received by the terminal meets a preset condition, for example: and triggering the mechanical hard disk to enter a writing state when the content of the display interface corresponding to the generated instruction comprises the specified content.
Here, the mechanical hard disk can perform the same function as a microphone sensor, and record sound. In the case of sound generation, such as: the sound generated by knocking the keyboard or the physical vibration sound of the keyboard area caused by the keys is transmitted into the hard disk, and the mechanical wave of the sound is written into the hard disk when the mechanical hard disk is in a writing state. After the mechanical wave of the sound is written into the hard disk, the terminal can acquire the written information written into the mechanical hard disk.
Here, the written information may be represented as a change of sectors of the mechanical hard disk.
In practical application, an input frame is displayed on a display interface of a terminal, a user clicks in the input frame to generate an instruction, the terminal receives the generated instruction and detects whether the content of the display interface corresponding to the instruction comprises designated content, and when the content of the display interface comprises the designated content, a mechanical hard disk is triggered to enter a writing state; after the mechanical hard disk enters a writing state, a user operates the keyboard on the terminal, vibration sound is generated based on the operation of the user on the keyboard, and mechanical waves of the vibration sound are transmitted into the hard disk to obtain writing information. Such as: the sound generated by hitting A, B, C key in the keyboard is conducted to the hard disk, and the obtained written information is "XXX".
Step 102: responding to the instruction, and acquiring input information corresponding to an input operation;
here, when the terminal receives the instruction, the user performs an input operation on the terminal, and in response to the received instruction, the terminal acquires input information corresponding to the input operation.
Such as: the terminal receives a command generated by clicking in an input box displayed on a display interface of the terminal, a user inputs a character ABC in the input box by performing input operation, and the terminal acquires input information ABC corresponding to the input operation in response to the clicking operation.
Step 103: and detecting whether the input operation passes verification or not according to the written information and the input information.
Here, when the written information and the input information are obtained, the terminal matches the written information and the input information, thereby detecting whether the input operation is verified.
The corresponding relation between the sample writing information and the sample input information can be stored in advance, and the writing information and the input information are matched according to the corresponding relation; if the written information is matched with the input information, the input operation passes the verification; if the written information and the input information do not match, the input operation is not verified.
Such as: the correspondence between the stored sample write information and the sample input information is: "XXX" corresponds to "ABC"; when the written information is XXX and the input information is ABC, the written information and the input information are matched and pass the verification; when the written information is "XXX 1" and the input information is "ABC", the two do not match and the verification is not passed.
It should be noted that the correspondence between the sample writing information and the sample input information may be stored in the terminal in advance, or may be acquired from the server at the time of detection.
In practical application, the information verification method can be used for determining the corresponding relation between the input verification code and the written information written into the mechanical hard disk in advance under the condition of detecting the verification code; when the verification code is input, obtaining the verification code input by input operation and the written information of the mechanical hard disk, and matching the input verification code and the written information of the mechanical hard disk according to the corresponding relation; if the input verification code can be matched with the written information of the mechanical hard disk, the input operation is verified; if the input verification code and the written information of the mechanical hard disk cannot be matched, the input operation is not verified.
The information verification method provided by the embodiment of the application receives an instruction, and if the instruction meets a preset condition, the mechanical hard disk is triggered to enter a write-in state to obtain write-in information; responding to the instruction, and acquiring input information corresponding to an input operation; detecting whether the input operation passes verification or not according to the written information and the input information; therefore, the information verification is simple and convenient to realize, and the verification result is accurate.
An embodiment of the present application provides an information verification method, as shown in fig. 2, the method includes the following steps:
step 201: receiving an instruction, and acquiring the content of a display interface corresponding to the instruction;
here, when the terminal receives an instruction, the content of the display interface corresponding to the instruction is acquired. Such as: when the terminal receives a command generated by clicking in an input frame displayed on a display interface of the terminal, the content displayed on the display interface is acquired.
Step 202: if the content of the display interface corresponding to the instruction comprises specified content, determining that the instruction meets a preset condition;
the designated content may be a verification code, a verification operation, a verification picture, and the like.
Here, after acquiring the content displayed on the display interface, the terminal determines whether the content of the display interface includes the specified content, and if the content of the display interface includes the specified content, determines that the instruction satisfies the preset condition. Such as: the content of the display interface comprises specified content: and verifying the code ABC, and determining that the instruction meets the preset condition.
If the content of the display interface does not include the specified content, determining that the instruction does not meet the preset condition, and continuously detecting whether an instruction is received.
The content of the specification may be set in advance, and the embodiment of the present application does not limit this.
Step 203: if the instruction meets the preset condition, triggering the mechanical hard disk to enter a write-in state to obtain write-in information;
step 204: responding to the instruction, and acquiring input information corresponding to an input operation;
step 205: and detecting whether the input operation passes verification or not according to the written information and the input information.
In step 203 to step 205, refer to step 101 to step 103 in the above embodiments, respectively.
According to the information verification method provided by the embodiment of the application, when the content of the display interface corresponding to the instruction comprises the specified content, the instruction is determined to meet the preset condition, so that the mechanical hard disk is triggered to enter the writing state, and the writing information is obtained.
An embodiment of the present application provides an information verification method, as shown in fig. 3, the method includes the following steps:
step 301: receiving an instruction, and if the instruction meets a preset condition, closing disk write cache operation of an operating system or starting a direct-write mode;
here, when the terminal receives an instruction, if the instruction meets a preset condition, the mechanical hard disk enters a write-in state, and before the mechanical hard disk enters the write-in state, the terminal closes the disk write-in cache operation of the operating system.
Here, it should be noted that, if the disk write cache operation of the operating system is not closed, the mechanical disk is not read and written immediately, the written information is cached in the disk of the operating system, and the mechanical hard disk cannot record the sound generated by the keyboard stroke at the current time.
When the central processor in the terminal adopts the cache, a write-through mode can be started, namely, the terminal can directly write into the mechanical hard disk and cannot write into a magnetic disk of an operating system.
Step 302: under the condition of closing the disk write cache operation of the operating system or starting the direct-write mode, triggering the mechanical hard disk to enter a write-in state to obtain write-in information;
here, in the case where the disk write cache operation of the operating system is turned off or the write-through mode is enabled, the mechanical hard disk is triggered to enter the write state.
When the mechanical hard disk enters a writing state, a user operates the keyboard on the terminal, vibration sound is generated based on the operation of the user on the keyboard, mechanical waves of the vibration sound are directly conducted into the mechanical hard disk, written information is obtained, and caching in a magnetic disk of an operating system is avoided.
In an embodiment, after triggering the mechanical hard disk to enter the write state, the method further includes: writing the input time of the input operation into the mechanical hard disk, and establishing an incidence relation between the input time and the written information;
wherein the input time is used to associate the written information with the input operation.
After the mechanical hard disk is triggered to enter the writing state, the terminal writes information based on input operation of a user, writes input time of the input operation into the mechanical hard disk, and establishes an association relationship between the input time and the written information.
Such as: based on the input operation of the user, the obtained written information is "XXX", and the input time of the input operation is: 19 minutes and 26 seconds at 14 hours and 19 minutes at 11 months and 15 days in 2019, the terminal establishes the association relationship between the input time and the written information as follows: "XXX" corresponds to 19 minutes 26 seconds at 11, 15, 14, 2019.
In this way, the input time is obtained while the written information is obtained based on the input operation of the user, when whether the subsequent input operation passes the verification is detected, the written information corresponding to the input time can be determined by using the input time, and the written information is matched with the input information of the input operation, so that whether the input operation passes the verification is detected.
In an embodiment, the triggering the mechanical hard disk to enter a write state to obtain write information includes: and triggering the mechanical hard disk to enter a writing state, and performing writing operation in a blank writing area of the mechanical hard disk to obtain the writing information.
Here, when the terminal writes information based on an input operation of a user after triggering the mechanical hard disk to enter the write state, the terminal performs a write operation in a blank write area of the mechanical hard disk to obtain the write information.
In this way, when a write operation is performed in a blank write area of the mechanical hard disk, the write information is prevented from colliding with other information stored in the mechanical hard disk.
When the write information is obtained when the write operation is performed in the blank write area of the mechanical hard disk, the input time corresponding to the write information may be written in the blank write area of the mechanical hard disk.
In practical application, when a terminal receives an instruction, if the instruction meets a preset condition, the terminal closes or enables a write-through mode for a disk write cache operation of an operating system, and under the condition that the cache operation is closed or the write-through mode is enabled, the mechanical hard disk is triggered to enter a write-in state, information is written into a blank write-in area of the mechanical hard disk based on input operation of a user, and input time corresponding to the write-in information is written at the same time.
Step 303: responding to the instruction, and acquiring input information corresponding to an input operation;
step 304: and detecting whether the input operation passes verification or not according to the written information and the input information.
Wherein, steps 303 to 304 refer to steps 102 to 103 in the above embodiments.
The information verification method provided by the embodiment of the application can write the written information and the write time corresponding to the written information into a blank write-in area of the mechanical hard disk under the condition that the disk write-in cache operation of an operating system is closed or a write-through mode is started, and is simple and convenient to implement during information verification and accurate in verification result.
An embodiment of the present application provides an information verification method, as shown in fig. 4, the method includes the following steps:
step 401: receiving an instruction, and triggering the mechanical hard disk to enter a write-in state to obtain write-in information if the instruction meets a preset condition;
step 402: responding to the instruction, and acquiring input information corresponding to an input operation;
wherein, steps 401 to 402 refer to steps 101 to 102 in the above embodiments, respectively.
Step 403: performing writing operation on sample input operation on the mechanical hard disk to obtain sample writing information;
here, before detecting whether the input operation passes the verification based on the write information and the input information, a correspondence relationship between the sample write information and the sample input information is established, and whether the input operation passes the verification is determined based on the correspondence relationship, the write information, and the input information.
When the corresponding relation between the sample writing information and the sample input information is established, firstly, the sample input operation is written in the mechanical hard disk, and the sample writing information is obtained.
Such as: the sample input operation is to tap A, B, C key on the keyboard, and based on the sample input operation, when the mechanical hard disk is in the writing state, the mechanical hard disk is written to obtain the sample writing information "XXX".
Step 404: acquiring sample input information corresponding to the sample input operation;
here, based on a sample input operation by the user, the terminal acquires sample input information corresponding to the sample input operation.
Such as: when the user clicks A, B, C on the keyboard in the sample input operation, the terminal acquires that the sample input information corresponding to the sample input operation is "ABC".
Step 405: establishing a corresponding relation between the sample writing information and the sample input information;
here, the sample writing information and the sample input information are both obtained based on a sample input operation by a user, and therefore, there is a correspondence relationship between the sample writing information and the sample input information, and the correspondence relationship between the sample writing information and the sample input information is established.
Such as: the sample input operation of the user is to tap A, B, C key on the keyboard, the sample writing information corresponding to the above sample input operation is "XXX", the sample input information is "ABC", and the corresponding relationship between the sample writing information and the sample input information is as follows: "XXX" corresponds to "ABC".
Here, after the correspondence relationship between the sample writing information and the sample input information is established, the correspondence relationship between the sample writing information and the sample input information may be stored in the terminal or the server, and acquired from the terminal or the server when the input operation is verified.
Step 406: acquiring a corresponding relation between sample writing information and sample input information;
here, in verifying the input operation, the correspondence between the sample writing information and the sample input information is acquired from the terminal or the server. The obtained corresponding relationship between the sample writing information and the sample input information may be stored in a storage module of the terminal or the server.
Step 407: matching the written information with the input information according to the corresponding relation;
here, after the correspondence between the sample write information and the sample input information is obtained, the write information is matched with the input information using the correspondence.
Such as: the corresponding relationship between the sample write information and the sample input information is: "XXX" corresponds to "ABC", the written information is "XXX", the input information is "ABC", and the written information is "XXX", and the input information is "ABC", and the correspondence is substituted to determine whether the written information and the input information match.
Step 408: if the written information is matched with the input information, determining that the input operation passes verification;
here, with the use of the correspondence between the sample write information and the sample input information, if the write information matches the input information, it is determined that the input operation is verified.
Such as: the corresponding relationship between the sample write information and the sample input information is: "XXX" corresponds to "ABC", the written information is "XXX", the input information is "ABC", and it can be seen that the input operation is verified if the written information matches the input information.
Step 409: and if the written information does not match the input information, determining that the input operation is not verified.
Here, with the correspondence between the sample write information and the sample input information, if the write information does not match the input information, it is determined that the input operation is not verified.
Such as: the corresponding relationship between the sample write information and the sample input information is: "XXX" corresponds to "ABC", the written information is "XXD", the input information is "ABC", and it can be seen that the written information does not match the input information, the input operation is not verified.
The information verification method provided by the embodiment of the application can detect whether the input operation passes the verification according to the corresponding relation between the sample write-in information and the sample input information, the write-in information and the input information, is simple and convenient to realize during information verification, and has an accurate verification result.
The information verification method provided by the embodiment of the present application is described in a specific scenario in the embodiment of the present application.
In the prior art, an information verification method includes: and verifying characters, letters, numbers, pictures or input operation. As shown in fig. 5, the display interface includes a picture 501, a picture 502, a picture 503, a picture 504, a picture 505, a picture 506, a picture 507, and a picture 508, and a target picture needs to be selected from the pictures for verification; as shown in fig. 6, the display interface includes a picture 601, and the picture 601 needs to be operated to perform verification; however, the algorithm of the above scheme is very complex and difficult to implement.
The embodiment of the application adopts the mechanical hard disk to realize the information verification method provided by the embodiment of the application, and the defects of the prior art can be overcome.
Precision mechanical components inside the mechanical hard disk can perform the same function as a microphone sensor and with sufficient precision to extract and interpret human speech. The fidelity of the outside song sensed and recorded by such an "unintentional microphone" is high enough to be accurately recognized by music recognition software. The detection of physical input of an operator is realized by combining an operating system based on the sound perception technology of a mechanical hard disk, so that whether the operation is real operation or not is judged, and finally the safety level of computer operation is improved.
The information verification method provided in the embodiment of the present application must include one or more mechanical hard disks and a connection Interface of the mechanical hard disks on a System level, which may be an Integrated Drive Electronics (IDE) Interface, a Small Computer System Interface (SCSI), a Universal Serial Bus (USB), or the like.
The technical scheme of the embodiment of the application is as follows:
firstly, a mapping relation between a physical keyboard and sound is established by utilizing the mechanical hard disk detection sound input technology;
this is because the keyboard input, especially for notebook computers, whether the sound generated by keyboard knocking or the mechanical wave conduction into the hard disk by the physical vibration of the keyboard area caused by the keys itself will cause the small change of the hard disk during operation, resulting in the recording effect.
When people input specific content, including but not limited to password login and specific shortcut key usage, user input can be detected at the operating system level, and the content input by the user is detected, and at the same time, the operating system synchronously starts the mechanical hard disk sector writing operation at the time of user input, attention needs to be paid to the following cases: 1. at present, an operating system can start a disk cache operation irregularly and needs to close the function while recording; 2. the operation of writing on the disk is switched from the solid state disk to the mechanical hard disk, and finally the sound existing at the moment can be really restored by reading the change on the sector. And establishing a mapping relation through the restored sound and the corresponding physical key.
Secondly, when the user real-person operation needs to be determined, keyboard input detection can be started on a system level, a disk cache function of an operating system is closed, the mechanical hard disk sector continuous writing operation is started, and the corresponding keyboard sound is restored by reading the change on the sector; and restoring the input content through the mapping relation.
And finally, detecting and judging whether the operation is performed by a real person through keyboard input content.
The embodiment of the application also provides an information verification device, and each module included in the information verification device and each unit included in each module can be realized by a processor of information verification equipment; of course, the implementation can also be realized through a specific logic circuit; in implementation, the processor may be a Central Processing Unit (CPU), a Microprocessor (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like.
As shown in fig. 7, the information authentication apparatus 70 includes:
the first obtaining module 701 is configured to receive an instruction, and if the instruction meets a preset condition, trigger the mechanical hard disk to enter a write state to obtain write information;
a second obtaining module 702, configured to respond to the instruction and obtain input information corresponding to an input operation;
a detecting module 703, configured to detect whether the input operation passes verification according to the written information and the input information.
In some embodiments, the apparatus 70 further comprises: the device comprises a third acquisition module and a first determination module; wherein the content of the first and second substances,
the third acquisition module is used for acquiring the content of the display interface corresponding to the instruction;
and the first determining module is used for determining that the instruction meets the preset condition if the content of the display interface corresponding to the instruction comprises the specified content.
In some embodiments, the apparatus 70 further comprises:
the second determining module is used for writing the input time of the input operation into the mechanical hard disk and establishing an association relation between the input time and the written information; the input time is used for associating the written information with the input operation.
In some embodiments, the first obtaining module 701 is configured to trigger the mechanical hard disk to enter a write state, and perform a write operation in a blank write area of the mechanical hard disk to obtain the write information.
In some embodiments, the apparatus 70 further comprises: the control module is used for closing the disk write cache operation of the operating system or starting a direct-write mode;
correspondingly, the first obtaining module 701 is configured to trigger the mechanical hard disk to enter a write state when the disk write cache operation of the operating system is turned off or the write-through mode is enabled.
In some embodiments, the apparatus 70 further comprises: the fourth acquisition module is used for acquiring the corresponding relation between the sample writing information and the sample input information;
accordingly, the detection module 703 comprises: the device comprises a matching unit, a first determining unit and a second determining unit; wherein the content of the first and second substances,
the matching unit is used for matching the written information with the input information according to the corresponding relation;
the first determination unit is used for determining that the input operation passes verification if the written information is matched with the input information;
the second determination unit is configured to determine that the input operation is not verified if the written information does not match the input information.
In some embodiments, the apparatus 70 further comprises: a fifth acquisition module, a sixth acquisition module and an establishment module; wherein the content of the first and second substances,
the fifth acquisition module is used for performing writing operation on the sample input operation on the mechanical hard disk to acquire sample writing information;
a sixth obtaining module, configured to obtain sample input information corresponding to the sample input operation;
and the establishing module is used for establishing the corresponding relation between the sample writing information and the sample input information.
It should be noted that: the information verification apparatus provided in the above embodiment is only illustrated by the above division of each program module when information verification is performed, and in practical applications, the above processing may be distributed to different program modules according to needs, that is, the internal structure of the apparatus may be divided into different program modules to complete all or part of the above-described processing. In addition, the information verification apparatus and the information verification method provided by the above embodiments belong to the same concept, and specific implementation processes thereof are detailed in the method embodiments and are not described herein again.
The information authentication apparatus 80 shown in fig. 8 includes: at least one processor 810, a memory 840, at least one network interface 820, a user interface 830, and a mechanical hard disk 850. The various components in information verification device 80 are coupled together by bus system 850. It is understood that the bus system 850 is used to enable communications among the components for connection. The bus system 850 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 850 in fig. 8.
The user interface 830 may include a display, keyboard, mouse, trackball, click wheel, keys, buttons, touch pad or touch screen, etc.
The memory 840 may be either volatile memory or nonvolatile memory, and may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read Only Memory (ROM). The volatile Memory may be a Random Access Memory (RAM). The memory 840 described in embodiments herein is intended to comprise any suitable type of memory.
The memory 840 in the embodiment of the present application is capable of storing data to support the operation of the information authentication apparatus 80. Examples of such data include: any computer program for operating on the information authentication apparatus 80, such as an operating system and an application program. The operating system includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application program may include various application programs.
The processor 810 is configured to execute the computer program to implement the steps of the information verification method provided in the above embodiments.
As an example of the method provided by the embodiment of the present application implemented by a combination of hardware and software, the method provided by the embodiment of the present application may be directly embodied as a combination of software modules executed by the processor 810, for example, an information verification apparatus provided by the embodiment of the present application, the software modules of the information verification apparatus may be stored in the memory 840, the processor 810 reads executable instructions included in the software modules in the memory 840, and the information verification method provided by the embodiment of the present application is completed in combination with necessary hardware (for example, including the processor 810 and other components connected to the bus 850).
By way of example, the Processor 810 may be an integrated circuit chip having Signal processing capabilities, such as a general purpose Processor, a Digital Signal Processor (DSP), or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like, wherein the general purpose Processor may be a microprocessor or any conventional Processor or the like.
Here, it should be noted that: the above description of the embodiment of the information verification apparatus is similar to the above description of the method, and has the same beneficial effects as the embodiment of the method, and therefore, the description thereof is omitted. For technical details that are not disclosed in the embodiments of the information verification apparatus of the present application, those skilled in the art should refer to the description of the embodiments of the method of the present application for understanding, and for the sake of brevity, will not be described again here.
In an exemplary embodiment, the present application further provides a storage medium, which may be a computer-readable storage medium, for example, including a memory storing a computer program, which can be processed by a processor to implement the steps of the foregoing method. The computer readable storage medium may be Memory such as FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface Memory, optical disk, or CD-ROM.
Embodiments of the present application further provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when processed by a processor, implements the steps in the information verification method provided in the above embodiments.
Here, it should be noted that: the above description of the computer medium embodiment is similar to the above description of the method, and has the same beneficial effects as the method embodiment, and therefore, the description thereof is omitted. For technical details not disclosed in the embodiments of the storage medium of the present application, those skilled in the art should refer to the description of the embodiments of the method of the present application for understanding, and for the sake of brevity, will not be described again here.
The method disclosed by the embodiment of the present application can be applied to the processor or implemented by the processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be implemented by integrated logic circuits of hardware or instructions in the form of software in the processor. The processor described above may be a general purpose processor, a DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The processor may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present application. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software modules may be located in a storage medium located in a memory and the processor reads the information in the memory and performs the steps of the method described above in conjunction with its hardware.
It will be appreciated that the memory(s) of embodiments of the present application can be either volatile memory or nonvolatile memory, and can include both volatile and nonvolatile memory. Among them, the nonvolatile Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a magnetic random access Memory (FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical disk, or a Compact Disc Read-Only Memory (CD-ROM); the magnetic surface storage may be disk storage or tape storage. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Synchronous Static Random Access Memory (SSRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), Enhanced Synchronous Dynamic Random Access Memory (ESDRAM), Enhanced Synchronous Dynamic Random Access Memory (Enhanced DRAM), Synchronous Dynamic Random Access Memory (SLDRAM), Direct Memory (DRmb Access), and Random Access Memory (DRAM). The memories described in the embodiments of the present application are intended to comprise, without being limited to, these and any other suitable types of memory.
It should be understood by those skilled in the art that other configurations and functions of the information verification method according to the embodiments of the present application are known to those skilled in the art, and are not described in detail in order to reduce redundancy.
In the description herein, reference to the description of the terms "one embodiment," "some embodiments," "an example," "a specific example" or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present application have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the application, the scope of which is defined by the claims and their equivalents.

Claims (10)

1. An information verification method is applied to a terminal, and the terminal comprises the following steps: a mechanical hard disk; the method comprises the following steps:
receiving an instruction, and if the instruction meets a preset condition, triggering the mechanical hard disk to enter a writing state, and acquiring writing information obtained by transmitting sound generated by input operation to the mechanical hard disk;
responding to the instruction, and acquiring input information corresponding to the input operation;
matching the written information with the input information according to the corresponding relation between the sample written information and the sample input information;
if the written information is matched with the input information, determining that the input operation passes verification;
and if the written information does not match the input information, determining that the input operation is not verified.
2. The method of claim 1, further comprising:
acquiring the content of a display interface corresponding to the instruction;
and if the content of the display interface corresponding to the instruction comprises the specified content, determining that the instruction meets the preset condition.
3. The method of claim 1, after said triggering the mechanical hard disk to enter a write state, the method further comprising:
writing the input time of the input operation into the mechanical hard disk, and establishing an incidence relation between the input time and the written information; the input time is used for associating the written information with the input operation.
4. The method of claim 1, wherein triggering the mechanical hard disk to enter a write state to obtain a write message comprises:
and triggering the mechanical hard disk to enter a writing state, and performing writing operation in a blank writing area of the mechanical hard disk to obtain the writing information.
5. The method of claim 1, prior to said triggering the mechanical hard disk to enter a write state, the method further comprising:
closing the disk write cache operation of the operating system or starting a write-through mode;
correspondingly, the triggering the mechanical hard disk to enter a writing state includes:
and under the condition of closing the disk write cache operation of the operating system or enabling the direct-write mode, triggering the mechanical hard disk to enter a write-in state.
6. The method of claim 1, before matching the written information with the input information according to a correspondence between sample written information and sample input information, the method further comprising:
and acquiring the corresponding relation between the sample writing information and the sample input information.
7. The method of claim 6, before obtaining the correspondence between the sample write information and the sample input information, the method further comprising:
performing writing operation on sample input operation on the mechanical hard disk to obtain sample writing information;
acquiring sample input information corresponding to the sample input operation;
and establishing a corresponding relation between the sample writing information and the sample input information.
8. An information verification apparatus, the apparatus comprising: the device comprises a first acquisition module, a second acquisition module and a detection module; wherein the content of the first and second substances,
the first acquisition module is used for receiving an instruction, triggering the mechanical hard disk to enter a writing state if the instruction meets a preset condition, and acquiring writing information obtained by conducting sound generated by input operation to the mechanical hard disk;
the second obtaining module is used for responding to the instruction and obtaining input information corresponding to the input operation;
the detection module is used for matching the written information with the input information according to the corresponding relation between the sample written information and the sample input information;
if the written information is matched with the input information, determining that the input operation passes verification;
and if the written information does not match the input information, determining that the input operation is not verified.
9. An information authentication apparatus comprising: a mechanical hard disk, a processor, and a memory for storing a computer program capable of running on the processor; wherein the processor is configured to execute the information verification method according to any one of claims 1 to 7 when the computer program is executed.
10. A storage medium having stored thereon a computer program which, when executed by a processor, implements the information authentication method of any one of claims 1 to 7.
CN201910471978.9A 2019-05-31 2019-05-31 Information verification method, device, equipment and storage medium Active CN110245477B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910471978.9A CN110245477B (en) 2019-05-31 2019-05-31 Information verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910471978.9A CN110245477B (en) 2019-05-31 2019-05-31 Information verification method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110245477A CN110245477A (en) 2019-09-17
CN110245477B true CN110245477B (en) 2021-06-15

Family

ID=67885750

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910471978.9A Active CN110245477B (en) 2019-05-31 2019-05-31 Information verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110245477B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI827906B (en) * 2021-01-29 2024-01-01 銓安智慧科技股份有限公司 Message transmitting system, user device and hardware security module for use therein
CN113220603A (en) * 2021-05-27 2021-08-06 济南浪潮数据技术有限公司 Hard disk cache closing method, device, terminal and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1547688A (en) * 2001-07-27 2004-11-17 ����л����Үά�桤ŬŬ���޷� Method and device for entering computer database password
CN102799833A (en) * 2012-07-02 2012-11-28 人民搜索网络股份公司 Digital encryption and decryption method based on keying rhythm or keying force conversion
CN102955908A (en) * 2011-08-31 2013-03-06 国际商业机器公司 Method and device for creating rhythm password and carrying out verification according to rhythm password
CN107194219A (en) * 2017-06-16 2017-09-22 西安电子科技大学 Intelligent terminal identity identifying method based on similarity
CN108959866A (en) * 2018-04-24 2018-12-07 西北大学 A kind of lasting identity identifying method based on high frequency sound wave frequency

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080028231A1 (en) * 2002-09-24 2008-01-31 Bender Steven L Key sequence trustable activation recognition system and method
US20130326604A1 (en) * 2012-05-31 2013-12-05 Ca, Inc. Rhythm-based authentication
CN106128452A (en) * 2016-07-05 2016-11-16 深圳大学 Acoustical signal detection keyboard is utilized to tap the system and method for content
CN107133135B (en) * 2017-05-02 2021-02-09 电子科技大学 Keyboard key detection method based on statistics and sound positioning

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1547688A (en) * 2001-07-27 2004-11-17 ����л����Үά�桤ŬŬ���޷� Method and device for entering computer database password
CN102955908A (en) * 2011-08-31 2013-03-06 国际商业机器公司 Method and device for creating rhythm password and carrying out verification according to rhythm password
CN102799833A (en) * 2012-07-02 2012-11-28 人民搜索网络股份公司 Digital encryption and decryption method based on keying rhythm or keying force conversion
CN107194219A (en) * 2017-06-16 2017-09-22 西安电子科技大学 Intelligent terminal identity identifying method based on similarity
CN108959866A (en) * 2018-04-24 2018-12-07 西北大学 A kind of lasting identity identifying method based on high frequency sound wave frequency

Also Published As

Publication number Publication date
CN110245477A (en) 2019-09-17

Similar Documents

Publication Publication Date Title
US20230005288A1 (en) Enrollment Using Synthetic Fingerprint Image and Fingerprint Sensing Systems
KR20140117125A (en) Method of detecting fingerprint and electronic device thereof
US9965607B2 (en) Expedited biometric validation
CN110245477B (en) Information verification method, device, equipment and storage medium
US11567647B2 (en) Dynamic credit report obfuscation
US11238858B2 (en) Speech interactive method and device
US9189152B2 (en) Touch device and method for dynamically setting touch inactive area, and non-transitory recording medium
US20200258517A1 (en) Electronic device for providing graphic data based on voice and operating method thereof
WO2020156313A1 (en) Operation execution method and device, terminal, and storage medium
RU2673401C2 (en) Method and device for obtaining certification document
US20210027007A1 (en) Online document commenting method and apparatus
US10908701B2 (en) Electronic device and method for capturing multimedia content
WO2020005349A1 (en) Techniques for generating analytics based on interactions through digital channels
KR20160083759A (en) Method for providing an annotation and apparatus thereof
US20230035104A1 (en) Verification method, apparatus and device, and storage medium
CN106599648A (en) Application startup method and terminal
CN110768894A (en) Method and equipment for deleting session message
CN111079438A (en) Identity authentication method and device, electronic equipment and storage medium
WO2024041452A1 (en) Fingerprint recognition method and apparatus, electronic device and readable storage medium
CN110244848B (en) Reading control method and related equipment
CN107819944A (en) Delet method, device, equipment and the storage medium of short message
WO2020199913A1 (en) Tap event detection method and device
CN106529239A (en) Verification password generation method and apparatus
CN112710300A (en) Method and device for switching dial plate of wearable device
AU2021101257A4 (en) Usb: auto data store your gmail and link share your mobile no.) using ai- based programming

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant