CN103714278A - Password authentication method and password authentication device of terminal equipment - Google Patents
Password authentication method and password authentication device of terminal equipment Download PDFInfo
- Publication number
- CN103714278A CN103714278A CN201210375554.0A CN201210375554A CN103714278A CN 103714278 A CN103714278 A CN 103714278A CN 201210375554 A CN201210375554 A CN 201210375554A CN 103714278 A CN103714278 A CN 103714278A
- Authority
- CN
- China
- Prior art keywords
- information
- authentication
- content
- release
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Abstract
The invention discloses a password authentication method of terminal equipment. The method includes during unlocking of the terminal equipment, receiving password content used for unlocking and input by a user, collecting biological features when the user inputs the password content, and generating biological feature information used for unlocking, wherein the biological feature information used for unlocking includes coordinates, pressure information and/or time information and/or speed information and/or acceleration information of an input point; comparing the received password content with prestored authentication content information, and when the received password content is nonuniform with the prestored authentication content information, refusing unlocking; when the received password content is uniform with the prestored authentication content information, comparing the generated biological feature information used for unlocking with prestored authentication biological feature information; when difference between the generated biological feature information and the prestored authentication biological feature information is within a preset threshold value range, allowing unlocking, and or, refusing unlocking. The invention further provides a password authentication device of the terminal equipment. By the method and the device, safety of password authentication can be improved, and the password authentication process is ensured not to be affected by changing of outside environment.
Description
Technical field
The application relates to cipher verification technique, particularly a kind of cipher authentication method of terminal device and device.
Background technology
Current Password authentication method mainly contains: input code characters content, and input dot matrix password track, also has based on finger information, based on speech recognition, recognition of face etc.
But all there is corresponding defect in above-mentioned cipher authentication method:
First,, there is certain insecurity in the mode of input content or dot matrix track, and the content of input is easy to by others, be stolen in input.Secondly, the method based on finger biologic characteristics, needs the extra external unit that increases as external light source fingerprint capturer etc., practical not.
Again, the authentication based on living things feature recognitions such as voice and people's faces, although to a certain extent than the former safety, but still be easy to pass through user recording, or user picture, the modes such as video are by authentication, and voice and recognition of face are subject to external environment as larger in constraints such as noise, light.
Summary of the invention
The application provides a kind of cipher authentication method and device of terminal device, and the security that can improve cipher authentication guarantees the impact that cipher authentication process is not changed by external environment simultaneously.
A cipher authentication method for terminal device, comprising:
When carrying out unlocking terminal equipment, receive the password content for release of user's input, biological characteristic when collection user inputs described password content, generates the biological information for release; The described biological information for release comprises coordinate and pressure information and/or temporal information and/or speed and/or the acceleration information of input point;
The password content of reception and the authentication content information prestoring are compared, when comparison is inconsistent, refusal release; When the password content receiving is consistent with the authentication content information prestoring, the biological information for release generating and the authentication biological information prestoring are compared, when the two gap is within the scope of predetermined threshold value, allow release, otherwise refusal release.
Preferably, described in the prestore mode of authentication content information comprise: the password content that the user that terminal device receives sets, the password content of this setting is preserved as described authentication content information;
The described mode that prestores authentication biological information comprises: biological characteristic during user's setting code that terminal device gathers, and generate described authentication biological information and preserve.
Biological characteristic when preferably, described collection user inputs described password content comprises: force value, the coordinate of sampled point and/or the time of sampled point of each sampled point when collection user inputs described password content.
Preferably, when user inputs described password content by static state or dynamic soft keyboard mode,
Described password content is the key assignments of input;
Described generation comprises for the biological information of release: be created on the statistics pressure information on the key assignments of described input, and/or, be created on the residence time on the key assignments of described input, and/or be created on the interval time on each adjacent key assignments of described input.
Preferably, when user inputs described password content by dot matrix track mode,
The dot matrix sequence number value that described password content comprises for user's input trajectory;
Described generation comprises for the biological information of release: generate speed and/or acceleration and/or the direction of user's input trajectory, and/or generate the temporal information of user's input trajectory, and/or generate the statistics pressure information of user's input trajectory.
Preferably, when user inputs described password content by handwriting recognition mode,
Described password content is the character content of user's input;
Described generation comprises for the biological information of release: the statistics pressure information that generates described character, with or, generate stroke speed in described character and/or the time interval and/or the stroke number of stroke acceleration and/or stroke direction and/or stroke duration and/or adjacent stroke.
A cipher authentication device for terminal device, comprising: data acquisition module, code data generation module, cipher authentication module and code data administration module;
Described data acquisition module, for receiving the password content for release of user's input, biological characteristic when collection user inputs described password content, and described password content and biological characteristic are transmitted to described code data generation module;
Described code data generation module, the biological characteristic when inputting described password content according to the user of described data collecting module collected, generates the biological information for release; The described biological information generating and the next password content of described data acquisition module forwarding are sent to described cipher authentication module; The described biological information for release comprises coordinate and pressure information and/or temporal information and/or speed and/or the acceleration information of input point;
Described cipher authentication module, the authentication content information of preserving for password content and described code data administration module that described data acquisition module is received is compared, and when comparison is inconsistent, refuses release; When the password content receiving is consistent with the authentication content information prestoring, the authentication biological information that the biological information for release that described code data generation module is generated and described code data administration module are preserved is compared, when the two gap is within the scope of predetermined threshold value, allow release, otherwise refusal release;
Described code data administration module is for preserving and providing described authentication content information and authentication biological information to described cipher authentication module.
Preferably, described data acquisition module, is further used for receiving the password content that user sets, and the biological characteristic while gathering user's setting code;
Described code data generation module, biological characteristic while being further used for according to user's setting code generates described authentication biological information and is kept in described code data administration module, and the password content of also setting for the user that described data acquisition module is received is kept at described code data administration module as described authentication content information.
Preferably, described code data administration module, is further used for allowing after release in described cipher authentication module, and the biological information for release generating according to described code data generation module upgrades described authentication biological information.
As seen from the above technical solution, when carrying out unlocking terminal equipment, the biological characteristic except receiving the password content for release of user's input, also gather user while inputting password content, generates the biological information for release; Wherein, biological information comprises input point coordinate and pressure information and/or temporal information and/or velocity information and/or acceleration information.When carrying out cipher authentication, the password content of reception and the authentication content information prestoring are compared, when comparison is inconsistent, refusal release; When the password content receiving is consistent with the authentication content information prestoring, the biological information for release generating and the authentication biological information prestoring are compared, when the two gap is within the scope of predetermined threshold value, allow release, otherwise refusal release.By the way, in cipher authentication process, the biological informations such as the coordinate while introducing input password content and pressure information and/or temporal information and/or speed and/or acceleration information, thereby utilize on the one hand biological information to improve the security of cipher authentication, can avoid again on the other hand affecting larger problem as the traditional biological characteristic informations such as voice, recognition of face are subject to environmental change.
Accompanying drawing explanation
Fig. 1 is the cipher authentication method process flow diagram of terminal device in the application;
Fig. 2 is the basic structure schematic diagram of the cipher authentication device of terminal device in the application.
Embodiment
In order to make the application's object, technological means and advantage clearer, below in conjunction with accompanying drawing, the application is described in further details.
The application's basic thought is: when carrying out cipher authentication, the biological informations such as coordinate when introducing user inputs password and pressure and/or time and/or speed and/or acceleration participate in authentication, thereby improve the security of cipher authentication, simultaneously, coordinate during due to input password and pressure and/or time and/or speed and/or acceleration etc. are not subject to the impact of environmental change, therefore can avoid the authentication of traditional biological feature to be subject to environmental change to affect larger problem.
Particularly, in the application's cipher authentication method, with the similar ground of existing authentication method, receive the password of user's input, utilize the password of input and the authentication information of preservation to compare, according to comparative result, determine whether permission release.Be with the key distinction of existing authentication method, for the encrypted message of release and authentication information except comprising password content, the biological information while including input password.Conventionally, authentication information be user while carrying out password setting terminal device input content is analyzed and is generated.Certainly, the mode of also not getting rid of the concrete authentication information of direct input.
Below by the specific implementation of cipher authentication method in specific embodiment explanation the application, wherein, the user of take carries out password setting, terminal device receives and analysis user is set password producing authentication information and describes as example.
Wherein, authentication information comprises authentication content information and authentication biological information.
Specifically in this step, terminal device receives the password that user sets, and wherein, by the identification of password content, determines the password content that user inputs, using this password content as authentication content information, the concrete content aware mode of password can adopt existing mode to realize.
Meanwhile, biological characteristic when terminal device also gathers user's setting code, comprises coordinate and pressure and/or time etc., and generates authentication biological information according to the biological characteristic gathering.Concrete this biological information can comprise pressure information and/or temporal information and/or velocity information and/or the acceleration information of input point, information such as the speed of time dependent pressure information, time that each finger is pressed or lifted, sliding trace and acceleration.Wherein, about the acquisition mode of the biological characteristics such as pressure and time, can carry out according to existing mode, just repeat no more here.The feature of input mode during according to user's setting code, also can adopt different algorithms to generate different biological informations.
The mode of particular user setting code can adopt various existing input modes, for example static soft keyboard input, dynamic soft keyboard input, the input of dot matrix track or handwriting recognition input etc.Take below above-mentioned several input mode as example illustrates corresponding authentication information.
1) static state/dynamic soft keyboard mode.
Under which, authentication content information can be key assignments; The biological characteristic gathering can comprise: the force value of sampled point, sample point coordinate, time etc.; The authentication biological information generating can be the value that the data messages such as force value, coordinate and time that utilize aforementioned sample point calculate, for example, statistics pressure information (average pressure value of all sampled points on as this key assignments), the time of each key assignments in the state of being pressed on the key assignments of input, the key assignments of current input is pressed and the key assignments of the upper input time interval, speed, the acceleration between being released, the key assignments sum of input etc.The mode that specifically generates various authentication biological informations according to the biological characteristic gathering belongs to those skilled in the art's common technology means, just repeats no more here.
2) dot matrix track mode.
Under which, authentication content information can be the dot matrix sequence number value that user's input trajectory comprises, and the biological characteristic of collection can comprise: the force value of sampled point and respective coordinates, time etc.The authentication biological information generating can be the value that the data messages such as force value, coordinate and time that utilize aforementioned sample point calculate, such as the various speed of user's input trajectory and acceleration, the direction of user's input trajectory, the statistics pressure information of the time of user's input trajectory, user's input trajectory etc.The mode that specifically generates various authentication biological informations according to the biological characteristic gathering belongs to those skilled in the art's common technology means, just repeats no more here.
3) handwriting recognition mode.
Under which, authentication content information can be the character content obtaining by handwriting recognition algorithm; The biological characteristic gathering can comprise: the force value of sampled point and respective coordinates, time etc.; The authentication biological information generating can be the value that the data messages such as force value, coordinate and time that utilize aforementioned sample point calculate, the statistics pressure information of stroke for example, stroke speed, stroke acceleration, stroke direction, the stroke duration, the time interval of adjacent two-stroke, the data such as stroke number.The mode that specifically generates various authentication biological informations according to the biological characteristic gathering belongs to those skilled in the art's common technology means, just repeats no more here.
Here, input the processing of password during to user's release, the processing during with user's setting code is identical, comprise that password input mode is identical, and encrypted message extracting mode is identical.
Particularly, for the unlocking pin of user input, the password content of identification user input, using it as the password content for release, the biological characteristic when gathering user simultaneously and inputting corresponding password content, generates the biological information for release.Wherein, identical during with setting code of the characteristic type that gathers biological characteristic and generate biological information, identical to the processing mode of biological characteristic.That is, if during setting code, the biological characteristic of collection is force value, and during release input password, the biological characteristic of collection also should be force value mutually, and the algorithm that generates biological information according to this force value is also identical.Certainly, be to improve the security of cipher authentication, preferably, the biological characteristic of collection comprises pressure and time, thereby can carry out more comprehensively, more complicated cipher authentication.
Authentication for content information in this step is identical with existing mode, and relatively whether the content of input is identical with the password content of setting, just repeats no more here.According to different authentication results, correspondingly carry out subsequent operation.
While carrying out the authentication of biological characteristic, the difference between the biological information that calculates user's input and authentication biological information, when this difference is within the scope of setting threshold, judges that authentication passes through, permission release, even otherwise content authentication by still keeping lock-out state.
For administering and maintaining better authentication biological information, can judge and allow after release in step 104, further carry out following operation and upgrade authentication biological information:
Step 105, upgrades authentication biological information according to the biological information for release by authentication.
While upgrading operation, can be directly using the biological information generating in step 102 the authentication biological information after upgrading, also can carry out specify arithmetic (such as carrying out statistical average etc.), the authentication biological information using operation result after upgrading by the authentication biological information by the biological information generating in step 102 and before upgrading.
So far, the cipher authentication method flow process in the application finishes.
In addition, in the application, also provide cipher authentication device, for implementing above-mentioned cipher authentication method.Particularly, the basic structure of cipher authentication device as shown in Figure 2, comprising: data acquisition module, code data generation module, cipher authentication module and code data administration module.
Wherein, data acquisition module, for receiving the password content for release of user's input, biological characteristic when collection user inputs described password content, and password content and biological characteristic are transmitted to code data generation module.
Code data generation module, the biological characteristic when inputting described password content according to the user of data collecting module collected, generates the biological information for release; The biological information of generation and the next password content of data acquisition module forwarding are sent to cipher authentication module.
Cipher authentication module, the authentication content information of preserving for password content and described code data administration module that data acquisition module is received is compared, and when comparison is inconsistent, refuses release; When the password content receiving is consistent with the authentication content information prestoring, the authentication biological information that the biological information for release that described code data generation module is generated and described code data administration module are preserved is compared, when the two gap is within the scope of predetermined threshold value, allow release, otherwise refusal release.
Code data administration module is for preserving and providing authentication content information and authentication biological information to cipher authentication module.
When being received user by cipher authentication device and input and gather corresponding information and generate authentication biological information, data acquisition module, can be further used for receiving the password content of user's setting, and the biological characteristic while gathering user's setting code.Code data generation module, biological characteristic in the time of can being further used for according to user's setting code generates authentication biological information and is kept in code data administration module, and the password content of also setting for the user that data acquisition module is received is kept at code data administration module as authentication content information.
Further, for realizing the renewal of authentication biological information, code data administration module, can be further used for allowing after release in cipher authentication module, and the biological information for release generating according to code data generation module upgrades authentication biological information.
Specific implementation by above-mentioned the application is visible, cipher authentication method in the application and equipment are when carrying out cipher authentication, except receiving the password content for release of user's input, biological characteristic when also gathering user and inputting password content, generate the biological information for release, utilize this biological information to carry out cipher authentication.Well utilize current main flow terminal equipment itself can collect pressure, the characteristic of the data such as speed, utilize these data to generate biological information, in conjunction with input content, both can solve current ubiquitous cryptosecurity problem, there is again the advantage that the external environment of not being subject to affects as sound, light, and do not need additionally to increase external unit.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of making, be equal to replacement, improvement etc., within all should being included in the scope of protection of the invention.
Claims (9)
1. a cipher authentication method for terminal device, is characterized in that, comprising:
When carrying out unlocking terminal equipment, receive the password content for release of user's input, biological characteristic when collection user inputs described password content, generates the biological information for release; The described biological information for release comprises coordinate and pressure information and/or temporal information and/or speed and/or the acceleration information of input point;
The password content of reception and the authentication content information prestoring are compared, when comparison is inconsistent, refusal release; When the password content receiving is consistent with the authentication content information prestoring, the biological information for release generating and the authentication biological information prestoring are compared, when the two gap is within the scope of predetermined threshold value, allow release, otherwise refusal release.
2. method according to claim 1, is characterized in that, described in the prestore mode of authentication content information comprise: the password content that the user that terminal device receives sets, the password content of this setting is preserved as described authentication content information;
The described mode that prestores authentication biological information comprises: biological characteristic during user's setting code that terminal device gathers, and generate described authentication biological information and preserve.
3. method according to claim 1 and 2, it is characterized in that, biological characteristic when described collection user inputs described password content comprises: force value, the coordinate of sampled point and/or the time of sampled point of each sampled point when collection user inputs described password content.
4. method according to claim 3, is characterized in that, when user inputs described password content by static state or dynamic soft keyboard mode,
Described password content is the key assignments of input;
Described generation comprises for the biological information of release: be created on the statistics pressure information on the key assignments of described input, and/or, be created on the residence time on the key assignments of described input, and/or be created on the interval time on each adjacent key assignments of described input.
5. method according to claim 3, is characterized in that, when user inputs described password content by dot matrix track mode,
The dot matrix sequence number value that described password content comprises for user's input trajectory;
Described generation comprises for the biological information of release: generate speed and/or acceleration and/or the direction of user's input trajectory, and/or generate the temporal information of user's input trajectory, and/or generate the statistics pressure information of user's input trajectory.
6. method according to claim 3, is characterized in that, when user inputs described password content by handwriting recognition mode,
Described password content is the character content of user's input;
Described generation comprises for the biological information of release: the statistics pressure information that generates described character, with or, generate stroke speed in described character and/or the time interval and/or the stroke number of stroke acceleration and/or stroke direction and/or stroke duration and/or adjacent stroke.
7. a cipher authentication device for terminal device, is characterized in that, this device comprises: data acquisition module, code data generation module, cipher authentication module and code data administration module;
Described data acquisition module, for receiving the password content for release of user's input, biological characteristic when collection user inputs described password content, and described password content and biological characteristic are transmitted to described code data generation module;
Described code data generation module, the biological characteristic when inputting described password content according to the user of described data collecting module collected, generates the biological information for release; The described biological information generating and the next password content of described data acquisition module forwarding are sent to described cipher authentication module; The described biological information for release comprises coordinate and pressure information and/or temporal information and/or speed and/or the acceleration information of input point;
Described cipher authentication module, the authentication content information of preserving for password content and described code data administration module that described data acquisition module is received is compared, and when comparison is inconsistent, refuses release; When the password content receiving is consistent with the authentication content information prestoring, the authentication biological information that the biological information for release that described code data generation module is generated and described code data administration module are preserved is compared, when the two gap is within the scope of predetermined threshold value, allow release, otherwise refusal release;
Described code data administration module is for preserving and providing described authentication content information and authentication biological information to described cipher authentication module.
8. device according to claim 7, is characterized in that, described data acquisition module is further used for receiving the password content that user sets, and the biological characteristic while gathering user's setting code;
Described code data generation module, biological characteristic while being further used for according to user's setting code generates described authentication biological information and is kept in described code data administration module, and the password content of also setting for the user that described data acquisition module is received is kept at described code data administration module as described authentication content information.
9. according to the device described in claim 7 or 8, it is characterized in that, described code data administration module, is further used for allowing after release in described cipher authentication module, and the biological information for release generating according to described code data generation module upgrades described authentication biological information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210375554.0A CN103714278A (en) | 2012-09-29 | 2012-09-29 | Password authentication method and password authentication device of terminal equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210375554.0A CN103714278A (en) | 2012-09-29 | 2012-09-29 | Password authentication method and password authentication device of terminal equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103714278A true CN103714278A (en) | 2014-04-09 |
Family
ID=50407241
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210375554.0A Pending CN103714278A (en) | 2012-09-29 | 2012-09-29 | Password authentication method and password authentication device of terminal equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103714278A (en) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103870744A (en) * | 2012-12-13 | 2014-06-18 | 联想(北京)有限公司 | Method and electronic device for verifying password |
CN104462906A (en) * | 2014-12-19 | 2015-03-25 | 中国农业银行股份有限公司 | Mouse with information collection function and identity recognition method and system |
CN104915582A (en) * | 2015-05-28 | 2015-09-16 | 努比亚技术有限公司 | Unlocking method and unlocking device |
CN105184122A (en) * | 2015-09-09 | 2015-12-23 | 魅族科技(中国)有限公司 | Encrypting method, decrypting method, encrypting device, decrypting device and terminal |
CN105279407A (en) * | 2015-11-02 | 2016-01-27 | 上海斐讯数据通信技术有限公司 | Touchscreen-based encryption/decryption method, system and equipment |
CN105354458A (en) * | 2015-11-03 | 2016-02-24 | 广东欧珀移动通信有限公司 | Password input verification method and system |
CN105404460A (en) * | 2015-11-27 | 2016-03-16 | 上海与德通讯技术有限公司 | Key input detection method and module |
CN105450405A (en) * | 2014-07-18 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Password setting and authentication method and system |
CN105512527A (en) * | 2015-12-09 | 2016-04-20 | 上海斐讯数据通信技术有限公司 | Encryption/decryption method and encryption/decryption system for application as well as mobile terminal |
CN105589645A (en) * | 2014-10-21 | 2016-05-18 | 中兴通讯股份有限公司 | Touch screen unlocking method and device |
CN105589654A (en) * | 2015-12-29 | 2016-05-18 | 惠州Tcl移动通信有限公司 | Pressure sensor based mobile terminal unlocking method and system |
CN105644496A (en) * | 2016-03-15 | 2016-06-08 | 许准 | Start control method and system based on pressure detection and vehicle |
CN105740691A (en) * | 2016-01-27 | 2016-07-06 | 深圳市金立通信设备有限公司 | Password authentication method and terminal |
CN105809018A (en) * | 2016-03-11 | 2016-07-27 | 深圳市金立通信设备有限公司 | Sliding track verification method and terminal |
CN106656962A (en) * | 2016-09-30 | 2017-05-10 | 北京瑞卓喜投科技发展有限公司 | Cryptograph decryption method and cryptograph decryption device |
CN106778203A (en) * | 2016-12-27 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method and device of unlocking screen |
CN107122638A (en) * | 2016-02-24 | 2017-09-01 | 西安中兴新软件有限责任公司 | User equipment and its unlocking method |
WO2018006542A1 (en) * | 2016-07-06 | 2018-01-11 | 中兴通讯股份有限公司 | Terminal unlock method, and terminal |
CN107633573A (en) * | 2017-07-28 | 2018-01-26 | 移康智能科技(上海)股份有限公司 | The method for unlocking and intelligent door lock of a kind of intelligent door lock |
CN107710212A (en) * | 2015-04-30 | 2018-02-16 | 德山真旭 | Terminal installation and computer program |
CN107729728A (en) * | 2016-08-12 | 2018-02-23 | 京瓷办公信息系统株式会社 | Authentication device, image processing apparatus and authentication method |
CN107862200A (en) * | 2016-11-14 | 2018-03-30 | 平安科技(深圳)有限公司 | Cipher-code input method and device |
CN110084009A (en) * | 2019-04-22 | 2019-08-02 | 惠州Tcl移动通信有限公司 | Digital unlocking method, device, storage medium and mobile terminal |
CN110121174A (en) * | 2019-05-16 | 2019-08-13 | 徐国愚 | A kind of implicit identity identifying method of mobile intelligent terminal |
CN110263519A (en) * | 2019-05-31 | 2019-09-20 | 联想(北京)有限公司 | Information processing method and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040095384A1 (en) * | 2001-12-04 | 2004-05-20 | Applied Neural Computing Ltd. | System for and method of web signature recognition system based on object map |
CN101008876A (en) * | 2006-01-23 | 2007-08-01 | 郑希付 | Script analysis system |
CN101753301A (en) * | 2008-11-28 | 2010-06-23 | 谈剑锋 | Fingerprint dynamic password ID authentication device and the implementation method thereof |
CN102067150A (en) * | 2008-06-16 | 2011-05-18 | 高通股份有限公司 | Method and system for graphical passcode security |
CN102170348A (en) * | 2010-11-08 | 2011-08-31 | 无敌科技(西安)有限公司 | Method for achieving encryption and decryption of data through recording user input speed |
CN102483784A (en) * | 2009-08-27 | 2012-05-30 | 讯宝科技公司 | Systems and methods for pressure-based authentication of a signature on a touch screen |
-
2012
- 2012-09-29 CN CN201210375554.0A patent/CN103714278A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040095384A1 (en) * | 2001-12-04 | 2004-05-20 | Applied Neural Computing Ltd. | System for and method of web signature recognition system based on object map |
CN101008876A (en) * | 2006-01-23 | 2007-08-01 | 郑希付 | Script analysis system |
CN102067150A (en) * | 2008-06-16 | 2011-05-18 | 高通股份有限公司 | Method and system for graphical passcode security |
CN101753301A (en) * | 2008-11-28 | 2010-06-23 | 谈剑锋 | Fingerprint dynamic password ID authentication device and the implementation method thereof |
CN102483784A (en) * | 2009-08-27 | 2012-05-30 | 讯宝科技公司 | Systems and methods for pressure-based authentication of a signature on a touch screen |
CN102170348A (en) * | 2010-11-08 | 2011-08-31 | 无敌科技(西安)有限公司 | Method for achieving encryption and decryption of data through recording user input speed |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103870744B (en) * | 2012-12-13 | 2018-04-27 | 联想(北京)有限公司 | A kind of method and electronic equipment for verifying password |
CN103870744A (en) * | 2012-12-13 | 2014-06-18 | 联想(北京)有限公司 | Method and electronic device for verifying password |
CN105450405A (en) * | 2014-07-18 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Password setting and authentication method and system |
CN105450405B (en) * | 2014-07-18 | 2018-10-02 | 阿里巴巴集团控股有限公司 | A kind of setting of password and authentication method and system |
CN105589645A (en) * | 2014-10-21 | 2016-05-18 | 中兴通讯股份有限公司 | Touch screen unlocking method and device |
CN104462906A (en) * | 2014-12-19 | 2015-03-25 | 中国农业银行股份有限公司 | Mouse with information collection function and identity recognition method and system |
CN107710212A (en) * | 2015-04-30 | 2018-02-16 | 德山真旭 | Terminal installation and computer program |
CN104915582B (en) * | 2015-05-28 | 2017-12-22 | 努比亚技术有限公司 | unlocking method and device |
CN104915582A (en) * | 2015-05-28 | 2015-09-16 | 努比亚技术有限公司 | Unlocking method and unlocking device |
CN105184122A (en) * | 2015-09-09 | 2015-12-23 | 魅族科技(中国)有限公司 | Encrypting method, decrypting method, encrypting device, decrypting device and terminal |
CN105279407A (en) * | 2015-11-02 | 2016-01-27 | 上海斐讯数据通信技术有限公司 | Touchscreen-based encryption/decryption method, system and equipment |
CN105354458B (en) * | 2015-11-03 | 2018-01-16 | 广东欧珀移动通信有限公司 | Password Input verification method and system |
CN105354458A (en) * | 2015-11-03 | 2016-02-24 | 广东欧珀移动通信有限公司 | Password input verification method and system |
CN105404460A (en) * | 2015-11-27 | 2016-03-16 | 上海与德通讯技术有限公司 | Key input detection method and module |
CN105512527A (en) * | 2015-12-09 | 2016-04-20 | 上海斐讯数据通信技术有限公司 | Encryption/decryption method and encryption/decryption system for application as well as mobile terminal |
CN105589654B (en) * | 2015-12-29 | 2019-07-09 | 惠州Tcl移动通信有限公司 | A kind of mobile terminal unlocking method and system based on pressure sensor |
CN105589654A (en) * | 2015-12-29 | 2016-05-18 | 惠州Tcl移动通信有限公司 | Pressure sensor based mobile terminal unlocking method and system |
CN105740691A (en) * | 2016-01-27 | 2016-07-06 | 深圳市金立通信设备有限公司 | Password authentication method and terminal |
CN107122638A (en) * | 2016-02-24 | 2017-09-01 | 西安中兴新软件有限责任公司 | User equipment and its unlocking method |
CN105809018A (en) * | 2016-03-11 | 2016-07-27 | 深圳市金立通信设备有限公司 | Sliding track verification method and terminal |
CN105644496A (en) * | 2016-03-15 | 2016-06-08 | 许准 | Start control method and system based on pressure detection and vehicle |
WO2018006542A1 (en) * | 2016-07-06 | 2018-01-11 | 中兴通讯股份有限公司 | Terminal unlock method, and terminal |
CN107729728A (en) * | 2016-08-12 | 2018-02-23 | 京瓷办公信息系统株式会社 | Authentication device, image processing apparatus and authentication method |
CN106656962A (en) * | 2016-09-30 | 2017-05-10 | 北京瑞卓喜投科技发展有限公司 | Cryptograph decryption method and cryptograph decryption device |
CN107862200A (en) * | 2016-11-14 | 2018-03-30 | 平安科技(深圳)有限公司 | Cipher-code input method and device |
CN106778203A (en) * | 2016-12-27 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method and device of unlocking screen |
CN107633573A (en) * | 2017-07-28 | 2018-01-26 | 移康智能科技(上海)股份有限公司 | The method for unlocking and intelligent door lock of a kind of intelligent door lock |
CN110084009A (en) * | 2019-04-22 | 2019-08-02 | 惠州Tcl移动通信有限公司 | Digital unlocking method, device, storage medium and mobile terminal |
CN110121174A (en) * | 2019-05-16 | 2019-08-13 | 徐国愚 | A kind of implicit identity identifying method of mobile intelligent terminal |
CN110121174B (en) * | 2019-05-16 | 2022-04-15 | 徐国愚 | Implicit identity authentication method of mobile intelligent terminal |
CN110263519A (en) * | 2019-05-31 | 2019-09-20 | 联想(北京)有限公司 | Information processing method and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103714278A (en) | Password authentication method and password authentication device of terminal equipment | |
US10558792B2 (en) | Touch-screen user key-press behavior pattern construction and analysis system and identity recognition method thereof | |
Meng et al. | Surveying the development of biometric user authentication on mobile phones | |
AU2016217549B2 (en) | Systems and methods for securely managing biometric data | |
CN106068512B (en) | Method and apparatus for verifying user on the mobile device | |
CN103294334B (en) | Unlocking screen data access control method and safety control | |
CN108989278A (en) | Identification service system and method | |
CN106572097B (en) | A kind of mobile device-based hybrid identity identifying method | |
CN104158664A (en) | Identity authentication method and system | |
CN106657166B (en) | A kind of method of authentication, terminal device and server | |
EP4088205B1 (en) | System and method for disentangling features specific to users, actions and devices recorded in motion sensor data | |
Mayrhofer et al. | Adversary models for mobile device authentication | |
CN106921655B (en) | Service authorization method and device | |
CN107194219A (en) | Intelligent terminal identity identifying method based on similarity | |
CN104486310A (en) | Method and system for authenticating finger veins and finger vein information acquisition instrument | |
Lin et al. | A novel non-intrusive user authentication method based on touchscreen of smartphones | |
Zhang et al. | Multimodal continuous user authentication on mobile devices via interaction patterns | |
Feng et al. | Security after login: Identity change detection on smartphones using sensor fusion | |
CN103532956A (en) | Biological information-based authentication method in cloud operation system | |
Adeyemi et al. | A psychographic framework for online user identification | |
Hao et al. | Towards user re-authentication on mobile devices via on-screen keyboard | |
CN104717641B (en) | A kind of digital signature generation method and SIM card based on SIM card | |
Albayram et al. | A method for improving mobile authentication using human spatio-temporal behavior | |
CN108564726A (en) | One kind borrowing umbrella control system | |
CN114745184B (en) | Number graphical encryption method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140409 |
|
RJ01 | Rejection of invention patent application after publication |