CN103714278A - Password authentication method and password authentication device of terminal equipment - Google Patents

Password authentication method and password authentication device of terminal equipment Download PDF

Info

Publication number
CN103714278A
CN103714278A CN201210375554.0A CN201210375554A CN103714278A CN 103714278 A CN103714278 A CN 103714278A CN 201210375554 A CN201210375554 A CN 201210375554A CN 103714278 A CN103714278 A CN 103714278A
Authority
CN
China
Prior art keywords
information
authentication
content
release
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210375554.0A
Other languages
Chinese (zh)
Inventor
张黎
王炎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Original Assignee
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Samsung Telecommunications Technology Research Co Ltd, Samsung Electronics Co Ltd filed Critical Beijing Samsung Telecommunications Technology Research Co Ltd
Priority to CN201210375554.0A priority Critical patent/CN103714278A/en
Publication of CN103714278A publication Critical patent/CN103714278A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The invention discloses a password authentication method of terminal equipment. The method includes during unlocking of the terminal equipment, receiving password content used for unlocking and input by a user, collecting biological features when the user inputs the password content, and generating biological feature information used for unlocking, wherein the biological feature information used for unlocking includes coordinates, pressure information and/or time information and/or speed information and/or acceleration information of an input point; comparing the received password content with prestored authentication content information, and when the received password content is nonuniform with the prestored authentication content information, refusing unlocking; when the received password content is uniform with the prestored authentication content information, comparing the generated biological feature information used for unlocking with prestored authentication biological feature information; when difference between the generated biological feature information and the prestored authentication biological feature information is within a preset threshold value range, allowing unlocking, and or, refusing unlocking. The invention further provides a password authentication device of the terminal equipment. By the method and the device, safety of password authentication can be improved, and the password authentication process is ensured not to be affected by changing of outside environment.

Description

A kind of cipher authentication method of terminal device and device
Technical field
The application relates to cipher verification technique, particularly a kind of cipher authentication method of terminal device and device.
Background technology
Current Password authentication method mainly contains: input code characters content, and input dot matrix password track, also has based on finger information, based on speech recognition, recognition of face etc.
But all there is corresponding defect in above-mentioned cipher authentication method:
First,, there is certain insecurity in the mode of input content or dot matrix track, and the content of input is easy to by others, be stolen in input.Secondly, the method based on finger biologic characteristics, needs the extra external unit that increases as external light source fingerprint capturer etc., practical not.
Again, the authentication based on living things feature recognitions such as voice and people's faces, although to a certain extent than the former safety, but still be easy to pass through user recording, or user picture, the modes such as video are by authentication, and voice and recognition of face are subject to external environment as larger in constraints such as noise, light.
Summary of the invention
The application provides a kind of cipher authentication method and device of terminal device, and the security that can improve cipher authentication guarantees the impact that cipher authentication process is not changed by external environment simultaneously.
A cipher authentication method for terminal device, comprising:
When carrying out unlocking terminal equipment, receive the password content for release of user's input, biological characteristic when collection user inputs described password content, generates the biological information for release; The described biological information for release comprises coordinate and pressure information and/or temporal information and/or speed and/or the acceleration information of input point;
The password content of reception and the authentication content information prestoring are compared, when comparison is inconsistent, refusal release; When the password content receiving is consistent with the authentication content information prestoring, the biological information for release generating and the authentication biological information prestoring are compared, when the two gap is within the scope of predetermined threshold value, allow release, otherwise refusal release.
Preferably, described in the prestore mode of authentication content information comprise: the password content that the user that terminal device receives sets, the password content of this setting is preserved as described authentication content information;
The described mode that prestores authentication biological information comprises: biological characteristic during user's setting code that terminal device gathers, and generate described authentication biological information and preserve.
Biological characteristic when preferably, described collection user inputs described password content comprises: force value, the coordinate of sampled point and/or the time of sampled point of each sampled point when collection user inputs described password content.
Preferably, when user inputs described password content by static state or dynamic soft keyboard mode,
Described password content is the key assignments of input;
Described generation comprises for the biological information of release: be created on the statistics pressure information on the key assignments of described input, and/or, be created on the residence time on the key assignments of described input, and/or be created on the interval time on each adjacent key assignments of described input.
Preferably, when user inputs described password content by dot matrix track mode,
The dot matrix sequence number value that described password content comprises for user's input trajectory;
Described generation comprises for the biological information of release: generate speed and/or acceleration and/or the direction of user's input trajectory, and/or generate the temporal information of user's input trajectory, and/or generate the statistics pressure information of user's input trajectory.
Preferably, when user inputs described password content by handwriting recognition mode,
Described password content is the character content of user's input;
Described generation comprises for the biological information of release: the statistics pressure information that generates described character, with or, generate stroke speed in described character and/or the time interval and/or the stroke number of stroke acceleration and/or stroke direction and/or stroke duration and/or adjacent stroke.
A cipher authentication device for terminal device, comprising: data acquisition module, code data generation module, cipher authentication module and code data administration module;
Described data acquisition module, for receiving the password content for release of user's input, biological characteristic when collection user inputs described password content, and described password content and biological characteristic are transmitted to described code data generation module;
Described code data generation module, the biological characteristic when inputting described password content according to the user of described data collecting module collected, generates the biological information for release; The described biological information generating and the next password content of described data acquisition module forwarding are sent to described cipher authentication module; The described biological information for release comprises coordinate and pressure information and/or temporal information and/or speed and/or the acceleration information of input point;
Described cipher authentication module, the authentication content information of preserving for password content and described code data administration module that described data acquisition module is received is compared, and when comparison is inconsistent, refuses release; When the password content receiving is consistent with the authentication content information prestoring, the authentication biological information that the biological information for release that described code data generation module is generated and described code data administration module are preserved is compared, when the two gap is within the scope of predetermined threshold value, allow release, otherwise refusal release;
Described code data administration module is for preserving and providing described authentication content information and authentication biological information to described cipher authentication module.
Preferably, described data acquisition module, is further used for receiving the password content that user sets, and the biological characteristic while gathering user's setting code;
Described code data generation module, biological characteristic while being further used for according to user's setting code generates described authentication biological information and is kept in described code data administration module, and the password content of also setting for the user that described data acquisition module is received is kept at described code data administration module as described authentication content information.
Preferably, described code data administration module, is further used for allowing after release in described cipher authentication module, and the biological information for release generating according to described code data generation module upgrades described authentication biological information.
As seen from the above technical solution, when carrying out unlocking terminal equipment, the biological characteristic except receiving the password content for release of user's input, also gather user while inputting password content, generates the biological information for release; Wherein, biological information comprises input point coordinate and pressure information and/or temporal information and/or velocity information and/or acceleration information.When carrying out cipher authentication, the password content of reception and the authentication content information prestoring are compared, when comparison is inconsistent, refusal release; When the password content receiving is consistent with the authentication content information prestoring, the biological information for release generating and the authentication biological information prestoring are compared, when the two gap is within the scope of predetermined threshold value, allow release, otherwise refusal release.By the way, in cipher authentication process, the biological informations such as the coordinate while introducing input password content and pressure information and/or temporal information and/or speed and/or acceleration information, thereby utilize on the one hand biological information to improve the security of cipher authentication, can avoid again on the other hand affecting larger problem as the traditional biological characteristic informations such as voice, recognition of face are subject to environmental change.
Accompanying drawing explanation
Fig. 1 is the cipher authentication method process flow diagram of terminal device in the application;
Fig. 2 is the basic structure schematic diagram of the cipher authentication device of terminal device in the application.
Embodiment
In order to make the application's object, technological means and advantage clearer, below in conjunction with accompanying drawing, the application is described in further details.
The application's basic thought is: when carrying out cipher authentication, the biological informations such as coordinate when introducing user inputs password and pressure and/or time and/or speed and/or acceleration participate in authentication, thereby improve the security of cipher authentication, simultaneously, coordinate during due to input password and pressure and/or time and/or speed and/or acceleration etc. are not subject to the impact of environmental change, therefore can avoid the authentication of traditional biological feature to be subject to environmental change to affect larger problem.
Particularly, in the application's cipher authentication method, with the similar ground of existing authentication method, receive the password of user's input, utilize the password of input and the authentication information of preservation to compare, according to comparative result, determine whether permission release.Be with the key distinction of existing authentication method, for the encrypted message of release and authentication information except comprising password content, the biological information while including input password.Conventionally, authentication information be user while carrying out password setting terminal device input content is analyzed and is generated.Certainly, the mode of also not getting rid of the concrete authentication information of direct input.
Below by the specific implementation of cipher authentication method in specific embodiment explanation the application, wherein, the user of take carries out password setting, terminal device receives and analysis user is set password producing authentication information and describes as example.
Step 101, terminal device receives the password content that user sets, and the biological characteristic while gathering user's setting code, generates the authentication information for cipher authentication.
Wherein, authentication information comprises authentication content information and authentication biological information.
Specifically in this step, terminal device receives the password that user sets, and wherein, by the identification of password content, determines the password content that user inputs, using this password content as authentication content information, the concrete content aware mode of password can adopt existing mode to realize.
Meanwhile, biological characteristic when terminal device also gathers user's setting code, comprises coordinate and pressure and/or time etc., and generates authentication biological information according to the biological characteristic gathering.Concrete this biological information can comprise pressure information and/or temporal information and/or velocity information and/or the acceleration information of input point, information such as the speed of time dependent pressure information, time that each finger is pressed or lifted, sliding trace and acceleration.Wherein, about the acquisition mode of the biological characteristics such as pressure and time, can carry out according to existing mode, just repeat no more here.The feature of input mode during according to user's setting code, also can adopt different algorithms to generate different biological informations.
The mode of particular user setting code can adopt various existing input modes, for example static soft keyboard input, dynamic soft keyboard input, the input of dot matrix track or handwriting recognition input etc.Take below above-mentioned several input mode as example illustrates corresponding authentication information.
1) static state/dynamic soft keyboard mode.
Under which, authentication content information can be key assignments; The biological characteristic gathering can comprise: the force value of sampled point, sample point coordinate, time etc.; The authentication biological information generating can be the value that the data messages such as force value, coordinate and time that utilize aforementioned sample point calculate, for example, statistics pressure information (average pressure value of all sampled points on as this key assignments), the time of each key assignments in the state of being pressed on the key assignments of input, the key assignments of current input is pressed and the key assignments of the upper input time interval, speed, the acceleration between being released, the key assignments sum of input etc.The mode that specifically generates various authentication biological informations according to the biological characteristic gathering belongs to those skilled in the art's common technology means, just repeats no more here.
2) dot matrix track mode.
Under which, authentication content information can be the dot matrix sequence number value that user's input trajectory comprises, and the biological characteristic of collection can comprise: the force value of sampled point and respective coordinates, time etc.The authentication biological information generating can be the value that the data messages such as force value, coordinate and time that utilize aforementioned sample point calculate, such as the various speed of user's input trajectory and acceleration, the direction of user's input trajectory, the statistics pressure information of the time of user's input trajectory, user's input trajectory etc.The mode that specifically generates various authentication biological informations according to the biological characteristic gathering belongs to those skilled in the art's common technology means, just repeats no more here.
3) handwriting recognition mode.
Under which, authentication content information can be the character content obtaining by handwriting recognition algorithm; The biological characteristic gathering can comprise: the force value of sampled point and respective coordinates, time etc.; The authentication biological information generating can be the value that the data messages such as force value, coordinate and time that utilize aforementioned sample point calculate, the statistics pressure information of stroke for example, stroke speed, stroke acceleration, stroke direction, the stroke duration, the time interval of adjacent two-stroke, the data such as stroke number.The mode that specifically generates various authentication biological informations according to the biological characteristic gathering belongs to those skilled in the art's common technology means, just repeats no more here.
Step 102, while carrying out the release of terminal device, receives the password content for release of user's input, and the biological characteristic when gathering user and inputting corresponding password content, generates the biological information for release.
Here, input the processing of password during to user's release, the processing during with user's setting code is identical, comprise that password input mode is identical, and encrypted message extracting mode is identical.
Particularly, for the unlocking pin of user input, the password content of identification user input, using it as the password content for release, the biological characteristic when gathering user simultaneously and inputting corresponding password content, generates the biological information for release.Wherein, identical during with setting code of the characteristic type that gathers biological characteristic and generate biological information, identical to the processing mode of biological characteristic.That is, if during setting code, the biological characteristic of collection is force value, and during release input password, the biological characteristic of collection also should be force value mutually, and the algorithm that generates biological information according to this force value is also identical.Certainly, be to improve the security of cipher authentication, preferably, the biological characteristic of collection comprises pressure and time, thereby can carry out more comprehensively, more complicated cipher authentication.
Step 103, compares the password content of user input in step 102 and the authentication content information in step 101, if content is consistent, performs step 104 authentications of proceeding biological characteristic, if content is inconsistent, refuses release.
Authentication for content information in this step is identical with existing mode, and relatively whether the content of input is identical with the password content of setting, just repeats no more here.According to different authentication results, correspondingly carry out subsequent operation.
Step 104, the biological information for release that step 102 is generated and the authentication biological information of step 101 compare, if the difference of the two, within the scope of predetermined threshold value, allows release, otherwise refusal release.
While carrying out the authentication of biological characteristic, the difference between the biological information that calculates user's input and authentication biological information, when this difference is within the scope of setting threshold, judges that authentication passes through, permission release, even otherwise content authentication by still keeping lock-out state.
For administering and maintaining better authentication biological information, can judge and allow after release in step 104, further carry out following operation and upgrade authentication biological information:
Step 105, upgrades authentication biological information according to the biological information for release by authentication.
While upgrading operation, can be directly using the biological information generating in step 102 the authentication biological information after upgrading, also can carry out specify arithmetic (such as carrying out statistical average etc.), the authentication biological information using operation result after upgrading by the authentication biological information by the biological information generating in step 102 and before upgrading.
So far, the cipher authentication method flow process in the application finishes.
In addition, in the application, also provide cipher authentication device, for implementing above-mentioned cipher authentication method.Particularly, the basic structure of cipher authentication device as shown in Figure 2, comprising: data acquisition module, code data generation module, cipher authentication module and code data administration module.
Wherein, data acquisition module, for receiving the password content for release of user's input, biological characteristic when collection user inputs described password content, and password content and biological characteristic are transmitted to code data generation module.
Code data generation module, the biological characteristic when inputting described password content according to the user of data collecting module collected, generates the biological information for release; The biological information of generation and the next password content of data acquisition module forwarding are sent to cipher authentication module.
Cipher authentication module, the authentication content information of preserving for password content and described code data administration module that data acquisition module is received is compared, and when comparison is inconsistent, refuses release; When the password content receiving is consistent with the authentication content information prestoring, the authentication biological information that the biological information for release that described code data generation module is generated and described code data administration module are preserved is compared, when the two gap is within the scope of predetermined threshold value, allow release, otherwise refusal release.
Code data administration module is for preserving and providing authentication content information and authentication biological information to cipher authentication module.
When being received user by cipher authentication device and input and gather corresponding information and generate authentication biological information, data acquisition module, can be further used for receiving the password content of user's setting, and the biological characteristic while gathering user's setting code.Code data generation module, biological characteristic in the time of can being further used for according to user's setting code generates authentication biological information and is kept in code data administration module, and the password content of also setting for the user that data acquisition module is received is kept at code data administration module as authentication content information.
Further, for realizing the renewal of authentication biological information, code data administration module, can be further used for allowing after release in cipher authentication module, and the biological information for release generating according to code data generation module upgrades authentication biological information.
Specific implementation by above-mentioned the application is visible, cipher authentication method in the application and equipment are when carrying out cipher authentication, except receiving the password content for release of user's input, biological characteristic when also gathering user and inputting password content, generate the biological information for release, utilize this biological information to carry out cipher authentication.Well utilize current main flow terminal equipment itself can collect pressure, the characteristic of the data such as speed, utilize these data to generate biological information, in conjunction with input content, both can solve current ubiquitous cryptosecurity problem, there is again the advantage that the external environment of not being subject to affects as sound, light, and do not need additionally to increase external unit.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of making, be equal to replacement, improvement etc., within all should being included in the scope of protection of the invention.

Claims (9)

1. a cipher authentication method for terminal device, is characterized in that, comprising:
When carrying out unlocking terminal equipment, receive the password content for release of user's input, biological characteristic when collection user inputs described password content, generates the biological information for release; The described biological information for release comprises coordinate and pressure information and/or temporal information and/or speed and/or the acceleration information of input point;
The password content of reception and the authentication content information prestoring are compared, when comparison is inconsistent, refusal release; When the password content receiving is consistent with the authentication content information prestoring, the biological information for release generating and the authentication biological information prestoring are compared, when the two gap is within the scope of predetermined threshold value, allow release, otherwise refusal release.
2. method according to claim 1, is characterized in that, described in the prestore mode of authentication content information comprise: the password content that the user that terminal device receives sets, the password content of this setting is preserved as described authentication content information;
The described mode that prestores authentication biological information comprises: biological characteristic during user's setting code that terminal device gathers, and generate described authentication biological information and preserve.
3. method according to claim 1 and 2, it is characterized in that, biological characteristic when described collection user inputs described password content comprises: force value, the coordinate of sampled point and/or the time of sampled point of each sampled point when collection user inputs described password content.
4. method according to claim 3, is characterized in that, when user inputs described password content by static state or dynamic soft keyboard mode,
Described password content is the key assignments of input;
Described generation comprises for the biological information of release: be created on the statistics pressure information on the key assignments of described input, and/or, be created on the residence time on the key assignments of described input, and/or be created on the interval time on each adjacent key assignments of described input.
5. method according to claim 3, is characterized in that, when user inputs described password content by dot matrix track mode,
The dot matrix sequence number value that described password content comprises for user's input trajectory;
Described generation comprises for the biological information of release: generate speed and/or acceleration and/or the direction of user's input trajectory, and/or generate the temporal information of user's input trajectory, and/or generate the statistics pressure information of user's input trajectory.
6. method according to claim 3, is characterized in that, when user inputs described password content by handwriting recognition mode,
Described password content is the character content of user's input;
Described generation comprises for the biological information of release: the statistics pressure information that generates described character, with or, generate stroke speed in described character and/or the time interval and/or the stroke number of stroke acceleration and/or stroke direction and/or stroke duration and/or adjacent stroke.
7. a cipher authentication device for terminal device, is characterized in that, this device comprises: data acquisition module, code data generation module, cipher authentication module and code data administration module;
Described data acquisition module, for receiving the password content for release of user's input, biological characteristic when collection user inputs described password content, and described password content and biological characteristic are transmitted to described code data generation module;
Described code data generation module, the biological characteristic when inputting described password content according to the user of described data collecting module collected, generates the biological information for release; The described biological information generating and the next password content of described data acquisition module forwarding are sent to described cipher authentication module; The described biological information for release comprises coordinate and pressure information and/or temporal information and/or speed and/or the acceleration information of input point;
Described cipher authentication module, the authentication content information of preserving for password content and described code data administration module that described data acquisition module is received is compared, and when comparison is inconsistent, refuses release; When the password content receiving is consistent with the authentication content information prestoring, the authentication biological information that the biological information for release that described code data generation module is generated and described code data administration module are preserved is compared, when the two gap is within the scope of predetermined threshold value, allow release, otherwise refusal release;
Described code data administration module is for preserving and providing described authentication content information and authentication biological information to described cipher authentication module.
8. device according to claim 7, is characterized in that, described data acquisition module is further used for receiving the password content that user sets, and the biological characteristic while gathering user's setting code;
Described code data generation module, biological characteristic while being further used for according to user's setting code generates described authentication biological information and is kept in described code data administration module, and the password content of also setting for the user that described data acquisition module is received is kept at described code data administration module as described authentication content information.
9. according to the device described in claim 7 or 8, it is characterized in that, described code data administration module, is further used for allowing after release in described cipher authentication module, and the biological information for release generating according to described code data generation module upgrades described authentication biological information.
CN201210375554.0A 2012-09-29 2012-09-29 Password authentication method and password authentication device of terminal equipment Pending CN103714278A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210375554.0A CN103714278A (en) 2012-09-29 2012-09-29 Password authentication method and password authentication device of terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210375554.0A CN103714278A (en) 2012-09-29 2012-09-29 Password authentication method and password authentication device of terminal equipment

Publications (1)

Publication Number Publication Date
CN103714278A true CN103714278A (en) 2014-04-09

Family

ID=50407241

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210375554.0A Pending CN103714278A (en) 2012-09-29 2012-09-29 Password authentication method and password authentication device of terminal equipment

Country Status (1)

Country Link
CN (1) CN103714278A (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103870744A (en) * 2012-12-13 2014-06-18 联想(北京)有限公司 Method and electronic device for verifying password
CN104462906A (en) * 2014-12-19 2015-03-25 中国农业银行股份有限公司 Mouse with information collection function and identity recognition method and system
CN104915582A (en) * 2015-05-28 2015-09-16 努比亚技术有限公司 Unlocking method and unlocking device
CN105184122A (en) * 2015-09-09 2015-12-23 魅族科技(中国)有限公司 Encrypting method, decrypting method, encrypting device, decrypting device and terminal
CN105279407A (en) * 2015-11-02 2016-01-27 上海斐讯数据通信技术有限公司 Touchscreen-based encryption/decryption method, system and equipment
CN105354458A (en) * 2015-11-03 2016-02-24 广东欧珀移动通信有限公司 Password input verification method and system
CN105404460A (en) * 2015-11-27 2016-03-16 上海与德通讯技术有限公司 Key input detection method and module
CN105450405A (en) * 2014-07-18 2016-03-30 阿里巴巴集团控股有限公司 Password setting and authentication method and system
CN105512527A (en) * 2015-12-09 2016-04-20 上海斐讯数据通信技术有限公司 Encryption/decryption method and encryption/decryption system for application as well as mobile terminal
CN105589645A (en) * 2014-10-21 2016-05-18 中兴通讯股份有限公司 Touch screen unlocking method and device
CN105589654A (en) * 2015-12-29 2016-05-18 惠州Tcl移动通信有限公司 Pressure sensor based mobile terminal unlocking method and system
CN105644496A (en) * 2016-03-15 2016-06-08 许准 Start control method and system based on pressure detection and vehicle
CN105740691A (en) * 2016-01-27 2016-07-06 深圳市金立通信设备有限公司 Password authentication method and terminal
CN105809018A (en) * 2016-03-11 2016-07-27 深圳市金立通信设备有限公司 Sliding track verification method and terminal
CN106656962A (en) * 2016-09-30 2017-05-10 北京瑞卓喜投科技发展有限公司 Cryptograph decryption method and cryptograph decryption device
CN106778203A (en) * 2016-12-27 2017-05-31 宇龙计算机通信科技(深圳)有限公司 A kind of method and device of unlocking screen
CN107122638A (en) * 2016-02-24 2017-09-01 西安中兴新软件有限责任公司 User equipment and its unlocking method
WO2018006542A1 (en) * 2016-07-06 2018-01-11 中兴通讯股份有限公司 Terminal unlock method, and terminal
CN107633573A (en) * 2017-07-28 2018-01-26 移康智能科技(上海)股份有限公司 The method for unlocking and intelligent door lock of a kind of intelligent door lock
CN107710212A (en) * 2015-04-30 2018-02-16 德山真旭 Terminal installation and computer program
CN107729728A (en) * 2016-08-12 2018-02-23 京瓷办公信息系统株式会社 Authentication device, image processing apparatus and authentication method
CN107862200A (en) * 2016-11-14 2018-03-30 平安科技(深圳)有限公司 Cipher-code input method and device
CN110084009A (en) * 2019-04-22 2019-08-02 惠州Tcl移动通信有限公司 Digital unlocking method, device, storage medium and mobile terminal
CN110121174A (en) * 2019-05-16 2019-08-13 徐国愚 A kind of implicit identity identifying method of mobile intelligent terminal
CN110263519A (en) * 2019-05-31 2019-09-20 联想(北京)有限公司 Information processing method and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040095384A1 (en) * 2001-12-04 2004-05-20 Applied Neural Computing Ltd. System for and method of web signature recognition system based on object map
CN101008876A (en) * 2006-01-23 2007-08-01 郑希付 Script analysis system
CN101753301A (en) * 2008-11-28 2010-06-23 谈剑锋 Fingerprint dynamic password ID authentication device and the implementation method thereof
CN102067150A (en) * 2008-06-16 2011-05-18 高通股份有限公司 Method and system for graphical passcode security
CN102170348A (en) * 2010-11-08 2011-08-31 无敌科技(西安)有限公司 Method for achieving encryption and decryption of data through recording user input speed
CN102483784A (en) * 2009-08-27 2012-05-30 讯宝科技公司 Systems and methods for pressure-based authentication of a signature on a touch screen

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040095384A1 (en) * 2001-12-04 2004-05-20 Applied Neural Computing Ltd. System for and method of web signature recognition system based on object map
CN101008876A (en) * 2006-01-23 2007-08-01 郑希付 Script analysis system
CN102067150A (en) * 2008-06-16 2011-05-18 高通股份有限公司 Method and system for graphical passcode security
CN101753301A (en) * 2008-11-28 2010-06-23 谈剑锋 Fingerprint dynamic password ID authentication device and the implementation method thereof
CN102483784A (en) * 2009-08-27 2012-05-30 讯宝科技公司 Systems and methods for pressure-based authentication of a signature on a touch screen
CN102170348A (en) * 2010-11-08 2011-08-31 无敌科技(西安)有限公司 Method for achieving encryption and decryption of data through recording user input speed

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103870744B (en) * 2012-12-13 2018-04-27 联想(北京)有限公司 A kind of method and electronic equipment for verifying password
CN103870744A (en) * 2012-12-13 2014-06-18 联想(北京)有限公司 Method and electronic device for verifying password
CN105450405A (en) * 2014-07-18 2016-03-30 阿里巴巴集团控股有限公司 Password setting and authentication method and system
CN105450405B (en) * 2014-07-18 2018-10-02 阿里巴巴集团控股有限公司 A kind of setting of password and authentication method and system
CN105589645A (en) * 2014-10-21 2016-05-18 中兴通讯股份有限公司 Touch screen unlocking method and device
CN104462906A (en) * 2014-12-19 2015-03-25 中国农业银行股份有限公司 Mouse with information collection function and identity recognition method and system
CN107710212A (en) * 2015-04-30 2018-02-16 德山真旭 Terminal installation and computer program
CN104915582B (en) * 2015-05-28 2017-12-22 努比亚技术有限公司 unlocking method and device
CN104915582A (en) * 2015-05-28 2015-09-16 努比亚技术有限公司 Unlocking method and unlocking device
CN105184122A (en) * 2015-09-09 2015-12-23 魅族科技(中国)有限公司 Encrypting method, decrypting method, encrypting device, decrypting device and terminal
CN105279407A (en) * 2015-11-02 2016-01-27 上海斐讯数据通信技术有限公司 Touchscreen-based encryption/decryption method, system and equipment
CN105354458B (en) * 2015-11-03 2018-01-16 广东欧珀移动通信有限公司 Password Input verification method and system
CN105354458A (en) * 2015-11-03 2016-02-24 广东欧珀移动通信有限公司 Password input verification method and system
CN105404460A (en) * 2015-11-27 2016-03-16 上海与德通讯技术有限公司 Key input detection method and module
CN105512527A (en) * 2015-12-09 2016-04-20 上海斐讯数据通信技术有限公司 Encryption/decryption method and encryption/decryption system for application as well as mobile terminal
CN105589654B (en) * 2015-12-29 2019-07-09 惠州Tcl移动通信有限公司 A kind of mobile terminal unlocking method and system based on pressure sensor
CN105589654A (en) * 2015-12-29 2016-05-18 惠州Tcl移动通信有限公司 Pressure sensor based mobile terminal unlocking method and system
CN105740691A (en) * 2016-01-27 2016-07-06 深圳市金立通信设备有限公司 Password authentication method and terminal
CN107122638A (en) * 2016-02-24 2017-09-01 西安中兴新软件有限责任公司 User equipment and its unlocking method
CN105809018A (en) * 2016-03-11 2016-07-27 深圳市金立通信设备有限公司 Sliding track verification method and terminal
CN105644496A (en) * 2016-03-15 2016-06-08 许准 Start control method and system based on pressure detection and vehicle
WO2018006542A1 (en) * 2016-07-06 2018-01-11 中兴通讯股份有限公司 Terminal unlock method, and terminal
CN107729728A (en) * 2016-08-12 2018-02-23 京瓷办公信息系统株式会社 Authentication device, image processing apparatus and authentication method
CN106656962A (en) * 2016-09-30 2017-05-10 北京瑞卓喜投科技发展有限公司 Cryptograph decryption method and cryptograph decryption device
CN107862200A (en) * 2016-11-14 2018-03-30 平安科技(深圳)有限公司 Cipher-code input method and device
CN106778203A (en) * 2016-12-27 2017-05-31 宇龙计算机通信科技(深圳)有限公司 A kind of method and device of unlocking screen
CN107633573A (en) * 2017-07-28 2018-01-26 移康智能科技(上海)股份有限公司 The method for unlocking and intelligent door lock of a kind of intelligent door lock
CN110084009A (en) * 2019-04-22 2019-08-02 惠州Tcl移动通信有限公司 Digital unlocking method, device, storage medium and mobile terminal
CN110121174A (en) * 2019-05-16 2019-08-13 徐国愚 A kind of implicit identity identifying method of mobile intelligent terminal
CN110121174B (en) * 2019-05-16 2022-04-15 徐国愚 Implicit identity authentication method of mobile intelligent terminal
CN110263519A (en) * 2019-05-31 2019-09-20 联想(北京)有限公司 Information processing method and electronic equipment

Similar Documents

Publication Publication Date Title
CN103714278A (en) Password authentication method and password authentication device of terminal equipment
US10558792B2 (en) Touch-screen user key-press behavior pattern construction and analysis system and identity recognition method thereof
Meng et al. Surveying the development of biometric user authentication on mobile phones
AU2016217549B2 (en) Systems and methods for securely managing biometric data
CN106068512B (en) Method and apparatus for verifying user on the mobile device
CN103294334B (en) Unlocking screen data access control method and safety control
CN108989278A (en) Identification service system and method
CN106572097B (en) A kind of mobile device-based hybrid identity identifying method
CN104158664A (en) Identity authentication method and system
CN106657166B (en) A kind of method of authentication, terminal device and server
EP4088205B1 (en) System and method for disentangling features specific to users, actions and devices recorded in motion sensor data
Mayrhofer et al. Adversary models for mobile device authentication
CN106921655B (en) Service authorization method and device
CN107194219A (en) Intelligent terminal identity identifying method based on similarity
CN104486310A (en) Method and system for authenticating finger veins and finger vein information acquisition instrument
Lin et al. A novel non-intrusive user authentication method based on touchscreen of smartphones
Zhang et al. Multimodal continuous user authentication on mobile devices via interaction patterns
Feng et al. Security after login: Identity change detection on smartphones using sensor fusion
CN103532956A (en) Biological information-based authentication method in cloud operation system
Adeyemi et al. A psychographic framework for online user identification
Hao et al. Towards user re-authentication on mobile devices via on-screen keyboard
CN104717641B (en) A kind of digital signature generation method and SIM card based on SIM card
Albayram et al. A method for improving mobile authentication using human spatio-temporal behavior
CN108564726A (en) One kind borrowing umbrella control system
CN114745184B (en) Number graphical encryption method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140409

RJ01 Rejection of invention patent application after publication