CN104166819A - Identity verification method, device and terminal - Google Patents

Identity verification method, device and terminal Download PDF

Info

Publication number
CN104166819A
CN104166819A CN201410360244.0A CN201410360244A CN104166819A CN 104166819 A CN104166819 A CN 104166819A CN 201410360244 A CN201410360244 A CN 201410360244A CN 104166819 A CN104166819 A CN 104166819A
Authority
CN
China
Prior art keywords
semanteme
verification pattern
authentication
training
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410360244.0A
Other languages
Chinese (zh)
Inventor
王琳
王司瑞
陈志军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410360244.0A priority Critical patent/CN104166819A/en
Publication of CN104166819A publication Critical patent/CN104166819A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation

Abstract

The invention discloses an identity verification method, device and terminal. According to the scheme, identity verification is carried out according to semanteme of a verification figure. When identity verification is carried out and after the verification figure is received, a terminal analyzes the obtained semanteme of the verification figure, and whether the identity verification is passed or not is determined according to the comparison result of semanteme of the verification figure and preset semanteme, wherein the verification figure is drawn by a user on a screen, and the identity verification is passed when the semanteme of the verification figure is identical with the preset semanteme. Due to the fact that the identity verification is carried out on the basis of the semanteme of the verification figure in the identity verification method, the verification figure comprises multiple types, the user cannot decode the verification figure after many attempts, and the safety of identity verification is improved.

Description

Auth method, device and terminal
Technical field
The disclosure relates to technical field of electronic equipment, relates in particular to a kind of auth method, device and terminal.
Background technology
As a kind of high-tech product, various terminals, as mobile phone, panel computer etc. bring many facilities for people.In order to prevent that terminal from being used by other people, use terminal to go to toward needing terminal to carry out authentication operation, to only have by authentication, terminal could be carried out various functions under user's operation.For example, when mobile phone does not use within a certain period of time, the screen of mobile phone can enter lock-out state, and only after by authentication, the screen of mobile phone is just understood release, and user can use the various functions of mobile phone.
Authentication at present mainly comprises slip button and draws two kinds of modes of nine grids figure.When the mode that adopts slip button is carried out authentication, if user slides into default target location by button, think by authentication; When the mode that adopts drafting nine grids figure is carried out authentication, if the nine grids figure that user draws is identical with default nine grids figure, think by authentication.
But when above-mentioned two kinds of modes are carried out authentication, the limited amount of the target location adopting and nine grids figure can be decrypted under repeatedly attempting, security is low.
Summary of the invention
For overcoming the problem existing in correlation technique, the disclosure provides a kind of auth method, device and terminal.
According to the first aspect of disclosure embodiment, a kind of auth method is provided, comprising:
Receive the verification pattern that user draws on screen;
Obtain the semanteme of described verification pattern;
The semanteme of described verification pattern and default semanteme are compared, when the semanteme of described verification pattern is identical with default semanteme, determine by authentication.
In conjunction with first aspect, in the possible implementation of first aspect the first, before the verification pattern that described reception user draws on screen, also comprise:
The type that shows the authorization information that this authentication is required;
When the type of described authorization information is graph style, carry out the operation of the verification pattern that described reception user draws on screen.
In conjunction with first aspect, in the possible implementation of first aspect the second, described auth method also comprises:
Receive user's verification mode blocked operation, described verification mode blocked operation is for switching the type of the required authorization information of this authentication;
If the type of the authorization information that this authentication is required is text, receive the checking text of user's input;
Described checking text and default text are compared, when described checking text is identical with default text, determine by authentication.
In conjunction with first aspect, in the third possible implementation of first aspect, described auth method also comprises:
Receive training atlas, described training plan is concentrated the training figure that comprises corresponding two or more semantemes;
Extract and respectively train the feature of figure, and to described feature coding, obtain coding characteristic vector;
According to described coding characteristic vector, described training figure is carried out to classification based training, obtain sorter model, wherein, the training figure of identical semanteme belongs to same classification.
In conjunction with the third possible implementation of first aspect, in the 4th kind of possible implementation of first aspect, described in obtain the semanteme of described verification pattern, comprising:
Extract the feature of described verification pattern;
By the feature of described sorter model and described verification pattern, obtain the training figure the highest with described verification pattern similarity;
Semanteme with the highest training figure of described verification pattern similarity is defined as to the semanteme of described verification pattern.
In conjunction with first aspect, or in conjunction with the possible implementation of first aspect the second, in the 5th kind of possible implementation of first aspect, described auth method also comprises:
Receiving described verification pattern, or before described checking text message, by information corresponding to this authentication of screen display.
According to the second aspect of disclosure embodiment, a kind of authentication means is provided, comprising: described authentication means comprises:
The first receiver module, the verification pattern of drawing on screen for receiving user;
Semantic acquisition module, for obtaining the semanteme of described verification pattern;
The first authentication module, for the semanteme of described verification pattern and default semanteme are compared, when the semanteme of described verification pattern is identical with default semanteme, determines by authentication.
In conjunction with second aspect, in the possible implementation of second aspect the first, described authentication means also comprises:
Display module, for showing the type of the authorization information that this authentication is required;
When the type of described authorization information is graph style, the operation of the verification pattern that the described reception of described receiver module execution user draws on screen.
In conjunction with second aspect, in the possible implementation of second aspect the second, described authentication means also comprises:
The second receiver module, for receiving user's verification mode blocked operation, described verification mode blocked operation is for switching the type of the required authorization information of this authentication;
The 3rd receiver module, if be text for the type of the required authorization information of this authentication, receives the checking text of user's input;
The second authentication module, for described checking text and default text are compared, when described checking text is identical with default text, determines by authentication.
In conjunction with second aspect, in the third possible implementation of second aspect, described authentication means also comprises:
The 4th receiver module, for receiving training atlas, described training plan is concentrated the training figure that comprises corresponding two or more semantemes;
First Characteristic extraction module, for extracting the feature of respectively training figure, and to described feature coding, obtains coding characteristic vector;
Classification based training module, for according to described coding characteristic vector, carries out classification based training to described training figure, obtains sorter model, and wherein, the training figure of identical semanteme belongs to same classification.
In conjunction with second aspect, in the 4th kind of possible implementation of second aspect, described semantic acquisition module comprises:
Second Characteristic extraction module, for extracting the feature of described verification pattern;
Acquisition module, for by the feature of described sorter model and described verification pattern, obtains the training figure the highest with described verification pattern similarity;
Determination module, is defined as the semanteme with the highest training figure of described verification pattern similarity the semanteme of described verification pattern.
In conjunction with second aspect, or in conjunction with the possible implementation of second aspect the second, in the 5th kind of possible implementation of second aspect, described authentication means also comprises:
Reminding module, for receiving described verification pattern, or before described checking text message, by information corresponding to this authentication of screen display.
According to the third aspect of disclosure embodiment, a kind of terminal is provided, comprising:
Processor;
Storer for storage of processor executable instruction;
Wherein, described processor is configured to:
Receive the verification pattern that user draws on screen;
Obtain the semanteme of described verification pattern;
The semanteme of described verification pattern and default semanteme are compared, when the semanteme of described verification pattern is identical with default semanteme, determine by authentication.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect:
When the disclosed scheme of the application is carried out authentication, be that the semanteme based on verification pattern carries out authentication, and described verification pattern comprises plurality of classes, thereby be also difficult to decode after repeatedly attempting user, improved the security of authentication.
Should be understood that, it is only exemplary and explanatory that above general description and details are hereinafter described, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing is herein merged in instructions and forms the part of this instructions, shows embodiment according to the invention, and is used from and explains principle of the present invention with instructions one.
Fig. 1 is according to the process flow diagram of a kind of auth method shown in an exemplary embodiment.
Fig. 2 is according to the process flow diagram of a kind of auth method shown in an exemplary embodiment.
Fig. 3 is according to the process flow diagram of a kind of auth method shown in an exemplary embodiment.
Fig. 4 is according to the screen schematic diagram of the terminal shown in an exemplary embodiment.
Fig. 5 is according to the screen schematic diagram of the terminal shown in an exemplary embodiment.
Fig. 6 is according to the process flow diagram of a kind of auth method shown in an exemplary embodiment.
Fig. 7 is according in a kind of auth method shown in an exemplary embodiment, obtains the semantic process flow diagram of verification pattern.
Fig. 8 is according to the structural representation of a kind of authentication means shown in an exemplary embodiment.
Fig. 9 is according to the structural representation of a kind of authentication means shown in an exemplary embodiment.
Figure 10 is according to the structural representation of a kind of authentication means shown in an exemplary embodiment.
Figure 11 is according to the block diagram of a kind of device for authentication shown in an exemplary embodiment.
Embodiment
Here will at length to exemplary embodiment, describe, its example shown in the accompanying drawings.When description below relates to accompanying drawing, unless separately there is expression, the same numbers in different accompanying drawings represents same or analogous key element.Embodiment described in following exemplary embodiment does not represent all embodiments consistent with the present invention.On the contrary, they are only the examples with apparatus and method as consistent in some aspects that described in detail in appended claims, of the present invention.
Fig. 1 is according to the process flow diagram of a kind of auth method shown in an exemplary embodiment, and as shown in Figure 1, described auth method is applied in terminal, and the method comprises the following steps:
In step S11, receive the verification pattern that user draws on screen.
Receive after verification pattern, in step S12, obtain the semanteme of described verification pattern.
Wherein, the semanteme of data refers to the implication of the concept of things representative corresponding to data.In the application, the semanteme of described verification pattern refers to the kind of the object of verification pattern representative.
Obtain after the semanteme of verification pattern, in step S13, the semanteme of described verification pattern and default semanteme are compared, when the semanteme of described verification pattern is identical with default semanteme, determine by authentication.
Wherein, described default semanteme according to user the operating and setting to terminal.When the semanteme of verification pattern is identical with default semanteme, illustrate that the verification pattern that user draws is the required information of this authentication, determine by authentication.
When if the semanteme of described verification pattern is different from default semanteme, explanation is not by this authentication, terminal is carried out corresponding operation according to arranging in advance, for example, terminal can continue wait, until carry out authentication operation next time, or, terminal can be carried out alarm operation, to point out user.
In above embodiment, disclose a kind of auth method, the method relies on the semanteme of verification pattern when carrying out authentication.After receiving described verification pattern, verification pattern described in terminal analysis, obtain the semanteme of described verification pattern, then according to the semanteme of described verification pattern and the semantic comparing result of presetting, determine whether the authentication by this, wherein, described verification pattern is drawn on screen by user, and when the semanteme of verification pattern is identical with default semanteme, determine by this authentication.
In above-mentioned auth method, that semanteme based on verification pattern carries out authentication, and described verification pattern comprises plurality of classes, for example, described verification pattern can comprise plant, animal class and daily category, and plant can segment a plurality of classifications such as comprising apple, banana, leaf, flower and trees, thereby be also difficult to decode after repeatedly attempting user, improved the security of authentication.
In addition, before carrying out authentication, terminal arranges described default semanteme under user's operation, default semantic mode is wherein set and comprises at least following two kinds of modes.
A kind of setting in default semantic method therein, terminal receives the text message of user's input, then using semanteme corresponding to described text message as described default semanteme.In another approach, first terminal receives the figure of user's input, then described figure is analyzed, and obtains the semanteme of described figure, using the semanteme of described figure as described default semanteme.
By the way, can realize default semantic setting, and, in setting up procedure, can corresponding semanteme be set according to user's hobby.For example, user likes this figure of apple, and described default semanteme can be set to apple.When carrying out authentication, user can complete authentication by draw the apple figure of oneself liking on screen, thereby has increased the interest of authentication.
In above-mentioned exemplary embodiment, the application adopts verification pattern to realize authentication.In addition, in order to adapt to user's demand, can also adopt the information of other types to carry out authentication.When the information of authentication employing comprises two or more type, referring to Fig. 2, the disclosed auth method of the application comprises:
Step S21, show the type of the authorization information that this authentication is required.
Step S22, when the type of described authorization information is graph style, carry out the operation of the verification pattern that described reception user draws on screen.
Step S23, obtain the semanteme of described verification pattern.
Step S24, the semanteme of described verification pattern and default semanteme are compared, when the semanteme of described verification pattern is identical with default semanteme, determine by authentication.
Wherein, step S22 is identical to the operating process of step S13 with step S11 to the operating process of step S24, can cross-reference, repeat no more herein.
Above-described embodiment is applicable to the situation that authorization information comprises two or more types.In this case, terminal can judge the type of the authorization information that this authentication is required, and show the type of the authorization information that this authentication is required, when the type of described authorization information is graph style, can carry out by the verification pattern receiving the operation of authentication.
In addition, user wishes to adopt other modes to carry out authentication sometimes.For example, user's release of being eager, or user has been sick of the mode of graphing release, wishes to utilize text message to carry out authentication.In order to meet this demand, the application discloses the 3rd exemplary embodiment.
Referring to Fig. 3, in this embodiment, the disclosed auth method of the application also comprises:
Step S31, reception user's verification mode blocked operation, described verification mode blocked operation is for switching the type of the required authorization information of this authentication.
Wherein, according to user's setting to terminal in advance, determine the way of realization of described verification mode blocked operation.For example, can arrange that long to press screen locking key be verification mode blocked operation, in this case, terminal is pressed the length of screen locking key after operation receiving user, switches the type of the required authorization information of this authentication.Certainly, can also be set to other forms by described verification mode blocked operation, the application does not limit this.
Step S32, judge the type of the authorization information that this authentication is required, if the type of the authorization information that this authentication is required is text, the operation of execution step S33, if the type of the required authorization information of this authentication is graph style, the operation of execution step S35.
If the type of the authorization information that this authentication of step S33 is required is text, receive the checking text of user's input.
In addition, in order to make the type of the required authorization information of clear and definite this authentication of user, when determining that the type of required authorization information is text, can also on the screen of terminal, show the type of the authorization information that this authentication is required, the form showing can be referring to Fig. 4, certainly, can also adopt other forms to show, the application does not limit this.
Step S34, described checking text and default text are compared, when described checking text is identical with default text, determine by authentication.
When if the type of the authorization information that this authentication of step S35 is required is graph style, receive the verification pattern that user draws on screen.
In addition, in order to make the type of the required authorization information of clear and definite this authentication of user, when determining that the type of required authorization information is graph style, can also on the screen of terminal, show the type of the authorization information that this authentication is required, the form showing can be referring to Fig. 5, certainly, can also adopt other forms to show, the application does not limit this.
Step S36, obtain the semanteme of described verification pattern.
Step S37, the semanteme of described verification pattern and default semanteme are compared, when the semanteme of described verification pattern is identical with default semanteme, determine by authentication.
Wherein, step S35 is identical to the operating process of step S13 with step S11 to the operating process of step S37, can cross-reference, repeat no more herein.
In addition, referring to Fig. 6, the disclosed auth method of the application also comprises:
Step S41, reception training atlas, described training plan is concentrated the training figure that comprises corresponding two or more semantemes.
Step S42, extraction are respectively trained the feature of figure, and to described feature coding, are obtained coding characteristic vector.
When extracting the feature of training figure, the method that can adopt various features to extract, as methods such as HOG (Histograms of Oriented Gradients, gradient orientation histogram), Dense SIFT (dense yardstick invariant feature extraction), SIFT (feature extraction).By the method for described feature extraction, can extract the feature of respectively training figure, obtain corresponding coding characteristic vector.
In addition, when carrying out feature coding, can adopt bag of feature mode, certainly, can adopt other feature coding mode yet, the application does not limit this.
Step S43, vectorial according to described coding characteristic, carries out classification based training to described training figure, obtains sorter model, and wherein, the training figure of identical semanteme belongs to same classification.
After obtaining coding characteristic vector, adopt the mode of sorter training to carry out classification based training to training figure, and obtain sorter model corresponding to training figure.Wherein, described sorter training patterns can adopt the methods such as SVM (support vector machine, support vector machine).
Step S41 is to step S43 for carrying out pretreated operation to training figure, and this is carried out before operating in step S11.This pretreated operation, can obtain the corresponding sorter model of training figure, and described training figure at least comprises two kinds of semantemes, to obtain the semanteme of verification pattern according to described sorter model.
Wherein, referring to Fig. 7, obtain the semanteme of verification pattern described in disclosed in step S12, comprise the following steps:
Step S121, extract the feature of described verification pattern.
Wherein, the feature extracting method adopting while extracting the feature of described verification pattern, with in step S42, extract training figure feature time the feature extracting method that adopts identical.
Step S122, by the feature of described sorter model and described verification pattern, obtain the training figure the highest with described verification pattern similarity.
Step S123, the semanteme with the highest training figure of described verification pattern similarity is defined as to the semanteme of described verification pattern.
Described training plan is concentrated and is at least comprised two kinds of semantic training figures, at step S121 to step S123, by the feature of sorter and verification pattern, from described training plan, concentrate and obtain the training figure the highest with verification pattern similarity, and the semanteme of the highest training figure of described this similarity is defined as to the semanteme of described verification pattern, thereby can determine the semanteme of described verification pattern.
Further, described auth method also comprises:
Receiving described verification pattern, or before described checking text message, by information corresponding to this authentication of screen display.
For example, when default semanteme is " apple ", can be at the verification pattern that receives user's drafting, or before receiving the checking text of user's input, the information that shows relevant apple on the screen of terminal, as " you are at favourite fruit? " Deng, thereby play prompting user's effect.
Accordingly, disclosed herein as well is a kind of authentication means, referring to Fig. 8, described authentication means comprises: the first receiver module 100, semantic acquisition module 200 and the first authentication module 300.
Wherein, described the first receiver module 100, the verification pattern of drawing on screen for receiving user;
Described semantic acquisition module 200, for obtaining the semanteme of described verification pattern;
Described the first authentication module 300, for the semanteme of described verification pattern and default semanteme are compared, when the semanteme of described verification pattern is identical with default semanteme, determines by authentication.
Further, referring to Fig. 9, described authentication means also comprises: display module 400, for showing the type of the authorization information that this authentication is required; When the type of described authorization information is graph style, the operation of the verification pattern that the described reception of described receiver module execution user draws on screen.
Further, referring to Figure 10, described authentication means also comprises: the second receiver module 500, the 3rd receiver module 600 and the second authentication module 700.
Wherein, described the second receiver module 500, for receiving user's verification mode blocked operation, described verification mode blocked operation is for switching the type of the required authorization information of this authentication;
Described the 3rd receiver module 600, if be text for the type of the required authorization information of this authentication, receives the checking text of user's input;
Described the second authentication module 700, for described checking text and default text are compared, when described checking text is identical with default text, determines by authentication.
Further, described authentication means also comprises: the 4th receiver module, First Characteristic extraction module and classification based training module.
Wherein, described the 4th receiver module, for receiving training atlas, described training plan is concentrated the training figure that comprises corresponding two or more semantemes;
Described First Characteristic extraction module, for extracting the feature of respectively training figure, and to described feature coding, obtains coding characteristic vector;
Described classification based training module, for according to described coding characteristic vector, carries out classification based training to described training figure, obtains sorter model, and wherein, the training figure of identical semanteme belongs to same classification.
Accordingly, described semantic acquisition module 200 comprises:
Second Characteristic extraction module, for extracting the feature of described verification pattern;
Acquisition module, for by the feature of described sorter model and described verification pattern, obtains the training figure the highest with described verification pattern similarity;
Determination module, is defined as the semanteme with the highest training figure of described verification pattern similarity the semanteme of described verification pattern.
Further, described identification means also comprises: reminding module, and for receiving described verification pattern, or before described checking text message, by information corresponding to this authentication of screen display.
The authentication means that disclosure exemplary embodiment provides, be applied to terminal, described authentication means is when carrying out authentication, that semanteme based on verification pattern carries out authentication, and described verification pattern comprises plurality of classes, thereby user, after repeatedly attempting, be also difficult to decode, improved the security of authentication.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations have been described in detail in the embodiment of relevant the method, will not elaborate explanation herein.
Accordingly, disclosed herein as well is a kind of terminal.Described terminal comprises:
Processor;
Storer for storage of processor executable instruction;
Wherein, described processor is configured to:
Receive the verification pattern that user draws on screen;
Obtain the semanteme of described verification pattern;
The semanteme of described verification pattern and default semanteme are compared, when the semanteme of described verification pattern is identical with default semanteme, determine by authentication.
Further, before the verification pattern that reception user draws on screen, the operation that described processor is carried out also comprises:
The type that shows the authorization information that this authentication is required;
When the type of described authorization information is graph style, carry out the operation of the verification pattern that described reception user draws on screen.
Further, the operation that described processor is carried out also comprises:
Described auth method also comprises:
Receive user's verification mode blocked operation, described verification mode blocked operation is for switching the type of the required authorization information of this authentication;
If the type of the authorization information that this authentication is required is text, receive the checking text of user's input;
Described checking text and default text are compared, when described checking text is identical with default text, determine by authentication.
Further, the operation that described processor is carried out also comprises:
Receive training atlas, described training plan is concentrated the training figure that comprises corresponding two or more semantemes;
Extract and respectively train the feature of figure, and to described feature coding, obtain coding characteristic vector;
According to described coding characteristic vector, described training figure is carried out to classification based training, obtain sorter model, wherein, the training figure of identical semanteme belongs to same classification.
Further, in the operation that described processor is carried out, described in obtain the semanteme of described verification pattern, comprising:
Extract the feature of described verification pattern;
By the feature of described sorter model and described verification pattern, obtain the training figure the highest with described verification pattern similarity;
Semanteme with the highest training figure of described verification pattern similarity is defined as to the semanteme of described verification pattern.
Further, the operation that described processor is carried out also comprises: receiving described verification pattern, or before described checking text message, by information corresponding to this authentication of screen display.
Figure 11 is according to the block diagram of a kind of device 800 for authentication shown in an exemplary embodiment.For example, device 800 can be mobile phone, computing machine, flat-panel devices, game console and personal digital assistant etc.
With reference to Figure 11, device 800 can comprise following one or more assembly: processing components 802, storer 804, power supply module 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of I/O (I/O), sensor module 814, and communications component 816.
The integrated operation of processing components 802 common control device 800, such as with demonstration, call, data communication, the operation that camera operation and record operation are associated.Processing components 802 can comprise that one or more processors 820 carry out instruction, to complete all or part of step of above-mentioned method.In addition, processing components 802 can comprise one or more modules, is convenient to mutual between processing components 802 and other assemblies.For example, processing components 802 can comprise multi-media module, to facilitate mutual between multimedia groupware 808 and processing components 802.
Storer 804 is configured to store various types of data to be supported in the operation of device 800.The example of these data comprises for any application program of operation on device 800 or the instruction of method, contact data, telephone book data, message, picture, video etc.Storer 804 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), ROM (read-only memory) (ROM), magnetic store, flash memory, disk or CD.
Power supply module 806 provides electric power for installing 800 various assemblies.Power supply module 806 can comprise power-supply management system, one or more power supplys, and other and the assembly that generates, manages and distribute electric power to be associated for device 800.
Multimedia groupware 808 is included in the screen that an output interface is provided between described device 800 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises that one or more touch sensors are with the gesture on sensing touch, slip and touch panel.Described touch sensor is the border of sensing touch or sliding action not only, but also detects duration and the pressure relevant to described touch or slide.In certain embodiments, multimedia groupware 808 comprises a front-facing camera and/or post-positioned pick-up head.When device 800 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.For example, audio-frequency assembly 810 comprises a microphone (MIC), and when device 800 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The sound signal receiving can be further stored in storer 804 or be sent via communications component 816.In certain embodiments, audio-frequency assembly 810 also comprises a loudspeaker, for output audio signal.
I/O interface 812 is for providing interface between processing components 802 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: homepage button, volume button, startup button and locking button.
Sensor module 814 comprises one or more sensors, is used to device 800 that the state estimation of various aspects is provided.For example, sensor module 814 can detect the opening/closing state of device 800, the relative positioning of assembly, for example described assembly is display and the keypad of device 800, the position of all right pick-up unit 800 of sensor module 814 or 800 1 assemblies of device changes, user is with device 800 existence that contact or do not have the temperature variation of device 800 orientation or acceleration/deceleration and device 800.Sensor module 814 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor module 814 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor module 814 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to be convenient to the communication of wired or wireless mode between device 800 and other equipment.Device 800 wireless networks that can access based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communications component 816 receives broadcast singal or the broadcast related information from external broadcasting management system via broadcast channel.In one exemplary embodiment, described communications component 816 also comprises near-field communication (NFC) module, to promote junction service.For example, can be based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 800 can be realized by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD) (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components, for carrying out said method.
In the exemplary embodiment, also provide a kind of non-provisional computer-readable recording medium that comprises instruction, for example, comprised the storer 804 of instruction, above-mentioned instruction can have been carried out said method by the processor 820 of device 800.For example, described non-provisional computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage equipment etc.
A non-provisional computer-readable recording medium, when the instruction in described storage medium is carried out by the processor of terminal, makes terminal can carry out a kind of auth method, and described method comprises:
Receive the verification pattern that user draws on screen;
Obtain the semanteme of described verification pattern;
The semanteme of described verification pattern and default semanteme are compared, when the semanteme of described verification pattern is identical with default semanteme, determine by authentication.
Those skilled in the art, considering instructions and putting into practice after invention disclosed herein, will easily expect other embodiment of the present invention.The application is intended to contain any modification of the present invention, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present invention and comprised undocumented common practise or the conventional techniques means in the art of the disclosure.Instructions and embodiment are only regarded as exemplary, and true scope of the present invention and spirit are pointed out by claim below.
Should be understood that, the present invention is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various modifications and change not departing from its scope.Scope of the present invention is only limited by appended claim.

Claims (13)

1. an auth method, is characterized in that, described auth method comprises:
Receive the verification pattern that user draws on screen;
Obtain the semanteme of described verification pattern;
The semanteme of described verification pattern and default semanteme are compared, when the semanteme of described verification pattern is identical with default semanteme, determine by authentication.
2. method according to claim 1, is characterized in that, before the verification pattern that described reception user draws on screen, also comprises:
The type that shows the authorization information that this authentication is required;
When the type of described authorization information is graph style, carry out the operation of the verification pattern that described reception user draws on screen.
3. method according to claim 1, is characterized in that, described auth method also comprises:
Receive user's verification mode blocked operation, described verification mode blocked operation is for switching the type of the required authorization information of this authentication;
If the type of the authorization information that this authentication is required is text, receive the checking text of user's input;
Described checking text and default text are compared, when described checking text is identical with default text, determine by authentication.
4. method according to claim 1, is characterized in that, described auth method also comprises:
Receive training atlas, described training plan is concentrated the training figure that comprises corresponding two or more semantemes;
Extract and respectively train the feature of figure, and to described feature coding, obtain coding characteristic vector;
According to described coding characteristic vector, described training figure is carried out to classification based training, obtain sorter model, wherein, the training figure of identical semanteme belongs to same classification.
5. method according to claim 4, is characterized in that, described in obtain the semanteme of described verification pattern, comprising:
Extract the feature of described verification pattern;
By the feature of described sorter model and described verification pattern, obtain the training figure the highest with described verification pattern similarity;
Semanteme with the highest training figure of described verification pattern similarity is defined as to the semanteme of described verification pattern.
6. according to the method described in claim 1 or 3, it is characterized in that, described auth method also comprises:
Receiving described verification pattern, or before described checking text message, by information corresponding to this authentication of screen display.
7. an authentication means, is characterized in that, described authentication means comprises:
The first receiver module, the verification pattern of drawing on screen for receiving user;
Semantic acquisition module, for obtaining the semanteme of described verification pattern;
The first authentication module, for the semanteme of described verification pattern and default semanteme are compared, when the semanteme of described verification pattern is identical with default semanteme, determines by authentication.
8. device according to claim 7, is characterized in that, described authentication means also comprises:
Display module, for showing the type of the authorization information that this authentication is required;
When the type of described authorization information is graph style, the operation of the verification pattern that the described reception of described receiver module execution user draws on screen.
9. device according to claim 7, is characterized in that, described authentication means also comprises:
The second receiver module, for receiving user's verification mode blocked operation, described verification mode blocked operation is for switching the type of the required authorization information of this authentication;
The 3rd receiver module, if be text for the type of the required authorization information of this authentication, receives the checking text of user's input;
The second authentication module, for described checking text and default text are compared, when described checking text is identical with default text, determines by authentication.
10. device according to claim 7, is characterized in that, described authentication means also comprises:
The 4th receiver module, for receiving training atlas, described training plan is concentrated the training figure that comprises corresponding two or more semantemes;
First Characteristic extraction module, for extracting the feature of respectively training figure, and to described feature coding, obtains coding characteristic vector;
Classification based training module, for according to described coding characteristic vector, carries out classification based training to described training figure, obtains sorter model, and wherein, the training figure of identical semanteme belongs to same classification.
11. devices according to claim 10, is characterized in that, described semantic acquisition module comprises:
Second Characteristic extraction module, for extracting the feature of described verification pattern;
Acquisition module, for by the feature of described sorter model and described verification pattern, obtains the training figure the highest with described verification pattern similarity;
Determination module, is defined as the semanteme with the highest training figure of described verification pattern similarity the semanteme of described verification pattern.
12. according to the device described in claim 7 or 9, it is characterized in that, described authentication means also comprises:
Reminding module, for receiving described verification pattern, or before described checking text message, by information corresponding to this authentication of screen display.
13. 1 kinds of terminals, is characterized in that, comprising:
Processor;
Storer for storage of processor executable instruction;
Wherein, described processor is configured to:
Receive the verification pattern that user draws on screen;
Obtain the semanteme of described verification pattern;
The semanteme of described verification pattern and default semanteme are compared, when the semanteme of described verification pattern is identical with default semanteme, determine by authentication.
CN201410360244.0A 2014-07-25 2014-07-25 Identity verification method, device and terminal Pending CN104166819A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410360244.0A CN104166819A (en) 2014-07-25 2014-07-25 Identity verification method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410360244.0A CN104166819A (en) 2014-07-25 2014-07-25 Identity verification method, device and terminal

Publications (1)

Publication Number Publication Date
CN104166819A true CN104166819A (en) 2014-11-26

Family

ID=51910628

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410360244.0A Pending CN104166819A (en) 2014-07-25 2014-07-25 Identity verification method, device and terminal

Country Status (1)

Country Link
CN (1) CN104166819A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789890A (en) * 2016-11-17 2017-05-31 北京光年无限科技有限公司 The data processing method and device of a kind of anti-data reptile for intelligent robot
CN108777672A (en) * 2018-01-18 2018-11-09 上海求敏信息科技有限公司 A kind of authentication method and system of multiple authentication

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827360A (en) * 2010-04-09 2010-09-08 中兴通讯股份有限公司 Method and device for setting communication terminal graphical passwords
US20130208990A1 (en) * 2010-10-22 2013-08-15 Nec Corporation Image comparison device, image comparison method, image comparison system, server, terminal, terminal control method, and terminal control program
CN103310139A (en) * 2013-05-10 2013-09-18 百度在线网络技术(北京)有限公司 Input validation method and input validation device
CN103489004A (en) * 2013-09-30 2014-01-01 华南理工大学 Method for achieving large category image identification of deep study network
CN103745144A (en) * 2014-01-08 2014-04-23 宇龙计算机通信科技(深圳)有限公司 Terminal and terminal unlocking method
CN103886244A (en) * 2014-03-18 2014-06-25 上海分维智能科技有限公司 Method for conducting any graphical password handwriting for intelligent terminal starting-up system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827360A (en) * 2010-04-09 2010-09-08 中兴通讯股份有限公司 Method and device for setting communication terminal graphical passwords
US20130208990A1 (en) * 2010-10-22 2013-08-15 Nec Corporation Image comparison device, image comparison method, image comparison system, server, terminal, terminal control method, and terminal control program
CN103310139A (en) * 2013-05-10 2013-09-18 百度在线网络技术(北京)有限公司 Input validation method and input validation device
CN103489004A (en) * 2013-09-30 2014-01-01 华南理工大学 Method for achieving large category image identification of deep study network
CN103745144A (en) * 2014-01-08 2014-04-23 宇龙计算机通信科技(深圳)有限公司 Terminal and terminal unlocking method
CN103886244A (en) * 2014-03-18 2014-06-25 上海分维智能科技有限公司 Method for conducting any graphical password handwriting for intelligent terminal starting-up system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789890A (en) * 2016-11-17 2017-05-31 北京光年无限科技有限公司 The data processing method and device of a kind of anti-data reptile for intelligent robot
CN108777672A (en) * 2018-01-18 2018-11-09 上海求敏信息科技有限公司 A kind of authentication method and system of multiple authentication

Similar Documents

Publication Publication Date Title
CN104850828A (en) Person identification method and person identification device
CN104794382A (en) Application starting method and device
CN105224195A (en) Terminal operation method and device
CN106709399A (en) Fingerprint identification method and device
CN105335754A (en) Character recognition method and device
CN104008635A (en) Equipment control method and device
CN104090741A (en) Statistical method and device for electronic book reading
CN105407098A (en) Identity verification method and device
CN104461014A (en) Screen unlocking method and device
CN104238912A (en) Application control method and application control device
CN105975301A (en) Memory cleaning method and device, and electronic equipment
CN103914148A (en) Function interface display method and device and terminal equipment
CN105046231A (en) Face detection method and device
CN104732201A (en) Touch key press and fingerprint identification implementation device and method, and terminal device
CN106250921A (en) Image processing method and device
CN105447150A (en) Face album based music playing method and apparatus, and terminal device
CN105354560A (en) Fingerprint identification method and device
CN104301528A (en) Information displaying method and device
CN104391712A (en) Shutdown method and device
CN105242942A (en) Application control method and apparatus
CN105160320A (en) Fingerprint identification method and apparatus, and mobile terminal
CN105139378A (en) Card boundary detection method and apparatus
CN104077597A (en) Image classifying method and device
CN107622189A (en) Optimize the method and apparatus of unlocked by fingerprint
CN106547850A (en) Expression annotation method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20141126