CN104573437B - Information authentication method, device and terminal - Google Patents
Information authentication method, device and terminal Download PDFInfo
- Publication number
- CN104573437B CN104573437B CN201310505220.5A CN201310505220A CN104573437B CN 104573437 B CN104573437 B CN 104573437B CN 201310505220 A CN201310505220 A CN 201310505220A CN 104573437 B CN104573437 B CN 104573437B
- Authority
- CN
- China
- Prior art keywords
- dragging
- terminal
- candidate answers
- described problem
- authentification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/0486—Drag-and-drop
Abstract
The invention discloses a kind of information authentication method, device and terminals, belong to technical field of network security.The information authentication method includes: display authentification of message interface, and the authentification of message interface includes problem figure and at least two candidate answers figures;Receive the dragging signal of dragging candidate answers figure to described problem figure;Whether the drag operation that detection drags candidate answers figure to the described problem figure is correct operation;If it is correct operation that testing result, which is, it is determined that the certification passes through.It is to be completed by people or completed by other terminals that this authentication operation cannot be accurately judged in the prior art by, which solving the problems, such as, the authentification of message interface that other terminals itself are unable to complete certification can be provided by having reached so that when certification by when carry out the user of authentification of message can only be people without be other terminals effect.
Description
Technical field
The present invention relates to technical field of network security, in particular to a kind of information authentication method, device and terminal.
Background technique
With the rapid development of communication technology, huge numbers of families have been come into internet.In internet, in order to keep away
Exempt from the attack of hacker, wooden horse and Malware, authentification of message has become the technology hand for guaranteeing network security and being commonly used
One of section.
Referring to FIG. 1, the certification schematic diagram it illustrates a kind of existing information authentication method when carrying out authentification of message,
The information authentication method may include: that certificate server provides the terminal with the authentication interface comprising identifying code, and terminal, which is shown, includes
The authentication interface of identifying code, and receive the identifying code that user inputs in authentication interface;The identifying code that terminal transmits and receives is extremely
Whether certificate server, the identifying code that certificate server detection receives match with the identifying code provided in authentication interface;If
Testing result is matching, then sends authentication pass information to terminal, terminal continues to provide after receiving authentication pass information
Service.
In the implementation of the present invention, at least there are the following problems for inventor's discovery prior art:
Since identifying code is usually made of character, and character can be identified by other terminals by picture and text identification technology
It arrives, so above- mentioned information authentication method, which can not be accurately judged to this authentication operation, to be completed by people or by other terminals
To complete.
Summary of the invention
In order to solve the prior art offer information authentication method cannot be accurately judged to this authentication operation be by people Lai
It completes or by other terminals come the problem of completion, the embodiment of the invention provides a kind of information authentication method, device and terminals.
The technical solution is as follows:
In a first aspect, providing a kind of information authentication method, which comprises
Show authentification of message interface, the authentification of message interface includes problem figure and at least two candidate answers figures;
Receive the dragging signal of dragging candidate answers figure to described problem figure;
Whether the drag operation that detection drags candidate answers figure to the described problem figure is correct operation;
If it is correct operation that testing result, which is, it is determined that the certification passes through.
In the first possible implementation of the first aspect, the detection drags the candidate answers figure to described
Whether the drag operation of problem figure is correct operation, comprising:
Detection drags whether the candidate answers figure to the dragging track of described problem figure is dragging correct option figure
Shape is to the dragging track of described problem figure;
If testing result is to be to drag correct option figure to the dragging track of described problem figure, it is determined that the dragging
Operation is correct operation.
In the second possible implementation of the first aspect, the detection drags the candidate answers figure to described
Whether the drag operation of problem figure is correct operation, comprising:
Whether the candidate answers figure of detection dragging is correct option figure corresponding with described problem figure;
If it is correct option figure corresponding with described problem figure that testing result, which is, it is determined that the drag operation is just
Really operation.
In a third possible implementation of the first aspect, the detection drags the candidate answers figure to described
Before whether the drag operation of problem figure is correct operation, the method also includes:
Whether detection drags the terminal of the candidate answers figure to the dragging track of described problem figure based on described
In the presumptive area of problem figure positioning;
If testing result is to execute described in the detection dragging in the presumptive area positioned based on described problem figure
The step of whether drag operation of candidate answers figure to described problem figure is correct operation.
In a fourth possible implementation of the first aspect, before the display authentification of message interface, the method
Further include:
Acquire finger print information;
Detect whether the finger print information matches with predetermined fingerprint information;
The step of if testing result is matching, executes the display authentification of message interface.
In the fifth possible implementation of the first aspect, the detection drags the candidate answers figure to described
After whether the drag operation of problem figure is correct operation, the method also includes:
Count the number that the drag operation detected within a predetermined period of time is not correct operation;
When the number that statistics obtains reaches pre-determined number, continuing to execute for the authentification of message is locked.
Second aspect, provides a kind of information authenticating apparatus, and described device includes:
Interface display module, for showing authentification of message interface, the authentification of message interface includes problem figure and at least
Two candidate answers figures;
Signal receiving module, for receiving the dragging signal of dragging candidate answers figure to described problem figure;
Operate detection module, for detect the dragging candidate answers figure to described problem figure drag operation whether
It is correct operation;
Certification is by module, described in determining when the testing result of the operation detection module is is correct operation
Certification passes through.
In the first possible implementation of the second aspect, the operation detection module, comprising:
Track detection unit, for detect the dragging candidate answers figure to the dragging track of described problem figure whether
It is to drag correct option figure to the dragging track of described problem figure;
First determination unit is to drag correct option figure to institute for the testing result in the track detection unit
When stating the dragging track of problem figure, determine that the drag operation is correct operation.
In a second possible implementation of the second aspect, the operation detection module, comprising:
Graphics detection unit, whether the candidate answers figure for detecting dragging is corresponding with described problem figure
Correct option figure;
Second determination unit, it is corresponding with described problem figure for being for the testing result in the graphics detection unit
When correct option figure, determine that the drag operation is correct operation.
In the third possible implementation of the second aspect, described device further include:
Drop point detection module, for detecting the end of the dragging candidate answers figure to the dragging track of described problem figure
Whether point is in the presumptive area positioned based on described problem figure;
The operation detection module is to be based on described problem figure for the testing result in the drop point detection module
When in the presumptive area of positioning, executing the drag operation that the detection drags candidate answers figure to the described problem figure is
No the step of being correct operation.
In the fourth possible implementation of the second aspect, described device further include:
Finger print acquisition module, for acquiring finger print information;
Finger print detecting module, for detecting the finger print information and predetermined fingerprint information of the finger print acquisition module acquisition
Whether match;
The interface display module is also used to when the testing result of the finger print detecting module is matches, described in execution
The step of showing authentification of message interface.
In a fifth possible implementation of the second aspect, described device further include:
Number statistical module is time of correct operation for counting the drag operation detected within a predetermined period of time not
Number;
Locking module is authenticated, when the number for obtaining in the number statistical module counts reaches pre-determined number, locking
The authentification of message continues to execute.
The third aspect, provides a kind of terminal, and the terminal includes the various possible of second aspect and second aspect
Information authenticating apparatus described in implementation.
The beneficial effect of technical solution provided in an embodiment of the present invention is:
By showing authentification of message interface, the dragging signal of dragging candidate answers figure to problem figure is received, and detect
Whether the drag operation for dragging candidate answers figure to problem figure is correct operation, so that being in testing result is correct operation
When, determine that certification passes through;Solve cannot be accurately judged in the prior art this authentication operation be completed by people or by
Other terminals the problem of completion, have reached the authentification of message interface that can be provided other terminals and itself be unable to complete certification, make
Proper certification by when carry out the user of authentification of message can only be people without be other terminals effect.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing.
Fig. 1 is the display schematic diagram for the information authentication method that the prior art provides;
Fig. 2 is the method flow diagram of information authentication method provided by one embodiment of the present invention;
Fig. 3 A be another embodiment of the present invention provides information authentication method method flow diagram;
Fig. 3 B be another embodiment of the present invention provides authentification of message interface display schematic diagram;
Fig. 3 C be another embodiment of the present invention provides authentification of message interface another display schematic diagram;
Fig. 3 D be another embodiment of the present invention provides authentification of message interface another display schematic diagram;
Fig. 3 E be another embodiment of the present invention provides dragging candidate answers figure it is aobvious to the dragging track of problem figure
Show schematic diagram;
Fig. 3 F be another embodiment of the present invention provides authentification of message interface another display schematic diagram;
Fig. 3 G be another embodiment of the present invention provides authentification of message interface another display schematic diagram;
Fig. 4 is the method flow diagram for the information authentication method that yet another embodiment of the invention provides;
Fig. 5 is the structural block diagram of information authenticating apparatus provided by one embodiment of the present invention;
Fig. 6 A be another embodiment of the present invention provides information authenticating apparatus structural block diagram;
Fig. 6 B be another embodiment of the present invention provides information authenticating apparatus another structural block diagram;
Fig. 6 C be another embodiment of the present invention provides information authenticating apparatus another structural block diagram;
Fig. 7 is the structural block diagram of terminal provided by one embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into
It is described in detail to one step, it is clear that the described embodiments are only some of the embodiments of the present invention, rather than whole implementation
Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts
All other embodiment, shall fall within the protection scope of the present invention.
Referring to FIG. 2, it illustrates the method flow diagram of information authentication method provided by one embodiment of the present invention, the letter
Breath authentication method can be used for such as mobile phone, tablet computer, personal digital assistant, desktop computer or laptop etc
In communication terminal, which may include:
Step 201, authentification of message interface is shown;
Wherein, authentification of message interface includes problem figure and at least two candidate answers figures.
Step 202, the dragging signal of dragging candidate answers figure to problem figure is received;
Step 203, whether the drag operation of detection dragging candidate answers figure to problem figure is correct operation;
Step 204, if testing result is to be correct operation, it is determined that certification passes through.
In conclusion it is candidate to receive dragging by showing authentification of message interface for information authentication method provided in this embodiment
Answer graphic to problem figure dragging signal, and detect dragging candidate answers figure to problem figure drag operation whether be
Correct operation, to determine that certification passes through when testing result is is correct operation;Solving cannot accurately sentence in the prior art
Disconnected this authentication operation out is to be completed by people or can provide other terminals by other terminals to have reached the problem of completion
Itself be unable to complete the authentification of message interface of certification so that when certification by when carry out the user of authentification of message can only be people without
It can be the effect of other terminals.
Please refer to Fig. 3 A, it illustrates another embodiment of the present invention provides information authentication method method flow diagram, should
Information authentication method can be used for such as mobile phone, tablet computer, personal digital assistant, desktop computer or laptop etc
Terminal in, which may include:
Step 301, authentification of message interface is shown;
Terminal can show authentification of message interface.Wherein, authentification of message interface includes that problem figure and at least two are candidate
Answer graphic;For example, please referring to Fig. 3 B, it illustrates a kind of display schematic diagrams at possible authentification of message interface.
Specifically, a certain website is being frequently visited by the user or under the higher environment of certain security requirements, in order to keep away
From the attack to hacker to guarantee network security, it usually needs authentification of message is carried out, so terminal can be shown accordingly
Authentification of message interface.For example, in user's using terminal frequent downloads file from a certain website, website is in order to detect the downloading
Whether operation is to be completed by people, to guarantee that the Internet resources of oneself are not stolen by hacker, website would generally setting information recognize
Card, terminal can show authentification of message interface at this time.
However, in order to avoid criminal completes certification asking to menace network safety according to the authorization prompt of terminal
Topic, when a certain terminal needs to carry out authentification of message, which can also send other terminals that certification request is extremely bound with it,
Other terminals show authentification of message interface after receiving certification request.Wherein, other terminals of binding, which can be, is equipped with
The terminal for the application program that can be realized authentication function bound with the application program of request certification, for example, pacifying in user mobile phone
Equipped with the application program that authentication function may be implemented, a certain chat software that the application program and user use is bound, then when with
When family logs in the chat software in computer, in order to detect whether this register is user's operation, computer can be sent out
Send certification request to user mobile phone, correspondingly, user mobile phone can receive certification request, and after receiving certification request
Show authentification of message interface.
It should be noted that can also include to each in authentification of message interface to help user to complete authentification of message
The operation instruction of candidate answers figure, for example Fig. 3 C is please referred to, the explanation for ' sunbonnet ' is that ' clown Le Le can be helped to hide
It keeps off the sunshine ';Explanation for ' umbrella ' is ' can be that clown Le Le keeps off the rain ';Explanation for ' housing ' is ' warming '.
Step 302, the dragging signal of dragging candidate answers figure to problem figure is received;
User can carry out corresponding authentication operation according to the display content in authentification of message interface, namely work as authentification of message
When including problem figure and at least two candidate answers figures in interface, user can specifically ask according to indicated by problem figure
Topic drags on corresponding candidate answers figure to problem figure, and corresponding terminal can receive dragging candidate answers figure to problem
The dragging signal of figure.
For example, user can be according to ' current state of clown Le Le ' drags in the authentification of message interface shown in Fig. 3 C
Corresponding stage property is to completing to authenticate with it, correspondingly, terminal can receive dragging stage property to the ' dragging of clown Le Le '
Signal;Specifically, when ' when clown Le Le ' is under the burning sun, illustrating that ' clown Le Le ' currently needs a top sunbonnet
Sunshade, user can drag ' sunbonnet ' to ' clown Le Le ' to create a piece of cool place for it, and terminal can connect accordingly at this time
Dragging ' sunbonnet ' is received to ' the dragging signal of clown Le Le ';When ' when clown Le Le ' is drenching with rain, illustrating ' clown Le Le '
Currently umbrella is needed to carry out rain cover, user can drag ' umbrella ' to ' clown Le Le ' comes for its rain cover, and terminal can be corresponding at this time
Receive dragging ' umbrella ' to ' the dragging signal of clown Le Le ';And works as and ' when clown Le Le ' is in snowy day, illustrate current
' clown Le Le ' terribly cold may need to keep warm, and user can drag ' housing ' to ' clown Le Le ', terminal can be corresponding at this time
Dragging ' housing ' is received to ' the dragging signal of clown Le Le '.
Step 303, whether detection dragging candidate answers figure is to the terminal of the dragging track of problem figure in the problem of being based on
In the presumptive area of figure positioning;
After terminal receives dragging signal, terminal can detecte the dragging of dragging candidate answers figure to problem figure
Whether the terminal of track is in the presumptive area positioned based on problem figure.
Specifically, since some stage properties have its specific usage mode, for example, sunbonnet is for being worn on head
, it moves when dragging it ' when the foot areas of clown Le Le ', it is clear that be incorrect, so receiving dragging in terminal
After signal, whether terminal can detecte the terminal of dragging candidate answers figure to the dragging track of problem figure based on problem
In the presumptive area of figure positioning.In actual implementation, different problem figures and dragging candidate answers can be stored in advance in terminal
Corresponding pass of the terminal of track between region locating in the region positioned based on problem figure is dragged when figure to problem figure
System, corresponding terminal can execute detection according to the corresponding relationship prestored.
For example, in the corresponding relationship that terminal prestores, when problem figure is ' when clown Le Le ' is in the figure under the sun, to drag
The terminal of dynamic candidate answers figure to the dragging track of problem figure region locating in the region positioned based on problem figure
It is 1/2 region of problem figure from top to bottom to 3/4 region;So when the problems in authentification of message interface figure is that ' clown is happy
It is happy ' figure under the sun when, terminal can detecte dragging track terminal whether 1/2nd area in problem figure from top to bottom
In domain to 3/4 region, Fig. 3 D is specifically please referred to.
It should be noted that this step is optional step, in practical application, terminal can directly execute step 304, this
Embodiment is to this and without limitation.
Step 304, if testing result is that it is candidate to execute detection dragging in the presumptive area positioned based on problem figure
The step of whether drag operation of Answer graphic to problem figure is correct operation;
If the testing result of terminal is in the presumptive area positioned based on problem figure, terminal can execute detection
The step of whether drag operation for dragging candidate answers figure to problem figure is correct operation.
Specifically, terminal detection dragging candidate answers figure to problem figure drag operation whether be correct operation step
Suddenly may include any one of the following two kinds implementation:
The first possible implementation may include:
First, whether detection dragging candidate answers figure to the dragging track of problem figure is to drag correct option figure extremely
The dragging track of problem figure;
Specifically, user will form a dragging track namely terminal when dragging candidate answers figure to problem figure
When receiving dragging signal, dragging candidate answers figure can be got accordingly to the dragging track of problem figure;However, by
It is different the location of in authentification of message interface in different candidate answers figures, so user drags different candidate answers
The starting point of dragging track when figure to problem figure is also different;Simultaneously because user drags same candidate answers figure extremely
The dragged path of problem figure would also vary from, so in order to detect this dragging candidate answers figure of user to problem figure
Drag operation whether be correct operation, terminal can detecte dragging candidate answers figure to the dragging track of problem figure whether
It is to drag correct option figure to the dragging track of problem figure.
In actual implementation, terminal can prestore dragging between different problem figures and correct option figure in the database
Dynamic rail mark, corresponding terminal can be detected according to pre-stored data library.For example, terminal prestore with problem shown in Fig. 3 D
The corresponding dragging track of figure is the track of bold portion shown in Fig. 3 E, so when the problems in authentification of message interface figure is
When above problem figure, terminal can detecte whether dragging candidate answers figure to the dragging track of problem figure is reality in Fig. 3 E
The track of line part.
Second, if testing result is to be to drag correct option figure to the dragging track of problem figure, it is determined that dragging behaviour
Work is correct operation.
If the testing result of terminal is the track for being bold portion shown in Fig. 3 E, dragging correct option figure that is to say
To the dragging track of problem figure, then terminal can determine that drag operation is correct operation.
And if the testing result of terminal is the track of bold portion shown in not instead of Fig. 3 E, wherein dotted portion
Track is dragged, then terminal can determine that drag operation is not correct operation at this time.Wherein, in Fig. 3 E dotted portion dragging track
Wherein several possible situations that auxiliary understands and draws are intended merely to, no longer one by one to other possible implementation the present embodiment
It enumerates.
Second of possible implementation may include:
First, whether the candidate answers figure for detecting dragging is correct option figure corresponding with problem figure;
Specifically, being waited since different problems figure corresponds to unique candidate answers figure so detecting dragging in terminal
When whether the drag operation for selecting Answer graphic to problem figure is correct operation, terminal can detecte the candidate answers figure of dragging
It whether is correct option figure corresponding with problem figure.
In actual implementation, terminal can prestore the corresponding relationship between different problem figures and correct option figure, institute
With when terminal executes detecting step, terminal can be detected according to the corresponding relationship prestored.For example, the figure that terminal prestores
The corresponding correct option figure of problem figure shown in 3E is ' sunbonnet ';And problem figure shown in Fig. 3 F is corresponding correctly answers
Case figure is then ' umbrella ' etc.;The corresponding correct option figure of problem figure shown in Fig. 3 G is ' housing '.
Second, if it is correct option figure corresponding with problem figure that testing result, which is, determine that drag operation is correctly to grasp
Make.
If it is correct option figure corresponding with problem figure that the testing result of terminal, which is, for example, authentification of message interface
For authentication interface shown in Fig. 3 E, then when terminal detects that the candidate answers figure of dragging is exactly ' sunbonnet ', terminal can be with
Determine that drag operation is correct operation.
And if the testing result of terminal be not be correct option figure corresponding with problem figure, for example, authentification of message
Interface is authentication interface shown in Fig. 3 E, and terminal detects that the candidate answers figure of dragging is ' umbrella ' and is not ' sunshade
Cap ', terminal can determine that drag operation is not correct operation at this time.
Step 305, if testing result is to be correct operation, it is determined that certification passes through.
When the testing result of step 304 is is correct operation, terminal can determine that certification passes through.
Specifically, when terminal is to directly display authentification of message interface, the testing result of terminal be correct operation it
Afterwards, terminal can directly authenticate passing through and continuing to execute and requesting before for task;For example, terminal be in a certain website frequently into
Authentification of message is carried out when row downloading, then when the testing result of terminal is is correct operation, terminal can execute downloading task;And
Authentication interface is shown after terminal is received from the certification request that a certain application program is sent, then in the detection knot of terminal
Fruit is after being correct operation, and terminal can send authentication pass information to the application program, so that the application program is receiving
Offer service is provided after to authentication pass information.
If it is not correct operation that the testing result of terminal, which is, terminal can determine that this certification can't pass.However, being
Avoid maloperation due to user and certification caused to be refused, terminal testing result be not correct operation when, can also be again
Secondary display authentification of message interface, and after receiving dragging signal of the dragging candidate answers figure to problem figure, continue to examine
Whether the drag operation for surveying dragging candidate answers figure to problem figure is correct operation, so that being in testing result is correctly to grasp
When making, determine that certification passes through.Meanwhile in order to avoid criminal is by repeatedly attempting come by certification, terminal can also be arranged
The at most attemptable number of user within a predetermined period of time, can also execute following steps:
First, count the number that the drag operation detected within a predetermined period of time is not correct operation;
Firstly, it is the number of correct operation that terminal, which can count the drag operation detected within a predetermined period of time not,.?
In actual implementation, for terminal when detecting drag operation not is correct operation, number can be added 1 by terminal, and be counted predetermined
Total degree in period.
Second, when the number that statistics obtains reaches pre-determined number, locking information certification is continued to execute.
When the number that terminal counts reaches pre-determined number, terminal can be continued to execute with what locking information authenticated.
For example, setting predetermined amount of time as one day, pre-determined number is 3 times, then reaches 3 times in the total degree that terminal counts
When, terminal can be continued to execute with what locking information authenticated.
In conclusion it is candidate to receive dragging by showing authentification of message interface for information authentication method provided in this embodiment
Answer graphic to problem figure dragging signal, and detect dragging candidate answers figure to problem figure drag operation whether be
Correct operation, to determine that certification passes through when testing result is is correct operation;Solving cannot accurately sentence in the prior art
Disconnected this authentication operation out is to be completed by people or can provide other terminals by other terminals to have reached the problem of completion
Itself be unable to complete the authentification of message interface of certification so that when certification by when carry out the user of authentification of message can only be people without
It can be the effect of other terminals.Meanwhile the present embodiment first detects dragging candidate answers figure to the dragging track of problem figure
Whether terminal is in the presumptive area positioned based on problem figure, to only hold when testing result is in presumptive area
Row subsequent step, and be to terminate this process not in presumptive area, greatly reduce terminal in authentification of message in testing result
When processing complexity.
Referring to FIG. 4, the method flow diagram of the information authentication method provided it illustrates yet another embodiment of the invention, the letter
Breath authentication method can be used for such as mobile phone, tablet computer, personal digital assistant, desktop computer or laptop etc
In terminal;And unlike the embodiments above, in the present embodiment, before terminal shows authentification of message interface, terminal can
First to acquire finger print information, authentification of message interface is shown again after finger print identifying passes through;The information authentication method may include:
Step 401, finger print information is acquired;
Unlike the embodiments above, in the present embodiment when needing to carry out authentification of message, terminal can be acquired first
The finger print information of user.Specifically, terminal can acquire the finger print information of user by fingerprint sensor.Wherein fingerprint sensing
Device can be the sensor of terminal built-in, and the sensor being also possible in the ancillary equipment being connected with terminal, the present embodiment is to this
And without limitation.
For example, the personal account of user is usurped to lead by other people in order to prevent when user uses a certain chat software
Leakage of personal information is caused, when personal account trial logs in, the terminal for logging in the personal account can send certification request, phase
For the terminal for the offer authentication function answered after receiving certification request, display reminding user inputs prompt circle of finger print information
Face, and acquire the finger print information of user's input.
Step 402, whether detection finger print information matches with predetermined fingerprint information;
After terminal collects finger print information, terminal can detecte collected finger print information and predetermined fingerprint information
Whether match.
Step 403, if testing result is matching, the step of showing authentification of message interface is executed;
If the testing result of terminal is matching, illustrate to be user's operation, terminal can execute display letter at this time
The step of ceasing authentication interface.Wherein, authentification of message interface includes problem figure and at least two candidate answers figures.
It should be noted that can also include the operation instruction to each candidate answers figure in authentification of message interface, this
Similar with the step 301 of above-described embodiment, details are not described herein for the present embodiment.
Step 404, the dragging signal of dragging candidate answers figure to problem figure is received;
User can carry out corresponding authentication operation according to the display content in authentification of message interface, namely work as authentification of message
When including problem figure and at least two candidate answers figures in interface, user can specifically ask according to indicated by problem figure
Topic drags on corresponding candidate answers figure to problem figure, and corresponding terminal can receive dragging candidate answers figure to problem
The dragging signal of figure.
It should be noted that user is usually to drag candidate by finger when terminal is the terminal using touch screen
Answer graphic is to problem figure, so in order to reduce complexity of the terminal in authentification of message, terminal can also directly display letter
Authentication interface is ceased, the finger print information of user is acquired when user drags candidate answers figure to problem figure, and detects fingerprint letter
Whether breath matches with predetermined fingerprint information, to execute step 405 when testing result is matching;This is that is, step
401 and step 402 any moment can be executed before step 405, the present embodiment specific executes moment and without limitation to it.
Step 405, whether detection dragging candidate answers figure is to the terminal of the dragging track of problem figure in the problem of being based on
In the presumptive area of figure positioning;
After terminal receives dragging signal, terminal can detecte the dragging of dragging candidate answers figure to problem figure
Whether the terminal of track is in the presumptive area positioned based on problem figure.
Step 406, if testing result is that it is candidate to execute detection dragging in the presumptive area positioned based on problem figure
The step of whether drag operation of Answer graphic to problem figure is correct operation;
If the testing result of terminal is in the presumptive area positioned based on problem figure, terminal can execute detection
The step of whether drag operation for dragging candidate answers figure to problem figure is correct operation.
Specifically, terminal detection dragging candidate answers figure to problem figure drag operation whether be correct operation step
Suddenly may include any one of the following two kinds implementation:
The first possible implementation may include:
First, whether detection dragging candidate answers figure to the dragging track of problem figure is to drag correct option figure extremely
The dragging track of problem figure;
Specifically, user will form a dragging track namely terminal when dragging candidate answers figure to problem figure
When receiving dragging signal, dragging candidate answers figure can be got accordingly to the dragging track of problem figure;However, by
In different candidate answers figures, different the location of in authentification of message interface namely user drags different candidate answers
The starting point of dragging track when figure to problem figure is also different, and user drags same candidate answers figure to problem
The dragged path of figure would also vary from, so in order to detect this dragging candidate answers figure dragging to problem figure of user
Whether dynamic operation is correct operation, and whether the dragging track that terminal can detecte dragging candidate answers figure to problem figure drags
Correct option figure is moved to the dragging track of problem figure.
Second, if testing result is to be to drag correct option figure to the dragging track of problem figure, it is determined that dragging behaviour
Work is correct operation.
If the testing result of terminal is the track for being bold portion shown in Fig. 3 E, dragging correct option figure that is to say
To the dragging track of problem figure, then terminal can determine that drag operation is correct operation.
And if realizing the track of part shown in the testing result of terminal not instead of Fig. 3 E, wherein dotted portion drags
Dynamic rail mark, then terminal can determine that drag operation is not correct operation at this time.
Second of possible implementation may include:
First, whether the candidate answers figure for detecting dragging is correct option figure corresponding with problem figure;
Specifically, since different problems figure corresponds to a unique candidate answers figure, so being dragged in terminal detection
When whether the drag operation of dynamic candidate answers figure to problem figure is correct operation, terminal can detecte the candidate answers of dragging
Whether figure is correct option figure corresponding with problem figure.
In actual implementation, terminal can prestore the corresponding relationship between different problem figures and correct option figure, institute
With when terminal executes detecting step, terminal can be detected according to the corresponding relationship prestored.
Second, if it is correct option figure corresponding with problem figure that testing result, which is, it is determined that drag operation is correct
Operation.
Step 407, if testing result is to be correct operation, it is determined that certification passes through.
Specifically, when terminal is to directly display authentification of message interface, the testing result of terminal be correct operation it
Afterwards, terminal can directly authenticate passing through and continuing to execute and requesting before for task;For example, terminal be in a certain website frequently into
Authentification of message is carried out when row downloading, then when the testing result of terminal is is correct operation, terminal can execute downloading task;And
Authentication interface is shown after terminal is received from the certification request that a certain application program is sent, then in the detection knot of terminal
Fruit is after being correct operation, and terminal can send authentication pass information to the application program, so that the application program is receiving
Offer service is provided after to authentication pass information.
If it is not correct operation that the testing result of terminal, which is, terminal can determine that this certification can't pass.However, being
Avoid maloperation due to user and certification caused to be refused, terminal testing result be not correct operation when, terminal may be used also
To show authentification of message interface again, and after receiving dragging signal of the dragging candidate answers figure to problem figure, after
Whether the drag operation of continuous detection dragging candidate answers figure to problem figure is correct operation, and being when testing result is correctly to grasp
When making, determine that certification passes through.Meanwhile in order to avoid criminal is by repeatedly attempting come by certification, terminal can also be arranged
The at most attemptable number of user within a predetermined period of time, can also execute following steps:
First, count the number that the drag operation detected within a predetermined period of time is not correct operation;
Firstly, it is the number of correct operation that terminal, which can count the drag operation detected within a predetermined period of time not,.?
In actual implementation, for terminal when detecting drag operation not is correct operation, number can be added 1 by terminal, and be counted predetermined
Total degree in period.
Second, when the number that statistics obtains reaches pre-determined number, locking information certification is continued to execute.
When the number that terminal counts reaches pre-determined number, terminal can be continued to execute with what locking information authenticated.
It should be noted that step 404 to step 407 detailed technology details and above-described embodiment in step 302 to
Step 305 is similar, and details are not described herein for the present embodiment.
In conclusion it is candidate to receive dragging by showing authentification of message interface for information authentication method provided in this embodiment
Answer graphic to problem figure dragging signal, and detect dragging candidate answers figure to problem figure drag operation whether be
Correct operation, to determine that certification passes through when testing result is is correct operation;Solving cannot accurately sentence in the prior art
Disconnected this authentication operation out is to be completed by people or can provide other terminals by other terminals to have reached the problem of completion
Itself be unable to complete the authentification of message interface of certification so that when certification by when carry out the user of authentification of message can only be people without
It can be the effect of other terminals.
Whether the terminal that the present embodiment first detects dragging candidate answers figure to the dragging track of problem figure is being based on asking
In the presumptive area for inscribing figure positioning, to only execute subsequent step when testing result is in presumptive area, and examining
Surveying result is to terminate this process not in presumptive area, greatly reduce processing complexity of the terminal in authentification of message.
The present embodiment by detection acquisition finger print information whether matched with predetermined fingerprint information, so as to judge into
Row information certification people whether be authorization after user, improve the accuracy of authentification of message.
Referring to FIG. 5, the information is recognized it illustrates the structural block diagram of information authenticating apparatus provided in an embodiment of the present invention
Card device can be implemented as all or part of in terminal, the authentification of message by the combination of software, hardware or both
Device may include: that interface display module 510, signal receiving module 520, operation detection module 530 and certification pass through module
540;
Interface display module 510, for showing authentification of message interface, the authentification of message interface includes problem figure and extremely
Few two candidate answers figures;
Signal receiving module 520, for receiving the dragging signal of dragging candidate answers figure to described problem figure;
Detection module 530 is operated, for detecting the drag operation for dragging the candidate answers figure to described problem figure
It whether is correct operation;
Certification by module 540, for the testing result of the operation detection module 530 be correct operation when, really
The fixed certification passes through.
In conclusion it is candidate to receive dragging by showing authentification of message interface for information authenticating apparatus provided in this embodiment
Answer graphic to problem figure dragging signal, and detect dragging candidate answers figure to problem figure drag operation whether be
Correct operation, to determine that certification passes through when testing result is is correct operation;Solving cannot accurately sentence in the prior art
Disconnected this authentication operation out is to be completed by people or can provide other terminals by other terminals to have reached the problem of completion
Itself be unable to complete the authentification of message interface of certification so that when certification by when carry out the user of authentification of message can only be people without
It can be the effect of other terminals.
Please refer to Fig. 6 A, it illustrates another embodiment of the present invention provides information authenticating apparatus structural block diagram, should
Information authenticating apparatus can be implemented as all or part of in terminal, the letter by the combination of software, hardware or both
Breath authentication device may include: that interface display module 610, signal receiving module 620, operation detection module 630 and certification pass through
Module 640;
Interface display module 610, for showing authentification of message interface, the authentification of message interface includes problem figure and extremely
Few two candidate answers figures;
Signal receiving module 620, for receiving the dragging signal of dragging candidate answers figure to described problem figure;
Detection module 630 is operated, for detecting the drag operation for dragging the candidate answers figure to described problem figure
It whether is correct operation;
Certification by module 640, for the testing result of the operation detection module 630 be correct operation when, really
The fixed certification passes through.
Fig. 6 B is please referred to, in the first possible implementation of the present embodiment, the operation detection module 630, packet
It includes:
Track detection unit 631, for detecting the dragging candidate answers figure to the dragging track of described problem figure
It whether is to drag correct option figure to the dragging track of described problem figure;
First determination unit 632, being for the testing result in the track detection unit 631 is dragging correct option figure
When shape to the dragging track of described problem figure, determine that the drag operation is correct operation.
Fig. 6 C is please referred to, in second of possible implementation of the present embodiment, the operation detection module 630, packet
It includes:
Graphics detection unit 633, for detect dragging the candidate answers figure whether be and described problem figure pair
The correct option figure answered;
Second determination unit 634 is to be and described problem figure pair for the testing result in the graphics detection unit
When the correct option figure answered, determine that the drag operation is correct operation.
In the third possible implementation of the present embodiment, described device further include: drop point detection module 650;
Drop point detection module 650, for detecting the dragging candidate answers figure to the dragging track of described problem figure
Terminal whether in the presumptive area positioned based on described problem figure;
The operation detection module 630 is to ask based on described for the testing result in the drop point detection module 650
When inscribing in the presumptive area of figure positioning, executes the detection and drag the dragging of the candidate answers figure to described problem figure
The step of whether operation is correct operation.
In the 4th kind of possible implementation of the present embodiment, described device further include: finger print acquisition module 660 and refer to
Line detection module 670;
Finger print acquisition module 660, for acquiring finger print information;
Finger print detecting module 670, for detecting the finger print information and predetermined finger that the finger print acquisition module 660 acquires
Whether line information matches;
The interface display module 610 is also used to hold when the testing result of the finger print detecting module 670 is matches
The step of row display authentification of message interface.
In the 5th kind of possible implementation of the present embodiment, described device further include: number statistical module 680 and recognize
Demonstrate,prove locking module 690;
Number statistical module 680 is not correct operation for counting the drag operation detected within a predetermined period of time
Number;
Locking module 690 is authenticated, the number for obtaining in the number statistical module 680 statistics reaches pre-determined number
When, lock continuing to execute for the authentification of message.
In conclusion it is candidate to receive dragging by showing authentification of message interface for information authenticating apparatus provided in this embodiment
Answer graphic to problem figure dragging signal, and detect dragging candidate answers figure to problem figure drag operation whether be
Correct operation, to determine that certification passes through when testing result is is correct operation;Solving cannot accurately sentence in the prior art
Disconnected this authentication operation out is to be completed by people or can provide other terminals by other terminals to have reached the problem of completion
Itself be unable to complete the authentification of message interface of certification so that when certification by when carry out the user of authentification of message can only be people without
It can be the effect of other terminals.
Referring to FIG. 7, the terminal is for implementing it illustrates the structural block diagram of terminal provided in an embodiment of the present invention
The information authentication method of embodiment offer is stated, the terminal in the embodiment of the present invention may include one or more following composition portions
Point: the processor of various processes and method is completed for executing computer program instructions, for information and storage program instruction
Random access memory (RAM) and read-only memory (ROM), for storing data with the memory of information, I/O equipment, interface,
Antenna etc..Specifically:
Terminal 700 may include RF(Radio Frequency, radio frequency) circuit 710, memory 720, input unit 730,
Display unit 740, sensor 750, voicefrequency circuit 760, WiFi (wireless fidelity, Wireless Fidelity) module 770, place
Manage the components such as device 780, power supply 782, camera 790.It will be understood by those skilled in the art that terminal structure shown in Fig. 7 is simultaneously
The not restriction of structure paired terminal may include perhaps combining certain components or different than illustrating more or fewer components
Component layout.
It is specifically introduced below with reference to each component parts of the Fig. 7 to terminal 700:
RF circuit 710 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, handled to processor 780;In addition, the data for designing uplink are sent to base station.In general, RF circuit packet
Include but be not limited to antenna, at least one amplifier, transceiver, coupler, LNA(Low Noise Amplifier, low noise
Amplifier), duplexer etc..In addition, RF circuit 710 can also be communicated with network and other equipment by wireless communication.The nothing
Any communication standard or agreement, including but not limited to GSM (Global System of Mobile can be used in line communication
Communication, global system for mobile communications), GPRS (General Packet Radio Service, general packet without
Line service), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code
Division Multiple Access, wideband code division multiple access), LTE (Long Term Evolution, long term evolution), electronics
Mail, SMS (Short Messaging Service, short message service) etc..
Memory 720 can be used for storing software program and module, and processor 780 is stored in memory 720 by operation
Software program and module, thereby executing the various function application and data processing of terminal 700.Memory 720 can be main
Including storing program area and storage data area, wherein storing program area can answer needed for storage program area, at least one function
With program (such as sound-playing function, image player function etc.) etc.;Storage data area, which can be stored, uses institute according to terminal 700
Data (such as audio data, phone directory etc.) of creation etc..In addition, memory 720 may include high-speed random access memory,
It can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-states are deposited
Memory device.
Input unit 730 can be used for receiving the number or character information of input, and generate the user setting with terminal 700
And the related key signals input of function control.Specifically, input unit 730 may include touch panel 731 and other inputs
Equipment 732.Touch panel 731, also referred to as touch screen, collecting the touch operation of user on it or nearby, (for example user makes
With the operation of any suitable object or attachment such as finger, stylus on touch panel 731 or near touch panel 731), and
Corresponding attachment device is driven according to preset formula.Optionally, touch panel 731 may include touch detecting apparatus and touching
Touch two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation bring letter
Number, transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into
Contact coordinate, then give processor 780, and order that processor 780 is sent can be received and executed.Furthermore, it is possible to using
The multiple types such as resistance-type, condenser type, infrared ray and surface acoustic wave realize touch panel 731.It is defeated in addition to touch panel 731
Entering unit 730 can also include other input equipments 732.Specifically, other input equipments 732 can include but is not limited to physics
One of keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 740 can be used for showing information input by user or the information and terminal 700 that are supplied to user
Various menus.Display unit 740 may include display panel 741, optionally, can use LCD (Liquid Crystal
Display, liquid crystal display), the forms such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) come
Configure display panel 741.Further, touch panel 731 can cover display panel 741, when touch panel 731 is detected at it
On or near touch operation after, send processor 780 to determine the type of touch event, be followed by subsequent processing device 780 according to touching
The type for touching event provides corresponding visual output on display panel 741.Although in Fig. 7, touch panel 731 and display surface
Plate 741 is the input and input function for realizing terminal 700 as two independent components, but in certain embodiments, it can
That terminal 700 is realized so that touch panel 731 and display panel 741 is integrated outputs and inputs function.
Terminal 700 may also include at least one sensor 750, such as gyro sensor, magnetic induction sensor, light sensing
Device, motion sensor and other sensors.Specifically, optical sensor may include ambient light sensor and proximity sensor,
In, ambient light sensor can adjust the brightness of display panel 741 according to the light and shade of ambient light, and proximity sensor can be in terminal
750 when being moved in one's ear, closes display panel 741 and/or backlight.As a kind of motion sensor, acceleration transducer can
The size for detecting (generally three axis) acceleration in all directions, can detect that size and the direction of gravity, can be used for when static
The application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating) of identification terminal posture, Vibration identification correlation function
(such as pedometer, percussion) etc.;Barometer, hygrometer, thermometer, infrared sensor for can also configure as terminal 700 etc.
Other sensors, details are not described herein.
Voicefrequency circuit 760, loudspeaker 761, microphone 762 can provide the audio interface between user and terminal 700.Audio
Electric signal after the audio data received conversion can be transferred to loudspeaker 761, be converted to sound by loudspeaker 761 by circuit 760
Sound signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 762, after being received by voicefrequency circuit 760
Audio data is converted to, then by after the processing of audio data output processor 780, such as another end is sent to through RF circuit 710
End, or audio data is exported to memory 720 to be further processed.
WiFi belongs to short range wireless transmission technology, and terminal 700 can help user's transceiver electronics by WiFi module 770
Mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 7 is shown
WiFi module 770, but it is understood that, and it is not belonging to must be configured into for terminal 700, it can according to need completely
Do not change in the range of the essence of invention and omits.
Processor 780 is the control centre of terminal 700, utilizes each portion of various interfaces and the entire terminal of connection
Point, by running or execute the software program and/or module that are stored in memory 720, and calls and be stored in memory 720
Interior data execute the various functions and processing data of terminal 700, to carry out integral monitoring to terminal.Optionally, processor
780 may include one or more processing units;Preferably, processor 780 can integrate application processor and modem processor,
Wherein, the main processing operation system of application processor, user interface and application program etc., modem processor mainly handles nothing
Line communication.It is understood that above-mentioned modem processor can not also be integrated into processor 780.
Terminal 700 further includes the power supply 782(such as battery powered to all parts), it is preferred that power supply can pass through electricity
Management system and processor 782 are logically contiguous, to realize management charging, electric discharge and power consumption by power-supply management system
The functions such as management.
Camera 790 is generally by groups such as camera lens, imaging sensor, interface, digital signal processor, CPU, display screens
At.Wherein, camera lens is fixed on the top of imaging sensor, can change focusing by manually adjusting camera lens;Imaging sensor
It is equivalent to " film " of traditional camera, is the heart of camera collection image;Interface is used for camera using winding displacement, plate to plate
Connector, spring connection type are connect with terminal mainboard, and the image of acquisition is sent to the memory 720;Digital signal
Processor is handled by image of the mathematical operation to acquisition, the analog image of acquisition is converted to digital picture and by connecing
Mouth is sent to memory 720.
Although being not shown, terminal 700 can also be including bluetooth module etc., and details are not described herein.
Terminal 700 in addition to include one or more processor 780, further include have memory and one or more
Module, one or more module are stored in memory, and are configured to be executed by one or more processor.On
One or more program is stated with following function:
Show authentification of message interface, the authentification of message interface includes problem figure and at least two candidate answers figures;
Receive the dragging signal of dragging candidate answers figure to described problem figure;
Whether the drag operation that detection drags candidate answers figure to the described problem figure is correct operation;
If it is correct operation that testing result, which is, it is determined that the certification passes through.
In the first possible implementation of the present embodiment, the detection drags the candidate answers figure to described
Whether the drag operation of problem figure is correct operation, comprising:
Detection drags whether the candidate answers figure to the dragging track of described problem figure is dragging correct option figure
Shape is to the dragging track of described problem figure;
If testing result is to be to drag correct option figure to the dragging track of described problem figure, it is determined that the dragging
Operation is correct operation.
In second of possible implementation of the present embodiment, the detection drags the candidate answers figure to described
Whether the drag operation of problem figure is correct operation, comprising:
Whether the candidate answers figure of detection dragging is correct option figure corresponding with described problem figure;
If it is correct option figure corresponding with described problem figure that testing result, which is, it is determined that the drag operation is just
Really operation.
In the third possible implementation of the present embodiment, the detection drags the candidate answers figure to described
Before whether the drag operation of problem figure is correct operation, the method also includes:
Whether detection drags the terminal of the candidate answers figure to the dragging track of described problem figure based on described
In the presumptive area of problem figure positioning;
If testing result is to execute described in the detection dragging in the presumptive area positioned based on described problem figure
The step of whether drag operation of candidate answers figure to described problem figure is correct operation.
In the 4th kind of possible implementation of the present embodiment, before the display authentification of message interface, the method
Further include:
Acquire finger print information;
Detect whether the finger print information matches with predetermined fingerprint information;
The step of if testing result is matching, executes the display authentification of message interface.
In the 5th kind of possible implementation of the present embodiment, the detection drags the candidate answers figure to described
After whether the drag operation of problem figure is correct operation, the method also includes:
Count the number that the drag operation detected within a predetermined period of time is not correct operation;
When the number that statistics obtains reaches pre-determined number, continuing to execute for the authentification of message is locked.
In conclusion terminal provided in this embodiment receives dragging candidate answers figure by showing authentification of message interface
To the dragging signal of problem figure, and whether the drag operation for detecting dragging candidate answers figure to problem figure is correctly to grasp
Make, to determine that certification passes through when testing result is is correct operation;This cannot be accurately judged in the prior art by solving
Secondary authentication operation is to be completed by people or the problem of completion, reached by other terminals to provide other terminals itself nothing
Method complete certification authentification of message interface so that when certification by when carry out authentification of message user can only be people without being it
The effect of its terminal.
It should be understood that information authenticating apparatus provided by the above embodiment and terminal be when carrying out authentification of message, only with
The division progress of above-mentioned each functional module can according to need and for example, in practical application by above-mentioned function distribution by not
Same functional module is completed, i.e., the internal structure of equipment is divided into different functional modules, to complete whole described above
Or partial function.In addition, information authenticating apparatus provided by the above embodiment and terminal and the method for information authentication method are implemented
Example belongs to same design, and specific implementation process is detailed in embodiment of the method, and which is not described herein again.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and
Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (6)
1. a kind of information authentication method, which is characterized in that the method is in terminal, the terminal to be to be equipped with to recognize with request
The terminal of the application program for realizing authentication function of the application program binding of card, which comprises
Show that authentification of message interface, the authentification of message interface include problem figure, at least two candidate answers figures and to each
The operation instruction of a candidate answers figure, described problem figure are used to indicate problem;
Receive the dragging signal for dragging the candidate answers figure to described problem figure;
Finger print information is acquired when dragging the candidate answers figure to described problem figure;
Detect whether the finger print information matches with predetermined fingerprint information;
If testing result is matching, the terminal of the dragging candidate answers figure to the dragging track of described problem figure is detected
Whether in the presumptive area positioned based on described problem figure;
If testing result is to detect the dragging candidate answers figure in the presumptive area positioned based on described problem figure
Whether it is dragging correct option figure to the dragging track of described problem figure to the dragging track of described problem figure, and detects
Whether the candidate answers figure of dragging is the correct option figure corresponding with described problem figure;
If it is the dragging correct option figure to the dragging track of described problem figure that testing result, which is, and is and described problem
The corresponding correct option figure of figure, it is determined that drag operation is correct operation;
If it is the correct operation that testing result, which is, it is determined that certification passes through.
2. being asked the method according to claim 1, wherein the detection drags the candidate answers figure to described
Whether the dragging track for inscribing figure is after dragging correct option figure to the dragging track of described problem figure, and the method is also
Include:
Count the number that the drag operation detected within a predetermined period of time is not correct operation;
When the number that statistics obtains reaches pre-determined number, continuing to execute for the authentification of message is locked.
3. a kind of information authenticating apparatus, which is characterized in that described device is in terminal, the terminal to be to be equipped with to recognize with request
The terminal of the application program for realizing authentication function of the application program binding of card, described device include:
Interface display module, for showing that authentification of message interface, the authentification of message interface include problem figure, at least two times
Answer graphic and the operation instruction to each candidate answers figure are selected, described problem figure is used to indicate problem;
Signal receiving module, for receiving the dragging signal of dragging candidate answers figure to described problem figure;
Track detection unit, for acquiring finger print information when dragging the candidate answers figure to described problem figure;Detection
Whether the finger print information matches with predetermined fingerprint information;If testing result is matching, the dragging candidate answers figure is detected
Shape to described problem figure dragging track terminal whether in the presumptive area positioned based on described problem figure;It is detecting
When as a result in the presumptive area positioned based on described problem figure, detection drags the candidate answers figure to described problem
Whether the dragging track of figure is dragging correct option figure to the dragging track of described problem figure, and detects the described of dragging
Whether candidate answers figure is the correct option figure corresponding with described problem figure;
First determination unit is to drag the correct option figure to institute for the testing result in the track detection unit
When stating the dragging track of problem figure and being the correct option figure corresponding with described problem figure, determine that drag operation is
Correct operation;
Certification is by module, when being the correct operation for the testing result in first determination unit, determines certification
Pass through.
4. device according to claim 3, which is characterized in that described device further include:
Number statistical module is the number of correct operation for counting the drag operation detected within a predetermined period of time not;
Locking module is authenticated, when the number for obtaining in the number statistical module counts reaches pre-determined number, described in locking
Authentification of message continues to execute.
5. a kind of terminal, which is characterized in that it includes information authenticating apparatus as described in claim 3 or 4.
6. a kind of computer readable storage medium, which is characterized in that be stored with program, institute in the computer readable storage medium
Program is stated for realizing information authentication method as claimed in claim 1 or 2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310505220.5A CN104573437B (en) | 2013-10-23 | 2013-10-23 | Information authentication method, device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310505220.5A CN104573437B (en) | 2013-10-23 | 2013-10-23 | Information authentication method, device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104573437A CN104573437A (en) | 2015-04-29 |
CN104573437B true CN104573437B (en) | 2018-12-28 |
Family
ID=53089479
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310505220.5A Active CN104573437B (en) | 2013-10-23 | 2013-10-23 | Information authentication method, device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104573437B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105657348A (en) * | 2015-12-30 | 2016-06-08 | 广州励丰文化科技股份有限公司 | Automatic monitoring method and system applied in multi-microphone scene |
CN105635681A (en) * | 2015-12-30 | 2016-06-01 | 广州励丰文化科技股份有限公司 | Monitoring method and system in wearable device and multi-microphone scenes |
CN107301337A (en) * | 2016-04-14 | 2017-10-27 | 腾讯科技(深圳)有限公司 | Information Authentication method and apparatus |
CN107483208A (en) * | 2016-06-08 | 2017-12-15 | 中国移动通信有限公司研究院 | Generation, verification method and the device of identifying code picture |
CN110198328B (en) * | 2018-03-05 | 2021-09-21 | 腾讯科技(深圳)有限公司 | Client identification method and device, computer equipment and storage medium |
CN110138800A (en) * | 2019-05-30 | 2019-08-16 | 北京金山云网络技术有限公司 | Interface alternation and its verification method, log on request generation and verification method and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102375651A (en) * | 2010-08-13 | 2012-03-14 | Tcl集团股份有限公司 | Method for unlocking portable electronic equipment |
WO2012028773A9 (en) * | 2010-09-01 | 2012-05-31 | Nokia Corporation | Mode switching |
CN102566881A (en) * | 2010-12-31 | 2012-07-11 | 宏碁股份有限公司 | Method for unlocking screen and executing application program |
CN102592254A (en) * | 2011-10-25 | 2012-07-18 | 上海博路信息技术有限公司 | Identifying code system based on image splicing |
CN102664903A (en) * | 2012-05-16 | 2012-09-12 | 李明 | Network user identifying method and system |
CN103139204A (en) * | 2012-12-19 | 2013-06-05 | 姚爱军 | Network identifying code method and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103259785B (en) * | 2013-04-11 | 2015-11-18 | 深圳市深信服电子科技有限公司 | The authentication method of virtual token and system |
-
2013
- 2013-10-23 CN CN201310505220.5A patent/CN104573437B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102375651A (en) * | 2010-08-13 | 2012-03-14 | Tcl集团股份有限公司 | Method for unlocking portable electronic equipment |
WO2012028773A9 (en) * | 2010-09-01 | 2012-05-31 | Nokia Corporation | Mode switching |
CN102566881A (en) * | 2010-12-31 | 2012-07-11 | 宏碁股份有限公司 | Method for unlocking screen and executing application program |
CN102592254A (en) * | 2011-10-25 | 2012-07-18 | 上海博路信息技术有限公司 | Identifying code system based on image splicing |
CN102664903A (en) * | 2012-05-16 | 2012-09-12 | 李明 | Network user identifying method and system |
CN103139204A (en) * | 2012-12-19 | 2013-06-05 | 姚爱军 | Network identifying code method and system |
Also Published As
Publication number | Publication date |
---|---|
CN104573437A (en) | 2015-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104796385B (en) | Terminal binding method, apparatus and system | |
WO2017118437A1 (en) | Service processing method, device, and system | |
CN104852885B (en) | Method, device and system for verifying verification code | |
CN104468463B (en) | Verification method, device and system | |
CN106778175B (en) | Interface locking method and device and terminal equipment | |
WO2018032661A1 (en) | Information displaying method for terminal device, and terminal device | |
CN106912048B (en) | Access point information sharing method and device | |
CN104573437B (en) | Information authentication method, device and terminal | |
CN104424431B (en) | A kind of method and device resetting virtual machine user modification logging | |
CN108171037A (en) | Using startup method, terminal and computer storage media | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN107437009A (en) | Authority control method and related product | |
US9940448B2 (en) | Unlock processing method and device | |
CN108475304B (en) | Method and device for associating application program and biological characteristics and mobile terminal | |
CN104217172B (en) | Privacy content inspection method and device | |
WO2018161540A1 (en) | Fingerprint registration method and related product | |
WO2018214748A1 (en) | Method and apparatus for displaying application interface, terminal and storage medium | |
CN109257336A (en) | It is a kind of based on the encrypted message processing method of block chain, terminal device | |
CN109145552A (en) | Information ciphering method and terminal device | |
CN108551521A (en) | A kind of log-on message reminding method and mobile terminal | |
CN107786569A (en) | A kind of identifying code sending method, method of reseptance and relevant device | |
CN103366104A (en) | Method and device for controlling accessing of application | |
CN108829444A (en) | A kind of method that background application is automatically closed, terminal and computer storage medium | |
CN107715449A (en) | A kind of account login method and relevant device | |
CN107480495B (en) | Unlocking method of mobile terminal and related product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |