CN104573437B - Information authentication method, device and terminal - Google Patents

Information authentication method, device and terminal Download PDF

Info

Publication number
CN104573437B
CN104573437B CN201310505220.5A CN201310505220A CN104573437B CN 104573437 B CN104573437 B CN 104573437B CN 201310505220 A CN201310505220 A CN 201310505220A CN 104573437 B CN104573437 B CN 104573437B
Authority
CN
China
Prior art keywords
dragging
terminal
candidate answers
described problem
authentification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310505220.5A
Other languages
Chinese (zh)
Other versions
CN104573437A (en
Inventor
唐艳平
陈梦
陈荣
刘飞飞
陈远斌
孙增昕
董梁
李德春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201310505220.5A priority Critical patent/CN104573437B/en
Publication of CN104573437A publication Critical patent/CN104573437A/en
Application granted granted Critical
Publication of CN104573437B publication Critical patent/CN104573437B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/0486Drag-and-drop

Abstract

The invention discloses a kind of information authentication method, device and terminals, belong to technical field of network security.The information authentication method includes: display authentification of message interface, and the authentification of message interface includes problem figure and at least two candidate answers figures;Receive the dragging signal of dragging candidate answers figure to described problem figure;Whether the drag operation that detection drags candidate answers figure to the described problem figure is correct operation;If it is correct operation that testing result, which is, it is determined that the certification passes through.It is to be completed by people or completed by other terminals that this authentication operation cannot be accurately judged in the prior art by, which solving the problems, such as, the authentification of message interface that other terminals itself are unable to complete certification can be provided by having reached so that when certification by when carry out the user of authentification of message can only be people without be other terminals effect.

Description

Information authentication method, device and terminal
Technical field
The present invention relates to technical field of network security, in particular to a kind of information authentication method, device and terminal.
Background technique
With the rapid development of communication technology, huge numbers of families have been come into internet.In internet, in order to keep away Exempt from the attack of hacker, wooden horse and Malware, authentification of message has become the technology hand for guaranteeing network security and being commonly used One of section.
Referring to FIG. 1, the certification schematic diagram it illustrates a kind of existing information authentication method when carrying out authentification of message, The information authentication method may include: that certificate server provides the terminal with the authentication interface comprising identifying code, and terminal, which is shown, includes The authentication interface of identifying code, and receive the identifying code that user inputs in authentication interface;The identifying code that terminal transmits and receives is extremely Whether certificate server, the identifying code that certificate server detection receives match with the identifying code provided in authentication interface;If Testing result is matching, then sends authentication pass information to terminal, terminal continues to provide after receiving authentication pass information Service.
In the implementation of the present invention, at least there are the following problems for inventor's discovery prior art:
Since identifying code is usually made of character, and character can be identified by other terminals by picture and text identification technology It arrives, so above- mentioned information authentication method, which can not be accurately judged to this authentication operation, to be completed by people or by other terminals To complete.
Summary of the invention
In order to solve the prior art offer information authentication method cannot be accurately judged to this authentication operation be by people Lai It completes or by other terminals come the problem of completion, the embodiment of the invention provides a kind of information authentication method, device and terminals. The technical solution is as follows:
In a first aspect, providing a kind of information authentication method, which comprises
Show authentification of message interface, the authentification of message interface includes problem figure and at least two candidate answers figures;
Receive the dragging signal of dragging candidate answers figure to described problem figure;
Whether the drag operation that detection drags candidate answers figure to the described problem figure is correct operation;
If it is correct operation that testing result, which is, it is determined that the certification passes through.
In the first possible implementation of the first aspect, the detection drags the candidate answers figure to described Whether the drag operation of problem figure is correct operation, comprising:
Detection drags whether the candidate answers figure to the dragging track of described problem figure is dragging correct option figure Shape is to the dragging track of described problem figure;
If testing result is to be to drag correct option figure to the dragging track of described problem figure, it is determined that the dragging Operation is correct operation.
In the second possible implementation of the first aspect, the detection drags the candidate answers figure to described Whether the drag operation of problem figure is correct operation, comprising:
Whether the candidate answers figure of detection dragging is correct option figure corresponding with described problem figure;
If it is correct option figure corresponding with described problem figure that testing result, which is, it is determined that the drag operation is just Really operation.
In a third possible implementation of the first aspect, the detection drags the candidate answers figure to described Before whether the drag operation of problem figure is correct operation, the method also includes:
Whether detection drags the terminal of the candidate answers figure to the dragging track of described problem figure based on described In the presumptive area of problem figure positioning;
If testing result is to execute described in the detection dragging in the presumptive area positioned based on described problem figure The step of whether drag operation of candidate answers figure to described problem figure is correct operation.
In a fourth possible implementation of the first aspect, before the display authentification of message interface, the method Further include:
Acquire finger print information;
Detect whether the finger print information matches with predetermined fingerprint information;
The step of if testing result is matching, executes the display authentification of message interface.
In the fifth possible implementation of the first aspect, the detection drags the candidate answers figure to described After whether the drag operation of problem figure is correct operation, the method also includes:
Count the number that the drag operation detected within a predetermined period of time is not correct operation;
When the number that statistics obtains reaches pre-determined number, continuing to execute for the authentification of message is locked.
Second aspect, provides a kind of information authenticating apparatus, and described device includes:
Interface display module, for showing authentification of message interface, the authentification of message interface includes problem figure and at least Two candidate answers figures;
Signal receiving module, for receiving the dragging signal of dragging candidate answers figure to described problem figure;
Operate detection module, for detect the dragging candidate answers figure to described problem figure drag operation whether It is correct operation;
Certification is by module, described in determining when the testing result of the operation detection module is is correct operation Certification passes through.
In the first possible implementation of the second aspect, the operation detection module, comprising:
Track detection unit, for detect the dragging candidate answers figure to the dragging track of described problem figure whether It is to drag correct option figure to the dragging track of described problem figure;
First determination unit is to drag correct option figure to institute for the testing result in the track detection unit When stating the dragging track of problem figure, determine that the drag operation is correct operation.
In a second possible implementation of the second aspect, the operation detection module, comprising:
Graphics detection unit, whether the candidate answers figure for detecting dragging is corresponding with described problem figure Correct option figure;
Second determination unit, it is corresponding with described problem figure for being for the testing result in the graphics detection unit When correct option figure, determine that the drag operation is correct operation.
In the third possible implementation of the second aspect, described device further include:
Drop point detection module, for detecting the end of the dragging candidate answers figure to the dragging track of described problem figure Whether point is in the presumptive area positioned based on described problem figure;
The operation detection module is to be based on described problem figure for the testing result in the drop point detection module When in the presumptive area of positioning, executing the drag operation that the detection drags candidate answers figure to the described problem figure is No the step of being correct operation.
In the fourth possible implementation of the second aspect, described device further include:
Finger print acquisition module, for acquiring finger print information;
Finger print detecting module, for detecting the finger print information and predetermined fingerprint information of the finger print acquisition module acquisition Whether match;
The interface display module is also used to when the testing result of the finger print detecting module is matches, described in execution The step of showing authentification of message interface.
In a fifth possible implementation of the second aspect, described device further include:
Number statistical module is time of correct operation for counting the drag operation detected within a predetermined period of time not Number;
Locking module is authenticated, when the number for obtaining in the number statistical module counts reaches pre-determined number, locking The authentification of message continues to execute.
The third aspect, provides a kind of terminal, and the terminal includes the various possible of second aspect and second aspect Information authenticating apparatus described in implementation.
The beneficial effect of technical solution provided in an embodiment of the present invention is:
By showing authentification of message interface, the dragging signal of dragging candidate answers figure to problem figure is received, and detect Whether the drag operation for dragging candidate answers figure to problem figure is correct operation, so that being in testing result is correct operation When, determine that certification passes through;Solve cannot be accurately judged in the prior art this authentication operation be completed by people or by Other terminals the problem of completion, have reached the authentification of message interface that can be provided other terminals and itself be unable to complete certification, make Proper certification by when carry out the user of authentification of message can only be people without be other terminals effect.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is the display schematic diagram for the information authentication method that the prior art provides;
Fig. 2 is the method flow diagram of information authentication method provided by one embodiment of the present invention;
Fig. 3 A be another embodiment of the present invention provides information authentication method method flow diagram;
Fig. 3 B be another embodiment of the present invention provides authentification of message interface display schematic diagram;
Fig. 3 C be another embodiment of the present invention provides authentification of message interface another display schematic diagram;
Fig. 3 D be another embodiment of the present invention provides authentification of message interface another display schematic diagram;
Fig. 3 E be another embodiment of the present invention provides dragging candidate answers figure it is aobvious to the dragging track of problem figure Show schematic diagram;
Fig. 3 F be another embodiment of the present invention provides authentification of message interface another display schematic diagram;
Fig. 3 G be another embodiment of the present invention provides authentification of message interface another display schematic diagram;
Fig. 4 is the method flow diagram for the information authentication method that yet another embodiment of the invention provides;
Fig. 5 is the structural block diagram of information authenticating apparatus provided by one embodiment of the present invention;
Fig. 6 A be another embodiment of the present invention provides information authenticating apparatus structural block diagram;
Fig. 6 B be another embodiment of the present invention provides information authenticating apparatus another structural block diagram;
Fig. 6 C be another embodiment of the present invention provides information authenticating apparatus another structural block diagram;
Fig. 7 is the structural block diagram of terminal provided by one embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into It is described in detail to one step, it is clear that the described embodiments are only some of the embodiments of the present invention, rather than whole implementation Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts All other embodiment, shall fall within the protection scope of the present invention.
Referring to FIG. 2, it illustrates the method flow diagram of information authentication method provided by one embodiment of the present invention, the letter Breath authentication method can be used for such as mobile phone, tablet computer, personal digital assistant, desktop computer or laptop etc In communication terminal, which may include:
Step 201, authentification of message interface is shown;
Wherein, authentification of message interface includes problem figure and at least two candidate answers figures.
Step 202, the dragging signal of dragging candidate answers figure to problem figure is received;
Step 203, whether the drag operation of detection dragging candidate answers figure to problem figure is correct operation;
Step 204, if testing result is to be correct operation, it is determined that certification passes through.
In conclusion it is candidate to receive dragging by showing authentification of message interface for information authentication method provided in this embodiment Answer graphic to problem figure dragging signal, and detect dragging candidate answers figure to problem figure drag operation whether be Correct operation, to determine that certification passes through when testing result is is correct operation;Solving cannot accurately sentence in the prior art Disconnected this authentication operation out is to be completed by people or can provide other terminals by other terminals to have reached the problem of completion Itself be unable to complete the authentification of message interface of certification so that when certification by when carry out the user of authentification of message can only be people without It can be the effect of other terminals.
Please refer to Fig. 3 A, it illustrates another embodiment of the present invention provides information authentication method method flow diagram, should Information authentication method can be used for such as mobile phone, tablet computer, personal digital assistant, desktop computer or laptop etc Terminal in, which may include:
Step 301, authentification of message interface is shown;
Terminal can show authentification of message interface.Wherein, authentification of message interface includes that problem figure and at least two are candidate Answer graphic;For example, please referring to Fig. 3 B, it illustrates a kind of display schematic diagrams at possible authentification of message interface.
Specifically, a certain website is being frequently visited by the user or under the higher environment of certain security requirements, in order to keep away From the attack to hacker to guarantee network security, it usually needs authentification of message is carried out, so terminal can be shown accordingly Authentification of message interface.For example, in user's using terminal frequent downloads file from a certain website, website is in order to detect the downloading Whether operation is to be completed by people, to guarantee that the Internet resources of oneself are not stolen by hacker, website would generally setting information recognize Card, terminal can show authentification of message interface at this time.
However, in order to avoid criminal completes certification asking to menace network safety according to the authorization prompt of terminal Topic, when a certain terminal needs to carry out authentification of message, which can also send other terminals that certification request is extremely bound with it, Other terminals show authentification of message interface after receiving certification request.Wherein, other terminals of binding, which can be, is equipped with The terminal for the application program that can be realized authentication function bound with the application program of request certification, for example, pacifying in user mobile phone Equipped with the application program that authentication function may be implemented, a certain chat software that the application program and user use is bound, then when with When family logs in the chat software in computer, in order to detect whether this register is user's operation, computer can be sent out Send certification request to user mobile phone, correspondingly, user mobile phone can receive certification request, and after receiving certification request Show authentification of message interface.
It should be noted that can also include to each in authentification of message interface to help user to complete authentification of message The operation instruction of candidate answers figure, for example Fig. 3 C is please referred to, the explanation for ' sunbonnet ' is that ' clown Le Le can be helped to hide It keeps off the sunshine ';Explanation for ' umbrella ' is ' can be that clown Le Le keeps off the rain ';Explanation for ' housing ' is ' warming '.
Step 302, the dragging signal of dragging candidate answers figure to problem figure is received;
User can carry out corresponding authentication operation according to the display content in authentification of message interface, namely work as authentification of message When including problem figure and at least two candidate answers figures in interface, user can specifically ask according to indicated by problem figure Topic drags on corresponding candidate answers figure to problem figure, and corresponding terminal can receive dragging candidate answers figure to problem The dragging signal of figure.
For example, user can be according to ' current state of clown Le Le ' drags in the authentification of message interface shown in Fig. 3 C Corresponding stage property is to completing to authenticate with it, correspondingly, terminal can receive dragging stage property to the ' dragging of clown Le Le ' Signal;Specifically, when ' when clown Le Le ' is under the burning sun, illustrating that ' clown Le Le ' currently needs a top sunbonnet Sunshade, user can drag ' sunbonnet ' to ' clown Le Le ' to create a piece of cool place for it, and terminal can connect accordingly at this time Dragging ' sunbonnet ' is received to ' the dragging signal of clown Le Le ';When ' when clown Le Le ' is drenching with rain, illustrating ' clown Le Le ' Currently umbrella is needed to carry out rain cover, user can drag ' umbrella ' to ' clown Le Le ' comes for its rain cover, and terminal can be corresponding at this time Receive dragging ' umbrella ' to ' the dragging signal of clown Le Le ';And works as and ' when clown Le Le ' is in snowy day, illustrate current ' clown Le Le ' terribly cold may need to keep warm, and user can drag ' housing ' to ' clown Le Le ', terminal can be corresponding at this time Dragging ' housing ' is received to ' the dragging signal of clown Le Le '.
Step 303, whether detection dragging candidate answers figure is to the terminal of the dragging track of problem figure in the problem of being based on In the presumptive area of figure positioning;
After terminal receives dragging signal, terminal can detecte the dragging of dragging candidate answers figure to problem figure Whether the terminal of track is in the presumptive area positioned based on problem figure.
Specifically, since some stage properties have its specific usage mode, for example, sunbonnet is for being worn on head , it moves when dragging it ' when the foot areas of clown Le Le ', it is clear that be incorrect, so receiving dragging in terminal After signal, whether terminal can detecte the terminal of dragging candidate answers figure to the dragging track of problem figure based on problem In the presumptive area of figure positioning.In actual implementation, different problem figures and dragging candidate answers can be stored in advance in terminal Corresponding pass of the terminal of track between region locating in the region positioned based on problem figure is dragged when figure to problem figure System, corresponding terminal can execute detection according to the corresponding relationship prestored.
For example, in the corresponding relationship that terminal prestores, when problem figure is ' when clown Le Le ' is in the figure under the sun, to drag The terminal of dynamic candidate answers figure to the dragging track of problem figure region locating in the region positioned based on problem figure It is 1/2 region of problem figure from top to bottom to 3/4 region;So when the problems in authentification of message interface figure is that ' clown is happy It is happy ' figure under the sun when, terminal can detecte dragging track terminal whether 1/2nd area in problem figure from top to bottom In domain to 3/4 region, Fig. 3 D is specifically please referred to.
It should be noted that this step is optional step, in practical application, terminal can directly execute step 304, this Embodiment is to this and without limitation.
Step 304, if testing result is that it is candidate to execute detection dragging in the presumptive area positioned based on problem figure The step of whether drag operation of Answer graphic to problem figure is correct operation;
If the testing result of terminal is in the presumptive area positioned based on problem figure, terminal can execute detection The step of whether drag operation for dragging candidate answers figure to problem figure is correct operation.
Specifically, terminal detection dragging candidate answers figure to problem figure drag operation whether be correct operation step Suddenly may include any one of the following two kinds implementation:
The first possible implementation may include:
First, whether detection dragging candidate answers figure to the dragging track of problem figure is to drag correct option figure extremely The dragging track of problem figure;
Specifically, user will form a dragging track namely terminal when dragging candidate answers figure to problem figure When receiving dragging signal, dragging candidate answers figure can be got accordingly to the dragging track of problem figure;However, by It is different the location of in authentification of message interface in different candidate answers figures, so user drags different candidate answers The starting point of dragging track when figure to problem figure is also different;Simultaneously because user drags same candidate answers figure extremely The dragged path of problem figure would also vary from, so in order to detect this dragging candidate answers figure of user to problem figure Drag operation whether be correct operation, terminal can detecte dragging candidate answers figure to the dragging track of problem figure whether It is to drag correct option figure to the dragging track of problem figure.
In actual implementation, terminal can prestore dragging between different problem figures and correct option figure in the database Dynamic rail mark, corresponding terminal can be detected according to pre-stored data library.For example, terminal prestore with problem shown in Fig. 3 D The corresponding dragging track of figure is the track of bold portion shown in Fig. 3 E, so when the problems in authentification of message interface figure is When above problem figure, terminal can detecte whether dragging candidate answers figure to the dragging track of problem figure is reality in Fig. 3 E The track of line part.
Second, if testing result is to be to drag correct option figure to the dragging track of problem figure, it is determined that dragging behaviour Work is correct operation.
If the testing result of terminal is the track for being bold portion shown in Fig. 3 E, dragging correct option figure that is to say To the dragging track of problem figure, then terminal can determine that drag operation is correct operation.
And if the testing result of terminal is the track of bold portion shown in not instead of Fig. 3 E, wherein dotted portion Track is dragged, then terminal can determine that drag operation is not correct operation at this time.Wherein, in Fig. 3 E dotted portion dragging track Wherein several possible situations that auxiliary understands and draws are intended merely to, no longer one by one to other possible implementation the present embodiment It enumerates.
Second of possible implementation may include:
First, whether the candidate answers figure for detecting dragging is correct option figure corresponding with problem figure;
Specifically, being waited since different problems figure corresponds to unique candidate answers figure so detecting dragging in terminal When whether the drag operation for selecting Answer graphic to problem figure is correct operation, terminal can detecte the candidate answers figure of dragging It whether is correct option figure corresponding with problem figure.
In actual implementation, terminal can prestore the corresponding relationship between different problem figures and correct option figure, institute With when terminal executes detecting step, terminal can be detected according to the corresponding relationship prestored.For example, the figure that terminal prestores The corresponding correct option figure of problem figure shown in 3E is ' sunbonnet ';And problem figure shown in Fig. 3 F is corresponding correctly answers Case figure is then ' umbrella ' etc.;The corresponding correct option figure of problem figure shown in Fig. 3 G is ' housing '.
Second, if it is correct option figure corresponding with problem figure that testing result, which is, determine that drag operation is correctly to grasp Make.
If it is correct option figure corresponding with problem figure that the testing result of terminal, which is, for example, authentification of message interface For authentication interface shown in Fig. 3 E, then when terminal detects that the candidate answers figure of dragging is exactly ' sunbonnet ', terminal can be with Determine that drag operation is correct operation.
And if the testing result of terminal be not be correct option figure corresponding with problem figure, for example, authentification of message Interface is authentication interface shown in Fig. 3 E, and terminal detects that the candidate answers figure of dragging is ' umbrella ' and is not ' sunshade Cap ', terminal can determine that drag operation is not correct operation at this time.
Step 305, if testing result is to be correct operation, it is determined that certification passes through.
When the testing result of step 304 is is correct operation, terminal can determine that certification passes through.
Specifically, when terminal is to directly display authentification of message interface, the testing result of terminal be correct operation it Afterwards, terminal can directly authenticate passing through and continuing to execute and requesting before for task;For example, terminal be in a certain website frequently into Authentification of message is carried out when row downloading, then when the testing result of terminal is is correct operation, terminal can execute downloading task;And Authentication interface is shown after terminal is received from the certification request that a certain application program is sent, then in the detection knot of terminal Fruit is after being correct operation, and terminal can send authentication pass information to the application program, so that the application program is receiving Offer service is provided after to authentication pass information.
If it is not correct operation that the testing result of terminal, which is, terminal can determine that this certification can't pass.However, being Avoid maloperation due to user and certification caused to be refused, terminal testing result be not correct operation when, can also be again Secondary display authentification of message interface, and after receiving dragging signal of the dragging candidate answers figure to problem figure, continue to examine Whether the drag operation for surveying dragging candidate answers figure to problem figure is correct operation, so that being in testing result is correctly to grasp When making, determine that certification passes through.Meanwhile in order to avoid criminal is by repeatedly attempting come by certification, terminal can also be arranged The at most attemptable number of user within a predetermined period of time, can also execute following steps:
First, count the number that the drag operation detected within a predetermined period of time is not correct operation;
Firstly, it is the number of correct operation that terminal, which can count the drag operation detected within a predetermined period of time not,.? In actual implementation, for terminal when detecting drag operation not is correct operation, number can be added 1 by terminal, and be counted predetermined Total degree in period.
Second, when the number that statistics obtains reaches pre-determined number, locking information certification is continued to execute.
When the number that terminal counts reaches pre-determined number, terminal can be continued to execute with what locking information authenticated.
For example, setting predetermined amount of time as one day, pre-determined number is 3 times, then reaches 3 times in the total degree that terminal counts When, terminal can be continued to execute with what locking information authenticated.
In conclusion it is candidate to receive dragging by showing authentification of message interface for information authentication method provided in this embodiment Answer graphic to problem figure dragging signal, and detect dragging candidate answers figure to problem figure drag operation whether be Correct operation, to determine that certification passes through when testing result is is correct operation;Solving cannot accurately sentence in the prior art Disconnected this authentication operation out is to be completed by people or can provide other terminals by other terminals to have reached the problem of completion Itself be unable to complete the authentification of message interface of certification so that when certification by when carry out the user of authentification of message can only be people without It can be the effect of other terminals.Meanwhile the present embodiment first detects dragging candidate answers figure to the dragging track of problem figure Whether terminal is in the presumptive area positioned based on problem figure, to only hold when testing result is in presumptive area Row subsequent step, and be to terminate this process not in presumptive area, greatly reduce terminal in authentification of message in testing result When processing complexity.
Referring to FIG. 4, the method flow diagram of the information authentication method provided it illustrates yet another embodiment of the invention, the letter Breath authentication method can be used for such as mobile phone, tablet computer, personal digital assistant, desktop computer or laptop etc In terminal;And unlike the embodiments above, in the present embodiment, before terminal shows authentification of message interface, terminal can First to acquire finger print information, authentification of message interface is shown again after finger print identifying passes through;The information authentication method may include:
Step 401, finger print information is acquired;
Unlike the embodiments above, in the present embodiment when needing to carry out authentification of message, terminal can be acquired first The finger print information of user.Specifically, terminal can acquire the finger print information of user by fingerprint sensor.Wherein fingerprint sensing Device can be the sensor of terminal built-in, and the sensor being also possible in the ancillary equipment being connected with terminal, the present embodiment is to this And without limitation.
For example, the personal account of user is usurped to lead by other people in order to prevent when user uses a certain chat software Leakage of personal information is caused, when personal account trial logs in, the terminal for logging in the personal account can send certification request, phase For the terminal for the offer authentication function answered after receiving certification request, display reminding user inputs prompt circle of finger print information Face, and acquire the finger print information of user's input.
Step 402, whether detection finger print information matches with predetermined fingerprint information;
After terminal collects finger print information, terminal can detecte collected finger print information and predetermined fingerprint information Whether match.
Step 403, if testing result is matching, the step of showing authentification of message interface is executed;
If the testing result of terminal is matching, illustrate to be user's operation, terminal can execute display letter at this time The step of ceasing authentication interface.Wherein, authentification of message interface includes problem figure and at least two candidate answers figures.
It should be noted that can also include the operation instruction to each candidate answers figure in authentification of message interface, this Similar with the step 301 of above-described embodiment, details are not described herein for the present embodiment.
Step 404, the dragging signal of dragging candidate answers figure to problem figure is received;
User can carry out corresponding authentication operation according to the display content in authentification of message interface, namely work as authentification of message When including problem figure and at least two candidate answers figures in interface, user can specifically ask according to indicated by problem figure Topic drags on corresponding candidate answers figure to problem figure, and corresponding terminal can receive dragging candidate answers figure to problem The dragging signal of figure.
It should be noted that user is usually to drag candidate by finger when terminal is the terminal using touch screen Answer graphic is to problem figure, so in order to reduce complexity of the terminal in authentification of message, terminal can also directly display letter Authentication interface is ceased, the finger print information of user is acquired when user drags candidate answers figure to problem figure, and detects fingerprint letter Whether breath matches with predetermined fingerprint information, to execute step 405 when testing result is matching;This is that is, step 401 and step 402 any moment can be executed before step 405, the present embodiment specific executes moment and without limitation to it.
Step 405, whether detection dragging candidate answers figure is to the terminal of the dragging track of problem figure in the problem of being based on In the presumptive area of figure positioning;
After terminal receives dragging signal, terminal can detecte the dragging of dragging candidate answers figure to problem figure Whether the terminal of track is in the presumptive area positioned based on problem figure.
Step 406, if testing result is that it is candidate to execute detection dragging in the presumptive area positioned based on problem figure The step of whether drag operation of Answer graphic to problem figure is correct operation;
If the testing result of terminal is in the presumptive area positioned based on problem figure, terminal can execute detection The step of whether drag operation for dragging candidate answers figure to problem figure is correct operation.
Specifically, terminal detection dragging candidate answers figure to problem figure drag operation whether be correct operation step Suddenly may include any one of the following two kinds implementation:
The first possible implementation may include:
First, whether detection dragging candidate answers figure to the dragging track of problem figure is to drag correct option figure extremely The dragging track of problem figure;
Specifically, user will form a dragging track namely terminal when dragging candidate answers figure to problem figure When receiving dragging signal, dragging candidate answers figure can be got accordingly to the dragging track of problem figure;However, by In different candidate answers figures, different the location of in authentification of message interface namely user drags different candidate answers The starting point of dragging track when figure to problem figure is also different, and user drags same candidate answers figure to problem The dragged path of figure would also vary from, so in order to detect this dragging candidate answers figure dragging to problem figure of user Whether dynamic operation is correct operation, and whether the dragging track that terminal can detecte dragging candidate answers figure to problem figure drags Correct option figure is moved to the dragging track of problem figure.
Second, if testing result is to be to drag correct option figure to the dragging track of problem figure, it is determined that dragging behaviour Work is correct operation.
If the testing result of terminal is the track for being bold portion shown in Fig. 3 E, dragging correct option figure that is to say To the dragging track of problem figure, then terminal can determine that drag operation is correct operation.
And if realizing the track of part shown in the testing result of terminal not instead of Fig. 3 E, wherein dotted portion drags Dynamic rail mark, then terminal can determine that drag operation is not correct operation at this time.
Second of possible implementation may include:
First, whether the candidate answers figure for detecting dragging is correct option figure corresponding with problem figure;
Specifically, since different problems figure corresponds to a unique candidate answers figure, so being dragged in terminal detection When whether the drag operation of dynamic candidate answers figure to problem figure is correct operation, terminal can detecte the candidate answers of dragging Whether figure is correct option figure corresponding with problem figure.
In actual implementation, terminal can prestore the corresponding relationship between different problem figures and correct option figure, institute With when terminal executes detecting step, terminal can be detected according to the corresponding relationship prestored.
Second, if it is correct option figure corresponding with problem figure that testing result, which is, it is determined that drag operation is correct Operation.
Step 407, if testing result is to be correct operation, it is determined that certification passes through.
Specifically, when terminal is to directly display authentification of message interface, the testing result of terminal be correct operation it Afterwards, terminal can directly authenticate passing through and continuing to execute and requesting before for task;For example, terminal be in a certain website frequently into Authentification of message is carried out when row downloading, then when the testing result of terminal is is correct operation, terminal can execute downloading task;And Authentication interface is shown after terminal is received from the certification request that a certain application program is sent, then in the detection knot of terminal Fruit is after being correct operation, and terminal can send authentication pass information to the application program, so that the application program is receiving Offer service is provided after to authentication pass information.
If it is not correct operation that the testing result of terminal, which is, terminal can determine that this certification can't pass.However, being Avoid maloperation due to user and certification caused to be refused, terminal testing result be not correct operation when, terminal may be used also To show authentification of message interface again, and after receiving dragging signal of the dragging candidate answers figure to problem figure, after Whether the drag operation of continuous detection dragging candidate answers figure to problem figure is correct operation, and being when testing result is correctly to grasp When making, determine that certification passes through.Meanwhile in order to avoid criminal is by repeatedly attempting come by certification, terminal can also be arranged The at most attemptable number of user within a predetermined period of time, can also execute following steps:
First, count the number that the drag operation detected within a predetermined period of time is not correct operation;
Firstly, it is the number of correct operation that terminal, which can count the drag operation detected within a predetermined period of time not,.? In actual implementation, for terminal when detecting drag operation not is correct operation, number can be added 1 by terminal, and be counted predetermined Total degree in period.
Second, when the number that statistics obtains reaches pre-determined number, locking information certification is continued to execute.
When the number that terminal counts reaches pre-determined number, terminal can be continued to execute with what locking information authenticated.
It should be noted that step 404 to step 407 detailed technology details and above-described embodiment in step 302 to Step 305 is similar, and details are not described herein for the present embodiment.
In conclusion it is candidate to receive dragging by showing authentification of message interface for information authentication method provided in this embodiment Answer graphic to problem figure dragging signal, and detect dragging candidate answers figure to problem figure drag operation whether be Correct operation, to determine that certification passes through when testing result is is correct operation;Solving cannot accurately sentence in the prior art Disconnected this authentication operation out is to be completed by people or can provide other terminals by other terminals to have reached the problem of completion Itself be unable to complete the authentification of message interface of certification so that when certification by when carry out the user of authentification of message can only be people without It can be the effect of other terminals.
Whether the terminal that the present embodiment first detects dragging candidate answers figure to the dragging track of problem figure is being based on asking In the presumptive area for inscribing figure positioning, to only execute subsequent step when testing result is in presumptive area, and examining Surveying result is to terminate this process not in presumptive area, greatly reduce processing complexity of the terminal in authentification of message.
The present embodiment by detection acquisition finger print information whether matched with predetermined fingerprint information, so as to judge into Row information certification people whether be authorization after user, improve the accuracy of authentification of message.
Referring to FIG. 5, the information is recognized it illustrates the structural block diagram of information authenticating apparatus provided in an embodiment of the present invention Card device can be implemented as all or part of in terminal, the authentification of message by the combination of software, hardware or both Device may include: that interface display module 510, signal receiving module 520, operation detection module 530 and certification pass through module 540;
Interface display module 510, for showing authentification of message interface, the authentification of message interface includes problem figure and extremely Few two candidate answers figures;
Signal receiving module 520, for receiving the dragging signal of dragging candidate answers figure to described problem figure;
Detection module 530 is operated, for detecting the drag operation for dragging the candidate answers figure to described problem figure It whether is correct operation;
Certification by module 540, for the testing result of the operation detection module 530 be correct operation when, really The fixed certification passes through.
In conclusion it is candidate to receive dragging by showing authentification of message interface for information authenticating apparatus provided in this embodiment Answer graphic to problem figure dragging signal, and detect dragging candidate answers figure to problem figure drag operation whether be Correct operation, to determine that certification passes through when testing result is is correct operation;Solving cannot accurately sentence in the prior art Disconnected this authentication operation out is to be completed by people or can provide other terminals by other terminals to have reached the problem of completion Itself be unable to complete the authentification of message interface of certification so that when certification by when carry out the user of authentification of message can only be people without It can be the effect of other terminals.
Please refer to Fig. 6 A, it illustrates another embodiment of the present invention provides information authenticating apparatus structural block diagram, should Information authenticating apparatus can be implemented as all or part of in terminal, the letter by the combination of software, hardware or both Breath authentication device may include: that interface display module 610, signal receiving module 620, operation detection module 630 and certification pass through Module 640;
Interface display module 610, for showing authentification of message interface, the authentification of message interface includes problem figure and extremely Few two candidate answers figures;
Signal receiving module 620, for receiving the dragging signal of dragging candidate answers figure to described problem figure;
Detection module 630 is operated, for detecting the drag operation for dragging the candidate answers figure to described problem figure It whether is correct operation;
Certification by module 640, for the testing result of the operation detection module 630 be correct operation when, really The fixed certification passes through.
Fig. 6 B is please referred to, in the first possible implementation of the present embodiment, the operation detection module 630, packet It includes:
Track detection unit 631, for detecting the dragging candidate answers figure to the dragging track of described problem figure It whether is to drag correct option figure to the dragging track of described problem figure;
First determination unit 632, being for the testing result in the track detection unit 631 is dragging correct option figure When shape to the dragging track of described problem figure, determine that the drag operation is correct operation.
Fig. 6 C is please referred to, in second of possible implementation of the present embodiment, the operation detection module 630, packet It includes:
Graphics detection unit 633, for detect dragging the candidate answers figure whether be and described problem figure pair The correct option figure answered;
Second determination unit 634 is to be and described problem figure pair for the testing result in the graphics detection unit When the correct option figure answered, determine that the drag operation is correct operation.
In the third possible implementation of the present embodiment, described device further include: drop point detection module 650;
Drop point detection module 650, for detecting the dragging candidate answers figure to the dragging track of described problem figure Terminal whether in the presumptive area positioned based on described problem figure;
The operation detection module 630 is to ask based on described for the testing result in the drop point detection module 650 When inscribing in the presumptive area of figure positioning, executes the detection and drag the dragging of the candidate answers figure to described problem figure The step of whether operation is correct operation.
In the 4th kind of possible implementation of the present embodiment, described device further include: finger print acquisition module 660 and refer to Line detection module 670;
Finger print acquisition module 660, for acquiring finger print information;
Finger print detecting module 670, for detecting the finger print information and predetermined finger that the finger print acquisition module 660 acquires Whether line information matches;
The interface display module 610 is also used to hold when the testing result of the finger print detecting module 670 is matches The step of row display authentification of message interface.
In the 5th kind of possible implementation of the present embodiment, described device further include: number statistical module 680 and recognize Demonstrate,prove locking module 690;
Number statistical module 680 is not correct operation for counting the drag operation detected within a predetermined period of time Number;
Locking module 690 is authenticated, the number for obtaining in the number statistical module 680 statistics reaches pre-determined number When, lock continuing to execute for the authentification of message.
In conclusion it is candidate to receive dragging by showing authentification of message interface for information authenticating apparatus provided in this embodiment Answer graphic to problem figure dragging signal, and detect dragging candidate answers figure to problem figure drag operation whether be Correct operation, to determine that certification passes through when testing result is is correct operation;Solving cannot accurately sentence in the prior art Disconnected this authentication operation out is to be completed by people or can provide other terminals by other terminals to have reached the problem of completion Itself be unable to complete the authentification of message interface of certification so that when certification by when carry out the user of authentification of message can only be people without It can be the effect of other terminals.
Referring to FIG. 7, the terminal is for implementing it illustrates the structural block diagram of terminal provided in an embodiment of the present invention The information authentication method of embodiment offer is stated, the terminal in the embodiment of the present invention may include one or more following composition portions Point: the processor of various processes and method is completed for executing computer program instructions, for information and storage program instruction Random access memory (RAM) and read-only memory (ROM), for storing data with the memory of information, I/O equipment, interface, Antenna etc..Specifically:
Terminal 700 may include RF(Radio Frequency, radio frequency) circuit 710, memory 720, input unit 730, Display unit 740, sensor 750, voicefrequency circuit 760, WiFi (wireless fidelity, Wireless Fidelity) module 770, place Manage the components such as device 780, power supply 782, camera 790.It will be understood by those skilled in the art that terminal structure shown in Fig. 7 is simultaneously The not restriction of structure paired terminal may include perhaps combining certain components or different than illustrating more or fewer components Component layout.
It is specifically introduced below with reference to each component parts of the Fig. 7 to terminal 700:
RF circuit 710 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, handled to processor 780;In addition, the data for designing uplink are sent to base station.In general, RF circuit packet Include but be not limited to antenna, at least one amplifier, transceiver, coupler, LNA(Low Noise Amplifier, low noise Amplifier), duplexer etc..In addition, RF circuit 710 can also be communicated with network and other equipment by wireless communication.The nothing Any communication standard or agreement, including but not limited to GSM (Global System of Mobile can be used in line communication Communication, global system for mobile communications), GPRS (General Packet Radio Service, general packet without Line service), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), LTE (Long Term Evolution, long term evolution), electronics Mail, SMS (Short Messaging Service, short message service) etc..
Memory 720 can be used for storing software program and module, and processor 780 is stored in memory 720 by operation Software program and module, thereby executing the various function application and data processing of terminal 700.Memory 720 can be main Including storing program area and storage data area, wherein storing program area can answer needed for storage program area, at least one function With program (such as sound-playing function, image player function etc.) etc.;Storage data area, which can be stored, uses institute according to terminal 700 Data (such as audio data, phone directory etc.) of creation etc..In addition, memory 720 may include high-speed random access memory, It can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-states are deposited Memory device.
Input unit 730 can be used for receiving the number or character information of input, and generate the user setting with terminal 700 And the related key signals input of function control.Specifically, input unit 730 may include touch panel 731 and other inputs Equipment 732.Touch panel 731, also referred to as touch screen, collecting the touch operation of user on it or nearby, (for example user makes With the operation of any suitable object or attachment such as finger, stylus on touch panel 731 or near touch panel 731), and Corresponding attachment device is driven according to preset formula.Optionally, touch panel 731 may include touch detecting apparatus and touching Touch two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation bring letter Number, transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into Contact coordinate, then give processor 780, and order that processor 780 is sent can be received and executed.Furthermore, it is possible to using The multiple types such as resistance-type, condenser type, infrared ray and surface acoustic wave realize touch panel 731.It is defeated in addition to touch panel 731 Entering unit 730 can also include other input equipments 732.Specifically, other input equipments 732 can include but is not limited to physics One of keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 740 can be used for showing information input by user or the information and terminal 700 that are supplied to user Various menus.Display unit 740 may include display panel 741, optionally, can use LCD (Liquid Crystal Display, liquid crystal display), the forms such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) come Configure display panel 741.Further, touch panel 731 can cover display panel 741, when touch panel 731 is detected at it On or near touch operation after, send processor 780 to determine the type of touch event, be followed by subsequent processing device 780 according to touching The type for touching event provides corresponding visual output on display panel 741.Although in Fig. 7, touch panel 731 and display surface Plate 741 is the input and input function for realizing terminal 700 as two independent components, but in certain embodiments, it can That terminal 700 is realized so that touch panel 731 and display panel 741 is integrated outputs and inputs function.
Terminal 700 may also include at least one sensor 750, such as gyro sensor, magnetic induction sensor, light sensing Device, motion sensor and other sensors.Specifically, optical sensor may include ambient light sensor and proximity sensor, In, ambient light sensor can adjust the brightness of display panel 741 according to the light and shade of ambient light, and proximity sensor can be in terminal 750 when being moved in one's ear, closes display panel 741 and/or backlight.As a kind of motion sensor, acceleration transducer can The size for detecting (generally three axis) acceleration in all directions, can detect that size and the direction of gravity, can be used for when static The application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating) of identification terminal posture, Vibration identification correlation function (such as pedometer, percussion) etc.;Barometer, hygrometer, thermometer, infrared sensor for can also configure as terminal 700 etc. Other sensors, details are not described herein.
Voicefrequency circuit 760, loudspeaker 761, microphone 762 can provide the audio interface between user and terminal 700.Audio Electric signal after the audio data received conversion can be transferred to loudspeaker 761, be converted to sound by loudspeaker 761 by circuit 760 Sound signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 762, after being received by voicefrequency circuit 760 Audio data is converted to, then by after the processing of audio data output processor 780, such as another end is sent to through RF circuit 710 End, or audio data is exported to memory 720 to be further processed.
WiFi belongs to short range wireless transmission technology, and terminal 700 can help user's transceiver electronics by WiFi module 770 Mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 7 is shown WiFi module 770, but it is understood that, and it is not belonging to must be configured into for terminal 700, it can according to need completely Do not change in the range of the essence of invention and omits.
Processor 780 is the control centre of terminal 700, utilizes each portion of various interfaces and the entire terminal of connection Point, by running or execute the software program and/or module that are stored in memory 720, and calls and be stored in memory 720 Interior data execute the various functions and processing data of terminal 700, to carry out integral monitoring to terminal.Optionally, processor 780 may include one or more processing units;Preferably, processor 780 can integrate application processor and modem processor, Wherein, the main processing operation system of application processor, user interface and application program etc., modem processor mainly handles nothing Line communication.It is understood that above-mentioned modem processor can not also be integrated into processor 780.
Terminal 700 further includes the power supply 782(such as battery powered to all parts), it is preferred that power supply can pass through electricity Management system and processor 782 are logically contiguous, to realize management charging, electric discharge and power consumption by power-supply management system The functions such as management.
Camera 790 is generally by groups such as camera lens, imaging sensor, interface, digital signal processor, CPU, display screens At.Wherein, camera lens is fixed on the top of imaging sensor, can change focusing by manually adjusting camera lens;Imaging sensor It is equivalent to " film " of traditional camera, is the heart of camera collection image;Interface is used for camera using winding displacement, plate to plate Connector, spring connection type are connect with terminal mainboard, and the image of acquisition is sent to the memory 720;Digital signal Processor is handled by image of the mathematical operation to acquisition, the analog image of acquisition is converted to digital picture and by connecing Mouth is sent to memory 720.
Although being not shown, terminal 700 can also be including bluetooth module etc., and details are not described herein.
Terminal 700 in addition to include one or more processor 780, further include have memory and one or more Module, one or more module are stored in memory, and are configured to be executed by one or more processor.On One or more program is stated with following function:
Show authentification of message interface, the authentification of message interface includes problem figure and at least two candidate answers figures;
Receive the dragging signal of dragging candidate answers figure to described problem figure;
Whether the drag operation that detection drags candidate answers figure to the described problem figure is correct operation;
If it is correct operation that testing result, which is, it is determined that the certification passes through.
In the first possible implementation of the present embodiment, the detection drags the candidate answers figure to described Whether the drag operation of problem figure is correct operation, comprising:
Detection drags whether the candidate answers figure to the dragging track of described problem figure is dragging correct option figure Shape is to the dragging track of described problem figure;
If testing result is to be to drag correct option figure to the dragging track of described problem figure, it is determined that the dragging Operation is correct operation.
In second of possible implementation of the present embodiment, the detection drags the candidate answers figure to described Whether the drag operation of problem figure is correct operation, comprising:
Whether the candidate answers figure of detection dragging is correct option figure corresponding with described problem figure;
If it is correct option figure corresponding with described problem figure that testing result, which is, it is determined that the drag operation is just Really operation.
In the third possible implementation of the present embodiment, the detection drags the candidate answers figure to described Before whether the drag operation of problem figure is correct operation, the method also includes:
Whether detection drags the terminal of the candidate answers figure to the dragging track of described problem figure based on described In the presumptive area of problem figure positioning;
If testing result is to execute described in the detection dragging in the presumptive area positioned based on described problem figure The step of whether drag operation of candidate answers figure to described problem figure is correct operation.
In the 4th kind of possible implementation of the present embodiment, before the display authentification of message interface, the method Further include:
Acquire finger print information;
Detect whether the finger print information matches with predetermined fingerprint information;
The step of if testing result is matching, executes the display authentification of message interface.
In the 5th kind of possible implementation of the present embodiment, the detection drags the candidate answers figure to described After whether the drag operation of problem figure is correct operation, the method also includes:
Count the number that the drag operation detected within a predetermined period of time is not correct operation;
When the number that statistics obtains reaches pre-determined number, continuing to execute for the authentification of message is locked.
In conclusion terminal provided in this embodiment receives dragging candidate answers figure by showing authentification of message interface To the dragging signal of problem figure, and whether the drag operation for detecting dragging candidate answers figure to problem figure is correctly to grasp Make, to determine that certification passes through when testing result is is correct operation;This cannot be accurately judged in the prior art by solving Secondary authentication operation is to be completed by people or the problem of completion, reached by other terminals to provide other terminals itself nothing Method complete certification authentification of message interface so that when certification by when carry out authentification of message user can only be people without being it The effect of its terminal.
It should be understood that information authenticating apparatus provided by the above embodiment and terminal be when carrying out authentification of message, only with The division progress of above-mentioned each functional module can according to need and for example, in practical application by above-mentioned function distribution by not Same functional module is completed, i.e., the internal structure of equipment is divided into different functional modules, to complete whole described above Or partial function.In addition, information authenticating apparatus provided by the above embodiment and terminal and the method for information authentication method are implemented Example belongs to same design, and specific implementation process is detailed in embodiment of the method, and which is not described herein again.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (6)

1. a kind of information authentication method, which is characterized in that the method is in terminal, the terminal to be to be equipped with to recognize with request The terminal of the application program for realizing authentication function of the application program binding of card, which comprises
Show that authentification of message interface, the authentification of message interface include problem figure, at least two candidate answers figures and to each The operation instruction of a candidate answers figure, described problem figure are used to indicate problem;
Receive the dragging signal for dragging the candidate answers figure to described problem figure;
Finger print information is acquired when dragging the candidate answers figure to described problem figure;
Detect whether the finger print information matches with predetermined fingerprint information;
If testing result is matching, the terminal of the dragging candidate answers figure to the dragging track of described problem figure is detected Whether in the presumptive area positioned based on described problem figure;
If testing result is to detect the dragging candidate answers figure in the presumptive area positioned based on described problem figure Whether it is dragging correct option figure to the dragging track of described problem figure to the dragging track of described problem figure, and detects Whether the candidate answers figure of dragging is the correct option figure corresponding with described problem figure;
If it is the dragging correct option figure to the dragging track of described problem figure that testing result, which is, and is and described problem The corresponding correct option figure of figure, it is determined that drag operation is correct operation;
If it is the correct operation that testing result, which is, it is determined that certification passes through.
2. being asked the method according to claim 1, wherein the detection drags the candidate answers figure to described Whether the dragging track for inscribing figure is after dragging correct option figure to the dragging track of described problem figure, and the method is also Include:
Count the number that the drag operation detected within a predetermined period of time is not correct operation;
When the number that statistics obtains reaches pre-determined number, continuing to execute for the authentification of message is locked.
3. a kind of information authenticating apparatus, which is characterized in that described device is in terminal, the terminal to be to be equipped with to recognize with request The terminal of the application program for realizing authentication function of the application program binding of card, described device include:
Interface display module, for showing that authentification of message interface, the authentification of message interface include problem figure, at least two times Answer graphic and the operation instruction to each candidate answers figure are selected, described problem figure is used to indicate problem;
Signal receiving module, for receiving the dragging signal of dragging candidate answers figure to described problem figure;
Track detection unit, for acquiring finger print information when dragging the candidate answers figure to described problem figure;Detection Whether the finger print information matches with predetermined fingerprint information;If testing result is matching, the dragging candidate answers figure is detected Shape to described problem figure dragging track terminal whether in the presumptive area positioned based on described problem figure;It is detecting When as a result in the presumptive area positioned based on described problem figure, detection drags the candidate answers figure to described problem Whether the dragging track of figure is dragging correct option figure to the dragging track of described problem figure, and detects the described of dragging Whether candidate answers figure is the correct option figure corresponding with described problem figure;
First determination unit is to drag the correct option figure to institute for the testing result in the track detection unit When stating the dragging track of problem figure and being the correct option figure corresponding with described problem figure, determine that drag operation is Correct operation;
Certification is by module, when being the correct operation for the testing result in first determination unit, determines certification Pass through.
4. device according to claim 3, which is characterized in that described device further include:
Number statistical module is the number of correct operation for counting the drag operation detected within a predetermined period of time not;
Locking module is authenticated, when the number for obtaining in the number statistical module counts reaches pre-determined number, described in locking Authentification of message continues to execute.
5. a kind of terminal, which is characterized in that it includes information authenticating apparatus as described in claim 3 or 4.
6. a kind of computer readable storage medium, which is characterized in that be stored with program, institute in the computer readable storage medium Program is stated for realizing information authentication method as claimed in claim 1 or 2.
CN201310505220.5A 2013-10-23 2013-10-23 Information authentication method, device and terminal Active CN104573437B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310505220.5A CN104573437B (en) 2013-10-23 2013-10-23 Information authentication method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310505220.5A CN104573437B (en) 2013-10-23 2013-10-23 Information authentication method, device and terminal

Publications (2)

Publication Number Publication Date
CN104573437A CN104573437A (en) 2015-04-29
CN104573437B true CN104573437B (en) 2018-12-28

Family

ID=53089479

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310505220.5A Active CN104573437B (en) 2013-10-23 2013-10-23 Information authentication method, device and terminal

Country Status (1)

Country Link
CN (1) CN104573437B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105657348A (en) * 2015-12-30 2016-06-08 广州励丰文化科技股份有限公司 Automatic monitoring method and system applied in multi-microphone scene
CN105635681A (en) * 2015-12-30 2016-06-01 广州励丰文化科技股份有限公司 Monitoring method and system in wearable device and multi-microphone scenes
CN107301337A (en) * 2016-04-14 2017-10-27 腾讯科技(深圳)有限公司 Information Authentication method and apparatus
CN107483208A (en) * 2016-06-08 2017-12-15 中国移动通信有限公司研究院 Generation, verification method and the device of identifying code picture
CN110198328B (en) * 2018-03-05 2021-09-21 腾讯科技(深圳)有限公司 Client identification method and device, computer equipment and storage medium
CN110138800A (en) * 2019-05-30 2019-08-16 北京金山云网络技术有限公司 Interface alternation and its verification method, log on request generation and verification method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102375651A (en) * 2010-08-13 2012-03-14 Tcl集团股份有限公司 Method for unlocking portable electronic equipment
WO2012028773A9 (en) * 2010-09-01 2012-05-31 Nokia Corporation Mode switching
CN102566881A (en) * 2010-12-31 2012-07-11 宏碁股份有限公司 Method for unlocking screen and executing application program
CN102592254A (en) * 2011-10-25 2012-07-18 上海博路信息技术有限公司 Identifying code system based on image splicing
CN102664903A (en) * 2012-05-16 2012-09-12 李明 Network user identifying method and system
CN103139204A (en) * 2012-12-19 2013-06-05 姚爱军 Network identifying code method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103259785B (en) * 2013-04-11 2015-11-18 深圳市深信服电子科技有限公司 The authentication method of virtual token and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102375651A (en) * 2010-08-13 2012-03-14 Tcl集团股份有限公司 Method for unlocking portable electronic equipment
WO2012028773A9 (en) * 2010-09-01 2012-05-31 Nokia Corporation Mode switching
CN102566881A (en) * 2010-12-31 2012-07-11 宏碁股份有限公司 Method for unlocking screen and executing application program
CN102592254A (en) * 2011-10-25 2012-07-18 上海博路信息技术有限公司 Identifying code system based on image splicing
CN102664903A (en) * 2012-05-16 2012-09-12 李明 Network user identifying method and system
CN103139204A (en) * 2012-12-19 2013-06-05 姚爱军 Network identifying code method and system

Also Published As

Publication number Publication date
CN104573437A (en) 2015-04-29

Similar Documents

Publication Publication Date Title
CN104796385B (en) Terminal binding method, apparatus and system
WO2017118437A1 (en) Service processing method, device, and system
CN104852885B (en) Method, device and system for verifying verification code
CN104468463B (en) Verification method, device and system
CN106778175B (en) Interface locking method and device and terminal equipment
WO2018032661A1 (en) Information displaying method for terminal device, and terminal device
CN106912048B (en) Access point information sharing method and device
CN104573437B (en) Information authentication method, device and terminal
CN104424431B (en) A kind of method and device resetting virtual machine user modification logging
CN108171037A (en) Using startup method, terminal and computer storage media
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN107437009A (en) Authority control method and related product
US9940448B2 (en) Unlock processing method and device
CN108475304B (en) Method and device for associating application program and biological characteristics and mobile terminal
CN104217172B (en) Privacy content inspection method and device
WO2018161540A1 (en) Fingerprint registration method and related product
WO2018214748A1 (en) Method and apparatus for displaying application interface, terminal and storage medium
CN109257336A (en) It is a kind of based on the encrypted message processing method of block chain, terminal device
CN109145552A (en) Information ciphering method and terminal device
CN108551521A (en) A kind of log-on message reminding method and mobile terminal
CN107786569A (en) A kind of identifying code sending method, method of reseptance and relevant device
CN103366104A (en) Method and device for controlling accessing of application
CN108829444A (en) A kind of method that background application is automatically closed, terminal and computer storage medium
CN107715449A (en) A kind of account login method and relevant device
CN107480495B (en) Unlocking method of mobile terminal and related product

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant