CN105577375A - Identity authentication method and device - Google Patents

Identity authentication method and device Download PDF

Info

Publication number
CN105577375A
CN105577375A CN201410534430.1A CN201410534430A CN105577375A CN 105577375 A CN105577375 A CN 105577375A CN 201410534430 A CN201410534430 A CN 201410534430A CN 105577375 A CN105577375 A CN 105577375A
Authority
CN
China
Prior art keywords
user
information
physical function
function key
authorization information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410534430.1A
Other languages
Chinese (zh)
Other versions
CN105577375B (en
Inventor
张少愚
胡育辉
袁丽娜
柯向荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201410534430.1A priority Critical patent/CN105577375B/en
Publication of CN105577375A publication Critical patent/CN105577375A/en
Application granted granted Critical
Publication of CN105577375B publication Critical patent/CN105577375B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides an identity authentication method, which is used for a mobile terminal. The identity authentication method is characterized in that confirmation information of corresponding operation of executing preset business transmitted by a server can be received; by entering an information confirmation mode, the physical function key of the mobile terminal can be used to input authentication information in the information confirmation mode; account identification of a user and authentication information input by pressing the physical function key by the user can be acquired; and the account identification and the authentication information, which can be used as the identity information, can be transmitted to the server, which can be used for the identity authentication of the identity information according to the account identification and the authentication information; when the result of the authentication is valid, the operation corresponding to the preset business can be executed. The invention also provides an identity authentication device. By adopting the identity authentication method and the identity authentication device, the safety of the identity authentication and the accuracy of the input of the authentication information can be improved.

Description

Auth method and device
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of auth method and device.
Background technology
Along with the development of computer techno-stress technology, people more and more utilize computer to be undertaken some by network to relate to the individual privacy operation relevant with property safety, such as: photograph album management, pay by mails, accounts information management etc.
In order to ensure the information security of people in aforesaid operations process, general needs, before execution aforesaid operations, carries out authentication to the user of executable operations.Existing auth method mainly carries out authentication by the authentication password (as the confirmation payment scheme that micro-letter pays and Ge great Web bank uses) or biological identification technology (as fingerprint recognition and recognition of face) that input user preset.
But carrying out authentication by the authentication password inputting user preset needs user at the screen input character of mobile terminal, and easily peeped by offender and steal, fail safe is lower.Carry out the hardware of authentication to mobile terminal by biological identification technology and have higher requirement, and be subject to the restriction of existing recognition technology level, discrimination is not high.
Summary of the invention
In view of this, the invention provides a kind of auth method and device, the fail safe of authentication and the accuracy of authorization information input can be improved.
The auth method that the embodiment of the present invention provides, is applied to mobile terminal, comprises: the confirmation of the respective operations of the preset business of execution that reception server sends; Enter validation of information pattern, under described validation of information pattern, the physical function key of described mobile terminal is appointed as input validation information; The authorization information that the account identification of acquisition user and described user input by pressing described physical function key; Described account identification and described authorization information are sent to described server as identity information, make described server according to described account identification and described authorization information, authentication is carried out to described identity information, and when being verified, performs the operation that described preset business is corresponding.
The authentication means that the embodiment of the present invention provides, runs on mobile terminal, comprising: receiver module, for the confirmation of the respective operations of the preset business of execution of reception server transmission; Designated module, for entering validation of information pattern, under described validation of information pattern, is appointed as input validation information by the physical function key of described mobile terminal; Acquisition module, the authorization information that account identification and described user for obtaining user input by pressing described physical function key; Sending module, described server is sent to as identity information for the described account identification that obtained by described acquisition module and described authorization information, make described server according to described account identification and described authorization information, authentication is carried out to described identity information, and when being verified, perform the operation that described preset business is corresponding.
The above-mentioned auth method that the embodiment of the present invention provides and device, physical function key is appointed as input validation information, obtain user by pressing the authorization information of this physical function key input and sending to server to carry out authentication, because physical function key is generally arranged on the comparatively hidden position of mobile terminal, therefore use physical function key input validation information more hidden, effectively can prevent password in input process from being peeped by people, improve the fail safe of authentication.Meanwhile, because pressing physical function key can carry out by one hand, the misoperation of user can effectively be prevented, fast accurately.
For above and other object of the present invention, feature and advantage can be become apparent, preferred embodiment cited below particularly, and coordinate institute's accompanying drawings, be described in detail below.
Accompanying drawing explanation
The applied environment figure of the auth method that Fig. 1 provides for the embodiment of the present invention and device;
Fig. 2 shows a kind of structured flowchart of mobile terminal;
The flow chart of the auth method that Fig. 3 provides for first embodiment of the invention;
The schematic diagram of operation pages is confirmed in the auth method that Fig. 4 provides for first embodiment of the invention;
The flow chart of the auth method that Fig. 5 provides for second embodiment of the invention;
The schematic diagram of the first information in the auth method that Fig. 6 provides for second embodiment of the invention;
The flow chart of the auth method that Fig. 7 provides for third embodiment of the invention;
The flow chart of the auth method that Fig. 8 provides for fourth embodiment of the invention;
The schematic diagram of the second information in the auth method that Fig. 9 provides for fourth embodiment of the invention;
The flow chart of the auth method that Figure 10 provides for fifth embodiment of the invention;
The flow chart of the auth method that Figure 11 provides for sixth embodiment of the invention;
The structural representation of the authentication means that Figure 12 provides for seventh embodiment of the invention;
The structural representation of the authentication means that Figure 13 provides for eighth embodiment of the invention.
Embodiment
For further setting forth the present invention for the technological means that realizes predetermined goal of the invention and take and effect, below in conjunction with accompanying drawing and preferred embodiment, to according to the specific embodiment of the present invention, structure, feature and effect thereof, be described in detail as follows.
Refer to Fig. 1, the applied environment figure of the auth method that Fig. 1 embodiment of the present invention provides and device.As shown in Figure 1, server 100 and mobile terminal 200 are arranged in wireless or cable network, wireless or cable network by this, and server 100 and mobile terminal 200 carry out data interaction.The confirmation of the respective operations of the preset business of execution that mobile terminal 200 reception server 100 sends; Enter validation of information pattern, under this validation of information pattern, the physical function key of mobile terminal 200 is appointed as input validation information; The authorization information that the account identification of acquisition user and this user input by pressing this physical function key; To identify the account and this authorization information sends to server 100 as identity information, and to make server 100 according to account mark and this authorization information, authentication is carried out to this identity information, and when being verified, performs the operation that this preset business is corresponding.
Fig. 2 shows a kind of structured flowchart of mobile terminal.As shown in Figure 2, mobile terminal 200 comprises: memory 202, storage control 204, one or more (only illustrating one in figure) processor 206, Peripheral Interface 208, radio-frequency module 210, audio-frequency module 212, display module 214 and key-press module 216.These assemblies are by one or more communication bus/holding wire 218 communication mutually.
Be appreciated that the structure shown in Fig. 2 is only signal, mobile terminal 200 also can comprise than assembly more or less shown in Fig. 2, or has the configuration different from shown in Fig. 2.Each assembly shown in Fig. 2 can adopt hardware, software or its combination to realize.
Memory 202 can be used for storing software program and module, as the auth method in the embodiment of the present invention and program command/module corresponding to device, processor 206 is by running the software program and module that are stored in memory 202, thus perform the application of various function and data processing, namely realize above-mentioned auth method.
Memory 202 can comprise high speed random asccess memory, also can comprise nonvolatile memory, as one or more magnetic storage device, flash memory or other non-volatile solid state memories.In some instances, memory 202 can comprise the memory relative to the long-range setting of processor 206 further, and these remote memories can be connected to mobile terminal 200 by network.The example of above-mentioned network includes but not limited to the Internet, intranet, local area network (LAN), mobile radio communication and combination thereof.Processor 206 and other possible assemblies can carry out the access of memory 202 under the control of storage control 204.
Various softwares in processor 206 run memory 202, instruction are to perform the various function of mobile terminal 200 and to carry out data processing.
Peripheral Interface 208 is for being coupled to CPU and memory 202 by various external equipment.
In certain embodiments, storage control 204, processor 206 and Peripheral Interface 208 can realize in one single chip.In some other example, they can respectively by independently chip realization.
Radio-frequency module 210, for receiving and sending electromagnetic wave, realizes the mutual conversion of electromagnetic wave and the signal of telecommunication, thus carries out communication with communication network or other equipment.Radio-frequency module 210 can comprise the various existing circuit element for performing these functions, such as, and antenna, radio-frequency (RF) transceiver, digital signal processor, encrypt/decrypt chip, subscriber identity module (SIM) card, memory etc.Radio-frequency module 210 can with various network as the Internet, intranet, wireless network carry out communication or carry out communication by wireless network and other equipment.Above-mentioned wireless network can comprise cellular telephone networks, WLAN (wireless local area network) or metropolitan area network.Above-mentioned wireless network can use various communication standard, agreement and technology, include, but are not limited to global system for mobile communications (GlobalSystemforMobileCommunication, GSM), enhancement mode mobile communication technology (EnhancedDataGSMEnvironment, EDGE), Wideband CDMA Technology (widebandcodedivisionmultipleaccess, W-CDMA), CDMA (Code Division Multiple Access) (Codedivisionaccess, CDMA), tdma (timedivisionmultipleaccess, TDMA), bluetooth, adopting wireless fidelity technology (Wireless, Fidelity, WiFi) (as IEEE-USA standard IEEE 802.11a, IEEE802.11b, IEEE802.11g and/or IEEE802.11n), the networking telephone (Voiceoverinternetprotocol, VoIP), worldwide interoperability for microwave access (WorldwideInteroperabilityforMicrowaveAccess, Wi-Max), other are for mail, the agreement of instant messaging and short message, and any other suitable communications protocol, even can comprise those current agreements be developed not yet.
Audio-frequency module 212 provides audio interface to user, and it can comprise one or more microphone, one or more loud speaker and voicefrequency circuit.Voicefrequency circuit receives voice data from Peripheral Interface 208, voice data is converted to telecommunications breath, and telecommunications breath is transferred to loud speaker.Telecommunications breath is changed the sound wave can heard into people's ear by loud speaker.Voicefrequency circuit also from microphone receive telecommunications breath, convert electrical signals to voice data, and by data transmission in network telephony to Peripheral Interface 208 to be further processed.Voice data can obtain from memory 202 or by radio-frequency module 210.In addition, voice data also can be stored in memory 202 or by radio-frequency module 210 and send.In some instances, audio-frequency module 212 also can comprise an earphone and broadcast hole, for providing audio interface to earphone or other equipment.
Display module 214 provides an output interface between mobile terminal 200 and user, and export to user's display video, the content of these video frequency output can comprise word, figure, video and combination in any thereof.Some Output rusults correspond to some user interface object.Understandable, display module 214 can also provide one to export and inputting interface between mobile terminal 200 and user simultaneously.Particularly, except exporting to user's display video, display module 214 also receives the input of user, and the gesture operation such as click, slip of such as user, so that response is made in the input of user interface object to these users.The technology detecting user's input can be based on resistance-type, condenser type or other touch control detection technology possible arbitrarily.The instantiation of display module 214 display unit includes, but are not limited to liquid crystal display or light emitting polymer displays.
Key-press module 216 provides user to carry out the interface inputted to mobile terminal 200 equally, and user can perform different functions by pressing different buttons to make mobile terminal 200.
Mobile terminal 200 can comprise: have physical function button and the smart mobile phone of network enabled transfer of data, panel computer, E-book reader, MP3 player (MovingPictureExpertsGroupAudioLayerIII, dynamic image expert compression standard audio frequency aspect 3), MP4 (MovingPictureExpertsGroupAudioLayerIV, dynamic image expert compression standard audio frequency aspect 4) player, pocket computer on knee, vehicle-mounted computer, wearable device, navigator etc.For ease of illustrating, for convenience of description, following embodiment is all for smart mobile phone.
First embodiment
Refer to Fig. 3, the flow chart of the auth method that Fig. 3 provides for first embodiment of the invention.The auth method that the present embodiment provides, can be applicable in the mobile terminal 200 shown in Fig. 1.As shown in Figure 3, the method comprises:
Step S101, the confirmation of the respective operations of the preset business of execution that reception server sends;
The client for providing preset business for user is preset in mobile terminal 200, by this client can reception server 100 send the interactive information relevant with preset business and be shown to user, obtain user's input interactive information relevant with this preset business and send to server 100, think that user provides preset business, such as: instant communication client, Alipay client, wealth pay client terminal etc.
In the present embodiment, preset business can comprise the specific transactions relevant with the individual privacy of user or property safety, as: E-Payment, Password Management etc.
Perform the confirmation of the respective operations of preset business for being confirmed whether to perform the respective operations of preset business.
Step S102, enters validation of information pattern, under this validation of information pattern, is appointed as input validation information by the physical function key of mobile terminal;
Under validation of information pattern, the physical function key of mobile terminal 200 is designated as input validation information.It is the shielding system environment created by Intel Virtualization Technology that this validation of information pattern may be, but is not limited to, as: sandbox.Because the physical function key of mobile terminal 200 generally has specific purposes, for avoiding producing conflict, affect the normal input of authorization information, mobile terminal 200 is after the confirmation of the respective operations of the preset business of this execution sent by client reception server 100, enter validation of information pattern, under this validation of information pattern, physical function key is appointed as input validation information, generate " confirmation operation pages " (as shown in Figure 4) according to this confirmation received simultaneously and be shown to user by this client, make this user can under the guiding of this confirmation operation pages, by pressing physical function key input validation information, and the account identification of this authorization information and this user is sent to server 100 by indicating mobile terminal 200, to carry out authentication.
Step S103, the authorization information that the account identification of acquisition user and this user input by pressing this physical function key;
Mobile terminal 200 obtains the account identification of the account identification input area input of the confirmation operation pages of user shown in Fig. 4 by client, the account, mark included but not limited to: this user is at the finance account of operator's place's registration of preset business or other service accounts of associating with this finance account, as: micro-letter account, the instant messaging account number, cell-phone number etc. that associate with micro-letter account number.
This physical function key is the physical button on mobile terminal 200, include but not limited to: volume adjusting key, power key (on & off switch), camera key, return key, Menu key, main screen key, back spacer, search key, cross key and quiet key etc., but do not comprise the function key of the keyboard area for inputting the character such as numeral, letter, as: the function key on the full keyboard of Nokia N97mini, function key of the keyboard area of blackberry, blueberry Q20Classic etc.Preferably, this physical function key is the physical button of each side (top, bottom, left and right four sides) being arranged on mobile terminal 200, as: the power key being arranged on mobile terminal 200 top-side, the volume adjusting key, camera key etc. on left side or right side.
When the event obtaining authorization information is triggered, whether mobile terminal 200 detects has this physical function key to be pressed, obtain the position code of the physical function key be pressed, this position code is converted to corresponding key assignments, which button what determine that user presses according to this key assignments is, and according to preset transformation rule, this key assignments is converted to corresponding digital code, as the authorization information of user's input.Understandably, the event of this acquisition authorization information can be clicked in the confirmation operation pages shown in Fig. 4 because of user " ACK button " triggers.
Preferably, this user can by repeatedly pressing the combination in any input validation information of the button of at least two kinds of difference in functionalitys in this physical function key.Such as: assuming that represents two volume adjusting keys with "+" number and "-" number, represents on & off switch with " * " number, then user can input default authorization information by repeatedly pressing volume adjusting key and on & off switch, as: " ++--+-+-* * ".
Step S104, to identify the account and this authorization information sends to this server as identity information, and to make this server according to account mark and this authorization information, authentication is carried out to this identity information, and when being verified, perform the operation that this preset business is corresponding.
The identity information that server 100 mobile terminal receive 200 sends, the account identification of the account identification in this identity information and authorization information and user preset and authorization information are compared, to carry out authentication to this identity information, and when the account in this identity information, mark was consistent with the account identification of this authorization information and user preset and authorization information, confirmation is verified, and performs the operation that this preset business is corresponding.
The auth method that the embodiment of the present invention provides, physical function key is appointed as input validation information, obtain user by pressing the authorization information of this physical function key input and sending to server to carry out authentication, because physical function key is generally arranged on the comparatively hidden position of mobile terminal, therefore use physical function key input validation information more hidden, effectively can prevent password in input process from being peeped by people, improve the fail safe of authentication.Meanwhile, because pressing physical function key can carry out by one hand, the misoperation of user can effectively be prevented, fast accurately.
Second embodiment
Refer to Fig. 5, the flow chart of the auth method that Fig. 5 provides for second embodiment of the invention.The auth method that the present embodiment provides, can be applicable in the mobile terminal 200 shown in Fig. 1.As shown in Figure 5, the method comprises:
Step S201, the confirmation of the respective operations of the preset business of execution that reception server sends;
Step S202, enters validation of information pattern, under this validation of information pattern, is appointed as input validation information by the physical function key of this mobile terminal;
Step S203, the authorization information that the account identification of acquisition user and this user input by pressing this physical function key;
Step S201 to step S203 is identical to step S103 with the step S101 in the first embodiment, repeats no more herein.
Step S204, when detecting that this user terminates the action pressing this physical function key, judges whether the compression number of now this user equals the first preset numerical value;
Particularly, after detecting that this user completes the action once pressing this physical function key, the action that preset time period does not carry out pressing this physical function key again if exceed, then determine that this user terminates to press the action of this physical function key.Such as: after detecting that user has pressed an on & off switch, if more than 20 seconds, this user does not carry out the action pressing any physical function key again, then determine that this user terminates to press the action of this physical function key.
The first preset numerical value is the figure place of the authorization information being preset in the whether correct standard of identity information sent as checking mobile terminal 200 in server 100, and the authorization information that wherein user presses a physical function key input is regarded as one.For example, suppose that user has pressed 6 physical function keys, then the authorization information inputted is 6.This first numerical value when sending the confirmation of the respective operations performing preset business, can together be sent to mobile terminal 200 by server 100.
If equal this first numerical value, then perform step S205: will to identify the account and this authorization information sends to this server as identity information;
When detecting that this user terminates the action pressing this physical function key, if now the compression number of (when namely this user terminates push action) this user equals the first preset numerical value, then using the account mark and this user by pressing this physical function key input this authorization information send to server 100 as identity information, server 100 was identified and this authorization information according to the account, authentication is carried out to this identity information, and when being verified, perform the operation that this preset business is corresponding.
Further, before sending, mobile terminal 200 can according to preset encryption rule encrypting user this authorization information by the input of this physical function key of pressing, to improve the fail safe of this authorization information, and this authorization information after encryption and the account are identified and send to this server 100 as identity information.
This authorization information after the encryption that server 100 mobile terminal receive 200 sends and the account identify, this authorization information is obtained by this authorization information after deciphering this encryption, by the account mark and the account identification of this authorization information and user preset and authorization information compare, to carry out authentication to this identity information, and when the account in this identity information, mark was consistent with the account identification of this authorization information and user preset and authorization information, confirmation is verified, and performs operation corresponding to this preset business.
If be greater than or less than this first numerical value, then perform step S206: show the first information, the authorization information mistake that this first information inputs for pointing out this user.
When detecting that this user terminates the action pressing this physical function key, if now the compression number of (when namely this user terminates push action) this user is greater than or less than this first numerical value, then show the first information (as shown in Figure 6), the authorization information mistake that this first information inputs for pointing out this user, and guide user re-enter password or return.
The auth method that the embodiment of the present invention provides, physical function key is appointed as input validation information, obtain user by pressing the authorization information of this physical function key input and sending to server to carry out authentication, because physical function key is generally arranged on the comparatively hidden position of mobile terminal, therefore use physical function key input validation information more hidden, effectively can prevent password in input process from being peeped by people, improve the fail safe of authentication.Meanwhile, because pressing physical function key can carry out by one hand, the misoperation of user can effectively be prevented, fast accurately.
3rd embodiment
Refer to Fig. 7, the flow chart of the auth method that Fig. 7 provides for third embodiment of the invention.The auth method that the present embodiment provides, can be applicable in the mobile terminal 200 shown in Fig. 1.As shown in Figure 7, the method comprises:
Step S301, the confirmation of the respective operations of the preset business of execution that reception server sends;
Step S302, enters validation of information pattern, under this validation of information pattern, is appointed as input validation information by the physical function key of this mobile terminal;
Step S303, the authorization information that the account identification of acquisition user and this user input by pressing this physical function key;
Step S301 to step S303 is identical to step S103 with the step S101 in the first embodiment, repeats no more herein.
Step S304, adds up the number of times that this user presses this physical function key, when this number of times equals preset second value, will to identify the account and this authorization information sends to this server as identity information.
Preset second value is the figure place of the authorization information being preset in the whether correct standard of identity information sent as checking mobile terminal 200 in server 100, and the authorization information that wherein user presses a physical function key input is regarded as one.For example, suppose that user has pressed 6 physical function keys, then the authorization information inputted is 6.This second value when sending the confirmation of the respective operations performing preset business, can together be sent to mobile terminal 200 by server 100.
Understandably, during waiting for that user completes secondary this physical function key of pressing of this second value, the halt instruction that can be triggered by pressing return key according to user, stops the input of authorization information.
Further, before sending, mobile terminal 200 can according to preset encryption rule encrypting user this authorization information by the input of this physical function key of pressing, to improve the fail safe of this authorization information, and this authorization information and the account after encryption is identified send to this server 100 as identity information, server 100 was identified and this authorization information according to the account, authentication is carried out to this identity information, and when being verified, perform the operation that this preset business is corresponding.
This authorization information after the encryption that server 100 mobile terminal receive 200 sends and the account identify, this authorization information is obtained by this authorization information after deciphering this encryption, by the account mark and the account identification of this authorization information and user preset and authorization information compare, to carry out authentication to this identity information, and when the account in this identity information, mark was consistent with the account identification of this authorization information and user preset and authorization information, confirmation is verified, and performs operation corresponding to this preset business.
The auth method that the embodiment of the present invention provides, physical function key is appointed as input validation information, obtain user by pressing the authorization information of this physical function key input and sending to server to carry out authentication, because physical function key is generally arranged on the comparatively hidden position of mobile terminal, therefore use physical function key input validation information more hidden, effectively can prevent password in input process from being peeped by people, improve the fail safe of authentication.Meanwhile, because pressing physical function key can carry out by one hand, the misoperation of user can effectively be prevented, fast accurately.
4th embodiment
Refer to Fig. 8, the flow chart of the auth method that Fig. 8 provides for fourth embodiment of the invention.The auth method that the present embodiment provides, can be applicable in the mobile terminal 200 shown in Fig. 1.As shown in Figure 8, the method comprises:
Step S401, the confirmation of the respective operations of the preset business of execution that reception server sends;
Step S402, enters validation of information pattern, under this validation of information pattern, is appointed as input validation information by the physical function key of this mobile terminal;
Step S403, the authorization information that the account identification of acquisition user and this user input by pressing this physical function key;
Step S401 to step S403 is identical to step S103 with the step S101 in the first embodiment, repeats no more herein.
Step S404, when detecting that this user terminates the action pressing this physical function key, judges whether the compression number of now this user is greater than preset third value;
Particularly, after detecting that this user completes the action once pressing this physical function key, the action that preset time period does not carry out pressing this physical function key again if exceed, then determine that this user terminates to press the action of this physical function key, judge whether the compression number of now (when namely this user terminates push action) this user is greater than preset third value.Such as: after detection user has pressed an on & off switch, if more than 20 seconds, this user does not carry out the action pressing physical function key again, then determine that this user terminates to press the action of this physical function key.
Understandably, third value is greater than the figure place of the authorization information being preset in standard whether correct as the identity information of checking mobile terminal 200 transmission in server 100.
If now the compression number of this user is greater than this third value, then perform step S405: judge whether the physical function key that this user presses for the last time is the first default specified button;
If the physical function key that this user presses for the last time is this first specified button, then perform step S406: are identified preset the authorization information by the input of this physical function key of pressing and the account before this user in this authorization information and send to this server as identity information;
If the physical function key that this user presses for the last time is this first specified button, then preset the authorization information by the input of this physical function key of pressing and the account before this user in this authorization information identify and send to server 100 as identity information by mobile terminal 200, server 100 was identified and this authorization information according to the account, authentication is carried out to this identity information, and when being verified, perform the operation that this preset business is corresponding.
Further, before sending, mobile terminal 200 can encrypt authorization information to be sent according to preset encryption rule, to improve the fail safe of this authorization information, and this authorization information after encryption and the account is identified and sends to this server 100 as identity information.
This authorization information after the encryption that server 100 mobile terminal receive 200 sends and the account identify, this authorization information is obtained by this authorization information after deciphering this encryption, by the account mark and the account identification of this authorization information and user preset and authorization information compare, to carry out authentication to this identity information, and when the account in this identity information, mark was consistent with the account identification of this authorization information and user preset and authorization information, confirmation is verified, and performs operation corresponding to this preset business.
If the physical function key that this user presses for the last time is not this first specified button, then perform step S407: show the second information, the physical function key error that this second information presses for the last time for pointing out this user;
If the physical function key that this user presses for the last time is not this first specified button, then show the second information (as shown in Figure 9), the physical function key error that this second information presses for the last time for pointing out this user, and guide user re-enter password or return.Here, the action pressing this first specified button is equivalent to send confirmation and sends the instruction of identity information to mobile terminal 200, with instruction mobile terminal 200, identity information is sent to server 100.
If now the compression number of user is less than or equal to this third value, then perform step S408: display the 3rd information, the authorization information mistake that the 3rd information inputs for pointing out this user.
The suggestion content of the 3rd information can be identical with the first information shown in Fig. 6.
For example, assuming that the authorization information of user preset be 6 (also namely preset time be 6 times), third value is 8, first specified button is on & off switch, again do not press other physical function keys in preset duration after pressing physical function key 10 times according to detection user, can determine that user has terminated to press the action of physical function key thus.Now, the number of times 10 pressing physical function key due to user is greater than third value 8, whether what the key assignments of physical function key that then mobile terminal 200 presses for the last time according to the user detected judged that this user presses for the last time is on & off switch, if on & off switch, then obtain this user and send to server 100 as identity information by front 6 authorization informations (authorization information of also i.e. the 1-6 time pressing physical function key input) in the authorization information of these 10 times pressing physical function keys input together with the account identifies; If not on & off switch, then show the second information shown in Fig. 9, the physical function key error pressed for the last time to point out this user, and guide user re-enter password or return.
The auth method that the embodiment of the present invention provides, physical function key is appointed as input validation information, obtain user by pressing the authorization information of this physical function key input and sending to server to carry out authentication, because physical function key is generally arranged on the comparatively hidden position of mobile terminal, therefore use physical function key input validation information more hidden, effectively can prevent password in input process from being peeped by people, improve the fail safe of authentication.Meanwhile, because pressing physical function key can carry out by one hand, the misoperation of user can effectively be prevented, fast accurately.
5th embodiment
Refer to Figure 10, the flow chart of the auth method that Figure 10 provides for fifth embodiment of the invention.The auth method that the present embodiment provides, can be applicable in the mobile terminal 200 shown in Fig. 1.As shown in Figure 10, the method comprises:
Step S501, the confirmation of the respective operations of the preset business of execution that reception server sends;
Step S502, enters validation of information pattern, under this validation of information pattern, is appointed as input validation information by the physical function key of this mobile terminal;
Step S503, the authorization information that the account identification of acquisition user and this user input by pressing this physical function key;
Step S501 to step S503 is identical to step S103 with the step S101 in the first embodiment, repeats no more herein.
Step S504, when detecting that this user presses the second default specified button, this user in this authorization information being identified by the authorization information and the account pressing other physical function keys input except this second specified button and sends to this server as identity information.
Second specified button can be preset according to the instruction that arranges of user.For example, assuming that the second specified button is camera key, when detecting that user presses camera key, this user being pressed before camera key and identifying with the account send to server 100 by the authorization information of other physical function keys of pressing input together with this identity information.
Further, before sending, mobile terminal 200 can encrypt authorization information to be sent according to preset encryption rule, to improve the fail safe of this authorization information, and this authorization information after encryption and the account is identified and sends to this server 100 as identity information.
This authorization information after the encryption that server 100 mobile terminal receive 200 sends and the account identify, this authorization information is obtained by this authorization information after deciphering this encryption, by the account mark and the account identification of this authorization information and user preset and authorization information compare, to carry out authentication to this identity information, and when the account in this identity information, mark was consistent with the account identification of this authorization information and user preset and authorization information, confirmation is verified, and performs operation corresponding to this preset business.
Understandably, above-mentioned Fig. 4, Fig. 6 and Fig. 9 are only a kind of example, in practical application, confirm that the concrete manifestation form of operation pages, the first information, the second information and the 3rd information can be not limited thereto.
The auth method that the embodiment of the present invention provides, physical function key is appointed as input validation information, obtain user by pressing the authorization information of this physical function key input and sending to server to carry out authentication, because physical function key is generally arranged on the comparatively hidden position of mobile terminal, therefore use physical function key input validation information more hidden, effectively can prevent password in input process from being peeped by people, improve the fail safe of authentication.Meanwhile, because pressing physical function key can carry out by one hand, the misoperation of user can effectively be prevented, fast accurately.
6th embodiment
Refer to Figure 11, the flow chart of the auth method that Figure 11 provides for sixth embodiment of the invention.The present embodiment is the scene shifting this practical application for numerical value, to the explanation that auth method provided by the invention carries out, wherein service server 300 is the server for providing resource transfers business under line, as the server of Taobao's transaction platform, server 100 for providing the server of numerical value transfer service, as the server of each bank or Third-party payment platform.As shown in figure 11, the auth method that the present embodiment provides comprises:
Step S601, the transmission instruction that mobile terminal 200 triggers according to user, to send under line resource transfers request to service server 300, comprises the mark of resource under line to be transferred under this line in resource transfers request;
Step S602, service server 300 is according to the mark of resource under this line to be transferred, obtain the account identification of the provider of resource under this line to be transferred and numerical value to be transferred, under the line to be transferred using this, the account identification of the mark of resource, this provider, the IP address of mobile terminal 200, this numerical value to be transferred send to server 100 as numerical value transinformation together with confirmation numerical value transfer request, perform numerical value transfer operation with request server 100 according to this numerical value transinformation;
Step S603, server 100 receives the numerical value transinformation of service server 300 transmission and confirmation numerical value transfer request, generate and send according to this numerical value transinformation and confirm that numerical value transinformation is to mobile terminal 200, in this confirmation numerical value transinformation, comprise the account identification of the mark of resource under this line to be transferred, this numerical value to be transferred, this provider;
Step S604, the confirmation numerical value transinformation that mobile terminal 200 is sent by client reception server 100, obtains the identity information of user and sends to server 100;
Particularly, this step can comprise the following steps:
The first step: the confirmation numerical value transinformation that mobile terminal 200 is sent by client reception server 100;
Preset in mobile terminal 200 and can be used for for user provides the client of numerical value transfer service, as: Alipay client, wealth pay client terminal etc.
Confirm that numerical value transinformation is used for being confirmed whether to perform numerical value transfer operation, as: whether perform the operation numerical value in the account of this user being transferred to destiny account.
Second step: enter validation of information pattern, under this validation of information pattern, is appointed as input validation information by the physical function key of this mobile terminal;
The physical function key of the mobile terminal 200 under validation of information pattern is designated as input validation information.It is the shielding system environment created by Intel Virtualization Technology that this validation of information pattern may be, but is not limited to, as: sandbox.Because the physical function key of mobile terminal 200 generally has specific purposes, for avoiding producing conflict, affect the normal input of authorization information, mobile terminal 200 is after the confirmation numerical value transinformation sent by client reception server 100, enter validation of information pattern, under this validation of information pattern, physical function key is appointed as input validation information, generate according to this confirmation received simultaneously and confirm operation pages (as shown in Figure 4) and be shown to user by this client, make this user can under the guiding of this confirmation operation pages, by pressing physical function key input validation information, and the account identification of this authorization information and this user is sent to server 100 by indicating mobile terminal 200, to carry out authentication.
3rd step: the authorization information that the account identification of acquisition user and this user input by pressing this physical function key;
Mobile terminal 200 obtains the account identification of the account identification input area input of the confirmation operation pages of user shown in Fig. 4 by client, the account, mark comprised: the Bank Account Number that this user opens in bank, the financial account that user opens in Third-party payment mechanism, or the account identification to associate with this finance account, as with the instant messaging account number, E-mail address, cell-phone number etc. that enter account and associate.
This physical function key is the physical button of each side (top, bottom, left and right four sides) being arranged on mobile terminal 200, as: the power key being arranged on mobile terminal 200 top-side, the volume adjusting key, camera key etc. on left side or right side.
When the event obtaining authorization information is triggered, whether mobile terminal 200 detects has this physical function key to be pressed, obtain the position code of the physical function key be pressed, this position code is converted to corresponding key assignments, which button what determine that user presses according to this key assignments is, and according to preset transformation rule, this key assignments is converted to corresponding digital code, as the authorization information of user's input.Understandably, the event of this acquisition authorization information can be clicked in the confirmation operation pages shown in Fig. 4 because of user " ACK button " triggers.
This authorization information can be inputted by the combination in any repeatedly pressing the button of at least two kinds of difference in functionalitys in this physical function key by this user.Such as: assuming that represents two volume adjusting keys with "+" number and "-" number, represents on & off switch with " * " number, then user can input default authorization information by repeatedly pressing volume adjusting key and on & off switch, as: " ++--+-+-* * ".
4th step: will identify the account and send to this server with this authorization information as identity information, this server was identified and this authorization information according to the account in this identity information, authentication is carried out to this identity information, and when being verified, confirms the operation performing numerical value transfer.
This step is identical with the step S104 of the first embodiment, repeats no more herein.
Step S605, this identity information that server 100 mobile terminal receive 200 sends, by in this identity information the account mark and the account identification of this authorization information and user preset and authorization information compare, to carry out authentication to this identity information, and when the account in this identity information, mark was consistent with the account identification of this authorization information and user preset and authorization information, confirmation is verified, and perform the operation of numerical value transfer, according to provider's account identification of resource under the account identification of this user and this line, numerical value to be transferred in the account of this user is transferred to the account of this provider, send the information confirming the operation performing the transfer of this numerical value to mobile terminal 200 simultaneously.
The auth method that the embodiment of the present invention provides, physical function key is appointed as input validation information, obtain user by pressing the authorization information of this physical function key input and sending to server to carry out authentication, because physical function key is generally arranged on the comparatively hidden position of mobile terminal, therefore use physical function key input validation information more hidden, effectively can prevent password in input process from being peeped by people, improve the fail safe of authentication.Meanwhile, because pressing physical function key can carry out by one hand, the misoperation of user can effectively be prevented, fast accurately.
7th embodiment
The structural representation of the authentication means that Figure 12 provides for seventh embodiment of the invention.The authentication means that the present embodiment provides can run in the mobile terminal 200 shown in Fig. 1, for realizing the auth method in above-described embodiment.As shown in figure 12, authentication means 70 comprises:
Receiver module 71, for the confirmation of the respective operations of the preset business of execution of reception server transmission;
Designated module 72, for entering validation of information pattern, under this validation of information pattern, is appointed as input validation information by the physical function key of this mobile terminal;
Acquisition module 73, the authorization information that account identification and this user for obtaining user input by pressing this physical function key;
Sending module 74, the account for being obtained by acquisition module 73 identifies and this authorization information sends to this server as identity information, this server was identified and this authorization information according to the account, authentication is carried out to this identity information, and when being verified, perform the operation that this preset business is corresponding.
The present embodiment, to the detailed process of each Implement of Function Module of authentication means 70 function separately, refers to the particular content of above-mentioned Fig. 1 to middle description embodiment illustrated in fig. 11, repeats no more herein.
The authentication means that the embodiment of the present invention provides, physical function key is appointed as input validation information, obtain user by pressing the authorization information of this physical function key input and sending to server to carry out authentication, because physical function key is generally arranged on the comparatively hidden position of mobile terminal, therefore use physical function key input validation information more hidden, effectively can prevent password in input process from being peeped by people, improve the fail safe of authentication.Meanwhile, because pressing physical function key can carry out by one hand, the misoperation of user can effectively be prevented, fast accurately.
8th embodiment
The structural representation of the authentication means that Figure 13 provides for eighth embodiment of the invention.The authentication means that the present embodiment provides can run in the mobile terminal 200 shown in Fig. 1, for realizing the auth method in above-described embodiment.As shown in figure 13, authentication means 80 comprises:
Receiver module 71, for the confirmation of the respective operations of the preset business of execution of reception server transmission;
Designated module 72, for entering validation of information pattern, under this validation of information pattern, is appointed as input validation information by the physical function key of this mobile terminal;
Acquisition module 73, the authorization information that account identification and this user for obtaining user input by pressing this physical function key;
Sending module 74, the account for being obtained by acquisition module 73 identifies and this authorization information sends to this server as identity information, this server was identified and this authorization information according to the account, authentication is carried out to this identity information, and when being verified, perform the operation that this preset business is corresponding.
Preferably, this physical function key comprises the physical button of each side being arranged on this mobile terminal.
Preferably, acquisition module 73, also for obtaining this user by repeatedly pressing this authorization information of the combination in any input of the button of at least two kinds of difference in functionalitys in this physical function key.
Preferably, authentication means 80 also comprises:
Judge module 85, for when detecting that this user terminates the action pressing this physical function key, judges whether the compression number of now this user equals the first preset numerical value;
Sending module 74, if also judge that the compression number of now this user equals this first numerical value for judge module 85, then will to identify and this authorization information sends to this server as this identity information the account;
Display module 86, if judge that the compression number of now this user is greater than or less than this first numerical value for judge module 85, then shows the first information, the authorization information mistake that this first information inputs for pointing out this user.
Preferably, authentication means 80 also comprises:
Statistical module 87, presses the number of times of this physical function key for adding up this user;
Sending module 74, also for when this number of times that statistical module 87 is added up equals preset second value, will to identify and this authorization information sends to this server as this identity information the account.
Preferably, judge module 85, also for when detecting that this user terminates the action pressing this physical function key, judges whether the compression number of now this user is greater than preset third value;
Judge module 85, if be also greater than this third value for the compression number of now this user, then judges whether the physical function key that this user presses for the last time is the first default specified button;
Sending module 74, if also judge that the physical function key that this user presses for the last time is this first specified button for judge module 85, then preset the authorization information by the input of this physical function key of pressing and the account before this user in this authorization information are identified and send to this server as this identity information;
Display module 86, if also judge that the physical function key that this user presses for the last time is not this first specified button for judge module 85, then shows the second information, the physical function key error that this second information presses for the last time for pointing out this user;
Display module 86, if also judge that the compression number of now this user is less than or equal to this third value for judge module 85, then shows the 3rd information, the authorization information mistake that the 3rd information inputs for pointing out this user.
Preferably, sending module 74, also for when detecting that this user presses the second default specified button, this user in this authorization information being identified by the authorization information and the account pressing other physical function keys input except this second specified button and sends to this server as this identity information.
Preferably, judge module 85, also for after detecting that this user completes the action once pressing this physical function key, the action that preset time period does not carry out pressing this physical function key again if exceed, then determine that this user terminates to press the action of this physical function key.
Preferably, authentication means 80 also comprises:
Encrypting module 88, for encrypting this authorization information according to preset rule;
Sending module 74, also identifies for this authorization information after being encrypted by encrypting module 87 and the account and sends to this server as this identity information.
The present embodiment, to the detailed process of each Implement of Function Module of authentication means 80 function separately, refers to the particular content of above-mentioned Fig. 1 to middle description embodiment illustrated in fig. 11, repeats no more herein.
The authentication means that the embodiment of the present invention provides, physical function key is appointed as input validation information, obtain user by pressing the authorization information of this physical function key input and sending to server to carry out authentication, because physical function key is generally arranged on the comparatively hidden position of mobile terminal, therefore use physical function key input validation information more hidden, effectively can prevent password in input process from being peeped by people, improve the fail safe of authentication.Meanwhile, because pressing physical function key can carry out by one hand, the misoperation of user can effectively be prevented, fast accurately.
It should be noted that, each embodiment in this specification all adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar part mutually see.For device class embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, relevant part illustrates see the part of embodiment of the method.
It should be noted that, in this article, the such as relational terms of first and second grades and so on is only used for an entity or operation to separate with another entity or operating space, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or device and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or device.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the device comprising key element and also there is other identical element.
One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can have been come by hardware, the hardware that also can carry out instruction relevant by program completes, program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium mentioned can be read-only memory, disk or CD etc.
Above, it is only preferred embodiment of the present invention, not any pro forma restriction is done to the present invention, although the present invention discloses as above with preferred embodiment, but and be not used to limit the present invention, any those skilled in the art, do not departing within the scope of technical solution of the present invention, make a little change when the technology contents of above-mentioned announcement can be utilized or be modified to the Equivalent embodiments of equivalent variations, in every case be do not depart from technical solution of the present invention content, according to any simple modification that technical spirit of the present invention is done above embodiment, equivalent variations and modification, all still belong in the scope of technical solution of the present invention.

Claims (18)

1. an auth method, is applied to mobile terminal, it is characterized in that, comprising:
The confirmation of the respective operations of the preset business of execution that reception server sends;
Enter validation of information pattern, under described validation of information pattern, the physical function key of described mobile terminal is appointed as input validation information;
The authorization information that the account identification of acquisition user and described user input by pressing described physical function key;
Described account identification and described authorization information are sent to described server as identity information, make described server according to described account identification and described authorization information, authentication is carried out to described identity information, and when being verified, performs the operation that described preset business is corresponding.
2. method according to claim 1, is characterized in that, described physical function key comprises the physical button of each side being arranged on described mobile terminal.
3. method according to claim 2, is characterized in that, obtains described user and is comprised by the authorization information of the described physical function key input of pressing:
Obtain described user by repeatedly pressing the described authorization information of the combination in any input of the button of at least two kinds of difference in functionalitys in described physical function key.
4. method according to claim 3, is characterized in that, describedly sends to described server to comprise as identity information described account identification and described authorization information:
When detecting that described user terminates the action pressing described physical function key, judge whether the compression number of now described user equals the first preset numerical value;
If equal described first numerical value, then described account identification and described authorization information are sent to described server as described identity information;
If be greater than or less than described first numerical value, then show the first information, the authorization information mistake that described first information inputs for pointing out described user.
5. method according to claim 3, is characterized in that, describedly sends to described server also to comprise as identity information described account identification and described authorization information:
Add up the number of times that described user presses described physical function key;
When described number of times equals preset second value, described account identification and described authorization information are sent to described server as described identity information.
6. method according to claim 3, is characterized in that, describedly sends to described server also to comprise as identity information described account identification and described authorization information:
When detecting that described user terminates the action pressing described physical function key, judge whether the compression number of now described user is greater than preset third value;
If be greater than described third value, then judge whether the physical function key that described user presses for the last time is the first default specified button;
If described first specified button, then preset the authorization information by the described physical function key input of pressing and described account identification before user described in described authorization information are sent to described server as described identity information;
If not described first specified button, then show the second information, the physical function key error that described second information presses for the last time for pointing out described user;
If be less than or equal to described third value, then show the 3rd information, the authorization information mistake that described 3rd information inputs for pointing out described user.
7. method according to claim 3, is characterized in that, describedly sends to described server also to comprise as identity information described account identification and described authorization information:
When detecting that described user presses the second default specified button, user described in described authorization information is sent to described server by the authorization information and described account identification pressing other physical function keys input except described second specified button as described identity information.
8. the method according to claim 4 or 6, is characterized in that, described when detecting that described user comprises when terminating the action pressing described physical function key:
After detecting that described user completes the action once pressing described physical function key, the action that preset time period does not carry out pressing described physical function key again if exceed, then determine that described user terminates to press the action of described physical function key.
9. method according to claim 1, is characterized in that, describedly sends to described server also to comprise as identity information described account identification and described authorization information:
Described authorization information is encrypted according to preset rule;
Described authorization information after encryption and described account identification are sent to described server as described identity information.
10. an authentication means, runs on mobile terminal, it is characterized in that, comprising:
Receiver module, for the confirmation of the respective operations of the preset business of execution of reception server transmission;
Designated module, for entering validation of information pattern, under described validation of information pattern, is appointed as input validation information by the physical function key of described mobile terminal;
Acquisition module, the authorization information that account identification and described user for obtaining user input by pressing described physical function key;
Sending module, described server is sent to as identity information for the described account identification that obtained by described acquisition module and described authorization information, make described server according to described account identification and described authorization information, authentication is carried out to described identity information, and when being verified, perform the operation that described preset business is corresponding.
11. devices according to claim 10, is characterized in that, described physical function key comprises the physical button of each side being arranged on described mobile terminal.
12. devices according to claim 11, is characterized in that,
Described acquisition module, also for obtaining described user by repeatedly pressing the described authorization information of the combination in any input of the button of at least two kinds of difference in functionalitys in described physical function key.
13. devices according to claim 12, is characterized in that,
Described device also comprises:
Judge module, for when detecting that described user terminates the action pressing described physical function key, judges whether the compression number of now described user equals the first preset numerical value;
Described sending module, if also judge that the compression number of now described user equals described first numerical value for described judge module, then sends to described server using described account identification and described authorization information as described identity information;
Display module, if judge that the compression number of now described user is greater than or less than described first numerical value for described judge module, then shows the first information, the authorization information mistake that described first information inputs for pointing out described user.
14. devices according to claim 13, is characterized in that,
Described device also comprises:
Statistical module, presses the number of times of described physical function key for adding up described user;
Described sending module, also for when the described number of times of described statistical module counts equals preset second value, sends to described server using described account identification and described authorization information as described identity information.
15. devices according to claim 13, is characterized in that,
Described judge module, also for when detecting that described user terminates the action pressing described physical function key, judges whether the compression number of now described user is greater than preset third value;
Described judge module, if be also greater than described third value for the compression number of now described user, then judges whether the physical function key that described user presses for the last time is the first default specified button;
Described sending module, if also judge that the physical function key that described user presses for the last time is described first specified button for described judge module, then preset the authorization information by the described physical function key input of pressing and described account identification before user described in described authorization information are sent to described server as described identity information;
Described display module, if also judge that the physical function key that described user presses for the last time is not described first specified button for described judge module, then show the second information, the physical function key error that described second information presses for the last time for pointing out described user;
Described display module, if also judge that the compression number of now described user is less than or equal to described third value for described judge module, then shows the 3rd information, the authorization information mistake that described 3rd information inputs for pointing out described user.
16. devices according to claim 13, is characterized in that,
Described sending module, also for when detecting that described user presses the second default specified button, user described in described authorization information is sent to described server by the authorization information and described account identification pressing other physical function keys input except described second specified button as described identity information.
17. according to claim 13 to 16 any one described in device, it is characterized in that, described judge module, also for after detecting that described user completes the action once pressing described physical function key, the action that preset time period does not carry out pressing described physical function key again if exceed, then determine that described user terminates to press the action of described physical function key.
18. devices according to claim 11, is characterized in that,
Described device also comprises:
Encrypting module, for encrypting described authorization information according to preset rule;
Described sending module, also for the described authorization information after described encrypting module encryption and described account identification are sent to described server as described identity information.
CN201410534430.1A 2014-10-11 2014-10-11 Identity verification method and device Active CN105577375B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410534430.1A CN105577375B (en) 2014-10-11 2014-10-11 Identity verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410534430.1A CN105577375B (en) 2014-10-11 2014-10-11 Identity verification method and device

Publications (2)

Publication Number Publication Date
CN105577375A true CN105577375A (en) 2016-05-11
CN105577375B CN105577375B (en) 2020-07-14

Family

ID=55887092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410534430.1A Active CN105577375B (en) 2014-10-11 2014-10-11 Identity verification method and device

Country Status (1)

Country Link
CN (1) CN105577375B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108062810A (en) * 2017-12-12 2018-05-22 谭希妤 A kind of NFC smart homes door lock and application method
CN108319826A (en) * 2017-12-13 2018-07-24 阿里巴巴集团控股有限公司 A kind of method, apparatus and equipment of authentication
CN109063430A (en) * 2018-06-12 2018-12-21 阿里巴巴集团控股有限公司 A kind of method, device and equipment of data storage and authentication
CN109756465A (en) * 2017-11-07 2019-05-14 中移(杭州)信息技术有限公司 A kind of method and apparatus of authentication

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729492A (en) * 2008-10-15 2010-06-09 英业达股份有限公司 Information recording system with client identification and method thereof
CN102088583A (en) * 2009-12-08 2011-06-08 鸿富锦精密工业(深圳)有限公司 Remote controller and password protection method thereof
CN102184372A (en) * 2011-05-27 2011-09-14 北京洋浦伟业科技发展有限公司 Reverse-sandbox-based mobilephone payment protection method
US20120179915A1 (en) * 2011-01-07 2012-07-12 Apple Inc. System and method for full disk encryption authentication
CN103324874A (en) * 2012-03-23 2013-09-25 联想(北京)有限公司 Verification method and electronic device
CN103606082A (en) * 2013-11-15 2014-02-26 四川长虹电器股份有限公司 A television payment system based on fingerprint identification and a method
US20140115314A1 (en) * 2012-10-19 2014-04-24 Via Technologies, Inc. Electronic device and secure boot method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729492A (en) * 2008-10-15 2010-06-09 英业达股份有限公司 Information recording system with client identification and method thereof
CN102088583A (en) * 2009-12-08 2011-06-08 鸿富锦精密工业(深圳)有限公司 Remote controller and password protection method thereof
US20120179915A1 (en) * 2011-01-07 2012-07-12 Apple Inc. System and method for full disk encryption authentication
CN102184372A (en) * 2011-05-27 2011-09-14 北京洋浦伟业科技发展有限公司 Reverse-sandbox-based mobilephone payment protection method
CN103324874A (en) * 2012-03-23 2013-09-25 联想(北京)有限公司 Verification method and electronic device
US20140115314A1 (en) * 2012-10-19 2014-04-24 Via Technologies, Inc. Electronic device and secure boot method
CN103606082A (en) * 2013-11-15 2014-02-26 四川长虹电器股份有限公司 A television payment system based on fingerprint identification and a method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109756465A (en) * 2017-11-07 2019-05-14 中移(杭州)信息技术有限公司 A kind of method and apparatus of authentication
CN108062810A (en) * 2017-12-12 2018-05-22 谭希妤 A kind of NFC smart homes door lock and application method
CN108319826A (en) * 2017-12-13 2018-07-24 阿里巴巴集团控股有限公司 A kind of method, apparatus and equipment of authentication
CN109063430A (en) * 2018-06-12 2018-12-21 阿里巴巴集团控股有限公司 A kind of method, device and equipment of data storage and authentication

Also Published As

Publication number Publication date
CN105577375B (en) 2020-07-14

Similar Documents

Publication Publication Date Title
CN104202306B (en) Access authentication method, Apparatus and system
CN104935744A (en) Verification code display method, verification code display device and mobile terminal
CN104346560B (en) A kind of safe verification method and device
CN105260673A (en) Short message reading method and apparatus
CN105306204A (en) Security verification method, device and system
CN104933351A (en) Information security processing method and information security processing device
CN104363226A (en) Method, device and system for logging in operating system
CN105577375A (en) Identity authentication method and device
CN104333643B (en) Add the method for contact person, system and terminal
CN105323218A (en) Identity verifying method and device
US20160196556A1 (en) Fund transfer
CN103200325A (en) Peripheral device for mobile terminal and communication method for mobile terminal and peripheral device
CN110941821A (en) Data processing method, device and storage medium
CN104683104A (en) Identity identification method, identity identification device and identity identification system
CN105592005B (en) Security verification method, device and system
CN105955636A (en) Mobile terminal-based application mode setting method and apparatus
CN104640112A (en) Authentication method, device and system
CN106447325B (en) NFC communication-based processing method and device and mobile terminal
CN105100005A (en) Identity verification method and device
CN105719141A (en) Payment method and device
CN104333530A (en) Information credibility verifying method and apparatus
US20150341416A1 (en) Cloud management systems and methods for executing applications of android systems
KR101409790B1 (en) Remote control method between mobile telephone using program in mobile telephone
CN105407070A (en) Logging-in authorization method and device
CN104580070A (en) Method, device and system for confirming network conversations

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant