CN105608358A - Password information verification method, password information verification system and terminal - Google Patents

Password information verification method, password information verification system and terminal Download PDF

Info

Publication number
CN105608358A
CN105608358A CN201510460556.3A CN201510460556A CN105608358A CN 105608358 A CN105608358 A CN 105608358A CN 201510460556 A CN201510460556 A CN 201510460556A CN 105608358 A CN105608358 A CN 105608358A
Authority
CN
China
Prior art keywords
default
biological
information
biological information
characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510460556.3A
Other languages
Chinese (zh)
Inventor
刘东海
郭建军
吴殿清
汪智勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510460556.3A priority Critical patent/CN105608358A/en
Priority to PCT/CN2015/088492 priority patent/WO2017016033A1/en
Publication of CN105608358A publication Critical patent/CN105608358A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention provides a password information verification method, a password information verification system and a terminal. The password information verification method comprises the following steps: when an instruction of operating an appointed process is obtained, determining an operating system category to which the appointed process belongs and preset biological characteristic information corresponding to the operating system category; obtaining the biological characteristic information which is input by a user by aiming at the appointed process; judging whether the biological characteristic information is matched with the preset biological characteristic information or not; and when a judgment result shows that the biological characteristic information is matched with the preset biological characteristic information, determining that password information succeeds in being verified, and operating the appointed process, wherein the biological characteristic information comprises one or the any combination of more of fingerprint characteristic information, iris characteristic information, face characteristic information and voice characteristic information. Through the technical scheme of the invention, the data security of a multi-operation system terminal is improved, meanwhile, an encryption step and a decryption step are simultaneously simplified, and the use experience of users is improved.

Description

The verification method of encrypted message, the verification system of encrypted message and terminal
Technical field
The present invention relates to cipher verification technique field, in particular to a kind of checking of encrypted messageMethod, a kind of verification system of encrypted message and a kind of terminal.
Background technology
In correlation technique, finger-print cipher is widely used in the authentication function of terminal device, butThat the proof procedure of finger-print cipher normally judges that whether finger-print cipher information is complete with preset password informationFull coupling, if coupling is carried out corresponding process, if do not mate, exits proof procedure, above-mentionedThe proof procedure of finger-print cipher causes proof procedure too strict, especially for low the entering of safety requirementsJourney, strict finger-print cipher proof procedure can increase process the complexity of operation, and for multioperation beThe terminal of system, the operating system at process place has determined the safe class of this process, if according toCorrelation technique is carried out encrypting fingerprint and fingerprint deciphering for each process, obviously can increase the power consumption of terminalAnd operand, in addition, also can increase user's operating procedure and the difficulty of memory.
Therefore, how to design a kind of can guaranteeing data security and the checking of the encrypted message of simple operationScheme becomes technical problem urgently to be resolved hurrily.
Summary of the invention
The present invention just based on above-mentioned technical problem one of at least, has proposed a kind of new encrypted messageProof scheme, by carry out the coupling of biological information for the operating system described in appointment process,Realize the process in arbitrary operating system has been unified to verification mode, in the data peace of the process of guaranteeFull time, simplify user's verification step, promoted user's experience.
Realize above-mentioned purpose, embodiment according to a first aspect of the invention, provides a kind of message in cipherThe verification method of breath, comprising: in the time obtaining the instruction of operation appointment process, determine described appointment processAffiliated operating system classification, and default biological information corresponding to described operating system classification;Obtain the biological information of user for described appointment process input; Judge described biological informationWhether mate with described default biological information; Judging described biological information and described defaultBiological information when coupling, determine that described encrypted message is proved to be successful, and move described specify intoJourney, wherein, described biological information comprises fingerprint characteristic information, iris feature information, face spyAny combination of appointing one or more in reference breath and phonetic feature information, described default biological characteristic letterBreath comprises default fingerprint characteristic information, default iris feature information, default face characteristic information and defaultAny combination of appointing one or more in phonetic feature information.
In this technical scheme, by carrying out biological characteristic letter for the operating system described in appointment processBreath coupling, realized the process in arbitrary operating system unified to verification mode, ensure intoWhen the data security of journey, simplify user's verification step, promoted user's experience.
Particularly, for the terminal of multiple operating systems, terminal use is according to demands of individuals and makeBy custom, application process is divided in corresponding operating system, in terminal, set in advance each behaviourMake the checking standard of system, for example, the operating system A in terminal and operating system B are corresponding respectivelyIn senior and rudimentary two kinds of safe classes, at user's biological information and default biological informationWhile coupling completely, (comprise number, input sequence and the characteristic information etc. of biological information), abilityComplete the proof procedure to the application process in operating system A, for operating system B,When the biological information of input is user or user relatives fingerprint, in above-mentioned biological informationAny all belong to default biological information, complete the proof procedure to operating system B.
In technique scheme, preferably, in the time obtaining the instruction of operation appointment process, determine instituteState the affiliated operating system of appointment process, and default biological characteristic letter corresponding to described operating systemBreath, specifically comprises the following steps: in the time that definite described appointment process belongs to first kind operating system, reallyDetermine the first default biological spy in described default biological information corresponding to described first kind operating systemReference breath, wherein, the described first default biological information comprises a default biological characteristic or multipleDefault biological characteristic, preset order and predetermined number.
In this technical scheme, by when definite first kind operating system, determine corresponding first pre-If biological information, has realized determining of Validation Mode to first kind operating system, guarantee theThe data security of one type operating system, wherein, can be set as comprising safety in first kind operating systemThe application program that rank is higher, for example social software data, Net silver data, payment key data and photographSheet private data etc.
In technique scheme, preferably, in the time obtaining the instruction of operation appointment process, determine instituteState the affiliated operating system of appointment process, and default biological characteristic letter corresponding to described operating systemBreath, specifically further comprising the steps of: in the time that definite described appointment process belongs to Equations of The Second Kind operating system,Determine that second in described default biological information corresponding to described Equations of The Second Kind operating system is default biologicalCharacteristic information, wherein, the described second default biological information comprises the first default biological informationIn default biological characteristic, preset order and predetermined number, and do not belong to described first default biological specialAt least one biological characteristic of reference breath or the combination of multiple default biological characteristics, preset order and defaultQuantity, the level of security of described first kind operating system is higher than the safe level of described Equations of The Second Kind operating systemNot.
In this technical scheme, by for example, belong to Equations of The Second Kind behaviour in definite appointment process (browser)While making system, determine that second in default biological information corresponding to Equations of The Second Kind operating system is default rawThing characteristic information, has determined the Validation Mode of Equations of The Second Kind operating system, and wherein, second is default biological specialReference breath, except comprising the first all default biological informations, also comprises other biological characteristic information(as biological information of user relatives etc.), also for the checking of Equations of The Second Kind operating systemJourney can confirm to be proved to be successful Equations of The Second Kind behaviour in the time that checking biological characteristic mates with default biological characteristicComprise data cached and web page browsing data of local game data, online game etc. as system.
In technique scheme, preferably, judge that whether described biological information is with described defaultBiological information coupling, specifically comprises the following steps: judge the biology in described biological informationWhether feature mates with described default biological characteristic, and whether the input sequence in described biological informationWith default pleasant coupling, and whether quantity in described biological information mates with predetermined number.
In this technical scheme, by further the input sequence of biological characteristic being carried out to matching judgment,Promote the reliability of the proof procedure of first kind operating system, also only at biological characteristic and defaultBiological characteristic coupling, and input sequence is while mating with preset order, the testing of confirmation first kind operating systemDemonstrate,prove successfully, promoted the safe coefficient of the appointment process in first kind operating system.
In technique scheme, preferably, also comprise: obtaining the appointment of user to described terminalAfter the password preset instructions of operating system, generating cipher is preset interface; Prompting user inputs default biologicalCharacteristic information, and in judging whether at the appointed time, obtain described default biological information; JudgingWithin the described fixed time, obtain after described default biological information, judge described default biological characteristicWhether information mates with the biological information of pre-stored, in the biological information of described pre-stored, wrapsDraw together the biological characteristic of pre-stored and the biological characteristic title of pre-stored; Judging described default biological characteristicWhen default biological characteristic in information mates with the biological characteristic of described pre-stored, by described pre-storedBiological information is as the enciphered message of described assigned operation system; Judging described default biological spyWhen default biological characteristic in reference breath does not mate with the biological characteristic of described pre-stored, described in pre-storedDefault biological nature information, and using the biological information of described pre-stored as described assigned operation beThe enciphered message of system; Create described default biological information and described assigned operation according to user instructionThe mapping relations of system, and the biological characteristic title of described pre-stored is pushed to the default interface of password.
In this technical scheme, preset interface by generating cipher, prompting user inputs default biological specialReference breath, and at the appointed time, obtain default biological information, the default biological information of judgementWhether mate with the biological information of pre-stored, while limiting the input of obtaining default biological informationBetween, make further to promote the security of password preset procedures, point out intuitively use simultaneouslyBiological information is preset at family, in addition, when long in the duration of presetting biological characteristic, forces knotRestraint password authentification process, thereby avoid the leakage of default biological information.
According to a second aspect of the invention, also propose a kind of verification system of encrypted message, having comprised:Determining unit, in the time obtaining the instruction of operation appointment process, determines under described appointment processOperating system classification, and default biological information corresponding to described operating system classification; Obtain listUnit, for obtaining the biological information of user for described appointment process input; Judging unit, usesIn judging whether described biological information mates with described default biological information; Described definite listUnit also for: judging that described biological information is while mating with described default biological information, trueFixed described encrypted message is proved to be successful, and moves described appointment process, wherein, and described biological characteristic letterBreath comprises in fingerprint characteristic information, iris feature information, face characteristic information and phonetic feature informationAppoint one or more any combination, described default biological information comprise default fingerprint characteristic information,Arbitrary or many in default iris feature information, default face characteristic information and default phonetic feature informationAny combination of planting.
In this technical scheme, by carrying out biological characteristic letter for the operating system described in appointment processBreath coupling, realized the process in arbitrary operating system unified to verification mode, ensure intoWhen the data security of journey, simplify user's verification step, promoted user's experience.
Particularly, for the terminal of multiple operating systems, terminal use is according to demands of individuals and makeBy custom, application process is divided in corresponding operating system, in terminal, set in advance each behaviourMake the checking standard of system, for example, the operating system A in terminal and operating system B are corresponding respectivelyIn senior and rudimentary two kinds of safe classes, at user's biological information and default biological informationWhile coupling completely, (comprise number, input sequence and the characteristic information etc. of biological information), abilityComplete the proof procedure to the application process in operating system A, for operating system B,When the biological information of input is user or user relatives fingerprint, in above-mentioned biological informationAny all belong to default biological information, complete the proof procedure to operating system B.
In technique scheme, preferably, described determining unit also for: in definite described appointmentWhen process belongs to first kind operating system, determine the described default life that described first kind operating system is correspondingIn thing characteristic information first preset biological information, wherein, and the described first default biological characteristic letterBreath comprises a default biological characteristic or multiple default biological characteristic, preset order and predetermined number.
In this technical scheme, by when definite first kind operating system, determine corresponding first pre-If biological information, has realized determining of Validation Mode to first kind operating system, guarantee theThe data security of one type operating system, wherein, can be set as comprising safety in first kind operating systemThe application program that rank is higher, for example social software data, Net silver data, payment key data and photographSheet private data etc.
In technique scheme, preferably, described determining unit also for: in definite described appointmentWhen process belongs to Equations of The Second Kind operating system, determine the described default life that described Equations of The Second Kind operating system is correspondingIn thing characteristic information second preset biological information, wherein, and the described second default biological characteristic letterBreath comprises default biological characteristic, preset order and the predetermined number in the first default biological information,Do not belong at least one biological characteristic or multiple default biology of the described first default biological informationCombination, preset order and the predetermined number of feature, the level of security of described first kind operating system higher thanThe level of security of described Equations of The Second Kind operating system.
In this technical scheme, by for example, belong to Equations of The Second Kind behaviour in definite appointment process (browser)While making system, determine that second in default biological information corresponding to Equations of The Second Kind operating system is default rawThing characteristic information, has determined the Validation Mode of Equations of The Second Kind operating system, and wherein, second is default biological specialReference breath, except comprising the first all default biological informations, also comprises other biological characteristic information(as biological information of user relatives etc.), also for the checking of Equations of The Second Kind operating systemJourney can confirm to be proved to be successful Equations of The Second Kind behaviour in the time that checking biological characteristic mates with default biological characteristicComprise data cached and web page browsing data of local game data, online game etc. as system.
In technique scheme, preferably, described judging unit also for: judge described biological specialWhether the biological characteristic in reference breath mates with described default biological characteristic, in described biological informationInput sequence whether with default pleasant coupling, and quantity in described biological information whether withPredetermined number coupling.
In this technical scheme, by further the input sequence of biological characteristic being carried out to matching judgment,Promote the reliability of the proof procedure of first kind operating system, also only at biological characteristic and defaultBiological characteristic coupling, and input sequence is while mating with preset order, the testing of confirmation first kind operating systemDemonstrate,prove successfully, promoted the safe coefficient of the appointment process in first kind operating system.
In technique scheme, preferably, also comprise: generation unit, for obtaining user coupleAfter the password preset instructions of the assigned operation system of described terminal, generating cipher is preset interface; Prompting is singleUnit, for pointing out user to input default biological information, and obtains in judging whether at the appointed timeDescribed default biological information; Described judging unit also for: judge within the described fixed timeObtain after described default biological information, judge described default biological information whether with pre-storedBiological information coupling, the biological information of described pre-stored comprises the biology spy of pre-storedLevy and the biological characteristic title of pre-stored; The verification system of described encrypted message also comprises: password is determinedUnit, for default biological characteristic and described pre-stored judging described default biological informationBiological characteristic when coupling, using the biological information of described pre-stored as described assigned operation systemEnciphered message; Described password determining unit also for: judge described default biological informationDefault biological characteristic while not mating with the biological characteristic of described pre-stored, default biological described in pre-storedCharacteristic information, and encryption using the biological information of described pre-stored as described assigned operation systemInformation; The verification system of described encrypted message also comprises: push unit, and for creating according to user instructionBuild the mapping relations of described default biological information and described assigned operation system, and prestore described in inciting somebody to actionThe biological characteristic title of storage pushes to the default interface of password.
In this technical scheme, preset interface by generating cipher, prompting user inputs default biological specialReference breath, and at the appointed time, obtain default biological information, the default biological information of judgementWhether mate with the biological information of pre-stored, while limiting the input of obtaining default biological informationBetween, make further to promote the security of password preset procedures, point out intuitively use simultaneouslyBiological information is preset at family, in addition, when long in the duration of presetting biological characteristic, forces knotRestraint password authentification process, thereby avoid the leakage of default biological information.
According to a third aspect of the invention we, also propose a kind of terminal, having comprised: as above-mentioned any one skillThe verification system of the encrypted message described in art scheme.
By above technical scheme, by carrying out biological characteristic for the operating system described in appointment processThe coupling of information, has realized the process in arbitrary operating system has been unified to verification mode, is ensureingWhen the data security of process, simplify user's verification step, promoted user's use bodyTest.
Brief description of the drawings
Fig. 1 shows the exemplary flow of the verification method of encrypted message according to an embodiment of the inventionFigure;
Fig. 2 shows the schematic block diagram of the verification system of encrypted message according to an embodiment of the invention;
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 4 A to 4C shows the boundary of the proof scheme of terminal according to an embodiment of the inventionFace schematic diagram;
Fig. 5 A to 5C shows the proof scheme of terminal according to another embodiment of the inventionInterface schematic diagram;
Fig. 6 A to 6C shows the proof scheme of terminal according to still a further embodimentInterface schematic diagram.
Detailed description of the invention
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with attachedFigure and detailed description of the invention are further described in detail the present invention. It should be noted that, notIn the situation of conflict, the feature in the application's embodiment and embodiment can combine mutually.
Set forth in the following description a lot of details so that fully understand the present invention, still,The present invention can also adopt other to be different from other modes described here and implement, therefore, and the present inventionProtection domain be not subject to the restriction of following public specific embodiment.
Fig. 1 reduces terminal merit while showing according to an embodiment of the invention online playing stream media fileThe schematic flow diagram of the method for consumption.
As shown in Figure 1, the group of the multimedia file of embodiment is according to a first aspect of the invention broadcastPut method, comprising: step 102, in the time obtaining the instruction of operation appointment process, determine described appointmentOperating system classification under process, and default biological characteristic letter corresponding to described operating system classificationBreath; Step 104, obtains the biological information of user for described appointment process input; Step106, judge whether described biological information mates with described default biological information; Step108, in the time judging that described biological information mates with described default biological information, determine instituteState encrypted message and be proved to be successful, and move described appointment process, wherein, described biological information bagDraw together arbitrary in fingerprint characteristic information, iris feature information, face characteristic information and phonetic feature informationOr multiple any combination, described default biological information comprises default fingerprint characteristic information, defaultIn iris feature information, default face characteristic information and default phonetic feature information, appoint one or moreAny combination.
In this technical scheme, by carrying out biological characteristic letter for the operating system described in appointment processBreath coupling, realized the process in arbitrary operating system unified to verification mode, ensure intoWhen the data security of journey, simplify user's verification step, promoted user's experience.
Particularly, for the terminal of multiple operating systems, terminal use is according to demands of individuals and makeBy custom, application process is divided in corresponding operating system, in terminal, set in advance each behaviourMake the checking standard of system, for example, the operating system A in terminal and operating system B are corresponding respectivelyIn senior and rudimentary two kinds of safe classes, at user's biological information and default biological informationWhile coupling completely, (comprise number, input sequence and the characteristic information etc. of biological information), abilityComplete the proof procedure to the application process in operating system A, for operating system B,When the biological information of input is user or user relatives fingerprint, in above-mentioned biological informationAny all belong to default biological information, complete the proof procedure to operating system B.
In technique scheme, preferably, in the time obtaining the instruction of operation appointment process, determine instituteState the affiliated operating system of appointment process, and default biological characteristic letter corresponding to described operating systemBreath, specifically comprises the following steps: in the time that definite described appointment process belongs to first kind operating system, reallyDetermine the first default biological spy in described default biological information corresponding to described first kind operating systemReference breath, wherein, the described first default biological information comprises a default biological characteristic or multipleDefault biological characteristic, preset order and predetermined number.
In this technical scheme, by when definite first kind operating system, determine corresponding first pre-If biological information, has realized determining of Validation Mode to first kind operating system, guarantee theThe data security of one type operating system, wherein, can be set as comprising safety in first kind operating systemThe application program that rank is higher, for example social software data, Net silver data, payment key data and photographSheet private data etc.
In technique scheme, preferably, in the time obtaining the instruction of operation appointment process, determine instituteState the affiliated operating system of appointment process, and default biological characteristic letter corresponding to described operating systemBreath, specifically further comprising the steps of: in the time that definite described appointment process belongs to Equations of The Second Kind operating system,Determine that second in described default biological information corresponding to described Equations of The Second Kind operating system is default biologicalCharacteristic information, wherein, the described second default biological information comprises the first default biological informationIn default biological characteristic, preset order and predetermined number, and do not belong to described first default biological specialAt least one biological characteristic of reference breath or the combination of multiple default biological characteristics, preset order and defaultQuantity, the level of security of described first kind operating system is higher than the safe level of described Equations of The Second Kind operating systemNot.
In this technical scheme, by for example, belong to Equations of The Second Kind behaviour in definite appointment process (browser)While making system, determine that second in default biological information corresponding to Equations of The Second Kind operating system is default rawThing characteristic information, has determined the Validation Mode of Equations of The Second Kind operating system, and wherein, second is default biological specialReference breath, except comprising the first all default biological informations, also comprises other biological characteristic information(as biological information of user relatives etc.), also for the checking of Equations of The Second Kind operating systemJourney can confirm to be proved to be successful Equations of The Second Kind behaviour in the time that checking biological characteristic mates with default biological characteristicComprise data cached and web page browsing data of local game data, online game etc. as system.
In technique scheme, preferably, judge that whether described biological information is with described defaultBiological information coupling, specifically comprises the following steps: judge the biology in described biological informationWhether feature mates with described default biological characteristic, and whether the input sequence in described biological informationWith default pleasant coupling, and whether quantity in described biological information mates with predetermined number.
In this technical scheme, by further the input sequence of biological characteristic being carried out to matching judgment,Promote the reliability of the proof procedure of first kind operating system, also only at biological characteristic and defaultBiological characteristic coupling, and input sequence is while mating with preset order, the testing of confirmation first kind operating systemDemonstrate,prove successfully, promoted the safe coefficient of the appointment process in first kind operating system.
In technique scheme, preferably, also comprise: obtaining the appointment of user to described terminalAfter the password preset instructions of operating system, generating cipher is preset interface; Prompting user inputs default biologicalCharacteristic information, and in judging whether at the appointed time, obtain described default biological information; JudgingWithin the described fixed time, obtain after described default biological information, judge described default biological characteristicWhether information mates with the biological information of pre-stored, in the biological information of described pre-stored, wrapsDraw together the biological characteristic of pre-stored and the biological characteristic title of pre-stored; Judging described default biological characteristicWhen default biological characteristic in information mates with the biological characteristic of described pre-stored, by described pre-storedBiological information is as the enciphered message of described assigned operation system; Judging described default biological spyWhen default biological characteristic in reference breath does not mate with the biological characteristic of described pre-stored, described in pre-storedDefault biological nature information, and using the biological information of described pre-stored as described assigned operation beThe enciphered message of system; Create described default biological information and described assigned operation according to user instructionThe mapping relations of system, and the biological characteristic title of described pre-stored is pushed to the default interface of password.
In this technical scheme, preset interface by generating cipher, prompting user inputs default biological specialReference breath, and at the appointed time, obtain default biological information, the default biological information of judgementWhether mate with the biological information of pre-stored, while limiting the input of obtaining default biological informationBetween, make further to promote the security of password preset procedures, point out intuitively use simultaneouslyBiological information is preset at family, in addition, when long in the duration of presetting biological characteristic, forces knotRestraint password authentification process, thereby avoid the leakage of default biological information.
The verification system 200 of the encrypted message of embodiment according to a second aspect of the invention, comprising:Determining unit 202, in the time obtaining the instruction of operation appointment process, determines described appointment process instituteThe operating system classification belonging to, and default biological information corresponding to described operating system classification; ObtainGet unit 204, for obtaining the biological information of user for described appointment process input; JudgementUnit 206, for judge described biological information whether with described default biological informationJoin; Described determining unit 202 also for: judging described biological information and described default biologyWhen characteristic information coupling, determine that described encrypted message is proved to be successful, and move described appointment process, itsIn, described biological information comprises fingerprint characteristic information, iris feature information, face characteristic informationWith any combination of appointing one or more in phonetic feature information, described default biological information comprisesDefault fingerprint characteristic information, default iris feature information, default face characteristic information and default voice spyAny combination of appointing one or more in reference breath.
In this technical scheme, by carrying out biological characteristic letter for the operating system described in appointment processBreath coupling, realized the process in arbitrary operating system unified to verification mode, ensure intoWhen the data security of journey, simplify user's verification step, promoted user's experience.
Particularly, for the terminal of multiple operating systems, terminal use is according to demands of individuals and makeBy custom, application process is divided in corresponding operating system, in terminal, set in advance each behaviourMake the checking standard of system, for example, the operating system A in terminal and operating system B are corresponding respectivelyIn senior and rudimentary two kinds of safe classes, at user's biological information and default biological informationWhile coupling completely, (comprise number, input sequence and the characteristic information etc. of biological information), abilityComplete the proof procedure to the application process in operating system A, for operating system B,When the biological information of input is user or user relatives fingerprint, in above-mentioned biological informationAny all belong to default biological information, complete the proof procedure to operating system B.
In technique scheme, preferably, described determining unit 202 also for: determine described inWhen appointment process belongs to first kind operating system, determine corresponding described pre-of described first kind operating systemIf first in biological information preset biological information, wherein, described first is default biological specialReference breath comprises a default biological characteristic or multiple default biological characteristic, preset order and present countAmount.
In this technical scheme, by when definite first kind operating system, determine corresponding first pre-If biological information, has realized determining of Validation Mode to first kind operating system, guarantee theThe data security of one type operating system, wherein, can be set as comprising safety in first kind operating systemThe application program that rank is higher, for example social software data, Net silver data, payment key data and photographSheet private data etc.
In technique scheme, preferably, described determining unit 202 also for: determine described inWhen appointment process belongs to Equations of The Second Kind operating system, determine corresponding described pre-of described Equations of The Second Kind operating systemIf second in biological information preset biological information, wherein, described second is default biological specialReference breath comprises default biological characteristic, preset order and the present count in the first default biological informationAmount, and do not belong to the described first at least one biological characteristic or multiple presetting of presetting biological informationCombination, preset order and the predetermined number of biological characteristic, the level of security of described first kind operating systemHigher than the level of security of described Equations of The Second Kind operating system.
In this technical scheme, by for example, belong to Equations of The Second Kind behaviour in definite appointment process (browser)While making system, determine that second in default biological information corresponding to Equations of The Second Kind operating system is default rawThing characteristic information, has determined the Validation Mode of Equations of The Second Kind operating system, and wherein, second is default biological specialReference breath, except comprising the first all default biological informations, also comprises other biological characteristic information(as biological information of user relatives etc.), also for the checking of Equations of The Second Kind operating systemJourney can confirm to be proved to be successful Equations of The Second Kind behaviour in the time that checking biological characteristic mates with default biological characteristicComprise data cached and web page browsing data of local game data, online game etc. as system.
In technique scheme, preferably, described judging unit 206 also for: judge described lifeWhether the biological characteristic in thing characteristic information mates with described default biological characteristic, described biological characteristic letterInput sequence in breath whether with default pleasant coupling, and quantity in described biological information isNoly mate with predetermined number.
In this technical scheme, by further the input sequence of biological characteristic being carried out to matching judgment,Promote the reliability of the proof procedure of first kind operating system, also only at biological characteristic and defaultBiological characteristic coupling, and input sequence is while mating with preset order, the testing of confirmation first kind operating systemDemonstrate,prove successfully, promoted the safe coefficient of the appointment process in first kind operating system.
In technique scheme, preferably, also comprise: generation unit 208, for obtaining useAfter the password preset instructions of the assigned operation system of family to described terminal, generating cipher is preset interface; CarryShow unit 210, for pointing out user to input default biological information, and judge whether in the time specifyingIn obtain described default biological information; Described judging unit 206 also for: judge in instituteState in the fixed time and obtain after described default biological information, judge described default biological informationWhether mate with the biological information of pre-stored, the biological information of described pre-stored comprises in advanceThe biological characteristic of storage and the biological characteristic title of pre-stored; The verification system 200 of described encrypted messageAlso comprise: password determining unit 212, for judging the default of described default biological informationWhen biological characteristic mates with the biological characteristic of described pre-stored, by the biological information of described pre-storedAs the enciphered message of described assigned operation system; Described password determining unit 212 also for: sentencingDefault biological characteristic in fixed described default biological information and the biological characteristic of described pre-stored are notTiming, default biological nature information described in pre-stored, and the biological information of described pre-stored is doneFor the enciphered message of described assigned operation system; The verification system 200 of described encrypted message also comprises:Push unit 214, for creating described default biological information and described appointment according to user instructionThe mapping relations of operating system, and the biological characteristic title of described pre-stored is pushed to the default boundary of passwordFace.
In this technical scheme, preset interface by generating cipher, prompting user inputs default biological specialReference breath, and at the appointed time, obtain default biological information, the default biological information of judgementWhether mate with the biological information of pre-stored, while limiting the input of obtaining default biological informationBetween, make further to promote the security of password preset procedures, point out intuitively use simultaneouslyBiological information is preset at family, in addition, when long in the duration of presetting biological characteristic, forces knotRestraint password authentification process, thereby avoid the leakage of default biological information.
According to a third aspect of the invention we, also propose a kind of terminal 300, having comprised: as above-mentioned arbitraryThe verification system 200 of the encrypted message described in item technical scheme.
Illustrate according to this below in conjunction with Fig. 4 A to Fig. 4 C, Fig. 5 A to Fig. 5 C to Fig. 6 A to Fig. 6 CThe encrypted message proof scheme of inventive embodiment:
Embodiment mono-:
As shown in Fig. 4 A to Fig. 4 C, verify for the appointment process of the operating system 1 of terminal, comprising before: fingerprint typing, obtain the finger print information of user (or user relatives) input, itsIn, finger print information comprises number and the input sequence of fingerprint characteristic, fingerprint characteristic; System 1 function is fixedJustice, is also mapped in operating system to be encrypted by the fingerprint characteristic of the process of above-mentioned fingerprint typing, orPerson be mapped in appointment process in operating system (" VPN networking " as shown in Fig. 4 C, " beatThe application of the micro-letter of open system 1 " and " opening system 1 note application " etc.), and obtain that user inputsFingerprint typing title (" middle finger " as shown in Figure 4 B), and after user confirms, complete fingerThe preset procedures of line password.
Embodiment bis-:
As shown in Figure 5 A to FIG. 5 C, verify for the appointment process of the operating system 2 of terminal, comprising before: fingerprint typing, obtain the finger print information of user (or user relatives) input, itsIn, finger print information comprises number and the input sequence of fingerprint characteristic, fingerprint characteristic; System 2 functions are fixedJustice, is also mapped in operating system to be encrypted by the fingerprint characteristic of the process of above-mentioned fingerprint typing, orPerson be mapped in appointment process in operating system (as shown in Figure 5 C " enter operating system2 ", " operation body game " and " operation internet game " etc.), and obtain the finger that user inputsLine typing title (" forefinger " as shown in Figure 5 B), and after user confirms, complete fingerprintThe preset procedures of password.
Embodiment tri-:
As shown in Fig. 6 A to Fig. 6 C, verify for the appointment process of the operating system 3 of terminal, comprising before: fingerprint typing, obtain the finger print information of user (or user relatives) input, itsIn, finger print information comprises number and the input sequence of fingerprint characteristic, fingerprint characteristic; System 3 functions are fixedJustice, is also mapped in operating system to be encrypted by the fingerprint characteristic of the process of above-mentioned fingerprint typing, orPerson is mapped in appointment process (" the opening operation system as shown in Fig. 6 C in operating system3 ", " open system 3 recording application " and " open system 3 take pictures application " etc.), and obtainThe fingerprint typing title (" thumb " as shown in Fig. 6 B) of user's input, and confirm userAfter, complete the preset procedures of finger-print cipher.
Table 1
Table 1 shows the mapping between finger print information and feature operation according to an embodiment of the invention and closesSystem.
By above technical scheme, consider how designing one and can ensureing of proposing in correlation techniqueThe technical problem of the proof scheme of the encrypted message of data security and simple operation, the application has proposed onePlant the proof scheme of new encrypted message, by carrying out biology for the operating system described in appointment processThe coupling of characteristic information, has realized the process in arbitrary operating system has been unified to verification mode,When the data security of guarantee process, simplify user's verification step, promoted user's useExperience.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, forThose skilled in the art, the present invention can have various modifications and variations. All in essence of the present inventionWithin god and principle, any amendment of doing, be equal to replacement, improvement etc., all should be included in the present inventionProtection domain within.

Claims (11)

1. a verification method for encrypted message, being applicable to operation has the terminal of multiple operating systems,It is characterized in that, comprising:
In the time obtaining the instruction of operation appointment process, determine the operating system class that described appointment process is affiliatedNot, and default biological information corresponding to described operating system classification;
Obtain the biological information of user for described appointment process input;
Judge whether described biological information mates with described default biological information;
In the time judging that described biological information mates with described default biological information, described in determiningEncrypted message is proved to be successful, and moves described appointment process,
Wherein, described biological information comprises fingerprint characteristic information, iris feature information, face spyAny combination of appointing one or more in reference breath and phonetic feature information, described default biological characteristic letterBreath comprises default fingerprint characteristic information, default iris feature information, default face characteristic information and defaultAny combination of appointing one or more in phonetic feature information.
2. the verification method of encrypted message according to claim 1, is characterized in that, is obtainingWhile getting the instruction of operation appointment process, determine the operating system that described appointment process is affiliated, and described inThe default biological information that operating system is corresponding, specifically comprises the following steps:
In the time that definite described appointment process belongs to first kind operating system, determine that described first kind operation isThe first default biological information in the described default biological information of system correspondence,
Wherein, the described first default biological information comprises a default biological characteristic or multiple defaultBiological characteristic, preset order and predetermined number.
3. the verification method of encrypted message according to claim 1, is characterized in that, is obtainingWhile getting the instruction of operation appointment process, determine the operating system that described appointment process is affiliated, and described inThe default biological information that operating system is corresponding, specifically further comprising the steps of:
In the time that definite described appointment process belongs to Equations of The Second Kind operating system, determine that described Equations of The Second Kind operation isThe second default biological information in the described default biological information of system correspondence,
Wherein, the described second default biological information comprises pre-in the first default biological informationIf biological characteristic, preset order and predetermined number, and do not belong to the described first default biological informationAt least one biological characteristic or combination, preset order and the predetermined number of multiple default biological characteristics,The level of security of described first kind operating system is higher than the level of security of described Equations of The Second Kind operating system.
4. the verification method of encrypted message according to claim 2, is characterized in that, judgementWhether described biological information mates with described default biological information, specifically comprises following stepRapid:
Judge whether the biological characteristic in described biological information mates with described default biological characteristic,Input sequence in described biological information whether with default pleasant coupling, and described biological characteristicWhether the quantity in information mates with predetermined number.
5. according to the verification method of the encrypted message described in claim 3 or 4, it is characterized in that,Also comprise:
Obtaining after the password preset instructions of the assigned operation system of user to described terminal generating cipherDefault interface;
Prompting user inputs default biological information, and described in obtaining in judging whether at the appointed timeDefault biological information;
Within the described fixed time, obtain after described default biological information in judgement, judge described pre-If whether biological information mates with the biological information of pre-stored, the biology spy of described pre-storedReference breath comprises the biological characteristic of pre-stored and the biological characteristic title of pre-stored;
Default biological characteristic in the described default biological information of judgement and the biology of described pre-storedWhen characteristic matching, the encryption using the biological information of described pre-stored as described assigned operation systemInformation;
Default biological characteristic in the described default biological information of judgement and the biology of described pre-storedWhen feature is not mated, default biological nature information described in pre-stored, and by the biology spy of described pre-storedReference breath is as the enciphered message of described assigned operation system;
Create the mapping of described default biological information and described assigned operation system according to user instructionRelation, and the biological characteristic title of described pre-stored is pushed to the default interface of password.
6. a verification system for encrypted message, being applicable to operation has the terminal of multiple operating systems,It is characterized in that, comprising:
Determining unit, in the time obtaining the instruction of operation appointment process, determines described appointment process instituteThe operating system classification belonging to, and default biological information corresponding to described operating system classification;
Acquiring unit, for obtaining the biological information of user for described appointment process input;
Judging unit, for judge described biological information whether with described default biological informationCoupling;
Described determining unit also for: judging described biological information and described default biological characteristicWhen information matches, determine that described encrypted message is proved to be successful, and move described appointment process,
Wherein, described biological information comprises fingerprint characteristic information, iris feature information, face spyAny combination of appointing one or more in reference breath and phonetic feature information, described default biological characteristic letterBreath comprises default fingerprint characteristic information, default iris feature information, default face characteristic information and defaultAny combination of appointing one or more in phonetic feature information.
7. the verification system of encrypted message according to claim 6, is characterized in that, described inDetermining unit also for:
In the time that definite described appointment process belongs to first kind operating system, determine that described first kind operation isThe first default biological information in the described default biological information of system correspondence,
Wherein, the described first default biological information comprises a default biological characteristic or multiple defaultBiological characteristic, preset order and predetermined number.
8. the verification system of encrypted message according to claim 6, is characterized in that, described inDetermining unit also for:
In the time that definite described appointment process belongs to Equations of The Second Kind operating system, determine that described Equations of The Second Kind operation isThe second default biological information in the described default biological information of system correspondence,
Wherein, the described second default biological information comprises pre-in the first default biological informationIf biological characteristic, preset order and predetermined number, and do not belong to the described first default biological informationAt least one biological characteristic or combination, preset order and the predetermined number of multiple default biological characteristics,The level of security of described first kind operating system is higher than the level of security of described Equations of The Second Kind operating system.
9. according to the verification system of the encrypted message described in claim 7 or 8, it is characterized in that,Described judging unit also for::
Judge whether the biological characteristic in described biological information mates with described default biological characteristic,Input sequence in described biological information whether with default pleasant coupling, and described biological characteristicWhether the quantity in information mates with predetermined number.
10. the verification system of encrypted message according to claim 9, is characterized in that, also bagDraw together:
Generation unit, refers to for the password obtaining the assigned operation system of user to described terminal is defaultAfter order, generating cipher is preset interface;
Tip element, for pointing out user to input default biological information, and judges whether specifyingIn time, obtain described default biological information;
Described judging unit also for: judge within the described fixed time, obtain described default biological specialAfter reference breath, judge described default biological information whether with the biological information of pre-storedJoin, the biological information of described pre-stored comprises the biological characteristic of pre-stored and the biology of pre-storedFeature title;
The verification system of described encrypted message also comprises:
Password determining unit, for the default biological characteristic judging described default biological informationWhile coupling with the biological characteristic of described pre-stored, using the biological information of described pre-stored as describedThe enciphered message of assigned operation system;
Described password determining unit also for: judging the default life of described default biological informationWhen thing feature is not mated with the biological characteristic of described pre-stored, default biological nature letter described in pre-storedBreath, and enciphered message using the biological information of described pre-stored as described assigned operation system;
The verification system of described encrypted message also comprises:
Push unit, for creating described default biological information and described appointment according to user instructionThe mapping relations of operating system, and the biological characteristic title of described pre-stored is pushed to the default boundary of passwordFace.
11. 1 kinds of terminals, is characterized in that, comprising: as any one institute in claim 6 to 10The verification system of the encrypted message of stating.
CN201510460556.3A 2015-07-30 2015-07-30 Password information verification method, password information verification system and terminal Pending CN105608358A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510460556.3A CN105608358A (en) 2015-07-30 2015-07-30 Password information verification method, password information verification system and terminal
PCT/CN2015/088492 WO2017016033A1 (en) 2015-07-30 2015-08-30 Password information authentication method, password information authentication system, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510460556.3A CN105608358A (en) 2015-07-30 2015-07-30 Password information verification method, password information verification system and terminal

Publications (1)

Publication Number Publication Date
CN105608358A true CN105608358A (en) 2016-05-25

Family

ID=55988287

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510460556.3A Pending CN105608358A (en) 2015-07-30 2015-07-30 Password information verification method, password information verification system and terminal

Country Status (2)

Country Link
CN (1) CN105608358A (en)
WO (1) WO2017016033A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096585A (en) * 2016-06-29 2016-11-09 深圳市金立通信设备有限公司 A kind of auth method and terminal
CN106301784A (en) * 2016-08-03 2017-01-04 南昌欧菲生物识别技术有限公司 A kind of data capture method and terminal
CN107295016A (en) * 2017-08-10 2017-10-24 广州杰之良软件有限公司 Auth method and device
CN107507308A (en) * 2017-08-17 2017-12-22 美的智慧家居科技有限公司 The method, apparatus and intelligent door lock of a kind of match information
CN109145553A (en) * 2018-07-10 2019-01-04 合肥联宝信息技术有限公司 System authentication method, device, terminal and medium
CN110188525A (en) * 2019-05-24 2019-08-30 Oppo广东移动通信有限公司 Unlocked by fingerprint method and relevant device
CN110400149A (en) * 2019-07-29 2019-11-01 杭州项帮科技有限公司 Encrypting payment method based on network game payment transaction on intelligent terminal
CN113282912A (en) * 2021-05-14 2021-08-20 莎诺啤酒(上海)有限公司 Game monitoring software for preventing teenagers from being indulged in

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109960920A (en) * 2019-03-29 2019-07-02 联想(北京)有限公司 Information processing method and electronic equipment
CN116781397B (en) * 2023-07-24 2024-03-15 深圳建安润星安全技术有限公司 Internet information security method and platform based on biological recognition

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104050406A (en) * 2014-07-03 2014-09-17 南昌欧菲生物识别技术有限公司 Method and terminal equipment for carrying out authentication through fingerprint combinations
CN104615927A (en) * 2014-12-31 2015-05-13 宇龙计算机通信科技(深圳)有限公司 Multisystem safe verification method, multisystem safe verification device and terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9542783B2 (en) * 2013-11-15 2017-01-10 Google Technology Holdings LLC Method and apparatus for authenticating access to a multi-level secure environment of an electronic device
CN104077516B (en) * 2014-06-26 2018-04-27 华为技术有限公司 A kind of biological authentication method and terminal
CN104077576A (en) * 2014-07-03 2014-10-01 南昌欧菲生物识别技术有限公司 Fingerprint recognition method and terminal device having fingerprint recognition function
CN104156657B (en) * 2014-09-01 2018-04-10 宇龙计算机通信科技(深圳)有限公司 The data inputting method of terminal, the message input device of terminal and terminal
CN104462935B (en) * 2014-12-24 2018-01-09 宇龙计算机通信科技(深圳)有限公司 The safe verification method and terminal of application program in multiple operating system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104050406A (en) * 2014-07-03 2014-09-17 南昌欧菲生物识别技术有限公司 Method and terminal equipment for carrying out authentication through fingerprint combinations
CN104615927A (en) * 2014-12-31 2015-05-13 宇龙计算机通信科技(深圳)有限公司 Multisystem safe verification method, multisystem safe verification device and terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096585A (en) * 2016-06-29 2016-11-09 深圳市金立通信设备有限公司 A kind of auth method and terminal
CN106301784A (en) * 2016-08-03 2017-01-04 南昌欧菲生物识别技术有限公司 A kind of data capture method and terminal
CN107295016A (en) * 2017-08-10 2017-10-24 广州杰之良软件有限公司 Auth method and device
CN107507308A (en) * 2017-08-17 2017-12-22 美的智慧家居科技有限公司 The method, apparatus and intelligent door lock of a kind of match information
CN109145553A (en) * 2018-07-10 2019-01-04 合肥联宝信息技术有限公司 System authentication method, device, terminal and medium
CN110188525A (en) * 2019-05-24 2019-08-30 Oppo广东移动通信有限公司 Unlocked by fingerprint method and relevant device
CN110400149A (en) * 2019-07-29 2019-11-01 杭州项帮科技有限公司 Encrypting payment method based on network game payment transaction on intelligent terminal
CN113282912A (en) * 2021-05-14 2021-08-20 莎诺啤酒(上海)有限公司 Game monitoring software for preventing teenagers from being indulged in

Also Published As

Publication number Publication date
WO2017016033A1 (en) 2017-02-02

Similar Documents

Publication Publication Date Title
CN105608358A (en) Password information verification method, password information verification system and terminal
JP4607455B2 (en) System and portable terminal
Gupta et al. Demystifying authentication concepts in smartphones: Ways and types to secure access
US12050676B2 (en) Digital identity authentication and verification system, method, and device
KR101613233B1 (en) Improved biometric authentication and identification
Payne et al. A brief introduction to usable security
JP5028194B2 (en) Authentication server, client terminal, biometric authentication system, method and program
US20090052745A2 (en) Personal identification system
Cohen et al. Compelled decryption and the Fifth Amendment: exploring the technical boundaries
CN110291755A (en) Accredited key server
CN103297237B (en) Identity registration and authentication method, system, personal authentication apparatus and certificate server
Notoatmodjo Exploring the'weakest link': A study of personal password security
Peisert et al. Principles of authentication
Subha Biometrics in internet of things (iot) security
US20230108664A1 (en) Method for verifying liveness, and server using the same
Kannavara et al. Topics in biometric human-machine interaction security
Wilusz et al. Security analysis of transaction authorization methods for next generation electronic payment services
Dabbour et al. Towards In-Band Non-Cryptographic Authentication
CN203243360U (en) Identity registration system
Siwik et al. Server-side encrypting and digital signature platform with biometric authorization
Zimmermann et al. Promoting secure Email communication and authentication
CN105893810B (en) Terminal and encryption and decryption method thereof
Seitz Supporting users in password authentication with persuasive design
CN103297238B (en) Identity authorization system
Sanchez-Reillo et al. Smart cards to enhance security and privacy in biometrics

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160525

RJ01 Rejection of invention patent application after publication