CN105656851A - Information verification method, user terminal, server and system - Google Patents

Information verification method, user terminal, server and system Download PDF

Info

Publication number
CN105656851A
CN105656851A CN201410640646.6A CN201410640646A CN105656851A CN 105656851 A CN105656851 A CN 105656851A CN 201410640646 A CN201410640646 A CN 201410640646A CN 105656851 A CN105656851 A CN 105656851A
Authority
CN
China
Prior art keywords
checking information
checking
information
server
main
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410640646.6A
Other languages
Chinese (zh)
Inventor
张东蕊
王进
廖晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Cyber Shenzhen Co Ltd
Original Assignee
Tencent Cyber Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Cyber Shenzhen Co Ltd filed Critical Tencent Cyber Shenzhen Co Ltd
Priority to CN201410640646.6A priority Critical patent/CN105656851A/en
Publication of CN105656851A publication Critical patent/CN105656851A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an information verification method. The information verification method comprises the following steps of: acquiring master verification information after receiving a master verification triggering instruction input by a user, starting collection of slave verification information, sending the master verification information and the slave verification information to a server, such that the server respectively verifies the master verification information and the slave verification information, and receiving a successful verification result or a failed verification result returned by the server, wherein the successful verification result is sent by the server when both the master verification information and the slave verification information pass verification; and failed verification result is sent by the server when verification of at least one of the master verification information and the slave verification information is failed. By means of the method provided in the embodiment of the invention, subordinative verification of information can be carried out in a hidden manner in the event that the user is not perceptive; and thus, the information verification safety is improved.

Description

A kind of method of Information Authentication, user terminal, server and system
Technical field
The present invention relates to field of computer technology, it is specifically related to a kind of method of Information Authentication, user terminal, server and system.
Background technology
Prior art gets more and more for the verification method of safety, as: recognition of face, speech recognition, finger print identifying etc., recognition of face is a kind of biological identification technology that the facial feature information based on people carries out identification. Speech recognition, being also referred to as automatic speech recognition (AutomaticSpeechRecognition, ASR), its target is computer-readable input by the vocabulary Content Transformation in the voice of the mankind, such as button, binary coding or character string, and then identify. Finger print identifying refers to there is rough and uneven in surface lines on the positive surface skin of finger tips, contains a large amount of information. The lines of these skins is different on pattern, breakpoint and intersection point, they are called " feature " by information processing, and these features have uniqueness and permanent, therefore we just can be mapped a people with his fingerprint, by the fingerprint characteristic comparing his fingerprint characteristic and preserve in advance, so that it may to verify his true identity.
In prior art, although these verification methods can play certain safe effect, but some lawless persons are after locking assistant's object, by obtaining static photograph, video intercepting, stealthily the means such as take pictures, or the appearance that can obtain user is verified, often also can go smoothly, cause the security of security verification not high enough.
Summary of the invention
The embodiment of the present invention provides a kind of method of Information Authentication, it is possible to when user's not perception can be hidden information is carried out subordinate checking, it is to increase the security of Information Authentication. The embodiment of the present invention additionally provides corresponding user terminal, server and system.
First aspect present invention provides a kind of method of Information Authentication, comprising:
After receiving the main checking triggering command of user's input, gather main checking information, and start the collection from checking information;
Described main checking information and described from checking information is sent, so that described server to described main checking information and described is verified from checking information respectively to server;
Receive the result being proved to be successful that described server returns or the failed result of checking, the described result being proved to be successful is described server in described main checking information and described all sends by during checking from checking information, the failed result of described checking be described server described main checking information and described verify unsuccessfully from least one checking information time transmission.
Second aspect present invention provides a kind of method of Information Authentication, comprising:
Receive user terminal send main checking information and from checking information, described main checking information is that described user terminal is collected after the main checking triggering command receiving user's input, and described is that described user terminal starts collection when collecting described main checking information from checking information;
To described main checking information with described verify respectively from checking information;
Return the result being proved to be successful to described user terminal or verify failed result, the described result described main checking information of instruction that is proved to be successful and described from checking information all by checking, the failed result of described checking indicates described main checking information and described verifies unsuccessfully from least one checking information.
Third aspect present invention provides a kind of user terminal, comprising:
Receive unit, for receiving the main checking triggering command of user's input;
Collecting unit, for, after described reception unit receives the main checking triggering command that user inputs, gathering main checking information;
Start collector unit, for when described collecting unit collects described main checking information, starting the collection from checking information;
Send unit, for sending described main checking information and described from checking information to server, so that described server to described main checking information and described is verified from checking information respectively;
Described reception unit, also for receiving the result being proved to be successful that described server returns or the failed result of checking, the described result being proved to be successful is described server in described main checking information and described all sends by during checking from checking information, the failed result of described checking be described server described main checking information and described verify unsuccessfully from least one checking information time transmission.
Fourth aspect present invention provides a kind of server, comprising:
Receive unit, for receive user terminal send main checking information and from checking information, described main checking information is that described user terminal is collected after the main checking triggering command receiving user's input, and described is that described user terminal starts collection when collecting described main checking information from checking information;
Authentication unit, for the main checking information that received by described reception unit with described verify respectively from checking information;
Send unit, for to described user terminal return described authentication unit verify after the result being proved to be successful or the failed result of checking, the described result described main checking information of instruction that is proved to be successful and described from checking information all by checking, the failed result of described checking indicates described main checking information and described verifies unsuccessfully from least one checking information.
Fifth aspect present invention provides the system of a kind of Information Authentication, it is characterised in that, comprising: user terminal and server,
Described user terminal, for receive user input main checking triggering command after, gather main checking information, and start to from checking information collection, to server send described main checking information and described from checking information;
Described server, for described main checking information with described verify respectively from checking information;
Described user terminal, for receiving the result being proved to be successful that described server returns or the failed result of checking, the described result being proved to be successful is described server in described main checking information and described all sends by during checking from checking information, the failed result of described checking be described server described main checking information and described verify unsuccessfully from least one checking information time transmission.
After the embodiment of the present invention adopts the main checking triggering command receiving user's input, gather main checking information, and start the collection from checking information, to server send described main checking information and described from checking information, so that described server to described main checking information and described is verified from checking information respectively, receive the result being proved to be successful that described server returns or the failed result of checking, the described result being proved to be successful is described server in described main checking information and described all sends by during checking from checking information, described checking failed result be described server described main checking information and described verify unsuccessfully from least one checking information time transmission. compared with prior art, the embodiment of the present invention provides the method for Information Authentication, it is possible to can be hidden when user's not perception information is carried out subordinate checking, it is to increase the security of Information Authentication.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, it is briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is an embodiment schematic diagram of the method for Information Authentication in the embodiment of the present invention;
Fig. 2 is another embodiment schematic diagram of the method for Information Authentication in the embodiment of the present invention;
Fig. 3 is another embodiment schematic diagram of the method for Information Authentication in the embodiment of the present invention;
Fig. 4 is an embodiment schematic diagram of user terminal in the embodiment of the present invention;
Fig. 5 is an embodiment schematic diagram of server in the embodiment of the present invention;
Fig. 6 is another embodiment schematic diagram of user terminal in the embodiment of the present invention;
Fig. 7 is another embodiment schematic diagram of server in the embodiment of the present invention;
Fig. 8 is an embodiment schematic diagram of the system of Information Authentication in the embodiment of the present invention.
Embodiment
The embodiment of the present invention provides a kind of method of Information Authentication, it is possible to when user's not perception can be hidden information is carried out subordinate checking, it is to increase the security of Information Authentication. The embodiment of the present invention additionally provides corresponding user terminal, server and system. Hereinafter it is described in detail respectively.
In order to make those skilled in the art understand the present invention program better, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the embodiment of a part of the present invention, instead of whole embodiments. Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, should belong to the scope of protection of the invention.
Consulting Fig. 1, an embodiment of the method for the Information Authentication that the embodiment of the present invention provides comprises:
101, after receiving the main checking triggering command of user's input, gather main checking information, and start the collection from checking information.
In the embodiment of the present invention, main checking information can be face verification, any one in fingerprint authentication, voice authentication or other checkings.
Can be face verification from checking information, one or more in fingerprint authentication, voice authentication or other checkings, main checking information occurs time different with the type from checking information, when main checking information is face verification, can be fingerprint authentication, voice authentication etc. from checking information.
It is face verification information for main checking information, when user to be carried out the checking of brush face, stand in specified location brush face and trigger main checking, user terminal brush face gathers face characteristic information, simultaneously, user terminal starts at least one in microphone, fingerprint capturer, starts to collect the sound information that user is not intended to send, or collects the finger print information of user.
102, described main checking information and described from checking information is sent to server, so that described server to described main checking information and described is verified from checking information respectively.
103, the result being proved to be successful that described server returns or the failed result of checking is received, the described result being proved to be successful is described server in described main checking information and described all sends by during checking from checking information, the failed result of described checking be described server described main checking information and described verify unsuccessfully from least one checking information time transmission.
After the embodiment of the present invention adopts the main checking triggering command receiving user's input, gather main checking information, and start the collection from checking information, to server send described main checking information and described from checking information, so that described server to described main checking information and described is verified from checking information respectively, receive the result being proved to be successful that described server returns or the failed result of checking, the described result being proved to be successful is described server in described main checking information and described all sends by during checking from checking information, described checking failed result be described server described main checking information and described verify unsuccessfully from least one checking information time transmission. compared with prior art, the embodiment of the present invention provides the method for Information Authentication, it is possible to can be hidden when user's not perception information is carried out subordinate checking, it is to increase the security of Information Authentication.
Can selection of land, on the basis of embodiment corresponding to above-mentioned Fig. 1, in another embodiment of the method for the Information Authentication that the embodiment of the present invention provides, when the failed result described main checking Information Authentication of instruction of described checking successfully, described from, when verifying Information Authentication failure, described method can also comprise:
Resurvey except described except checking information other from checking information;
Described in sending to described server, other are from checking information, so that described other are verified by described server from checking information;
Receive another result being proved to be successful that described server returns, another result being proved to be successful described be described server to described other from sending during checking Information Authentication success.
In the embodiment of the present invention, when main checking information is by checking, in order to avoid because verifying failed situation from checking information gathering imperfect causing, in the embodiment of the present invention, in main checking information by checking, during from checking information failure, collect further some other again verify from checking information, thus further enhancing security.
Consulting Fig. 2, another embodiment of the method for the Information Authentication that the embodiment of the present invention provides comprises:
201, receive user terminal send main checking information and from checking information, described main checking information is that described user terminal is collected after the main checking triggering command receiving user's input, and described is that described user terminal starts collection when collecting described main checking information from checking information.
In the embodiment of the present invention, main checking information can be face verification, any one in fingerprint authentication, voice authentication or other checkings.
Can be face verification from checking information, one or more in fingerprint authentication, voice authentication or other checkings, main checking information occurs time different with the type from checking information, when main checking information is face verification, can be fingerprint authentication, voice authentication etc. from checking information.
It is face verification information for main checking information, when user to be carried out the checking of brush face, stand in specified location brush face and trigger main checking, user terminal brush face gathers face characteristic information, simultaneously, user terminal starts at least one in microphone, fingerprint capturer, starts to collect the sound information that user is not intended to send, or collects the finger print information of user.
202, to described main checking information with described verify respectively from checking information.
203, return the result being proved to be successful to described user terminal or verify failed result, the described result described main checking information of instruction that is proved to be successful and described from checking information all by checking, the failed result of described checking indicates described main checking information and described verifies unsuccessfully from least one checking information.
In the embodiment of the present invention, receive user terminal send main checking information and from checking information, described main checking information is that described user terminal is collected after the main checking triggering command receiving user's input, described is that described user terminal starts collection when collecting described main checking information from checking information, to described main checking information with described verify respectively from checking information, return the result being proved to be successful to described user terminal or verify failed result, described be proved to be successful result instruction described main checking information and described from checking information all by checking, the failed result of described checking indicates described main checking information and described verifies unsuccessfully from least one checking information. compared with prior art, the embodiment of the present invention provides the method for Information Authentication, it is possible to can be hidden when user's not perception information is carried out subordinate checking, it is to increase the security of Information Authentication.
Can selection of land, on the basis of embodiment corresponding to above-mentioned Fig. 2, in another embodiment of the method for the Information Authentication that the embodiment of the present invention provides, described to described main checking information with described verify respectively from checking information, it is possible to comprise:
According to described main checking information sample storehouse, described main checking information is verified;
Detect from whether checking information sample storehouse exists the described sample corresponding from checking information, when there is the described sample corresponding from checking information, compare described with the described sample corresponding from checking information from checking information, when do not exist described from the sample that checking information is corresponding time, using described from checking information stored in described from checking information sample storehouse as the described sample corresponding from checking information.
In the embodiment of the present invention, two sample storehouses can be set other equipment in the server or outside server, a sample storehouse is used for depositing the sample of main checking information, as: the sample that face verification information is corresponding, another sample storehouse is used for depositing other from sample corresponding to checking information, as: the sample of voice authentication information, the sample etc. of fingerprint identifier.
Recognition of face is a kind of biological identification technology that the facial feature information based on people carries out identification. Image or the video flowing of face is contained with pick up camera or camera collection, and automatic detection and tracking face in the picture, and then the face detected is carried out the technology of face recognition, usually also it is called Identification of Images, face recognition.
Speech recognition, it is also referred to as automatic speech recognition (AutomaticSpeechRecognition, ASR), its target is computer-readable input by the vocabulary Content Transformation in the voice of the mankind, such as button, binary coding or character string, confirming different from Speaker Identification and speaker, the latter attempts identifying or confirm the speaker sending voice, but not the vocabulary content wherein comprised.
Finger print identifying refers to there is rough and uneven in surface lines on the positive surface skin of finger tips, contains a large amount of information. The lines of these skins is different on pattern, breakpoint and intersection point, they are called " feature " by information processing, and these features have uniqueness and permanent, therefore we just can be mapped a people with his fingerprint, by the fingerprint characteristic comparing his fingerprint characteristic and preserve in advance, so that it may to verify his true identity.
Can selection of land, on the basis of embodiment corresponding to above-mentioned Fig. 2 or optional embodiment, in another optional embodiment of the method for the Information Authentication that the embodiment of the present invention provides, described method can also comprise:
Receive that described user terminal sends except described other except checking information are from checking information;
Described other are verified from checking information;
When described other from checking Information Authentication success after, return another result being proved to be successful to described user terminal.
In the embodiment of the present invention, when main checking information is by checking, in order to avoid because verifying failed situation from checking information gathering imperfect causing, in the embodiment of the present invention, in main checking information by checking, during from checking information failure, collect further some other again verify from checking information, thus further enhancing security.
For the ease of understanding, consult Fig. 3, another embodiment of the method for the Information Authentication that the embodiment of the present invention provides comprises: client terminal, Web server, checking code server, rule master control server, material storage server, and client terminal is also exactly user terminal, wherein;
After the main checking triggering command that client terminal inputs for receiving user, gather main checking information, and start the collection from checking information.
The connection of Web server for setting up between client terminal and checking code server, receives the described main checking information sent of client terminal and described from checking information, and by described main checking information with described forward to checking code server from checking information.
Checking code server is used for described main checking information and described verifies respectively from checking information.
Rule master control server is for storing main checking information and the checking rule from checking information.
Material storage server for store main checking information sample storehouse and from checking information sample storehouse.
When Information Authentication, checking code server can extract from rule master control server and verify rule accordingly, searches corresponding sample, compare in material storage server, thus completes the checking of main checking information and the checking from checking information.
Consulting Fig. 4, an embodiment of the user terminal that the embodiment of the present invention provides comprises:
Receive unit 301, for receiving the main checking triggering command of user's input;
Collecting unit 302, for, after described reception unit 301 receives the main checking triggering command that user inputs, gathering main checking information;
Start collector unit 303, for when described collecting unit 302 collects described main checking information, starting the collection from checking information;
Send unit 304, for send that described collecting unit 302 main checking information and described startup collector unit 303 collect to server from checking information so that described server to described main checking information and described is verified from checking information respectively;
Described reception unit 301, for receiving the result being proved to be successful that described server returns or the failed result of checking, the described result being proved to be successful is described server in described main checking information and described all sends by during checking from checking information, the failed result of described checking be described server described main checking information and described verify unsuccessfully from least one checking information time transmission.
In the embodiment of the present invention, receive the main checking triggering command that unit 301 receives user's input, collecting unit 302 is after described reception unit 301 receives the main checking triggering command of user's input, gather main checking information, start collector unit 303 when described collecting unit 302 collects described main checking information, start the collection from checking information, send unit 304 to server send that described collecting unit 302 main checking information and described startup collector unit 303 collect from checking information, so that described server to described main checking information and described is verified from checking information respectively, described reception unit 301 also receives the result being proved to be successful that described server returns or the failed result of checking, the described result being proved to be successful is described server in described main checking information and described all sends by during checking from checking information, described checking failed result be described server described main checking information and described verify unsuccessfully from least one checking information time transmission. compared with prior art, the embodiment of the present invention provides the method for Information Authentication, it is possible to can be hidden when user's not perception information is carried out subordinate checking, it is to increase the security of Information Authentication.
Can selection of land, on the basis of embodiment corresponding to above-mentioned Fig. 4, in another embodiment of the user terminal that the embodiment of the present invention provides,
Described startup collector unit 303, also for when described checking failed result instruction described main checking Information Authentication success, described from checking Information Authentication failure time, Resurvey is except described other except checking information are from the information of checking;
Described transmission unit 304, also for described server send described other from checking information so that described other are verified by described server from checking information;
Described reception unit 301, also for receiving another result being proved to be successful that described server returns, another result being proved to be successful described be described server to described other from sending during checking Information Authentication success.
Consulting Fig. 5, an embodiment of the server that the embodiment of the present invention provides comprises:
Receive unit 401, for receive user terminal send main checking information and from checking information, described main checking information is that described user terminal is collected after the main checking triggering command receiving user's input, and described is that described user terminal starts collection when collecting described main checking information from checking information;
Authentication unit 402, for the main checking information that received by described reception unit 401 with described verify respectively from checking information;
Send unit 403, for to described user terminal return described authentication unit 402 verify after the result being proved to be successful or the failed result of checking, the described result described main checking information of instruction that is proved to be successful and described from checking information all by checking, the failed result of described checking indicates described main checking information and described verifies unsuccessfully from least one checking information.
In the embodiment of the present invention, receive unit 401 receive user terminal send main checking information and from checking information, described main checking information is that described user terminal is collected after the main checking triggering command receiving user's input, described is that described user terminal starts collection when collecting described main checking information from checking information, the main checking information that described reception unit 401 is received by authentication unit 402 and described verify respectively from checking information, send unit 403 to described user terminal return described authentication unit 402 verify after the result being proved to be successful or the failed result of checking, described be proved to be successful result instruction described main checking information and described from checking information all by checking, the failed result of described checking indicates described main checking information and described verifies unsuccessfully from least one checking information. compared with prior art, the embodiment of the present invention provides the method for Information Authentication, it is possible to can be hidden when user's not perception information is carried out subordinate checking, it is to increase the security of Information Authentication.
Can selection of land, on the basis of embodiment corresponding to above-mentioned Fig. 5, in another embodiment of the server that the embodiment of the present invention provides,
Described authentication unit 402, for described main checking information being verified according to described main checking information sample storehouse, detect from whether checking information sample storehouse exists the described sample corresponding from checking information, when there is the described sample corresponding from checking information, compare described with the described sample corresponding from checking information from checking information, when do not exist described from the sample that checking information is corresponding time, using described from checking information stored in described from checking information sample storehouse as the described sample corresponding from checking information.
Can selection of land, on the basis of optional embodiment corresponding to embodiment corresponding to above-mentioned Fig. 5 or Fig. 5, in another embodiment of the server that the embodiment of the present invention provides,
Described reception unit 401, also for receive that described user terminal sends except described other except checking information are from checking information;
Described authentication unit 402, also described in being received by described reception unit 401, other are verified from checking information;
Send unit 403, also for when described in the checking of described authentication unit, other, after checking Information Authentication success, return another result being proved to be successful to described user terminal.
Please refer to Fig. 6, it illustrates the structural representation of the terminal involved by the embodiment of the present invention, this terminal may be used for implementing the method that the contact people of offer in above-described embodiment adds. Specifically:
Terminal 1200 can comprise RF (RadioFrequency, radio frequency) circuit 110, the storer 120 including one or more computer-readable recording mediums, input unit 130, display unit 140, sensor 150, voice frequency circuit 160, WiFi (wirelessfidelity, Wireless Fidelity) module 170, include one or the parts such as treater 180 that more than one processes core and power supply 190. It will be appreciated by those skilled in the art that, the restriction of the not structure paired terminal of the terminal structure shown in Fig. 6, it is possible to comprise the parts more more or less than diagram, or combine some parts, or different parts are arranged. Wherein:
RF circuit 110 can be used for receiving and sending messages or in communication process, the reception of signal and transmission, especially, after being received by the downlink information of base station, transfers to one or more than one treater 180 processes, in addition, the data relating to upper row are sent to base station. usually, RF circuit 110 includes but not limited to antenna, at least one amplifier, tuner, one or more vibrator, subscriber identity module (SIM) card, transceiver, coupling mechanism, LNA (LowNoiseAmplifier, low-noise amplifier), duplexer etc. in addition, RF circuit 110 can also by radio communication and network and other devices communicatings. described radio communication can use arbitrary communication standard or agreement, include but not limited to GSM (GlobalSystemofMobilecommunication, global system for mobile communications), GPRS (GeneralPacketRadioService, general packet radio service), CDMA (CodeDivisionMultipleAccess, code division multple access), WCDMA (WidebandCodeDivisionMultipleAccess, the many locations of wideband code division), LTE (LongTermEvolution, long-term evolution), e-mail, SMS (ShortMessagingService, Short Message Service) etc.
Storer 120 can be used for storing software program and module, and treater 180 is stored in software program and the module of storer 120 by running, thus performs the application of various function and data processing. Storer 120 can mainly comprise storage program district and store data field, wherein, stores program district and can store the application program needed for operating system, at least one function (such as sound-playing function, image player function etc.) etc.; Store the data (such as audio frequency data, phone directory etc.) etc. that data field can store the use according to terminal 1200 and create. In addition, storer 120 can comprise high-speed random access memory, it is also possible to comprises nonvolatile memory, such as at least one disk memory, flush memory device or other volatile solid-state parts. Correspondingly, storer 120 can also comprise storer controller, to provide treater 180 and input unit 130 to the access of storer 120.
Input unit 130 can be used for receiving numeral or the character information of input, and produces to arrange with user and function controls relevant keyboard, mouse, operating stick, optics or track ball signal input. Specifically, input unit 130 and can comprise touch-sensitive surperficial 131 and other input units 132. Touch-sensitive surperficial 131, also referred to as touch display screen or Trackpad, user can be collected or neighbouring touch operation (such as user uses finger, touch any applicable object such as pen or the operation of annex on touch-sensitive surperficial 131 or near touch-sensitive surperficial 131) thereon, and drive corresponding coupling device according to the formula set in advance. Optionally, touch-sensitive surperficial 131 can comprise touch detecting apparatus and touch controller two parts. Wherein, the touch orientation of touch detecting apparatus detection user, and detect the signal that touch operation brings, send signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and converts it to contact coordinate, then gives treater 180, and can the order sent of receiving processor 180 and performed. In addition, it is possible to adopt the broad varietys such as resistance-type, condenser type, infrared rays and surface acoustic wave to realize touch-sensitive surperficial 131. Except touch-sensitive surperficial 131, input unit 130 can also comprise other input units 132. Specifically, other input units 132 can include but not limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.), track ball, mouse, operating stick etc.
Display unit 140 can be used for showing the various graphical user interface of information or the information being supplied to user and the terminal 1200 inputted by user, and these graphical user interface can be made up of figure, text, icon, video and its arbitrary combination. Display unit 140 can comprise display panel 141, optionally, the form such as LCD (LiquidCrystalDisplay, liquid-crystal display), OLED (OrganicLight-EmittingDiode, Organic Light Emitting Diode) can be adopted to configure display panel 141. Further, touch-sensitive surperficial 131 can cover display panel 141, when touch-sensitive surperficial 131 detect thereon or after neighbouring touch operation, send treater 180 to determine the type of touch event, provide corresponding vision to export with preprocessor 180 on display panel 141 according to the type of touch event. Although in figure 6, touch-sensitive surperficial 131 is realize input and input function as two independent parts with display panel 141, but in certain embodiments, it is possible to integrated and realize input and output function with display panel 141 by touch-sensitive surperficial 131.
Terminal 1200 also can comprise at least one sensor 150, such as optical sensor, motion-sensing device and other sensors. Specifically, optical sensor can comprise ambient light sensor and close to sensor, wherein, ambient light sensor can regulate the brightness of display panel 141 according to the light and shade of environment light, when terminal 1200 moves in one's ear, display panel 141 and/or backlight can be closed close to sensor. As the one of motion-sensing device, Gravity accelerometer can detect the size of the acceleration that (is generally three axles) in all directions, size and the direction of gravity can be detected out time static, can be used for identifying the application (such as anyhow shielding switching, dependent game, magnetometer pose calibrating) of mobile phone attitude, Vibration identification correlation function (such as passometer, knock) etc.; As for other sensors such as the also configurable gyrostat of terminal 1200, weather gauge, wet bulb thermometer, thermometer, infrared sensors, do not repeat them here.
Voice frequency circuit 160, loud speaker 161, microphone 162 can provide the audio frequency interface between user and terminal 1200. Voice frequency circuit 160 the audio frequency data that receive can be changed after electrical signal, be transferred to loud speaker 161, be converted to voice signal by loud speaker 161 and export; On the other hand, the voice signal of collection is converted to electrical signal by microphone 162, audio frequency data are converted to after receiving by voice frequency circuit 160, after again audio frequency data output processing device 180 being processed, through RF circuit 110 to be sent to such as another terminal, or export audio frequency data to storer 120 to process further. Voice frequency circuit 160 also may comprise earphone jack, to provide peripheral hardware earphone and the communication of terminal 1200.
WiFi belongs to short range wireless transmission technology, and terminal 1200 can help user to send and receive e-mail by WiFi module 170, browse webpage and access streaming media etc., and its broadband internet wireless for user provides is accessed. Although Fig. 6 shows WiFi module 170, it should be understood that, it does not belong to must forming of terminal 1200, can omit in the scope of essence not changing invention as required completely.
Treater 180 is the control center of terminal 1200, utilize various interface and each part of the whole mobile phone of connection, by running or perform the software program that is stored in storer 120 and/or module, and call the data being stored in storer 120, perform various function and the process data of terminal 1200, thus mobile phone is carried out integral monitoring. Optionally, treater 180 can comprise one or more process core; Preferably, treater 180 can Integrated predict model treater and modem processor, wherein, answer purpose processor mainly to process operating system, user interface and application program etc., modem processor mainly processes radio communication. It should be appreciated that above-mentioned modem processor can not also be integrated in treater 180.
Terminal 1200 also comprises to the power supply 190 (such as battery) that each parts are powered, preferably, power supply can be connected with treater 180 logic by power-supply management system, thus realized the functions such as management charging, electric discharge and power managed by power-supply management system. Power supply 190 can also comprise one or more direct current or AC power, recharges system, power failure detection circuit, Power convert device or the random component such as invertor, power supply status indicator.
Although not illustrating, terminal 1200 can also comprise camera, bluetooth module etc., does not repeat them here. Specifically in the present embodiment, the display unit of terminal is touch-screen display, terminal also includes storer, and one or more than one program, one of them or more than one program are stored in storer, and are configured to perform to state one or more than one routine package by one or more than one treater containing the instruction for carrying out following operation:
After receiving the main checking triggering command of user's input, gather main checking information, and start the collection from checking information;
Described main checking information and described from checking information is sent, so that described server to described main checking information and described is verified from checking information respectively to server;
Receive the result being proved to be successful that described server returns or the failed result of checking, the described result being proved to be successful is described server in described main checking information and described all sends by during checking from checking information, the failed result of described checking be described server described main checking information and described verify unsuccessfully from least one checking information time transmission.
Assume that above-mentioned is the first possible enforcement mode, then, in the 2nd kind of possible enforcement mode provided based on the enforcement mode that the first is possible, in the storer of described terminal, also comprise the instruction for performing following operation:
When the result instruction described main checking Information Authentication success that described checking is failed, described from, when verifying Information Authentication failure, described method also comprises:
Resurvey except described except checking information other from checking information;
Described in sending to described server, other are from checking information, so that described other are verified by described server from checking information;
Receive another result being proved to be successful that described server returns, another result being proved to be successful described be described server to described other from sending during checking Information Authentication success.
In sum, the terminal that the present embodiment provides, after receiving the main checking triggering command of user's input, gather main checking information, and start the collection from checking information, to server send described main checking information and described from checking information, so that described server to described main checking information and described is verified from checking information respectively, receive the result being proved to be successful that described server returns or the failed result of checking, the described result being proved to be successful is described server in described main checking information and described all sends by during checking from checking information, described checking failed result be described server described main checking information and described verify unsuccessfully from least one checking information time transmission. compared with prior art, the embodiment of the present invention provides the method for Information Authentication, it is possible to can be hidden when user's not perception information is carried out subordinate checking, it is to increase the security of Information Authentication.
As on the other hand, yet another embodiment of the invention additionally provides a kind of computer-readable recording medium, and this computer-readable recording medium can be the computer-readable recording medium comprised in the storer in above-described embodiment; Can also be Individual existence, be unkitted the computer-readable recording medium allocating in terminal. Described computer-readable recording medium stores one or more than one program, and described one or more than one program are used for performing the method for an Information Authentication by one or more than one treater, and described method comprises:
After receiving the main checking triggering command of user's input, gather main checking information, and start the collection from checking information;
Described main checking information and described from checking information is sent, so that described server to described main checking information and described is verified from checking information respectively to server;
Receive the result being proved to be successful that described server returns or the failed result of checking, the described result being proved to be successful is described server in described main checking information and described all sends by during checking from checking information, the failed result of described checking be described server described main checking information and described verify unsuccessfully from least one checking information time transmission.
Assume that above-mentioned is the first possible enforcement mode, in the 2nd kind of possible enforcement mode then provided based on the enforcement mode that the first is possible, when the result instruction described main checking Information Authentication success that described checking is failed, described from, when verifying Information Authentication failure, described method also comprises:
Resurvey except described except checking information other from checking information;
Described in sending to described server, other are from checking information, so that described other are verified by described server from checking information;
Receive another result being proved to be successful that described server returns, another result being proved to be successful described be described server to described other from sending during checking Information Authentication success.
Fig. 7 is the structural representation of embodiment of the present invention server 40. Server 40 can comprise input unit 410, output equipment 420, treater 430 and storer 440.
The computing node that the server 40 that the embodiment of the present invention provides is applied in clustered database system, described computing node has multiple, described cluster data system also comprises coordinator node, described coordinator node is provided with the solid-state hard disk SSD that multiple computing node is shared, each computing node is respectively arranged with internal memory.
Storer 440 can comprise read-only storage and random access memory, and provides instruction and data to treater 430. A part for storer 440 can also comprise non-volatile random access memory (NVRAM).
Storer 440 stores following element, can execution module or data structure, or their subset, or their expansion collection:
Operational order: comprise various operational order, for realizing various operation.
Operating system: comprise various system program, for realizing various basic business and process hardware based task.
In embodiments of the present invention, the operational order (this operational order can store in an operating system) that treater 430 stores by calling storer 440, performs to operate as follows:
By input unit 410 receive user terminal send main checking information and from checking information, described main checking information is that described user terminal is collected after the main checking triggering command receiving user's input, and described is that described user terminal starts collection when collecting described main checking information from checking information;
To described main checking information with described verify respectively from checking information;
Returned the result being proved to be successful or the failed result of checking to described user terminal by output equipment 420, the described result described main checking information of instruction that is proved to be successful and described from checking information all by checking, the failed result of described checking indicates described main checking information and described verifies unsuccessfully from least one checking information.
The server 40 that the embodiment of the present invention provides, it is possible to when user's not perception can be hidden information is carried out subordinate checking, it is to increase the security of Information Authentication.
The operation of treater 430 Control Server 40, treater 430 can also be called CPU (CentralProcessingUnit, central processing unit). Storer 440 can comprise read-only storage and random access memory, and provides instruction and data to treater 430. A part for storer 440 can also comprise non-volatile random access memory (NVRAM). In concrete application, each assembly of server 40 is coupled by total wire system 450, and wherein total wire system 450 is except comprising data bus, it is also possible to comprise power supply bus, control bus and status signal bus in addition etc. But for the purpose of clearly demonstrating, in the drawings various bus is all designated as total wire system 450.
The method that the above-mentioned embodiment of the present invention discloses can be applied in treater 430, or realizes by treater 430. Treater 430 may be a kind of integrated circuit (IC) chip, has the processing power of signal. Realizing in process, each step of aforesaid method can be completed by the instruction of the integrated logic circuit of the hardware in treater 430 or software form. Above-mentioned treater 430 can be general procedure device, digital signal processor (DSP), application specific integrated circuit (ASIC), ready-made programmable gate array (FPGA) or other programmable logic device parts, discrete gate or transistor logical device, discrete hardware components. Can realize or perform the disclosed each method in the embodiment of the present invention, step and logic diagram. General procedure device can be microprocessor or this treater can also be the treater etc. of any routine. Step in conjunction with the method disclosed in the embodiment of the present invention can directly be presented as that hardware decoding processor is complete, or complete with the hardware in decoding processor and software module combination. Software module can be positioned at random access memory, flash memory, read-only storage, in the storage media of this area maturations such as programmable read only memory or electrically erasable programmable storer, register. This storage media is positioned at storer 440, and treater 430 reads the information in storer 440, completes the step of aforesaid method in conjunction with its hardware.
Can selection of land, described treater 430 is specifically for verifying described main checking information according to described main checking information sample storehouse, detect from whether checking information sample storehouse exists the described sample corresponding from checking information, when there is the described sample corresponding from checking information, compare described with the described sample corresponding from checking information from checking information, when do not exist described from the sample that checking information is corresponding time, using described from checking information stored in described from checking information sample storehouse as the described sample corresponding from checking information.
Can selection of land, described input unit 410 also for receive that described user terminal sends except described other except checking information are from checking information;
Described treater 430 is also for verifying from checking information described other;
Described output equipment 420 also for when described other from checking Information Authentication success after, return another result being proved to be successful to described user terminal.
Consulting Fig. 8, an embodiment of the system of the Information Authentication that the embodiment of the present invention provides comprises: family terminal and server,
Described user terminal 30, for receive user input main checking triggering command after, gather main checking information, and start to from checking information collection, to server send described main checking information and described from checking information;
Described server 40, for described main checking information with described verify respectively from checking information;
Described user terminal 30, for receiving the result being proved to be successful that described server returns or the failed result of checking, the described result being proved to be successful is described server in described main checking information and described all sends by during checking from checking information, the failed result of described checking be described server described main checking information and described verify unsuccessfully from least one checking information time transmission.
Compared with prior art, the embodiment of the present invention provides the system of Information Authentication, it is possible to can be hidden when user's not perception information is carried out subordinate checking, it is to increase the security of Information Authentication.
The all or part of step that one of ordinary skill in the art will appreciate that in the various methods of above-described embodiment can be completed by the hardware (such as treater) that program carrys out instruction relevant, this program can be stored in a computer-readable recording medium, and storage media can comprise: ROM, RAM, disk or CD etc.
The method of the Information Authentication embodiment of the present invention provided above, user terminal, server and system are described in detail, apply specific case herein the principle of the present invention and enforcement mode to have been set forth, illustrating just for helping the method understanding the present invention and core concept thereof of above embodiment; Meanwhile, for one of ordinary skill in the art, according to the thought of the present invention, all will change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.

Claims (11)

1. the method for an Information Authentication, it is characterised in that, comprising:
After receiving the main checking triggering command of user's input, gather main checking information, and start the collection from checking information;
Described main checking information and described from checking information is sent, so that described server to described main checking information and described is verified from checking information respectively to server;
Receive the result being proved to be successful that described server returns or the failed result of checking, the described result being proved to be successful is described server in described main checking information and described all sends by during checking from checking information, the failed result of described checking be described server described main checking information and described verify unsuccessfully from least one checking information time transmission.
2. method according to claim 1, it is characterised in that, when the result instruction described main checking Information Authentication success that described checking is failed, described from, when verifying Information Authentication failure, described method also comprises:
Resurvey except described except checking information other from checking information;
Described in sending to described server, other are from checking information, so that described other are verified by described server from checking information;
Receive another result being proved to be successful that described server returns, another result being proved to be successful described be described server to described other from sending during checking Information Authentication success.
3. the method for an Information Authentication, it is characterised in that, comprising:
Receive user terminal send main checking information and from checking information, described main checking information is that described user terminal is collected after the main checking triggering command receiving user's input, and described is that described user terminal starts collection when collecting described main checking information from checking information;
To described main checking information with described verify respectively from checking information;
Return the result being proved to be successful to described user terminal or verify failed result, the described result described main checking information of instruction that is proved to be successful and described from checking information all by checking, the failed result of described checking indicates described main checking information and described verifies unsuccessfully from least one checking information.
4. method according to claim 3, it is characterised in that, described to described main checking information with described verify respectively from checking information, comprising:
According to described main checking information sample storehouse, described main checking information is verified;
Detect from whether checking information sample storehouse exists the described sample corresponding from checking information, when there is the described sample corresponding from checking information, compare described with the described sample corresponding from checking information from checking information, when do not exist described from the sample that checking information is corresponding time, using described from checking information stored in described from checking information sample storehouse as the described sample corresponding from checking information.
5. method according to claim 3 or 4, it is characterised in that, described method also comprises:
Receive that described user terminal sends except described other except checking information are from checking information;
Described other are verified from checking information;
When described other from checking Information Authentication success after, return another result being proved to be successful to described user terminal.
6. a user terminal, it is characterised in that, comprising:
Receive unit, for receiving the main checking triggering command of user's input;
Collecting unit, for, after described reception unit receives the main checking triggering command that user inputs, gathering main checking information;
Start collector unit, for when described collecting unit collects described main checking information, starting the collection from checking information;
Send unit, for sending described main checking information and described from checking information to server, so that described server to described main checking information and described is verified from checking information respectively;
Described reception unit, also for receiving the result being proved to be successful that described server returns or the failed result of checking, the described result being proved to be successful is described server in described main checking information and described all sends by during checking from checking information, the failed result of described checking be described server described main checking information and described verify unsuccessfully from least one checking information time transmission.
7. user terminal according to claim 6, it is characterised in that,
Described startup collector unit, also for when described checking failed result instruction described main checking Information Authentication success, described from checking Information Authentication failure time, Resurvey is except described other except checking information are from the information of checking;
Described transmission unit, also for described server send described other from checking information so that described other are verified by described server from checking information;
Described reception unit, also for receiving another result being proved to be successful that described server returns, another result being proved to be successful described be described server to described other from sending during checking Information Authentication success.
8. a server, it is characterised in that, comprising:
Receive unit, for receive user terminal send main checking information and from checking information, described main checking information is that described user terminal is collected after the main checking triggering command receiving user's input, and described is that described user terminal starts collection when collecting described main checking information from checking information;
Authentication unit, for the main checking information that received by described reception unit with described verify respectively from checking information;
Send unit, for to described user terminal return described authentication unit verify after the result being proved to be successful or the failed result of checking, the described result described main checking information of instruction that is proved to be successful and described from checking information all by checking, the failed result of described checking indicates described main checking information and described verifies unsuccessfully from least one checking information.
9. server according to claim 8, it is characterised in that,
Described authentication unit, for described main checking information being verified according to described main checking information sample storehouse, detect from whether checking information sample storehouse exists the described sample corresponding from checking information, when there is the described sample corresponding from checking information, compare described with the described sample corresponding from checking information from checking information, when do not exist described from the sample that checking information is corresponding time, using described from checking information stored in described from checking information sample storehouse as the described sample corresponding from checking information.
10. server according to claim 8 or claim 9, it is characterised in that,
Described reception unit, also for receive that described user terminal sends except described other except checking information are from checking information;
Described authentication unit, also described in being received by described reception unit, other are verified from checking information;
Send unit, also for when described in the checking of described authentication unit, other, after checking Information Authentication success, return another result being proved to be successful to described user terminal.
The system of 11. 1 kinds of Information Authentications, it is characterised in that, comprising: user terminal and server,
Described user terminal is the user terminal described in the claims 6 or 7;
Described server is the arbitrary described server of the claims 8-10.
CN201410640646.6A 2014-11-13 2014-11-13 Information verification method, user terminal, server and system Pending CN105656851A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410640646.6A CN105656851A (en) 2014-11-13 2014-11-13 Information verification method, user terminal, server and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410640646.6A CN105656851A (en) 2014-11-13 2014-11-13 Information verification method, user terminal, server and system

Publications (1)

Publication Number Publication Date
CN105656851A true CN105656851A (en) 2016-06-08

Family

ID=56479568

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410640646.6A Pending CN105656851A (en) 2014-11-13 2014-11-13 Information verification method, user terminal, server and system

Country Status (1)

Country Link
CN (1) CN105656851A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106716429A (en) * 2016-08-31 2017-05-24 深圳前海达闼云端智能科技有限公司 Monitoring method and device, and electronic equipment
CN107463851A (en) * 2016-06-02 2017-12-12 广州市动景计算机科技有限公司 The method, apparatus and system of page checking

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930436A (en) * 2012-10-23 2013-02-13 江苏乐买到网络科技有限公司 Mobile payment method and device
CN203102365U (en) * 2012-12-28 2013-07-31 国民技术股份有限公司 Terminal and authentication apparatus
CN104077689A (en) * 2013-10-30 2014-10-01 腾讯科技(深圳)有限公司 Information verification method, relevant device and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930436A (en) * 2012-10-23 2013-02-13 江苏乐买到网络科技有限公司 Mobile payment method and device
CN203102365U (en) * 2012-12-28 2013-07-31 国民技术股份有限公司 Terminal and authentication apparatus
CN104077689A (en) * 2013-10-30 2014-10-01 腾讯科技(深圳)有限公司 Information verification method, relevant device and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107463851A (en) * 2016-06-02 2017-12-12 广州市动景计算机科技有限公司 The method, apparatus and system of page checking
CN107463851B (en) * 2016-06-02 2020-11-27 阿里巴巴(中国)有限公司 Page verification method, device and system
CN106716429A (en) * 2016-08-31 2017-05-24 深圳前海达闼云端智能科技有限公司 Monitoring method and device, and electronic equipment
WO2018040045A1 (en) * 2016-08-31 2018-03-08 深圳前海达闼云端智能科技有限公司 Monitoring method, apparatus and electronic device

Similar Documents

Publication Publication Date Title
AU2018311739B2 (en) Fingerprint recognition method and related products
US10643056B2 (en) Fingerprint recognition method and related products
US11290447B2 (en) Face verification method and device
CN103400108B (en) Face identification method, device and mobile terminal
CN104298666B (en) Webpage sharing method and device
CN107292235B (en) fingerprint acquisition method and related product
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN106126015A (en) A kind of application program launching control method and terminal
CN104796385A (en) Terminal binding method, device and system
CN107437009A (en) Authority control method and related product
CN107451450B (en) Biometric identification method and related product
CN103345602A (en) Client-side code integrality detection method, device and system
CN107545166A (en) Biometric discrimination method and Related product
CN103687063B (en) A kind of method of interconnection network, device and terminal equipment
CN104239343A (en) User input information processing method and device
CN109257336A (en) It is a kind of based on the encrypted message processing method of block chain, terminal device
CN106022071A (en) Fingerprint unlocking method and terminal
CN104217172A (en) Privacy content checking method and device
CN104573437A (en) Information authentication method, device and terminal
CN105868598A (en) Method and terminal for fingerprint unlocking
CN106126171A (en) A kind of sound effect treatment method and mobile terminal
CN109413256A (en) Contact person information processing method, device, storage medium and electronic equipment
CN105471888A (en) Business verification method and device based on biological feature information
CN105656851A (en) Information verification method, user terminal, server and system
CN107506628A (en) Biometric discrimination method and Related product

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160608

RJ01 Rejection of invention patent application after publication