CN106096369A - Method, device and mobile terminal to terminal user ID checking - Google Patents
Method, device and mobile terminal to terminal user ID checking Download PDFInfo
- Publication number
- CN106096369A CN106096369A CN201610431768.3A CN201610431768A CN106096369A CN 106096369 A CN106096369 A CN 106096369A CN 201610431768 A CN201610431768 A CN 201610431768A CN 106096369 A CN106096369 A CN 106096369A
- Authority
- CN
- China
- Prior art keywords
- pulse information
- user
- information
- pulse
- default
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
It relates to a kind of method and device to terminal user ID checking, described method includes: obtain the pulse information of user;Described pulse information is mated with the default pulse information in pulse data storehouse, it is thus achieved that matching result;When described matching result be described pulse information mate with described default pulse information time, by the authentication to described user.Pulse data storehouse and default pulse information are preset in having the beneficial effect that in terminal system of the disclosure, then can judge whether to pass through authentication to the user belonging to this pulse information when pulse information being detected, avoid user owing to the situation generation of authentication cannot be completed when other type of authentication mode lost efficacy, whole proof procedure can be judged voluntarily by terminal and start to arrange without user, brings a kind of splendid Consumer's Experience to user.
Description
Technical field
The present embodiments relate to field of mobile terminals, particularly relate to a kind of side being realized authentication by pulse identification
Method, device and mobile terminal.
Background technology
Identification can realize the terminal system judgement to the identity of terminal unit active user so that terminal system is only
Man-machine interaction can be carried out, such that it is able to be that terminal preserves when recognizing correct user (i.e. the holder of equipment)
Various information provides safety guarantee.
The identity recognition function of terminal unit is one of the most frequently used and the most conventional function, along with the development of smart mobile phone,
Identification to entering terminal system has obtained further development, conventional Password Input develop fingerprint recognition and (refer to
The uniqueness of stricture of vagina), the mode such as sound wave identification (uniqueness of tone color) carry out identification.
The technology such as fingerprint recognition, sound wave identification have been widely used in existing all kinds of mobile terminal, pass through fingerprint
Identify that the deciphering realizing mobile terminal system for use in carrying has the behaviour of identification with encryption, the security verification etc. of mobile payment
Make the most common, but, when carrying out fingerprint recognition or sound wave identification due to easily by environmental factors, as temperature, injure unexpectedly,
The impact of the factors such as external interference sound appearance so that fingerprint recognition is not readily accomplished, and from the point of view of user, fingerprint is at the body of terminal
Part has bigger restriction when identifying.
Summary of the invention
The present invention provides a kind of method and device being realized authentication by pulse identification, with by the distinctive arteries and veins of user
Information of fighting, to carry out the checking of user identity, relieves the restriction in traditional identification mode, improves user
Experience.
The present invention also provides for a kind of mobile terminal, and its processor comprised can be arranged to realize by pulse identification
The method realizing authentication, thus the mode of a kind of new identification is provided for mobile terminal, promote Consumer's Experience.
First aspect, disclosure embodiment provides a kind of method to terminal user ID checking, its concrete enforcement
Scheme is as follows:
Obtain the pulse information of user;
Described pulse information is mated with the default pulse information in pulse data storehouse, it is thus achieved that matching result;
When described matching result be described pulse information mate with described default pulse information time, by described user's
Authentication.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: by the pulse information of user with
The default matching result depositing pulse information completes the authentication process itself to user, starts inspection when user starts to take out terminal
Survey pulse information, checking can be completed the soonest when terminal presents in front of the user, thus eliminate user and take terminal the
One step needs to be manually entered the step of checking, greatly improves Consumer's Experience.
In conjunction with on the other hand, in a kind of possible embodiment on the other hand, described method also includes:
When described matching result be described pulse information do not mate with described default pulse information time, obtain user another
Checking information;
Whether pass through according to set strategy detection another checking information described that user sets;
When another checking information described is passed through, by the authentication to described user.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: during the actually used terminal of user
Situation is extremely complex, and pulse information all may be caused to be different from default pulse information, the most then provide a user with another checking
Mode, so that user conveniently enters system equally.
In conjunction with on the other hand, in a kind of possible embodiment on the other hand, described by described pulse information and arteries and veins
The default pulse information fought in data base mates, and draws matching result, including:
Obtain the value that fluctuates of described default pulse information;
When described pulse information mates with described default pulse information, also include:
Judge whether the numerical value of described pulse information is positioned at the scope that the value that fluctuates of described default pulse information comprises
In;
When the numerical value of described pulse information is positioned in the range of the value that fluctuates of described default pulse information comprises, it is determined that
Described pulse information is successfully with the matching result of default pulse information.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: during the actually used terminal of user
Situation is extremely complex, and pulse information all may be caused to be different from default pulse information, and by floating downward on acquisition pulse information
Dynamic value and preset the mode of certain pulse information scope, can make pulse start shooting this mode can adapt in more multiple relatively
For complicated situation, started shooting so that user the most all can just often rely on pulse information by checking.
In conjunction with on the other hand, in a kind of possible embodiment on the other hand, described method also includes:
When described matching result be described pulse information do not mate with described default pulse information time, in a Preset Time
Detection user gets the pulse information of described user the most again;
When again getting the pulse information of described user in Preset Time being detected, send to user and described pulse is believed
Breath is added to preset the request of pulse information;
Respond described request, to add described pulse information to pulse data storehouse.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: the coupling at pulse information is lost
Lose, and when determining correct user that active user is terminal, then can be by again providing a user with pulse in Preset Time
The mode of information makes to add in pulse data storehouse by this group pulse information, when this group pulse information again being detected
Normal through checking.
In conjunction with another aspect, in a kind of possible embodiment on the other hand, the described pulse information obtaining user,
Including:
Detect described pulse information changing value within the unit interval;
When described changing value is more than a predetermined threshold value, abandon described pulse information;
Repeat above step, until detecting that described pulse information changing value within the unit interval is less than or equal to
During described predetermined threshold value, choose the described pulse information pulse information as the described user obtained.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: pulse information is when same unit
In can have a change, and when changing value is more than a predetermined threshold value amount, then illustrate that now user is being carried out more fierce
Motor pattern, the pulse information obtained under this kind of pattern is general not in pulse data storehouse, it is therefore desirable to reacquire until it
The changing value of pulse information is less than described predetermined threshold value.
On the other hand, in conjunction with, in a kind of possible embodiment on the other hand, described include when described matching result
When described pulse information mates with described default pulse information, after the authentication to described user, also include:
Generating the identification code of described pulse information, described identification code is for closing other authentication side of described user
Formula, to carry out the sole mode of authentication by described pulse information as described user.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: close other body by identification code
Part verification mode, and only retain pulse information checking, can be by using the degree of accuracy training pulse information checking for a long time.
Second aspect, disclosure embodiment additionally provides a kind of device to terminal user ID checking, described device bag
Include:
Acquisition module, is arranged to obtain the pulse information of user;
Matching module, is arranged to carry out the default pulse information in described pulse information and pulse data storehouse
Join, it is thus achieved that matching result;
First authentication module, is arranged to when described matching result includes that described pulse information is believed with described default pulse
During breath coupling, by the authentication to described user.
In conjunction with on the other hand, in a kind of possible embodiment on the other hand, described device also includes:
Second acquisition module, is arranged to when described matching result is described pulse information and described default pulse information
When not mating, obtain another checking information of user;
Strategy detection module, is arranged to whether the set strategy according to user sets detects another checking information described
Pass through;
Second authentication module, is arranged to when another checking information described is passed through, by the identity to described user
Checking.
In conjunction with on the other hand, in a kind of possible embodiment on the other hand, described matching module includes:
3rd obtains submodule, is arranged to obtain the value that fluctuates of described default pulse information;
Described first authentication module also includes:
Judge submodule, be arranged to judge whether the numerical value of described pulse information is positioned at described default pulse information
In the range of the value that fluctuates comprises;
It is verified submodule, is arranged to when the numerical value of described pulse information is positioned at the upper of described default pulse information
In the range of lower float value comprises, it is determined that described pulse information is successfully with the matching result of default pulse information.
In conjunction with on the other hand, in a kind of possible embodiment on the other hand, described device also includes:
3rd acquisition module, is arranged to when described matching result is described pulse information and described default pulse information
When not mating, in a Preset Time, detect user the most again get the pulse information of described user;
Request module, when again getting the pulse information of described user in being arranged to Preset Time be detected, to
User sends the request that described pulse information is added to preset pulse information;
Respond module, is arranged to respond described request, to add described pulse information to pulse data storehouse.
In conjunction with on the other hand, in a kind of possible embodiment on the other hand, described acquisition module includes:
Numerical value detection sub-module, is arranged to the changing value detecting described pulse information within the unit interval;
Discard module, is arranged to, when described changing value is more than a predetermined threshold value, abandon described pulse information;
Replicated blocks, are arranged to repeat above step, until detecting that described pulse information is in the unit interval
When interior changing value is less than or equal to described predetermined threshold value, choose the described pulse information pulse letter as the described user obtained
Breath.
In conjunction with on the other hand, in a kind of possible embodiment on the other hand, described device also includes:
Mark module, is arranged to generate the identification code of described pulse information, and described identification code is used for closing described use
Other authentication mode at family, to carry out the sole mode of authentication by described pulse information as described user.
The third aspect, disclosure embodiment additionally provides a kind of mobile terminal, and it applies the method described in first aspect,
Including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Start the pulse identification service in terminal;
Obtain the pulse information of user;
Described pulse information is mated with the default pulse information in pulse data storehouse, it is thus achieved that matching result;
When described matching result includes that described pulse information mates with described default pulse information, by described user
Authentication.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: mobile terminal has pulse identification
Function, has provided the user a kind of new authentication mode, has greatly improved Consumer's Experience.
It should be appreciated that it is only exemplary and explanatory, not that above general description and details hereinafter describe
The disclosure can be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the disclosure
Example, and for explaining the principle of the disclosure together with description.
Fig. 1 is the flow chart according to a kind of method to terminal user ID checking shown in an exemplary embodiment.
Fig. 2 is the schematic diagram according to the partial steps shown in an exemplary embodiment.
Fig. 3 is the schematic diagram according to the partial steps shown in an exemplary embodiment.
Fig. 4 is the block diagram according to a kind of device to terminal user ID checking shown in an exemplary embodiment
Fig. 5 is the frame of the device according to a kind of method to terminal user ID checking shown in an exemplary embodiment
Figure.
Detailed description of the invention
With embodiment, the disclosure is described in further detail below in conjunction with the accompanying drawings.It is understood that this place is retouched
The specific embodiment stated is used only for explaining the disclosure, rather than restriction of this disclosure.It also should be noted that, in order to just
The part relevant to the disclosure is illustrate only rather than entire infrastructure in description, accompanying drawing.
It should be mentioned that, some exemplary embodiments are described as before being discussed in greater detail exemplary embodiment
The process described as flow chart or method.Although each step is described as by flow chart order process, but therein permitted
Multi-step can be implemented concurrently, concomitantly or simultaneously.Additionally, the order of each step can be rearranged, when it operates
When completing, described process can be terminated, it is also possible to have other step being not included in accompanying drawing.Process can be corresponding
In method, function, code, subroutine, subprogram etc..
It relates to a kind of method and device to terminal user ID checking, it mainly applies to terminal unit
In authentication scene, its basic thought is: obtain the pulse information of user, in the pulse information and pulse data storehouse of user
Default pulse coupling time, then can pass through the terminal unit authentication to user, pulse information therein can be examined on the spot
Survey, it is also possible to obtaining during terminal is carried, it brings a kind of brand-new authentication mode to user.
The present embodiment is applicable in the intelligent terminal with authentication module carry out the feelings of pulse information checking
In condition, the device that the method can be verified by pulse information performs, and wherein this device can come real by software and/or hardware
Existing, usually can be integrated in mobile terminal, or the Central Control Module in terminal controls, Fig. 1 is that the disclosure is exemplary
A kind of flow chart of method to terminal user ID checking that embodiment provides, as it is shown in figure 1, described method specifically include as
Lower step:
In step 110, the pulse information of user is obtained;
Obtain the pulse information of user, the arteries and veins of user can be obtained by pulse information detection device integrated in terminal
Fight, it is also possible to detected by the most all kinds of electronic wristwatch of wearable device supporting with terminal.
Described pulse information can be obtained when needs carry out authentication on the spot by user, it is also possible to passes through wearable device
In the pulse information of this user that stored provide, such as wearable device detects the pulse of user during dressing (can
It is acquired by the automatic acquisition module of pulse wave) and store, when carrying out authentication, by obtaining in this wearable device
The pulse information of storage is supplied to terminal to carry out authentication.
Pulse information therein, includes the characteristic vector of pulse, complete pulse waveform figure, and the pulse detected
The signal of telecommunication etc. changed into, it is mainly used in distinguishing the difference of the information that pulse is comprised and realizing the knowledge of the identity to user
Not.
In the step 120, it is judged that whether pulse information mates with default pulse information;
Described pulse information is mated with the default pulse information in pulse data storehouse, it is thus achieved that matching result;
In the terminal provided by pulse authentication module realize the storage in pulse data storehouse, or be integrated in terminal
One function of middle system for use in carrying or software realize the storage of pulse information.
When getting pulse information, carry out mating behaviour with all pulse informations in pulse data storehouse by this pulse information
Make.
In pulse data storehouse, the default pulse information of storage may have multiple, and different default pulse informations may cause
Different authentication result or operate the most accordingly, such as, presets pulse information and may generate different
Enable signal, so that start application different in terminal, opens different terminal hardware supports etc., enable signal therein
Can be the driving signal starting application, can be usually a signal of telecommunication, to start hardware driving circuit in terminal.
The matching result obtained, can be to find mate with described pulse information default in described pulse data storehouse
Pulse information, it is also possible to for not finding the default pulse information mated with described pulse information in described pulse data storehouse.
In step 130, when described matching result be described pulse information mate with described default pulse information time, pass through
Authentication to described user.
Described coupling refers to the characteristic vector of the information included by pulse information, such as pulse, with therein one pre-
If the characteristic vector of pulse information matches, the most described pulse information matches with described default pulse information.
And when coupling, then can according to matched default pulse information corresponding enable signal completion system
In checking to user identity.
And when matching with multinomial default pulse information therein, open corresponding to every default pulse information the most simultaneously
Correlation function.
The operation principle of the method: preset pulse data storehouse and default pulse information in terminal system, then detecting
During pulse information, this pulse information is judged, it is judged that whether it mates, and then judge whether to be entered by authentication
In terminal system, whole process can be judged voluntarily by terminal and start to arrange without user, brings a kind of splendid to user
Consumer's Experience.
When pulse information does not mates, then can carry out authentication by the second verification mode, this second is verified
Mode can not repeatedly be chosen feasible verification mode in the case of can not being successfully completed authentication and select for user, its
The step potentially included is as follows:
In step 140, matching result cannot obtain, and enters the second checking;
When described matching result includes that described pulse information does not mates with described default pulse information, obtain the another of user
One checking information;
Such as, when passing through authentication by pulse information verification mode, then other identity obtained in terminal is tested
Card mode, such as fingerprint recognition, speech recognition, iris identification and 3D rendering identification etc., another checking information refers to right
Such as finger print information, voice messaging corresponding to the verification mode answered, iris information, user's facial feature information etc..
In step 150, whether pass through according to set strategy detection another checking information described that user sets;
The proof procedure of the corresponding identification mode of the set strategy default the most in the terminal that user sets, when
When meeting its set strategy, then can determine that as passing through.
Set strategy can pre-set in the terminal.
In a step 160, when another checking information described is passed through, by the authentication to described user;
When another checking information is passed through, i.e. authentication is passed through, and reaches to use pulse information to realize authentication identical
Effect, i.e. enters system or software.
In this step, when another checking information described not by time, then return in step 140, reacquire one the
Three kinds of verification modes, till can be by authentication, during this, the authentication side of another checking information described
Formula can also repeat, and can repeat when all of authentication mode is used up.
In the step 120, may also include the tolerance value of the matching process to pulse information, it is to avoid owing to pulse information exists
During coupling due to excessively accurately and cause cannot the generation of the situation that the match is successful, its embodiment includes the following:
In step 210, the value that fluctuates of described default pulse information is obtained;
When described pulse information includes its characteristic vector, then obtain the value that fluctuates of its characteristic vector, described
When pulse information includes its pulse waveform figure, then obtain the value that fluctuates of its pulse waveform figure, i.e. this step obtains
Pulse information scope (float value top/bottom latitude and the value that fluctuates of oscillogram such as its characteristic vector of its value of fluctuating
Scope).
When described pulse information mates with described default pulse information, also include:
In a step 220, whether the numerical value of pulse information described in matching judgment is positioned at the upper and lower of described default pulse information
In the range of float value comprises;
Mating the numerical value of described pulse information, this matching process is fluctuating at described default pulse information
In the range of described pulse information mated.
Meanwhile, in this step, it is possible to the matching degree of pulse information is adjusted, such as, under certain conditions
Degree of joining reaches 80% complete match when spending, i.e. can be determined that described pulse information for coupling, without excessively requiring pulse information
Accurately coupling reach 100%.
This kind of mode, in the case of ensureing that pulse information is owning user, can make to carry out identity by pulse information and test
The percent of pass of the mode of card and verification efficiency etc. are substantially improved.
In step 230, comprise when the numerical value of described pulse information is positioned at the value that fluctuates of described default pulse information
In the range of, it is determined that described pulse information is successfully with the matching result of default pulse information.
Described pulse information can be embodied by numerical value, the pulse information such as the oscillogram included for it and characteristic vector
All can embody by the way of numerical value, can also be realized by numerical value when mating.
Another kind of enforcement in disclosure exemplary embodiment, in scene, is believed with described default pulse at described pulse information
Breath matching result be unsuccessfully time, add described pulse information in described pulse data storehouse, including:
In step 240, same pulse information is detected in Preset Time.
Described pulse information and described default pulse information matching result be unsuccessfully time, in a Preset Time specified
Detection user gets the pulse information of described user the most again;
In step 250, interpolation request is sent;
When again getting the pulse information of described user in Preset Time being detected, such as, got same in 30 seconds
Pulse information, then judge active user need this pulse information is added, now, to user send described pulse is believed
Breath is added to preset the request of pulse information.
In step 260, request is added in response;
Respond described request, to add described pulse information to pulse data storehouse.
For in increasingly complex application scenarios, as it is shown on figure 3, be what the pulse information that changing value is excessive was screened
Process, the pulse information such as detected when user's vigorous exercise is complete differs from usually, then it is right to be realized by following steps
The acquisition of pulse information:
In the step 310, described pulse information changing value within the unit interval is detected;
Within a unit interval, the pulse information of user can be at bigger excursion, so that the pulse obtained
Information cannot mate default pulse information.
In step 320, when described changing value is more than a predetermined threshold value, described pulse information is abandoned;
When its changing value within the unit interval is more than predetermined threshold value, then it is judged to that this group pulse information is defective, loses
Abandon this pulse information and carry out the acquisition of next round.
In a step 330, repeat above step, until the change within the unit interval of the described pulse information being detected
When value is less than or equal to described predetermined threshold value, choose the described pulse information pulse information as the described user obtained.
This step can realize the screening process to pulse information so that be that user is flat during the acquisition of described pulse information
Obtain gained under steady state, thus ensure that the accuracy rate that pulse information is verified.
Another kind of in disclosure exemplary embodiment is implemented in scene, closes it when may additionally include pulse information checking
Its authentication mode, its scheme can be the identification code by generating described pulse information, and this identification code can be used for system
Request is provided, the authentication mode of other form existing in closing a terminal with request, using by described pulse information as described
User carries out the sole mode of authentication.
The block diagram of a kind of device to terminal user ID checking that the exemplary embodiment that Fig. 4 is the disclosure provides, should
Device can be realized by software and/or hardware, is usually integrated in mobile terminal, and the present embodiment can be with above-described embodiment as base
Plinth, it mainly includes acquisition module 410, matching module 420 and the first authentication module 430, and module therein between any two may be used
Realize communication to connect, and all can be connected with the control unit communication of terminal.
Acquisition module 410 therein, is arranged to obtain the pulse information of user;
Matching module 420 therein, is arranged to described pulse information and the default pulse letter in pulse data storehouse
Breath mates, it is thus achieved that matching result;
First authentication module 430 therein, is arranged to when described matching result includes that described pulse information is with described
When presetting pulse information coupling, by the authentication to described user.
Another kind of in disclosure exemplary embodiment is implemented in scene, and described device also includes:
Second acquisition module, is arranged to when described matching result includes that described pulse information is believed with described default pulse
When breath does not mates, obtain another checking information of user;
Strategy detection module, is arranged to whether the set strategy according to user sets detects another checking information described
Pass through;
Second authentication module, is arranged to when another checking information described is passed through, by the identity to described user
Checking.
Another kind of in disclosure exemplary embodiment is implemented in scene, and described matching module 420 includes:
3rd obtains submodule, is arranged to obtain the value that fluctuates of described default pulse information;
Described first authentication module 430 also includes:
Judge submodule, be arranged to judge whether the numerical value of described pulse information is positioned at described default pulse information
In the range of the value that fluctuates comprises;
It is verified submodule, is arranged to when the numerical value of described pulse information is positioned at the upper of described default pulse information
In the range of lower float value comprises, it is determined that described pulse information is successfully with the matching result of default pulse information.
Another kind of in disclosure exemplary embodiment is implemented in scene, and described device also includes:
3rd acquisition module, is arranged to when described matching result is described pulse information and described default pulse information
When not mating, in a Preset Time, detect user the most again get the pulse information of described user;
Request module, when again getting the pulse information of described user in being arranged to Preset Time be detected, to
User sends the request that described pulse information is added to preset pulse information;
Respond module, is arranged to respond described request, to add described pulse information to pulse data storehouse.
Another kind of in disclosure exemplary embodiment is implemented in scene, and described acquisition module 410 includes:
Numerical value detection sub-module, is arranged to the changing value detecting described pulse information within the unit interval;
Discard module, is arranged to, when described changing value is more than a predetermined threshold value, abandon described pulse information;
Replicated blocks, are arranged to repeat above step, until detecting that described pulse information is in the unit interval
When interior changing value is less than or equal to described predetermined threshold value, choose the described pulse information pulse letter as the described user obtained
Breath.
Another kind of in disclosure exemplary embodiment is implemented in scene, and described device also includes:
Mark module, is arranged to generate the identification code of described pulse information, and described identification code is used for closing described use
Other authentication mode at family, to carry out the sole mode of authentication by described pulse information as described user.
The device to terminal user ID checking provided in above-described embodiment can perform in the disclosure in any embodiment
The method to terminal user ID checking provided, possesses the execution corresponding functional module of the method and beneficial effect, does not exists
In above-described embodiment describe in detail ins and outs, can be found in provided in disclosure any embodiment to terminal user ID
The method of checking.
Disclosure exemplary embodiment additionally provides a kind of mobile terminal, comprising:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Start the pulse identification service in terminal;
Obtain the pulse information of user;
Described pulse information is mated with the default pulse information in pulse data storehouse, it is thus achieved that matching result;
When described matching result includes that described pulse information mates with described default pulse information, by described user
Authentication.
Described mobile terminal can perform the method and apparatus that disclosure any embodiment is provided, and possesses execution method corresponding
Functional module and beneficial effect.
It is to be appreciated that the disclosure also extends to the computer program being suitable for the disclosure being tried out, particularly
Computer program on carrier or in carrier.Program can be compiled with source code, object code, code intermediate source and such as part
The form of the object code of the form translated, or with any other be suitable in realization according to the disclosed method use shape
Formula.Also it is to be noted that, such program is likely to be of many different frame design.Such as, it is achieved according to the side of the disclosure
Functional program code of method or system may be subdivided into one or more subroutine.
For will be obvious for technical personnel at the functional many different modes of these subroutine intermediate distribution.
Subroutine can be collectively stored in an executable file, thus forms self-contained program.Such executable file can
To include computer executable instructions, such as processor instruction and/or interpreter instruction (such as, Java interpreter instruction).Can
Alternatively, one or more or all subroutines of subroutine may be stored at least one external library file, and
And statically or dynamically link (the most at runtime) with mastery routine.Mastery routine contains at least one in subroutine
At least one call.Subroutine can also include function call each other.Relate to the embodiment bag of computer program
Include corresponding to the computer executable instructions of each step of the process step of at least one method in illustrated method.These refer to
Order can be subdivided into subroutine and/or be stored in one or more may be in the static or file of dynamic link.
Another embodiment relating to computer program include corresponding in illustrated system and/or product at least
The computer executable instructions of each device in the device of.These instructions can be subdivided into subroutine and/or be stored
In the file of one or more possible static state or dynamic link.
The carrier of computer program can be any entity or the equipment that can deliver program.Such as, carrier can wrap
Containing storage medium, such as (ROM such as CDROM or quasiconductor ROM) or magnetic recording media (such as floppy disk or hard disk).Enter
One step ground, carrier can be the carrier that can transmit, such as electricity or optical signalling, its can via cable or optical cable, or
Person is transmitted by radio or other means.When program is embodied as such signal, carrier can be by such cable
Or miscellaneous equipment or device composition.Alternatively, carrier can be the integrated circuit being wherein embedded with program, described integrated
Circuit is adapted for carrying out correlation technique, or for used by the execution of correlation technique.
Should be noted that, embodiment mentioned above is to illustrate the disclosure rather than limit the disclosure, and this
The technical staff in field can design many alternate embodiments, without departing from scope of the following claims.In power
During profit requires, any reference marks being placed between round parentheses is not to be read as being limitations on claims.Verb " bag
Include " and its paradigmatic use be not excluded for those except recording in the claims in addition to element or the depositing of step
?.Article " one " before element or " one " are not excluded for the existence of a plurality of such element.The disclosure can be passed through
Including the hardware of several visibly different elements, and realized by properly programmed computer.Enumerating several device
In equipment claim, several in these devices can be embodied by the same item of hardware.At mutually different appurtenance
Profit states in requiring that the simple fact of some measure is not intended that the combination of these measures can not be used to benefit.
If desired, difference in functionality discussed herein can perform with different order and/or perform simultaneously with one another.
Additionally, if desired, one or more functions described above can be optional or can be combined.
If desired, the most each step is not limited to the execution sequence in each embodiment, different step
Can perform with different order and/or perform simultaneously with one another.Additionally, in other embodiments, described above one or many
Individual step can be optional or can be combined.
Although various aspects of the disclosure is given in the independent claim, but the other side of the disclosure include from
The feature of described embodiment and/or there is the combination of dependent claims of feature of independent claims, and the most only
It it is the combination be clearly given in claim.
The most to be noted is, although the foregoing describe the example embodiment of the disclosure, but these describe not
Should understand in a limiting sense.On the contrary, several changing and modifications can be carried out to want without departing from the most appended right
The scope of the present disclosure defined in asking.
Will be appreciated by those skilled in the art that each module in the device of disclosure embodiment can be with general meter
Calculating device to realize, each module can concentrate on single calculating device or calculate in the group of networks that device forms, and the disclosure is real
Executing the device in example and correspond to the method in previous embodiment, it can be realized by executable program code, it is also possible to logical
The mode crossing integrated circuit combination realizes, and therefore the disclosure is not limited to specific hardware or software and combination thereof.
Will be appreciated by those skilled in the art that each module in the device of disclosure embodiment can be with general shifting
Dynamic terminal realizes, and each module can concentrate in the equipment combination of single mobile terminal or mobile terminal composition, the disclosure
Device in embodiment is corresponding to the method in previous embodiment, and it can realize, also by editing executable program code
Can realize by the way of integrated circuit combination, therefore the disclosure is not limited to specific hardware or software and knot thereof
Close.
Fig. 5 is a kind of for the device to the method that terminal user ID is verified according to shown in an exemplary embodiment
The block diagram of 800.Such as, device 800 can be mobile phone, computer, digital broadcast terminal, messaging devices, game control
Platform processed, tablet device, armarium, body-building equipment, personal digital assistant etc..
With reference to Fig. 5, device 800 can include following one or more assembly: processes assembly 802, memorizer 804, power supply
Assembly 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, and
Communications component 816.
Process assembly 802 and generally control the integrated operation of device 800, such as with display, call, data communication, phase
The operation that machine operation and record operation are associated.Process assembly 802 and can include that one or more processor 820 performs to refer to
Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more module, just
Mutual in process between assembly 802 and other assemblies.Such as, process assembly 802 and can include multi-media module, many to facilitate
Media component 808 and process between assembly 802 mutual.
Memorizer 804 is configured to store various types of data to support the operation at device 800.Showing of these data
Example includes any application program for operation on device 800 or the instruction of method, contact data, telephone book data, disappears
Breath, picture, video etc..Memorizer 804 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable compile
Journey read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash
Device, disk or CD.
The various assemblies that power supply module 806 is device 800 provide power supply.Power supply module 806 can include power management system
System, one or more power supplys, and other generate, manage and distribute, with for device 800, the assembly that power supply is associated.
The screen of one output interface of offer that multimedia groupware 808 is included between described device 800 and user.One
In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch screen, to receive the input signal from user.Touch panel includes one or more touch sensing
Device is with the gesture on sensing touch, slip and touch panel.Described touch sensor can not only sense touch or sliding action
Border, but also detect the persistent period relevant to described touch or slide and pressure.In certain embodiments, many matchmakers
Body assembly 808 includes a front-facing camera and/or post-positioned pick-up head.When device 800 is in operator scheme, such as screening-mode or
During video mode, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each front-facing camera and
Post-positioned pick-up head can be a fixing optical lens system or have focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.Such as, audio-frequency assembly 810 includes a Mike
Wind (MIC), when device 800 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike is joined
It is set to receive external audio signal.The audio signal received can be further stored at memorizer 804 or via communication set
Part 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a speaker, is used for exporting audio signal.
I/O interface 812 provides interface for processing between assembly 802 and peripheral interface module, above-mentioned peripheral interface module can
To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and lock
Set button.
Sensor cluster 814 includes one or more sensor, for providing the state of various aspects to comment for device 800
Estimate.Such as, what sensor cluster 814 can detect device 800 opens/closed mode, the relative localization of assembly, such as described
Assembly is display and the keypad of device 800, and sensor cluster 814 can also detect device 800 or 800 1 assemblies of device
Position change, the presence or absence that user contacts with device 800, device 800 orientation or acceleration/deceleration and device 800
Variations in temperature.Sensor cluster 814 can include proximity transducer, is configured to when not having any physical contact detect
The existence of neighbouring object.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, is used for becoming
Use as in application.In certain embodiments, this sensor cluster 814 can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to facilitate the communication of wired or wireless mode between device 800 and other equipment.Device
800 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.An exemplary enforcement
In example, communications component 816 receives the broadcast singal from external broadcasting management system or broadcast related information via broadcast channel.
In one exemplary embodiment, described communications component 816 also includes near-field communication (NFC) module, to promote junction service.Example
As, can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology,
Bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 800 can be by one or more application specific integrated circuits (ASIC), numeral letter
Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided
As included the memorizer 804 of instruction, above-mentioned instruction can have been performed said method by the processor 820 of device 800.Such as,
Described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
Note, above are only preferred embodiment and institute's application technology principle of the disclosure.It will be appreciated by those skilled in the art that
The disclosure is not limited to specific embodiment described here, can carry out for a person skilled in the art various obvious change,
Readjust and substitute the protection domain without departing from the disclosure.Therefore, although by above example, the disclosure is carried out
It is described in further detail, but the disclosure is not limited only to above example, in the case of conceiving without departing from the disclosure, also
Other Equivalent embodiments more can be included, and the scope of the present disclosure is determined by scope of the appended claims.
Claims (13)
1. the method to terminal user ID checking, it is characterised in that described method includes:
Obtain the pulse information of user;
Described pulse information is mated with the default pulse information in pulse data storehouse, it is thus achieved that matching result;
When described matching result be described pulse information mate with described default pulse information time, by the identity to described user
Checking.
Method the most according to claim 1, it is characterised in that described method also includes:
When described matching result be described pulse information do not mate with described default pulse information time, obtain user another checking
Information;
Whether pass through according to set strategy detection another checking information described that user sets;
When another checking information described is passed through, by the authentication to described user.
Method the most according to claim 1, it is characterised in that described by described pulse information pre-with pulse data storehouse
If pulse information mates, and draw matching result, including:
Obtain the value that fluctuates of described default pulse information;
When described pulse information is mated with the default pulse information in pulse data storehouse, also include:
Judge whether the numerical value of described pulse information is positioned in the range of the value that fluctuates of described default pulse information comprises;
When the numerical value of described pulse information is positioned in the range of the value that fluctuates of described default pulse information comprises, it is determined that described
Pulse information is successfully with the matching result of default pulse information.
Method the most according to claim 1, it is characterised in that described method also includes:
When described matching result be described pulse information do not mate with described default pulse information time, in a Preset Time detect
The most again get the pulse information of described user;
When again getting the pulse information of described user in Preset Time being detected, send to user and described pulse information is added
Add as presetting the request of pulse information;
Respond described request, to add described pulse information to pulse data storehouse.
Method the most according to claim 1, it is characterised in that the pulse information of described acquisition user, including:
Detect described pulse information changing value within the unit interval;
When described changing value is more than a predetermined threshold value, abandon described pulse information;
Repeat above step, until detecting that described pulse information changing value within the unit interval is less than or equal to described
During predetermined threshold value, choose the described pulse information pulse information as the described user obtained.
Method the most according to claim 1, it is characterised in that described when described matching result include described pulse information with
During described default pulse information coupling, after the authentication to described user, also include:
Generating the identification code of described pulse information, described identification code is used for closing other authentication mode of described user, with
Described pulse information is carried out as described user the sole mode of authentication.
7. the device to terminal user ID checking, it is characterised in that described device includes:
Acquisition module, is arranged to obtain the pulse information of user;
Matching module, is arranged to mate described pulse information with the default pulse information in pulse data storehouse, obtains
Obtain matching result;
First authentication module, is arranged to when described matching result includes described pulse information and described default pulse information
Timing, by the authentication to described user.
Device the most according to claim 7, it is characterised in that described device also includes:
Second acquisition module, is arranged to when described matching result includes that described pulse information is with described default pulse information not
During coupling, obtain another checking information of user;
Strategy detection module, is arranged to whether set strategy detection another checking information described according to user sets leads to
Cross;
Second authentication module, is arranged to when another checking information described is passed through, by the authentication to described user.
Device the most according to claim 7, it is characterised in that described matching module includes:
3rd obtains submodule, is arranged to obtain the value that fluctuates of described default pulse information;
Described first authentication module also includes:
Judge submodule, be arranged to judge whether the numerical value of described pulse information is positioned at the upper and lower of described default pulse information
In the range of float value comprises;
Be verified submodule, be arranged to when the numerical value of described pulse information be positioned at described default pulse information on float downward
In the range of dynamic value comprises, it is determined that described pulse information is successfully with the matching result of default pulse information.
Device the most according to claim 7, it is characterised in that described device also includes:
3rd acquisition module, is arranged to when described matching result is described pulse information with described default pulse information not
Timing, detects whether again to get the pulse information of described user in a Preset Time;
Request module, when again getting the pulse information of described user in being arranged to Preset Time be detected, to user
Send the request that described pulse information is added to preset pulse information;
Respond module, is arranged to respond described request, to add described pulse information to pulse data storehouse.
11. devices according to claim 7, it is characterised in that described acquisition module includes:
Numerical value detection sub-module, is arranged to the changing value detecting described pulse information within the unit interval;
Discard module, is arranged to, when described changing value is more than a predetermined threshold value, abandon described pulse information;
Replicated blocks, are arranged to repeat above step, until detecting that described pulse information is within the unit interval
When changing value is less than or equal to described predetermined threshold value, choose the described pulse information pulse information as the described user obtained.
12. devices according to claim 7, it is characterised in that described device also includes:
Mark module, is arranged to generate the identification code of described pulse information, and described identification code is for closing described user's
Other authentication mode, to carry out the sole mode of authentication by described pulse information as described user.
13. 1 kinds of mobile terminals, it is characterised in that including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Start the pulse identification service in terminal;
Obtain the pulse information of user;
Described pulse information is mated with the default pulse information in pulse data storehouse, it is thus achieved that matching result;
When described matching result includes that described pulse information mates with described default pulse information, by the body to described user
Part checking.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610431768.3A CN106096369A (en) | 2016-06-16 | 2016-06-16 | Method, device and mobile terminal to terminal user ID checking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610431768.3A CN106096369A (en) | 2016-06-16 | 2016-06-16 | Method, device and mobile terminal to terminal user ID checking |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106096369A true CN106096369A (en) | 2016-11-09 |
Family
ID=57235457
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610431768.3A Pending CN106096369A (en) | 2016-06-16 | 2016-06-16 | Method, device and mobile terminal to terminal user ID checking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106096369A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106686534A (en) * | 2017-01-22 | 2017-05-17 | 斑马信息科技有限公司 | Communication control method and communication control device and on-board equipment and transportation vehicle. |
WO2018145377A1 (en) * | 2017-02-07 | 2018-08-16 | 华为技术有限公司 | User identity recognition method, apparatus and system |
CN109993146A (en) * | 2019-04-09 | 2019-07-09 | 深圳安泰创新科技股份有限公司 | Indentity identifying method, electronic equipment and storage medium based on recognition of face |
CN111310149A (en) * | 2018-12-11 | 2020-06-19 | 阿里巴巴集团控股有限公司 | Method and system for authentication based on correlation of multiple pulse signals |
CN111581575A (en) * | 2020-05-07 | 2020-08-25 | 安徽龙讯信息科技有限公司 | Barrier-free browsing system for websites |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104618905A (en) * | 2015-03-09 | 2015-05-13 | 广东欧珀移动通信有限公司 | WIFI hotspot sharing method and mobile terminal |
CN104809371A (en) * | 2014-01-24 | 2015-07-29 | 北京奇虎科技有限公司 | Device and method for determining validity of authentication information of head-wearing intelligent device |
CN104799865A (en) * | 2015-04-16 | 2015-07-29 | 陈珉 | Fingerprint identification system |
US20160034679A1 (en) * | 2014-07-31 | 2016-02-04 | Samsung Electronics Co., Ltd. | Wearable device and method of operating the same |
CN105574383A (en) * | 2015-04-17 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Terminal system management method and device |
-
2016
- 2016-06-16 CN CN201610431768.3A patent/CN106096369A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104809371A (en) * | 2014-01-24 | 2015-07-29 | 北京奇虎科技有限公司 | Device and method for determining validity of authentication information of head-wearing intelligent device |
US20160034679A1 (en) * | 2014-07-31 | 2016-02-04 | Samsung Electronics Co., Ltd. | Wearable device and method of operating the same |
CN104618905A (en) * | 2015-03-09 | 2015-05-13 | 广东欧珀移动通信有限公司 | WIFI hotspot sharing method and mobile terminal |
CN104799865A (en) * | 2015-04-16 | 2015-07-29 | 陈珉 | Fingerprint identification system |
CN105574383A (en) * | 2015-04-17 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Terminal system management method and device |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106686534A (en) * | 2017-01-22 | 2017-05-17 | 斑马信息科技有限公司 | Communication control method and communication control device and on-board equipment and transportation vehicle. |
WO2018145377A1 (en) * | 2017-02-07 | 2018-08-16 | 华为技术有限公司 | User identity recognition method, apparatus and system |
CN108513665A (en) * | 2017-02-07 | 2018-09-07 | 华为技术有限公司 | The methods, devices and systems of user identity identification |
CN111310149A (en) * | 2018-12-11 | 2020-06-19 | 阿里巴巴集团控股有限公司 | Method and system for authentication based on correlation of multiple pulse signals |
CN109993146A (en) * | 2019-04-09 | 2019-07-09 | 深圳安泰创新科技股份有限公司 | Indentity identifying method, electronic equipment and storage medium based on recognition of face |
CN111581575A (en) * | 2020-05-07 | 2020-08-25 | 安徽龙讯信息科技有限公司 | Barrier-free browsing system for websites |
CN111581575B (en) * | 2020-05-07 | 2022-05-31 | 安徽龙讯信息科技有限公司 | Barrier-free browsing system for websites |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104850828B (en) | Character recognition method and device | |
CN106096369A (en) | Method, device and mobile terminal to terminal user ID checking | |
CN106104601A (en) | Virtual card Activiation method and device | |
CN104703252B (en) | Terminal device accesses the method and device of wireless network | |
CN107545569A (en) | Method for recognizing impurities and device | |
CN106231419A (en) | Operation performs method and device | |
CN104464238B (en) | Method of controlling operation thereof and device between mobile terminal | |
CN106375772A (en) | Video playing method and device | |
CN104915290B (en) | Application testing method and device | |
CN104618575B (en) | The close method and apparatus of detection object | |
CN106210797A (en) | Live network broadcast method and device | |
CN106201108B (en) | Gloves control mode touch mode control method and device and electronic equipment | |
CN107463903A (en) | Face key independent positioning method and device | |
CN105955051A (en) | Intelligent household equipment control method and apparatus | |
CN105938412A (en) | Volume icon display method and device | |
CN107169429A (en) | Vivo identification method and device | |
CN107133577A (en) | A kind of fingerprint identification method and device | |
CN106503537A (en) | Verification method and device based on flexible display screen | |
CN107622189A (en) | Optimize the method and apparatus of unlocked by fingerprint | |
CN105954706A (en) | Intelligent device positioning method and device | |
CN107562500A (en) | Debugging apparatus, method and apparatus | |
CN107845094A (en) | Pictograph detection method, device and computer-readable recording medium | |
CN107094203A (en) | Message treatment method, device and computer-readable recording medium | |
CN106201070A (en) | False-touch prevention method and device | |
CN107133550B (en) | Fingerprint authentication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161109 |
|
RJ01 | Rejection of invention patent application after publication |