CN106411509A - Cipher check method and device - Google Patents

Cipher check method and device Download PDF

Info

Publication number
CN106411509A
CN106411509A CN201610907210.8A CN201610907210A CN106411509A CN 106411509 A CN106411509 A CN 106411509A CN 201610907210 A CN201610907210 A CN 201610907210A CN 106411509 A CN106411509 A CN 106411509A
Authority
CN
China
Prior art keywords
password
user
time
biological
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610907210.8A
Other languages
Chinese (zh)
Inventor
胡健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201610907210.8A priority Critical patent/CN106411509A/en
Publication of CN106411509A publication Critical patent/CN106411509A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a cipher check method and device. The method comprises the steps of receiving a cipher input by a user; obtaining time for inputting the cipher by the user; searching the cipher corresponding to the time of inputting the cipher by the user according to a preset corresponding relationship between the ciphers and the time, wherein the searched cipher is a biological cipher or/and non-biological cipher; and judging whether the cipher input by the user matches the searched cipher or not, wherein the check is successful if the cipher input by the user matches the searched cipher. According to the method and the device, different types of ciphers can be employed at different moments, so the cipher check reliability is improved, and the security of user information is ensured.

Description

Password verification method and device
Technical Field
The invention relates to the technical field of information security, in particular to a password verification method and device.
Background
In the information age, passwords are widely used to verify user identity. However, existing password verification generally uses a single password, and in some cases is easily stolen or used involuntarily by others. For example, a user authenticates with a fingerprint password, which may be used by others without voluntary involvement while the user sleeps. Therefore, a more reliable password verification method is needed to ensure the security of the user information.
Disclosure of Invention
In view of the above, there is a need for a password verification method, which can use different types of passwords at different times, improve the reliability of password verification, and ensure the security of user information.
A first aspect of the present application provides a method of password verification, the method including:
receiving a password input by a user;
acquiring the time for the user to input the password;
searching a password corresponding to the time for inputting the password by the user according to the preset corresponding relation between the password and the time, and searching the obtained password as a biological password or/and a non-biological password;
and judging whether the password input by the user is matched with the password obtained by searching, and if so, passing the verification.
In another possible implementation manner, the correspondence between the preset password and the time includes:
the non-sleep time interval corresponds to a biological password pre-input by a user, and the sleep time interval corresponds to a non-biological password pre-input by the user; or,
the non-sleep time interval corresponds to a biological password and a non-biological password which are pre-input by the user, and the sleep time interval corresponds to a non-biological password which is pre-input by the user.
In another possible implementation manner, the searching for the password corresponding to the time when the user inputs the password according to the preset correspondence between the password and the time includes:
judging whether the password input by the user is a biological password or a non-biological password;
if the password input by the user is a biological password, judging whether the time for inputting the password by the user belongs to the time range corresponding to the biological password according to the preset corresponding relation between the password and the time, and if the time for inputting the password by the user belongs to the time range corresponding to the biological password, searching the biological password corresponding to the time for inputting the password by the user;
if the password input by the user is a non-biological password, judging whether the time for inputting the password by the user belongs to the time range corresponding to the non-biological password or not according to the preset corresponding relation between the password and the time, and if the time for inputting the password by the user belongs to the time range corresponding to the non-biological password, searching the non-biological password corresponding to the time for inputting the password by the user.
In another possible implementation manner, the method further includes:
judging whether the password input time of the user is biological password input time or non-biological password input time;
if the time for inputting the password by the user is the biological password input time, judging whether the password input by the user is the biological password, and if not, prompting the user to input the password again;
if the time for inputting the password by the user is the non-biological password input time, judging whether the password input by the user is the non-biological password, and if not, prompting the user to input the password again.
In another possible implementation manner, before the determining whether the password input by the user matches the password obtained by searching, the method further includes:
determining whether the type of the password input by the user is the same as the type of the password obtained by searching;
the method further comprises the following steps:
and if the type of the password input by the user is different from the type of the password obtained by searching, prompting the user to input the password again.
A second aspect of the present application provides a password verification apparatus, the apparatus comprising:
a receiving unit for receiving a password input by a user;
the acquisition unit is used for acquiring the time when the user inputs the password;
the searching unit is used for searching a password corresponding to the time for inputting the password by the user according to the preset corresponding relation between the password and the time, and searching the obtained password as a biological password or/and a non-biological password;
and the matching unit is used for judging whether the password input by the user is matched with the password obtained by searching, and if so, the verification is passed.
In another possible implementation manner, the correspondence between the preset password and the time includes:
the non-sleep time interval corresponds to a biological password pre-input by a user, and the sleep time interval corresponds to a non-biological password pre-input by the user; or,
the non-sleep time interval corresponds to a biological password and a non-biological password which are pre-input by the user, and the sleep time interval corresponds to a non-biological password which is pre-input by the user.
In another possible implementation manner, the search unit is specifically configured to determine whether the password input by the user is a biometric password or a non-biometric password;
if the password input by the user is a biological password, judging whether the time for inputting the password by the user belongs to a time range corresponding to the biological password according to the preset corresponding relation between the password and the time, and if the time for inputting the password by the user belongs to the time range corresponding to the biological password, searching the biological password corresponding to the time for inputting the password by the user;
if the password input by the user is a non-biological password, judging whether the time for inputting the password by the user belongs to the time range corresponding to the non-biological password or not according to the preset corresponding relation between the password and the time, and if the time for inputting the password by the user belongs to the time range corresponding to the non-biological password, searching the non-biological password corresponding to the time for inputting the password by the user.
In another possible implementation manner, the apparatus further includes:
the first prompting unit is used for judging whether the password input time of the user is biological password input time or non-biological password input time; if the time for inputting the password by the user is the biological password input time, judging whether the password input by the user is the biological password, and if not, prompting the user to input the password again; if the time for inputting the password by the user is the non-biological password input time, judging whether the password input by the user is the non-biological password, and if not, prompting the user to input the password again.
In another possible implementation manner, the apparatus further includes:
the determining unit is used for determining whether the type of the password input by the user is the same as that of the password obtained by searching before the matching unit judges whether the password input by the user is matched with the password obtained by searching;
and the second prompting unit is used for prompting the user to input the password again if the type of the password input by the user is different from the type of the password obtained by searching.
The password input by the user is received, the time for inputting the password by the user is acquired, the password corresponding to the time for inputting the password by the user is searched according to the preset corresponding relation between the password and the time, the acquired password is searched to be a biological password or/and a non-biological password, and whether the password input by the user is matched with the password obtained by searching is judged to confirm whether the password passes the verification. Because different types of passwords are used at different times, the reliability of password verification is improved, and the safety of user information is ensured.
Drawings
Fig. 1 is a schematic flowchart of a password verification method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a password verification method according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a password checking method according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a password verification apparatus according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of a password verification apparatus according to a fifth embodiment of the present invention;
fig. 6 is a schematic structural diagram of a password verification apparatus according to a sixth embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device implementing the method of password verification.
Description of the main elements
Electronic equipment 1
Password verification device 10
Storage device 20
Treatment apparatus 30
Display device 40
Receiving units 401, 501, 601
Acquisition units 402, 502, 602
Search units 403, 504, 603
Matching units 403, 505, 606
First prompt unit 503
Determination unit 604
Second presentation Unit 605
The following detailed description will further illustrate the invention in conjunction with the above-described figures.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a detailed description of the present invention will be given below with reference to the accompanying drawings and specific embodiments. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth to provide a thorough understanding of the present invention, and the described embodiments are merely a subset of the embodiments of the present invention, rather than a complete embodiment. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention.
Preferably, the password verification method of the present invention is applied to one or more electronic devices. The electronic device is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The electronic device may be, but is not limited to, any electronic product that can interact with a user through a keyboard, a mouse, a remote controller, a touch panel, or a voice control device, for example, a Personal computer, a tablet computer, a smart phone, a Personal Digital Assistant (PDA), a game machine, an Internet Protocol Television (IPTV), an intelligent wearable device, and the like.
Example one
Fig. 1 is a flowchart illustrating a password verification method according to an embodiment of the present invention. The password verification method is applied to electronic equipment (such as a mobile phone) and can be used for identity verification in various occasions, such as payment, unlocking, login and the like. As shown in fig. 1, the method specifically includes the following steps:
101: a password input by a user is received.
A user interface may be displayed on a display device of the electronic device from which the password entered by the user is received. For example, the password verification method is used for identity verification during login, and a password input box can be displayed on a login interface to receive a password input by a user.
102: and acquiring the time for the user to input the password.
The system time of the electronic device may be read when the user inputs the password, and the read system time of the electronic device may be used as the time when the user inputs the password. The server (such as a time server) can be accessed when the user inputs the password, and the current time of the server is obtained, and the obtained current time of the server is taken as the time when the user inputs the password.
103: and searching the password corresponding to the time for inputting the password by the user according to the preset corresponding relation between the password and the time, wherein the searched password is a biological password or/and a non-biological password.
The biometric password is a password containing biometric information. The non-biological password refers to a password that does not contain biological information. The biometric password may include a fingerprint password, an iris password, a voice-print password, a face recognition password, and the like. The non-biological password may include a numeric password, a gesture password, and the like.
The corresponding relation between the passwords and the time indicates that different types of passwords are used at different times. For example, a specified period of each day/week/month is set to correspond to the biometric code, and the remaining period corresponds to the non-biometric code. Several settings of the correspondence of the password to the time are exemplified below.
The preset correspondence between the password and the time may include: the method comprises the steps that a biological password which is pre-input by a user corresponds to a non-sleep time period (for example, 8: 00-22: 00), and a non-biological password which is pre-input by the user corresponds to a sleep time period (for example, 22: 00-8: 00); or the non-sleep time interval corresponds to a biological password and a non-biological password which are pre-input by the user, and the sleep time interval corresponds to a non-biological password which is pre-input by the user. The sleep period corresponds to a non-biological password, so that the biological password (such as a fingerprint password and an iris password) of the user can be prevented from being illegally used under the condition of involuntary when the user sleeps.
The preset correspondence between the password and the time may further include: the working day (such as Monday to Friday) corresponds to a biological password pre-entered by the user, and the non-working day (such as 22: 00-8: 00) corresponds to a non-biological password pre-entered by the user.
If the user arrives at a relatively unsafe place in a certain period of time and the biological password is easily used illegally by others, the non-biological password pre-entered by the user in the period of time can be set.
It should be understood that the correspondence between the password and the time can be flexibly set, and is not limited to the above cases.
The searching for the password corresponding to the time when the user inputs the password according to the preset correspondence between the password and the time may include: judging whether the password input by the user is a biological password or a non-biological password; if the password input by the user is a biological password, judging whether the time for inputting the password by the user belongs to the time range corresponding to the biological password according to the preset corresponding relation between the password and the time, and if the time for inputting the password by the user belongs to the time range corresponding to the biological password, searching the biological password corresponding to the time for inputting the password by the user; if the password input by the user is a non-biological password, judging whether the time for inputting the password by the user belongs to the time range corresponding to the non-biological password or not according to the preset corresponding relation between the password and the time, and if the time for inputting the password by the user belongs to the time range corresponding to the non-biological password, searching the non-biological password corresponding to the time for inputting the password by the user.
104: and judging whether the password input by the user is matched with the password obtained by searching, and if so, passing the verification. Otherwise, if not, the verification fails.
For example, if the password input by the user and the password obtained by searching are the biological passwords (such as fingerprint passwords), whether the biological password input by the user and the biological password obtained by searching match or not is judged, and if the biological passwords match, the verification is passed.
If the password input by the user and the password obtained by searching are biological passwords, whether the matching degree of the password input by the user and the password obtained by searching is greater than a specified threshold value or not can be judged, and if the matching degree of the password input by the user and the password obtained by searching is greater than the specified threshold value, the matching of the password input by the user and the password obtained by searching is confirmed.
If the password input by the user and the password obtained by searching are non-biological passwords, whether the password input by the user is the same as the password obtained by searching can be judged, and if the password input by the user is the same as the password obtained by searching, the password input by the user is confirmed to be matched with the password obtained by searching.
The password verification method according to the first embodiment receives a password input by a user and obtains time for the user to input the password, searches for a password corresponding to the time for the user to input the password according to a preset correspondence between the password and the time, and determines whether the password input by the user is matched with the password obtained by searching, so as to determine whether the password passes the verification. According to the first embodiment, different types of passwords can be used at different times, so that the reliability of password verification is improved, and the safety of user information is ensured.
Fig. 2 is a flowchart illustrating a password verification method according to a second embodiment of the present invention. The password verification method is applied to electronic equipment (such as a mobile phone) and can be used for identity verification in various occasions, such as payment, unlocking, login and the like. As shown in fig. 2, the method specifically includes the following steps:
201: a password input by a user is received.
Step 201 in this embodiment is the same as step 101 in the first embodiment, and please refer to the related description of step 101 in the first embodiment, which is not described herein again.
202: and acquiring the time for the user to input the password.
Step 202 in this embodiment is the same as step 102 in the first embodiment, and please refer to the related description of step 102 in the first embodiment, which is not described herein again.
203: and judging whether the time for inputting the password by the user corresponds to the password input by the user or not. Namely judging whether the time for inputting the password by the user is the biological password input time or the non-biological password input time; if the time for inputting the password by the user is the biological password input time, judging whether the password input by the user is the biological password; and if the time for inputting the password by the user is the non-biological password input time, judging whether the password input by the user is the non-biological password. If the time when the user inputs the password is the biological password time and the password input by the user is the biological password, or the time when the user inputs the password is the non-biological password time and the password input by the user is the non-biological password, the time when the user inputs the password corresponds to the password input by the user. Otherwise, if the time when the user inputs the password is the biological password time and the password input by the user is the non-biological password time or the time when the user inputs the password is the non-biological password time and the password input by the user is the biological password, the time when the user inputs the password does not correspond to the password input by the user.
204: and if the time for inputting the password by the user does not correspond to the password input by the user, prompting the user to input the password again, and returning to 201. If the time when the user inputs the password corresponds to the password input by the user, 205 is executed.
205: and searching the password corresponding to the time for inputting the password by the user according to the preset corresponding relation between the password and the time, wherein the searched password is a biological password or/and a non-biological password.
Step 205 in this embodiment is the same as step 103 in the first embodiment, and please refer to the related description of step 103 in the first embodiment, which is not described herein again.
206: and judging whether the password input by the user is matched with the password obtained by searching, and if so, passing the verification. Otherwise, if not, the verification fails.
Step 206 in this embodiment is the same as step 104 in the first embodiment, and please refer to the related description of step 104 in the first embodiment, which is not described herein again.
The password verification method in the second embodiment receives the password input by the user and obtains the time for the user to input the password, searches the password (biological password or/and non-biological password) corresponding to the time for the user to input the password according to the preset corresponding relationship between the password and the time, and judges whether the password input by the user is matched with the password obtained by searching so as to confirm whether the password passes the verification. The password verification method of the second embodiment further prompts the user to re-input the password when the time for inputting the password by the user does not correspond to the input password. The second embodiment improves the reliability and efficiency of password verification and ensures the safety of user information.
EXAMPLE III
Fig. 3 is a flowchart illustrating a password verification method according to a third embodiment of the present invention. The password verification method is applied to electronic equipment (such as a mobile phone) and can be used for identity verification in various occasions, such as payment, unlocking, login and the like. As shown in fig. 3, the method specifically includes the following steps:
301: a password input by a user is received.
Step 301 in this embodiment is the same as step 101 in the first embodiment, and please refer to the related description of step 101 in the first embodiment, which is not described herein again.
302: and acquiring the time for the user to input the password.
Step 302 in this embodiment is the same as step 102 in the first embodiment, and please refer to the related description of step 102 in the first embodiment, which is not described herein again.
303: and searching the password corresponding to the time for inputting the password by the user according to the preset corresponding relation between the password and the time, wherein the searched password is a biological password or/and a non-biological password.
Step 303 in this embodiment is the same as step 103 in the first embodiment, and please refer to the related description of step 103 in the first embodiment, which is not described herein again.
304: determining whether the type of the password input by the user is the same as the type of the password obtained by searching.
The types may include biological types and non-biological types. For example, if the password input by the user is a biometric type and the password obtained by searching is also a biometric type, the type of the password input by the user is the same as the type of the password obtained by searching. The types may also include specific biological types and non-biological types, specific biological types may include fingerprint types, iris types, and the like, and specific non-biological types may include digital types and the like. For example, if the password input by the user is a fingerprint type, and the password obtained by searching is also a fingerprint type, the type of the password input by the user is the same as the type of the password obtained by searching.
305: if the type of the password input by the user is different from the type of the password obtained by searching, prompting the user to input the password again, and returning to 301.
For example, if the password input by the user is of a fingerprint type and the password obtained by searching is of an iris type, prompting the user to input the password again.
Otherwise, if the type of the password input by the user is the same as the type of the password obtained by the search, executing 306.
306: and judging whether the password input by the user is matched with the password obtained by searching, and if so, passing the verification. Otherwise, if not, the verification fails.
Step 306 in this embodiment is the same as step 104 in the first embodiment, and please refer to the related description of step 104 in the first embodiment, which is not described herein again.
The password verification method in the third embodiment receives a password input by a user and obtains the time for the user to input the password, searches for a password (a biological password or/and a non-biological password) corresponding to the time for the user to input the password according to a preset corresponding relationship between the password and the time, and judges whether the password input by the user is matched with the password obtained by searching so as to confirm whether the password passes the verification. The method for password verification in the third embodiment prompts the user to re-input the password when the type of the password input by the user is different from the type of the password obtained by searching. The third embodiment improves the reliability and efficiency of password verification and ensures the safety of user information.
Example four
Fig. 4 is a schematic structural diagram of a password verification apparatus according to a fourth embodiment of the present invention. The password verification device 10 is installed in an electronic device (such as a mobile phone) and can be used for identity verification in various occasions, such as payment, unlocking, login and the like. As shown in fig. 4, the password verifying apparatus 10 may include: receiving unit 401, obtaining unit 402, searching unit 403, and matching unit 404.
A receiving unit 401, configured to receive a password input by a user.
The receiving unit 401 may display a user interface on a display device of the electronic device, and receive the password input by the user from the user interface. For example, the password verification method is used for identity verification during login, and a password input box can be displayed on a login interface to receive a password input by a user.
An obtaining unit 402, configured to obtain a time when the user inputs the password.
The obtaining unit 402 may read the system time of the electronic device when the user inputs the password, and use the read system time of the electronic device as the time when the user inputs the password. The server (such as a time server) can be accessed when the user inputs the password, and the current time of the server is obtained, and the obtained current time of the server is taken as the time when the user inputs the password.
The searching unit 403 is configured to search for a password corresponding to time when the user inputs the password according to a preset correspondence between the password and the time, and search for an obtained password as a biometric password or/and a non-biometric password.
The biometric password is a password containing biometric information. The non-biological password refers to a password that does not contain biological information. The biometric password may include a fingerprint password, an iris password, a voice-print password, a face recognition password, and the like. The non-biological password may include a numeric password, a gesture password, and the like.
The corresponding relation between the passwords and the time indicates that different types of passwords are used at different times. For example, a specified period of each day/week/month is set to correspond to the biometric code, and the remaining period corresponds to the non-biometric code. Several settings of the correspondence of the password to the time are exemplified below.
The preset correspondence between the password and the time may include: the method comprises the steps that a biological password which is pre-input by a user corresponds to a non-sleep time period (for example, 8: 00-22: 00), and a non-biological password which is pre-input by the user corresponds to a sleep time period (for example, 22: 00-8: 00); or the non-sleep time interval corresponds to a biological password and a non-biological password which are pre-input by the user, and the sleep time interval corresponds to a non-biological password which is pre-input by the user. The sleep period corresponds to a non-biological password, so that the biological password (such as a fingerprint password and an iris password) of the user can be prevented from being illegally used under the condition of involuntary when the user sleeps.
The preset correspondence between the password and the time may further include: the working day (such as Monday to Friday) corresponds to a biological password pre-entered by the user, and the non-working day (such as 22: 00-8: 00) corresponds to a non-biological password pre-entered by the user.
If the user arrives at a relatively unsafe place in a certain period of time and the biological password is easily used illegally by others, the non-biological password pre-entered by the user in the period of time can be set.
It should be understood that the correspondence between the password and the time can be flexibly set, and is not limited to the above cases.
The searching unit 403 may search for the password corresponding to the time when the user inputs the password according to the preset correspondence between the password and the time, including: judging whether the password input by the user is a biological password or a non-biological password; if the password input by the user is a biological password, judging whether the time for inputting the password by the user belongs to the time range corresponding to the biological password according to the preset corresponding relation between the password and the time, and if the time for inputting the password by the user belongs to the time range corresponding to the biological password, searching the biological password corresponding to the time for inputting the password by the user; if the password input by the user is a non-biological password, judging whether the time for inputting the password by the user belongs to the time range corresponding to the non-biological password or not according to the preset corresponding relation between the password and the time, and if the time for inputting the password by the user belongs to the time range corresponding to the non-biological password, searching the non-biological password corresponding to the time for inputting the password by the user.
And the matching unit 404 is configured to determine whether the password input by the user matches the password obtained by searching, and if so, pass the verification. Otherwise, if not, the verification fails.
For example, if the password input by the user and the password obtained by searching are the biological passwords (such as fingerprint passwords), whether the biological password input by the user and the biological password obtained by searching match or not is judged, and if the biological passwords match, the verification is passed.
If the password input by the user and the password obtained by searching are biological passwords, whether the matching degree of the password input by the user and the password obtained by searching is greater than a specified threshold value or not can be judged, and if the matching degree of the password input by the user and the password obtained by searching is greater than the specified threshold value, the matching of the password input by the user and the password obtained by searching is confirmed.
If the password input by the user and the password obtained by searching are non-biological passwords, whether the password input by the user is the same as the password obtained by searching can be judged, and if the password input by the user is the same as the password obtained by searching, the password input by the user is confirmed to be matched with the password obtained by searching.
The password verification apparatus according to the fourth embodiment receives a password input by a user and obtains a time when the user inputs the password, searches for a password corresponding to the time when the user inputs the password according to a preset correspondence between the password and the time, and determines whether the password input by the user matches the password obtained by the search, so as to determine whether the password passes the verification. And in the fourth embodiment, different types of passwords can be used at different time, so that the reliability of password verification is improved, and the safety of user information is ensured.
EXAMPLE five
Fig. 5 is a schematic structural diagram of a password verification apparatus according to a fourth embodiment of the present invention. The password verification device 10 is installed in an electronic device (such as a mobile phone) and can be used for identity verification in various occasions, such as payment, unlocking, login and the like. As shown in fig. 5, the password verifying apparatus 10 may include: the device comprises a receiving unit 501, an obtaining unit 502, a first prompting unit 503, a searching unit 504 and a matching unit 505.
A receiving unit 501, configured to receive a password input by a user.
The receiving unit 501 in this embodiment is the same as the receiving unit 401 in the fourth embodiment, and please refer to the related description of the receiving unit 401 in the fourth embodiment, which is not described herein again.
An obtaining unit 502, configured to obtain a time when the user inputs the password.
The obtaining unit 502 in this embodiment is the same as the obtaining unit 402 in the fourth embodiment, and please refer to the description related to the obtaining unit 402 in the fourth embodiment, which is not described herein again.
The first prompting unit 503 is configured to determine whether the time when the user inputs the password corresponds to the password input by the user. Namely judging whether the time for inputting the password by the user is the biological password input time or the non-biological password input time; if the time for inputting the password by the user is the biological password input time, judging whether the password input by the user is the biological password; and if the time for inputting the password by the user is the non-biological password input time, judging whether the password input by the user is the non-biological password. If the time when the user inputs the password is the biological password time and the password input by the user is the biological password, or the time when the user inputs the password is the non-biological password time and the password input by the user is the non-biological password, the time when the user inputs the password corresponds to the password input by the user. Otherwise, if the time when the user inputs the password is the biological password time and the password input by the user is the non-biological password time or the time when the user inputs the password is the non-biological password time and the password input by the user is the biological password, the time when the user inputs the password does not correspond to the password input by the user.
The first prompting unit 503 is further configured to prompt the user to re-input the password if the time for the user to input the password does not correspond to the password input by the user.
The searching unit 504 is configured to search a password corresponding to time when the user inputs the password according to a preset correspondence between the password and the time, and search for an obtained password as a biometric password or/and a non-biometric password.
The searching unit 504 in this embodiment is the same as the searching unit 403 in the fourth embodiment, and please refer to the related description of the searching unit 403 in the fourth embodiment, which is not described herein again.
And the matching unit 505 is configured to determine whether the password input by the user matches the password obtained by searching, and if the password matches the password, the verification is passed. Otherwise, if not, the verification fails.
The matching unit 505 in this embodiment is the same as the matching unit 404 in the fourth embodiment, and please refer to the description related to the matching unit 404 in the fourth embodiment, which is not described herein again.
The password verification apparatus according to the fifth embodiment receives a password input by a user and obtains a time when the user inputs the password, searches for a password (a biometric password or/and a non-biometric password) corresponding to the time when the user inputs the password according to a preset correspondence between the password and the time, and determines whether the password input by the user matches the password obtained by the search to determine whether the password passes the verification. The password verification apparatus of the fifth embodiment further prompts the user to re-input the password when the time for inputting the password by the user does not correspond to the input password. And fifthly, the reliability and the efficiency of password verification are improved, and the safety of user information is ensured.
EXAMPLE six
Fig. 6 is a schematic structural diagram of a password verification apparatus according to a sixth embodiment of the present invention. The password verification device 10 is installed in an electronic device (such as a mobile phone) and can be used for identity verification in various occasions, such as payment, unlocking, login and the like. As shown in fig. 6, the password verifying apparatus 10 may include: receiving unit 601, obtaining unit 602, searching unit 603, second prompting unit 604, and matching unit 605.
The receiving unit 601 is configured to receive a password input by a user.
The receiving unit 601 in this embodiment is the same as the receiving unit 401 in the fourth embodiment, and specific reference is made to the description of the receiving unit 401 in the fourth embodiment, which is not repeated herein.
An obtaining unit 602, configured to obtain a time when the user inputs the password.
The obtaining unit 602 in this embodiment is the same as the obtaining unit 402 in the fourth embodiment, and please refer to the description related to the obtaining unit 402 in the fourth embodiment, which is not described herein again.
The searching unit 603 is configured to search for a password corresponding to time when the user inputs the password according to the preset correspondence between the password and the time, and search for an obtained password as a biometric password or/and a non-biometric password.
The searching unit 603 in this embodiment is the same as the searching unit 403 in the fourth embodiment, and please refer to the related description of the searching unit 403 in the fourth embodiment, which is not described herein again.
A determining unit 604, configured to determine whether the type of the password input by the user is the same as the type of the password obtained by the search.
The types may include biological types and non-biological types. For example, if the password input by the user is a biometric type and the password obtained by searching is also a biometric type, the type of the password input by the user is the same as the type of the password obtained by searching. The types may also include specific biological types and non-biological types, specific biological types may include fingerprint types, iris types, and the like, and specific non-biological types may include digital types and the like. For example, if the password input by the user is a fingerprint type, and the password obtained by searching is also a fingerprint type, the type of the password input by the user is the same as the type of the password obtained by searching.
A second prompting unit 605, configured to prompt the user to re-input the password if the type of the password input by the user is different from the type of the password obtained by the search.
For example, if the password input by the user is of a fingerprint type and the password obtained by searching is of an iris type, prompting the user to input the password again.
And the matching unit 606 is configured to determine whether the password input by the user matches the password obtained by searching, and if so, pass the verification. Otherwise, if not, the verification fails.
The matching unit 606 in this embodiment is the same as the matching unit 404 in the fourth embodiment, and please refer to the description related to the matching unit 404 in the fourth embodiment, which is not described herein again.
The password verification apparatus according to the sixth embodiment receives a password input by a user and obtains a time when the user inputs the password, searches for a password (a biometric password or/and a non-biometric password) corresponding to the time when the user inputs the password according to a preset correspondence between the password and the time, and determines whether the password input by the user matches the password obtained by the search to confirm whether the password passes the verification. The password verification apparatus of the sixth embodiment further prompts the user to re-input the password when the type of the password input by the user is different from the type of the password obtained by searching. The sixth embodiment improves the reliability and efficiency of password verification and ensures the safety of user information.
EXAMPLE seven
Fig. 7 is a schematic structural diagram of an electronic device implementing the password verification method of the present invention. The electronic device 1 comprises means 10 for password verification. The electronic device 1 further comprises a storage device 20, a processing device 30 and a display device 40.
Preferably, the method for password verification of the present invention is implemented by the apparatus 10 for password verification in the electronic device 1.
The electronic device 1 is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and its hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The electronic device 1 may be, but is not limited to, any electronic product that can perform human-computer interaction with a user through a keyboard, a mouse, a remote controller, a touch panel, or a voice control device, for example, a Personal computer, a tablet computer, a smart phone, a Personal Digital Assistant (PDA), a game machine, an Internet Protocol Television (IPTV), or an intelligent wearable device.
The Network where the electronic device 1 is located includes, but is not limited to, the internet, a wide area Network, a metropolitan area Network, a local area Network, a Virtual Private Network (VPN), and the like.
The storage device 20 is used for storing program codes of various program segments in the password verifying apparatus 10. The storage device 20 may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The processing device 30 may include one or more microprocessors, digital processors. The processing device 30 executes the program codes of the program segments of the password verification apparatus 10, receives the password input by the user and obtains the time when the user inputs the password, searches the password corresponding to the time when the user inputs the password according to the preset corresponding relationship between the password and the time, and judges whether the password input by the user is matched with the searched password to confirm whether the password passes the verification, so that the use of different types of passwords at different times is realized, the reliability of password verification is improved, and the safety of user information is ensured.
The display device 40 may be a device for displaying a screen, such as a touch panel, and is configured to display a display interface of the electronic device 1.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and other divisions may be realized in practice.
In addition, functional units in the embodiments of the present invention may be integrated into the same processing unit, or each unit may exist alone physically, or two or more units are integrated into the same unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. Several units or means recited in the apparatus claims may also be embodied by one and the same item or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. A method of password verification, the method comprising:
receiving a password input by a user;
acquiring the time for the user to input the password;
searching a password corresponding to the time for inputting the password by the user according to the preset corresponding relation between the password and the time, and searching the obtained password as a biological password or/and a non-biological password;
and judging whether the password input by the user is matched with the password obtained by searching, and if so, passing the verification.
2. The method according to claim 1, wherein the preset correspondence between the password and the time comprises:
the non-sleep time interval corresponds to a biological password pre-input by a user, and the sleep time interval corresponds to a non-biological password pre-input by the user; or,
the non-sleep time interval corresponds to a biological password and a non-biological password which are pre-input by the user, and the sleep time interval corresponds to a non-biological password which is pre-input by the user.
3. The method according to claim 1, wherein the searching for the password corresponding to the time when the user inputs the password according to the preset correspondence between the password and the time comprises:
judging whether the password input by the user is a biological password or a non-biological password;
if the password input by the user is a biological password, judging whether the time for inputting the password by the user belongs to the time range corresponding to the biological password according to the preset corresponding relation between the password and the time, and if the time for inputting the password by the user belongs to the time range corresponding to the biological password, searching the biological password corresponding to the time for inputting the password by the user;
if the password input by the user is a non-biological password, judging whether the time for inputting the password by the user belongs to the time range corresponding to the non-biological password or not according to the preset corresponding relation between the password and the time, and if the time for inputting the password by the user belongs to the time range corresponding to the non-biological password, searching the non-biological password corresponding to the time for inputting the password by the user.
4. The method according to claim 1 or 2, characterized in that the method further comprises:
judging whether the password input time of the user is biological password input time or non-biological password input time;
if the time for inputting the password by the user is the biological password input time, judging whether the password input by the user is the biological password, and if not, prompting the user to input the password again;
if the time for inputting the password by the user is the non-biological password input time, judging whether the password input by the user is the non-biological password, and if not, prompting the user to input the password again.
5. The method according to any one of claims 1 to 3, wherein before determining whether the password input by the user matches the password obtained by searching, further comprising:
determining whether the type of the password input by the user is the same as the type of the password obtained by searching;
the method further comprises the following steps:
and if the type of the password input by the user is different from the type of the password obtained by searching, prompting the user to input the password again.
6. An apparatus for password verification, the apparatus comprising:
a receiving unit for receiving a password input by a user;
the acquisition unit is used for acquiring the time when the user inputs the password;
the searching unit is used for searching a password corresponding to the time for inputting the password by the user according to the preset corresponding relation between the password and the time, and searching the obtained password as a biological password or/and a non-biological password;
and the matching unit is used for judging whether the password input by the user is matched with the password obtained by searching, and if so, the verification is passed.
7. The apparatus of claim 6, wherein the preset password-time correspondence comprises:
the non-sleep time interval corresponds to a biological password pre-input by a user, and the sleep time interval corresponds to a non-biological password pre-input by the user; or,
the non-sleep time interval corresponds to a biological password and a non-biological password which are pre-input by the user, and the sleep time interval corresponds to a non-biological password which is pre-input by the user.
8. The apparatus according to claim 6, wherein the search unit is specifically configured to determine whether the password input by the user is a biometric password or a non-biometric password;
if the password input by the user is a biological password, judging whether the time for inputting the password by the user belongs to a time range corresponding to the biological password according to the preset corresponding relation between the password and the time, and if the time for inputting the password by the user belongs to the time range corresponding to the biological password, searching the biological password corresponding to the time for inputting the password by the user;
if the password input by the user is a non-biological password, judging whether the time for inputting the password by the user belongs to the time range corresponding to the non-biological password or not according to the preset corresponding relation between the password and the time, and if the time for inputting the password by the user belongs to the time range corresponding to the non-biological password, searching the non-biological password corresponding to the time for inputting the password by the user.
9. The apparatus of claim 6 or 7, further comprising:
the first prompting unit is used for judging whether the password input time of the user is biological password input time or non-biological password input time; if the time for inputting the password by the user is the biological password input time, judging whether the password input by the user is the biological password, and if not, prompting the user to input the password again; if the time for inputting the password by the user is the non-biological password input time, judging whether the password input by the user is the non-biological password, and if not, prompting the user to input the password again.
10. The apparatus of any one of claims 6 to 8, further comprising:
the determining unit is used for determining whether the type of the password input by the user is the same as that of the password obtained by searching before the matching unit judges whether the password input by the user is matched with the password obtained by searching;
and the second prompting unit is used for prompting the user to input the password again if the type of the password input by the user is different from the type of the password obtained by searching.
CN201610907210.8A 2016-10-18 2016-10-18 Cipher check method and device Withdrawn CN106411509A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610907210.8A CN106411509A (en) 2016-10-18 2016-10-18 Cipher check method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610907210.8A CN106411509A (en) 2016-10-18 2016-10-18 Cipher check method and device

Publications (1)

Publication Number Publication Date
CN106411509A true CN106411509A (en) 2017-02-15

Family

ID=58012958

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610907210.8A Withdrawn CN106411509A (en) 2016-10-18 2016-10-18 Cipher check method and device

Country Status (1)

Country Link
CN (1) CN106411509A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3699789A4 (en) * 2017-11-22 2020-12-23 Vivo Mobile Communication Co., Ltd. Method and device for security verification and mobile terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102841755A (en) * 2012-08-28 2012-12-26 广东欧珀移动通信有限公司 Method and system for unlocking mobile communication terminal
CN103167169A (en) * 2013-02-01 2013-06-19 北京小米科技有限责任公司 Terminal unlocking method and terminal unlocking device
CN103514416A (en) * 2013-10-15 2014-01-15 广东欧珀移动通信有限公司 Dynamic unlocking method and unlocking system for mobile terminal
EP2995040A2 (en) * 2013-05-08 2016-03-16 JPMorgan Chase Bank, N.A. Systems and methods for high fidelity multi-modal out-of-band biometric authentication
CN105611531A (en) * 2015-10-30 2016-05-25 东莞酷派软件技术有限公司 Terminal control method, terminal control device and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102841755A (en) * 2012-08-28 2012-12-26 广东欧珀移动通信有限公司 Method and system for unlocking mobile communication terminal
CN103167169A (en) * 2013-02-01 2013-06-19 北京小米科技有限责任公司 Terminal unlocking method and terminal unlocking device
EP2995040A2 (en) * 2013-05-08 2016-03-16 JPMorgan Chase Bank, N.A. Systems and methods for high fidelity multi-modal out-of-band biometric authentication
CN103514416A (en) * 2013-10-15 2014-01-15 广东欧珀移动通信有限公司 Dynamic unlocking method and unlocking system for mobile terminal
CN105611531A (en) * 2015-10-30 2016-05-25 东莞酷派软件技术有限公司 Terminal control method, terminal control device and terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3699789A4 (en) * 2017-11-22 2020-12-23 Vivo Mobile Communication Co., Ltd. Method and device for security verification and mobile terminal

Similar Documents

Publication Publication Date Title
US10068076B1 (en) Behavioral authentication system using a behavior server for authentication of multiple users based on their behavior
CA2836052C (en) Picture gesture authentication
KR101769119B1 (en) Password Authentication System Based on Junk Data Coincidence and User Authentication Method thereof
US9953183B2 (en) User verification using touch and eye tracking
US20130167212A1 (en) System and method for providing secure access to an electronic device using both a screen gesture and facial biometrics
US8904482B1 (en) Techniques for securing a one-time passcode with an alteration code
CN109145558B (en) Unlocking control method and electronic device
CN105956431B (en) A kind of application protection processing method and mobile terminal
US9596087B2 (en) Token authentication for touch sensitive display devices
CN106095513B (en) Application self-identification safe starting method and system
CN105678147B (en) Touch operation method and device
WO2016165245A1 (en) User interface control method and terminal
WO2018090471A1 (en) Fingerprint authentication method and device
WO2021244531A1 (en) Payment method and apparatus based on facial recognition
CN111882425B (en) Service data processing method, device and server
CN109472122A (en) A kind of multimedia messages reminding method and system
Oakley et al. The personal identification chord: A four buttonauthentication system for smartwatches
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
AU2013205126A1 (en) Facial recognition streamlined login
CN107808082B (en) Electronic device, data access verification method, and computer-readable storage medium
JP2007265219A (en) Biometrics system
JP2000200113A (en) Individual rejection recovery method, execution device therefor and medium recording processing program therefor
CN106411509A (en) Cipher check method and device
US9594968B1 (en) Biometric profile creation
US20180239884A1 (en) Detection System, Fingerprint Sensor, and Method of Finger Touch Authentication Thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20170215

WW01 Invention patent application withdrawn after publication