CN106612181A - Identity verification method and device - Google Patents

Identity verification method and device Download PDF

Info

Publication number
CN106612181A
CN106612181A CN201510703867.8A CN201510703867A CN106612181A CN 106612181 A CN106612181 A CN 106612181A CN 201510703867 A CN201510703867 A CN 201510703867A CN 106612181 A CN106612181 A CN 106612181A
Authority
CN
China
Prior art keywords
string
operating gesture
identifying code
binary characters
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510703867.8A
Other languages
Chinese (zh)
Inventor
杨霞
林陆
林陆一
郝允允
李轶峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510703867.8A priority Critical patent/CN106612181A/en
Priority to PCT/CN2016/083105 priority patent/WO2017071192A1/en
Publication of CN106612181A publication Critical patent/CN106612181A/en
Priority to US15/817,014 priority patent/US10657244B2/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the invention discloses an identity verification method and device. According to the embodiment, the identity verification method comprises the steps of generating a verification code based on an identity verification request when the identity verification request of a user is received; obtaining an operating gesture of the user on a touch panel when determining that the user needs to input the verification code; then generating a corresponding binary character string based on the operating gesture; matching the binary character string with the verification code according to a preset rule; if so, determining that the identity verification is successful when determining that the authentication information carried by the identity verification request is correct; and otherwise, refusing the identity verification request. According to the scheme, more choices can be provided for the user to input the verification code, great convenience is brought to the operation of the user, and improvement of the operating flexibility is facilitated.

Description

A kind of auth method and device
Technical field
The present invention relates to communication technical field, and in particular to a kind of auth method and device.
Background technology
Nowadays, the every aspect of people's life nearly all be unable to do without data, such as carry out shopping at network, turn Account and session etc., are related to the process of data invariably, therefore, how to ensure data safety, also into For the problem that industry is all extremely paid close attention to all the time.
In the prior art, the safety of data typically all can be improved by way of authentication, such as, According to the authentication information that user provides, such as account and password, it is compared with the checking information for prestoring, if Unanimously, then it is verified, otherwise, it is determined that checking does not pass through.Wherein, in order to effectively prevent certain hacker To some particular registered user, continuous login attempt is carried out (i.e. using specific program Brute Force mode Checking is attempted), prior art has also been proposed " identifying code " technology, i.e., generate only mankind's ability at random Can answer problem, such as string number, letter, word, picture or problem etc., it is desirable to lander according to The requirement of the identifying code is input into, and is only input into correctly, and authentication information is correct, just can determine that checking is logical Cross.In brief, the input that the presence of identifying code is exactly to distinguish authentication information is people or machine, with Improve the safety of checking.
In the research and practice process to prior art, it was found by the inventors of the present invention that currently existing scheme exists During input validation code, need just to be input into by keyboard, operating flexibility is not enough.
The content of the invention
The embodiment of the present invention provides a kind of auth method and device, can obtain Trackpad to obtain user The identifying code of input, on the premise of data safety is ensured, improves the motility of operation.
The embodiment of the present invention provides a kind of auth method, including:
The authentication request of receive user, the authentication request carries authentication information;
Identifying code is generated according to the authentication request;
When determining that user needs input validation code, user's operating gesture on the touch pad is obtained;
Corresponding string of binary characters is generated according to the operating gesture;
The string of binary characters is matched with the identifying code according to presetting rule;
If matching, when it is determined that the authentication information is correct, determines that authentication passes through;
If mismatching, refuse the authentication request.
Accordingly, the embodiment of the present invention also provides a kind of authentication means, including:
Receiving unit, for the authentication request of receive user, the authentication request carries authentication letter Breath;
Identifying code signal generating unit, for generating identifying code according to the authentication request;
Acquiring unit, during for determining that user needs input validation code, obtains user's operation on the touch pad Gesture;
Text string generation unit, for generating corresponding string of binary characters according to the operating gesture;
Processing unit, for carrying out the string of binary characters and the identifying code according to presetting rule Match somebody with somebody, if matching, when it is determined that the authentication information is correct, determines that authentication passes through, if mismatching, Then refuse the authentication request.
The embodiment of the present invention is adopted when the authentication request of user is received, according to the authentication request Identifying code is generated, and when it is determined that user needs input validation code, obtains user manipulator on the touch pad Gesture, then generates corresponding string of binary characters according to the operating gesture, and two enters this according to presetting rule Character string processed is matched with identifying code, if matching, it is determined that the authentication letter entrained by authentication request When ceasing correct, determine that authentication passes through, if conversely, mismatch, refuse the authentication request, from And realize carrying out user the purpose of authentication;The program obtain user input identifying code when, without the need for By keyboard, but obtained by being monitored to Trackpad, can only be led to accordingly, with respect to prior art For the technology for crossing keyboard to be input into, many a selections are provided for user input identifying code, it is big generous User operation, be conducive to improve operation motility and interest.
Description of the drawings
Technical scheme in order to be illustrated more clearly that the embodiment of the present invention, below will be to institute in embodiment description The accompanying drawing that needs are used is briefly described, it should be apparent that, drawings in the following description are only the present invention Some embodiments, for those skilled in the art, on the premise of not paying creative work, also Other accompanying drawings can be obtained according to these accompanying drawings.
Fig. 1 is the flow chart of auth method provided in an embodiment of the present invention;
Fig. 2 a are another flow charts of auth method provided in an embodiment of the present invention;
Fig. 2 b are the schematic diagrams of identifying code inputting interface in auth method provided in an embodiment of the present invention;
Fig. 3 a are the another flow charts of auth method provided in an embodiment of the present invention;
Fig. 3 b are another signals of identifying code inputting interface in auth method provided in an embodiment of the present invention Figure
Fig. 4 is the structural representation of authentication means provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly Chu, it is fully described by, it is clear that described embodiment is only a part of embodiment of the invention, rather than Whole embodiments.Based on the embodiment in the present invention, those skilled in the art are not making creative labor The every other embodiment obtained under the premise of dynamic, belongs to the scope of protection of the invention.
The embodiment of the present invention provides a kind of auth method and device.To be described in detail respectively below.
Embodiment one,
The present embodiment will be described from the angle of authentication means, and the authentication means specifically can collect Into in terminal, server or during other need the equipment for carrying out authentication.
A kind of auth method, including:The authentication request of receive user, the authentication request is taken Band authentication information, according to the authentication request identifying code is generated, when determining that user needs input validation code, User's operating gesture on the touch pad is obtained, corresponding string of binary characters is generated according to the operating gesture, The string of binary characters is matched with the identifying code according to presetting rule, if matching, it is determined that the mirror When power information is correct, determine that authentication passes through, otherwise, if mismatching, refuse the authentication request.
As shown in figure 1, the idiographic flow of the auth method can be as follows:
101st, the authentication request of receive user.
Wherein, the authentication request can carry authentication information, such as the account of user and password etc. should Account can include email address, the number of instant messaging, user's name or Customs Assigned Number etc..
102nd, identifying code is generated according to the authentication request.
For example, can when the authentication request of user is received, such as user open log-in interface when, Or during user input authentication information, or, when user is on log-in interface, click on and generate identifying code During triggering key, according to default strategy generating identifying code.
Wherein, depending on the preset strategy can be according to the demand of practical application, such as, the identifying code can be Random generation, it is also possible to generate according to certain rule, the identifying code can be string of binary characters, Can also be the numeral of other systems, such as decimal scale or hexadecimal numeral, or even, can also be figure Piece is combined or color combination, such as the combination of the combination of male's photograph and women photograph, or black and white, Blue and red combination, etc., will not be described here.
Optionally, for the ease of user operation, when identifying code is generated, corresponding prompting letter can also be generated Breath, to indicate the corresponding relation of operating gesture and binary-coded character.
For example, touch if " 0 " represents, " 1 " represents and presses, then can point out user:" wherein, 0 table Show and touch, 1 expression is pressed, and is please input in order ".
Again for example, touch if " 1 " represents, " 0 " represents and presses, then can point out user:" wherein, 1 Expression is touched, and 0 expression is pressed, and is please input in order ".
Again for example, if male's photograph is represented touching, women photograph is represented to be pressed, then can point out user:" its In, male's photograph is represented and touched, and women photograph is represented to be pressed, and is please input in order ".
Again for example, if black is represented touching, white is represented and pressed, then can point out user:It is " wherein, black Color table shows and touches that white is represented and pressed, and is please input in order ".
Again for example, it is also possible to distinguish the information of input, such as, Ke Yiru according to the difference of the dynamics for pressing Under:
If " 0 " represents flicking, " 1 " represents and presses again, then can point out user:" wherein, 0 flicking is represented, 1 expression is pressed again, is please input in order ".
Or, if " 1 " represents flicking, " 0 " represents and presses again, then can point out user:" wherein, 1 table Show flicking, 0 expression is pressed, is please input in order again ".
By that analogy, will not be described here.
It should be noted that, except " touching " and " pressing ", and outside " flicking " and " again by ", Can also be other operating gestures, such as " draw a circle " etc., the operating gesture is corresponding with binary-coded character Relation can be configured according to the demand of practical application, will not be described here.
When the 103rd, determining that user needs input validation code, user's operating gesture on the touch pad is obtained.
Wherein it is determined that user needs the mode of input validation code to have various, such as, test when user clicks on During the input frame of card code, or, when input light is marked on the input frame of identifying code, then can determine that user needs Want input validation code.
If in a step 102, having generated information, then now user can be according to the information Operated on the touch pad, i.e., step " obtaining user's operating gesture on the touch pad " is specifically as follows: Operating gesture of the user according to the information on the touch pad is obtained, such as " is pressed " or " touching ".
104th, corresponding string of binary characters is generated according to the operating gesture.
Wherein, generating the rule of string of binary characters can be set in advance, such as, with pressure touch As a example by (Force touch), can be with using following any one mode:
(1) first kind of way;
When determining the operating gesture to touch, character 1 is generated;
When determining the operating gesture to press, character 0 is generated;
The character of generation is arranged according to the order of operating gesture, string of binary characters is constituted.
(2) second way;
When determining the operating gesture to touch, character 0 is generated;
When determining the operating gesture to press, character 1 is generated;
The character of generation is arranged according to the order of operating gesture, string of binary characters is constituted.
(3) the third mode;
Determine the operating gesture be flicking when, generate character 0;
Determine that the operating gesture is attached most importance on time, generate character 1;
The character of generation is arranged according to the order of operating gesture, string of binary characters is constituted.
(4) the 4th kinds of modes;
Determine the operating gesture be flicking when, generate character 1;
Determine that the operating gesture is attached most importance on time, generate character 0;
The character of generation is arranged according to the order of operating gesture, string of binary characters is constituted.
It should be noted that, the rule of the generation is corresponding with information, certainly, also there are others side Formula, will not be described here.
105th, the string of binary characters is matched with the identifying code according to presetting rule, if matching, Execution step 106, if mismatching, execution step 107.
For example, if the identifying code is string of binary characters, at this point it is possible to determine that the operating gesture is corresponding Whether string of binary characters is consistent with the identifying code, if unanimously, it is determined that the corresponding binary system of the operating gesture Character string is matched with the identifying code;If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture with The identifying code is mismatched.
Again for example, combine or hexadecimal digit combination if the identifying code is ten's digit, now, can With by ten's digit combination or hexadecimal digit Combination conversion as string of binary characters, then, it is determined that Whether the corresponding string of binary characters of the operating gesture is consistent with the string of binary characters being converted to, if one Cause, it is determined that the corresponding string of binary characters of the operating gesture is matched with the identifying code;If inconsistent, really The fixed corresponding string of binary characters of the operating gesture is mismatched with the identifying code.
It should be noted that, wherein, ten's digit combination or hexadecimal digit Combination conversion are being entered for two During character string processed, the ten's digit combination or each numeral in hexadecimal digit combination can be turned Be changed to binary number, combination be then ranked up in order, it is also possible to directly by ten's digit combination or Hexadecimal digit combination is changed as a numeral, and concrete transformational rule can be according to practical application Depending on demand, however it is necessary that the transformational rule observed during with user input is consistent, will not be described here.
If the 106, matching, when it is determined that the authentication information is correct, determine that authentication passes through.
Anyway, however, it is determined that the authentication information is incorrect, then the authentication request is refused.
Wherein, whether authentication information correct, can by the authentication information, such as account number and password with prestore Checking information, such as the account number and password for preserving compares to determine, will not be described here.
If the 107, mismatching, refuse the authentication request.
From the foregoing, it will be observed that the present embodiment is adopted when the authentication request of user is received, tested according to the identity Card request generates identifying code, and when it is determined that user needs input validation code, obtains user on the touch pad Operating gesture, then generates corresponding string of binary characters according to the operating gesture, and will according to presetting rule The string of binary characters is matched with identifying code, if matching, it is determined that entrained by authentication request When authentication information is correct, determine that authentication passes through, if conversely, mismatching, refusing the authentication please Ask, so as to realize that the purpose of authentication is carried out to user;The program obtain user input identifying code when, By keyboard, but need not be obtained by being monitored to Trackpad, accordingly, with respect to prior art only For the technology that can be input into by keyboard, many a selections are provided for user input identifying code, greatly The operation of user is facilitated greatly, is conducive to improving the motility, interesting and interactive of operation.
Embodiment two,
Method according to described by embodiment one, is below described in further detail citing.
In the present embodiment, will be with the identifying code as string of binary characters, and " 0 " represents and touches, " 1 " Expression is illustrated as a example by pressing.
As shown in Figure 2 a, a kind of auth method, idiographic flow can be as follows:
201st, the authentication request of authentication means receive user.
Wherein, the authentication request can carry authentication information, such as the account of user and password etc. should Account can include email address, the number of instant messaging, user's name or Customs Assigned Number etc..
202nd, authentication means generate identifying code according to the authentication request, and the identifying code specifically can be with It is string of binary characters.
For example, can when the authentication request of user is received, such as user open log-in interface when, Or during user input authentication information, or, when user is on log-in interface, click on and generate identifying code During triggering key, identifying code is generated according to preset strategy.Wherein, the preset strategy can be according to practical application Depending on demand, such as, and what the identifying code can be randomly generated, it is also possible to generate according to certain rule.
Optionally, for the ease of user operation, when identifying code is generated, corresponding prompting letter can also be generated Breath, to indicate the corresponding relation of operating gesture and binary-coded character, such as, referring to Fig. 2 b, is showing checking During code " 10110 ", user can be pointed out:" wherein, 0 expression is touched, and 1 expression is pressed, please defeated in order Enter ", etc..
203rd, when authentication means determine that user needs input validation code, user is obtained on the touch pad Operating gesture.
For example, user can on the touch pad make the behaviour of " pressing " or " touching " according to the information Make a sign with the hand, be determined after input is finished, then now, authentication means just can receive these behaviour Make a sign with the hand.
Wherein it is determined that user needs the mode of input validation code to have various, such as, test when user clicks on During the input frame of card code, or, when input light is marked on the input frame of identifying code, then can determine that user needs Want input validation code.
204th, when authentication means determine the operating gesture to touch, character 0 is generated, determines the manipulator Gesture is arranged the character of generation according to the order of operating gesture when pressing, to generate character 1, is constituted String of binary characters.
205th, authentication means determine whether are the corresponding string of binary characters of the operating gesture and the identifying code Unanimously, if unanimously, it is determined that the corresponding string of binary characters of the operating gesture is matched with the identifying code, perform Step 206;If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture and the identifying code are not Match somebody with somebody, execution step 207.
206th, authentication means determine that authentication passes through when it is determined that the authentication information is correct.
Anyway, however, it is determined that the authentication information is incorrect, then the authentication request (i.e. execution step is refused 207)。
Wherein, whether authentication information correct, can by the authentication information, such as account number and password with prestore Checking information, such as the account number and password for preserving compares to determine, will not be described here.
207th, authentication means refuse the authentication request.
It should be noted that, in addition to allowing user by Trackpad input validation code, it is also possible to allow user By other approach, such as input through keyboard identifying code, i.e. user can select the approach of input validation code, This is repeated no more.
From the foregoing, it will be observed that the present embodiment is adopted when the authentication request of user is received, tested according to the identity Card request generates a string of binary characters as identifying code, and when it is determined that user needs input validation code, User's operating gesture on the touch pad is obtained, such as, is pressed or is touched, then according to the operating gesture Corresponding string of binary characters is generated, and the string of binary characters and identifying code are compared, if unanimously, Then when it is determined that the authentication information entrained by authentication request is correct, determine that authentication passes through, conversely, If inconsistent, refuse the authentication request, so as to realize that the purpose of authentication is carried out to user;Should Scheme when the identifying code of user input is obtained, without the need for by keyboard, but by being monitored to Trackpad It is user for the technology that can only be input into by keyboard accordingly, with respect to prior art to obtain Input validation code provides many a selections, greatly facilitates the operation of user, is conducive to improving the spirit of operation It is active, interesting and interactive.
Embodiment three,
Method according to described by embodiment one, is below described in further detail citing.
In the present embodiment, will be with the identifying code as character to decimal string, and " 0 " represents and touches, " 1 " Expression is illustrated as a example by pressing.
As shown in Figure 3 a, a kind of auth method, idiographic flow can be as follows:
301st, the authentication request of authentication means receive user.
Wherein, the authentication request can carry authentication information, such as the account of user and password etc. should Account can include email address, the number of instant messaging, user's name or Customs Assigned Number etc..
302nd, authentication means generate identifying code according to the authentication request, and the identifying code specifically can be with It is character to decimal string.
For example, can when the authentication request of user is received, such as user open log-in interface when, Or during user input authentication information, or, when user is on log-in interface, click on and generate identifying code During triggering key, identifying code is generated according to preset strategy.Wherein, the preset strategy can be according to practical application Depending on demand, such as, and what the identifying code can be randomly generated, it is also possible to generate according to certain rule.
Optionally, for the ease of user operation, when identifying code is generated, corresponding prompting letter can also be generated Breath, to indicate the corresponding relation of operating gesture and binary-coded character, such as, referring to Fig. 3 b, is showing checking During code " 4587 ", user can be pointed out:" numeral of display is converted to and be input into after binary system, its In, 0 expression is touched, and 1 expression is pressed, and is please input in order ", etc..
Optionally, it is also possible to only require the binary system of certain part number in the user input character to decimal string Number, such as, can be highlighted " 8 " in identifying code " 4587 ", such as be labeled as different It is such as red in other digital colors, then require that user is corresponding in Trackpad input " 8 " in order Binary number, wherein, 0 expression is touched, and 1 expression is pressed, etc..
303rd, when authentication means determine that user needs input validation code, user is obtained on the touch pad Operating gesture.
For example, user can on the touch pad make the behaviour of " pressing " or " touching " according to the information Make a sign with the hand, be determined after input is finished, then now, authentication means just can receive these behaviour Make a sign with the hand.
Wherein it is determined that user needs the mode of input validation code to have various, such as, test when user clicks on During the input frame of card code, or, when input light is marked on the input frame of identifying code, then can determine that user needs Want input validation code.
304th, when authentication means determine the operating gesture to touch, character 0 is generated, determines the manipulator Gesture is arranged the character of generation according to the order of operating gesture when pressing, to generate character 1, is constituted String of binary characters.
305th, the identifying code, i.e. the ten's digit Combination conversion are binary-coded character by authentication means String.
For example, each numeral in the ten's digit combination can be converted to binary number, is then pressed Order is ranked up combination.
Such as, by taking " 4587 " as an example, then " 4 " therein can be converted to " 100 ", will be therein " 5 " are converted to " 101 ", and " 8 " therein are converted to " 1000 ", and " 7 " therein are changed For " 111 ", then, these numbers are combined in order, as " 1001011000111 ".
It is of course also possible to arrange directly the ten's digit is directly changed into into binary number, rather than will be every Individual numeral is converted into binary number, such as, " 4587 " this number can be converted to into binary system and be " 1000111101011 ", etc..Specifically need to be changed using which kind of mode, can be answered according to actual Depending on demand, however it is necessary that the transformational rule observed during with user input is consistent.
306th, authentication means determine the corresponding string of binary characters of the operating gesture and two for being converted to Whether system character string (i.e. identifying code) is consistent, if unanimously, it is determined that the corresponding binary system of the operating gesture Character string is matched with the identifying code, execution step 307;If inconsistent, it is determined that the operating gesture is corresponding String of binary characters is mismatched with the identifying code, execution step 308.
307th, authentication means determine that authentication passes through when it is determined that the authentication information is correct.
Anyway, however, it is determined that the authentication information is incorrect, then the authentication request (i.e. execution step is refused 307)。
Wherein, whether authentication information correct, can by the authentication information, such as account number and password with prestore Checking information, such as the account number and password for preserving compares to determine, will not be described here.
308th, authentication means refuse the authentication request.
It should be noted that, the above is only illustrated so that the identifying code is for character to decimal string as an example, should be managed Solve, the identifying code can also be represented in other forms, such as hexadecimal string or color group Close etc., its implementation is similar to the above, will not be described here.
From the foregoing, it will be observed that the present embodiment is adopted when the authentication request of user is received, tested according to the identity Card request generates a character to decimal string as identifying code, and when it is determined that user needs input validation code, User's operating gesture on the touch pad is obtained, such as is pressed or is touched, then according to the operating gesture life Into corresponding string of binary characters, identifying code is converted to into string of binary characters, then by the binary-coded character The string of binary characters that string is converted into identifying code is compared, if unanimously, it is determined that authentication request When entrained authentication information is correct, determine that authentication passes through, if conversely, inconsistent, refusing the body Part checking request, so as to realize that the purpose of authentication is carried out to user;The program is obtaining user input During identifying code, without the need for passing through keyboard, but obtained by being monitored to Trackpad, accordingly, with respect to For the technology that prior art can only be input into by keyboard, for user input identifying code many one are provided Part select, greatly facilitate the operation of user, be conducive to improving the motility, interesting and interactive of operation.
Example IV,
Accordingly, the embodiment of the present invention also provides a kind of authentication means, as shown in figure 4, the identity is tested Card device includes receiving unit 401, identifying code signal generating unit 402, acquiring unit 403, text string generation list Unit 404 and processing unit 405, it is as follows:
(1) receiving unit 401;
Receiving unit 401, for the authentication request of receive user.
Wherein, the authentication request can carry authentication information, such as the account of user and password etc. should Account can include email address, the number of instant messaging, user's name or Customs Assigned Number etc..
(2) identifying code signal generating unit 402;
Identifying code signal generating unit 402, for generating identifying code according to the authentication request.
For example, can when the authentication request of user is received, such as user open log-in interface when, Or during user input authentication information, or, when user is on log-in interface, click on and generate identifying code During triggering key, according to default strategy generating identifying code.
Wherein, depending on the preset strategy can be according to the demand of practical application, such as, the identifying code can be Random generation, it is also possible to generate according to certain rule, the identifying code can be string of binary characters, Can also be the numeral of other systems, such as decimal scale or hexadecimal numeral, or even, can also be figure Piece is combined or color combination, such as the combination of the combination of male's photograph and women photograph, or black and white, Blue and red combination, etc., will not be described here.
Optionally, for the ease of user operation, when identifying code is generated, corresponding prompting letter can also be generated Breath, to indicate the corresponding relation of operating gesture and binary-coded character.I.e.:
The identifying code signal generating unit 402, can be also used for generating information, and the information is used to indicate The corresponding relation of operating gesture and binary-coded character.
For example, touch if " 0 " represents, " 1 " represents and presses, then can point out user:" wherein, 0 table Show and touch, 1 expression is pressed, and is please input in order ".
Again for example, touch if " 1 " represents, " 0 " represents and presses, then can point out user:" wherein, 1 Expression is touched, and 0 expression is pressed, and is please input in order ".
Again for example, if male's photograph is represented touching, women photograph is represented to be pressed, then can point out user:" its In, male's photograph is represented and touched, and women photograph is represented to be pressed, and is please input in order ".
Again for example, if black is represented touching, white is represented and pressed, then can point out user:It is " wherein, black Color table shows and touches that white is represented and pressed, and is please input in order ".
Again for example, it is also possible to distinguish the information of input, such as, Ke Yiru according to the difference of the dynamics for pressing Under:
If " 0 " represents flicking, " 1 " represents and presses again, then can point out user:" wherein, 0 flicking is represented, 1 expression is pressed again, is please input in order ".
Or, if " 1 " represents flicking, " 0 " represents and presses again, then can point out user:" wherein, 1 table Show flicking, 0 expression is pressed, is please input in order again ".
By that analogy, will not be described here.
It should be noted that, except " touching " and " pressing ", and outside " flicking " and " again by ", Can also be other operating gestures, such as " draw a circle " etc., the operating gesture is corresponding with binary-coded character Relation can be configured according to the demand of practical application, will not be described here.
(3) acquiring unit 403;
Acquiring unit 403, during for determining that user needs input validation code, obtains user on the touch pad Operating gesture.
For example, the acquiring unit 403, specifically can be used for obtaining user according to the information in Trackpad On operating gesture, such as " press " or " touching " etc..
Wherein it is determined that user needs the mode of input validation code to have various, such as, test when user clicks on During the input frame of card code, or, when input light is marked on the input frame of identifying code, then can determine that user needs Want input validation code, etc..
(4) text string generation unit 404;
Text string generation unit 404, for generating corresponding string of binary characters according to the operating gesture;
Wherein, generating the rule of string of binary characters can be set in advance, for example, can be as follows:
The text string generation unit 404, when being specifically determined for the operating gesture to touch, generates word Symbol 1;When determining the operating gesture to press, character 0 is generated;By the character for generating according to the suitable of operating gesture Sequence is arranged, and constitutes string of binary characters.
Or, the text string generation unit 404, when being specifically determined for the operating gesture to touch, Generate character 0;When determining the operating gesture to press, character 1 is generated;By the character for generating according to manipulator The order of gesture is arranged, and constitutes string of binary characters.
Or, the text string generation unit 404, be specifically determined for the operating gesture for flicking when, Generate character 0;Determine that the operating gesture is attached most importance on time, generate character 1;By the character for generating according to manipulator The order of gesture is arranged, and constitutes string of binary characters.
Or, the text string generation unit 404, be specifically determined for the operating gesture for flicking when, Generate character 1;Determine that the operating gesture is attached most importance on time, generate character 0;By the character for generating according to manipulator The order of gesture is arranged, and constitutes string of binary characters.
It should be noted that, the rule of the generation is corresponding with information, certainly, also there are others side Formula, will not be described here.
(5) processing unit 405;
Processing unit 405, for the string of binary characters to be matched with the identifying code according to presetting rule, If matching, when it is determined that the authentication information is correct, determines that authentication passes through, if mismatching, refuse The authentication request.
For example, if the identifying code is string of binary characters,
The processing unit 405, is specifically determined for the corresponding string of binary characters of the operating gesture and is somebody's turn to do Whether identifying code is consistent;If consistent, it is determined that the corresponding string of binary characters of the operating gesture and the identifying code Matching;If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture is mismatched with the identifying code.
Again for example, combine or hexadecimal digit combination if the identifying code is ten's digit,:
The processing unit 405, specifically can be used for the ten's digit combination or hexadecimal digit combination Be converted to string of binary characters;Determine that the corresponding string of binary characters of the operating gesture enters with two for being converted to Whether character string processed is consistent;If consistent, it is determined that the corresponding string of binary characters of the operating gesture and the checking Code matching;If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture is mismatched with the identifying code.
It should be noted that, wherein, ten's digit combination or hexadecimal digit Combination conversion are being entered for two During character string processed, the ten's digit combination or each numeral in hexadecimal digit combination can be turned Be changed to binary number, combination be then ranked up in order, it is also possible to directly by ten's digit combination or Hexadecimal digit combination is changed as a numeral, and concrete transformational rule can be according to practical application Depending on demand, however it is necessary that the transformational rule observed during with user input is consistent, will not be described here.
Additionally, processing unit 405, can be also used for it is determined that the string of binary characters is matched with the identifying code When, however, it is determined that the authentication information is incorrect, then refuse the authentication request.
When being embodied as, above unit can be realized as independent entity, it is also possible to be carried out arbitrarily Combination, realizes as same or several entities, and being embodied as of above unit can be found in above Embodiment of the method, will not be described here.
The authentication means specifically can be integrated in terminal, server or other need to carry out authentication In equipment.
From the foregoing, it will be observed that the employing of the authentication means of the present embodiment is receiving the authentication request of user When, identifying code is generated according to the authentication request by identifying code signal generating unit 402, and by acquiring unit 403 When it is determined that user needs input validation code, user's operating gesture on the touch pad is obtained, then by character String signal generating unit 404 generates corresponding string of binary characters according to the operating gesture, and by processing unit 405 The string of binary characters is matched with identifying code according to presetting rule, if matching, it is determined that identity is tested When the entrained authentication information of card request is correct, determine that authentication passes through, if conversely, mismatch, refuses Exhausted authentication request, so as to realize that the purpose of authentication is carried out to user;The program is obtaining user During the identifying code of input, without the need for passing through keyboard, but obtained by being monitored to Trackpad, therefore, For the technology that prior art can only be input into by keyboard, provide for user input identifying code It is many it is a select, greatly facilitate the operation of user, be conducive to improving the motility of operation, it is interesting and It is interactive.
Example IV,
Additionally, the embodiment of the present invention also provides a kind of identity-validation device, embodiment of the present invention institute can be included Any one authentication means for providing, specifically can be found in embodiment three, for example, can be as follows:
Authentication means, for the authentication request of receive user, the authentication request carries authentication Information, according to the authentication request identifying code is generated, and when determining that user needs input validation code, is obtained and is used Family operating gesture on the touch pad, generates corresponding string of binary characters, according to pre- according to the operating gesture Put rule to be matched the string of binary characters with the identifying code, if matching, it is determined that the authentication information When correct, determine that authentication passes through, otherwise, if mismatching, refuse the authentication request.
For example, when it is determined that the operating gesture is to touch, character 1 is generated, determines the operating gesture to press When, character 0 is generated, then, the character of generation is arranged according to the order of operating gesture, composition two System character string.
Or, and for example, when it is determined that the operating gesture is to touch, character 0 is generated, determine the manipulator Then gesture, the character of generation is arranged according to the order of operating gesture when pressing, to generate character 1, Composition string of binary characters.
The identity-validation device be specifically as follows terminal, server or other need the equipment that carries out authentication Deng the operation of, the above is embodied as can be found in embodiment above, will not be described here.
Because the identity-validation device can include any one authentication dress that the embodiment of the present invention is provided Put, it is thereby achieved that having achieved by any one authentication means for being provided of the embodiment of the present invention Beneficial effect, the embodiment met each other above, will not be described here.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment Suddenly can be by program to instruct the hardware of correlation to complete, the program can be stored in a computer-readable In storage medium, storage medium can include:Read only memory (ROM, Read Only Memory), Random access memory (RAM, Random Access Memory), disk or CD etc..
A kind of auth method for being provided the embodiment of the present invention above and device are described in detail, Specific case used herein is set forth to the principle and embodiment of the present invention, above example Illustrate that being only intended to help understands the method for the present invention and its core concept;Simultaneously for the technology of this area Personnel, according to the thought of the present invention, will change in specific embodiments and applications, comprehensive Upper described, this specification content should not be construed as limiting the invention.

Claims (14)

1. a kind of auth method, it is characterised in that include:
The authentication request of receive user, the authentication request carries authentication information;
Identifying code is generated according to the authentication request;
When determining that user needs input validation code, user's operating gesture on the touch pad is obtained;
Corresponding string of binary characters is generated according to the operating gesture;
The string of binary characters is matched with the identifying code according to presetting rule;
If matching, when it is determined that the authentication information is correct, determines that authentication passes through;
If mismatching, refuse the authentication request.
2. method according to claim 1, it is characterised in that described to be generated according to the operating gesture Corresponding string of binary characters, including:
When determining the operating gesture to touch, character 1 is generated;
When determining the operating gesture to press, character 0 is generated;
The character of generation is arranged according to the order of operating gesture, string of binary characters is constituted.
3. method according to claim 1, it is characterised in that described to be generated according to the operating gesture Corresponding string of binary characters, including:
When determining the operating gesture to touch, character 0 is generated;
When determining the operating gesture to press, character 1 is generated;
The character of generation is arranged according to the order of operating gesture, string of binary characters is constituted.
4. the method according to any one of claims 1 to 3, it is characterised in that the identifying code is two System character string, then it is described to carry out the string of binary characters and the identifying code according to presetting rule Match somebody with somebody, including:
Determine whether the corresponding string of binary characters of the operating gesture is consistent with the identifying code;
If consistent, it is determined that the corresponding string of binary characters of the operating gesture is matched with the identifying code;
If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture and the identifying code are not Match somebody with somebody.
5. the method according to any one of claims 1 to 3, it is characterised in that the identifying code is ten Binary digits are combined or hexadecimal digit combination, then it is described according to presetting rule by the string of binary characters Matched with the identifying code, including:
It is string of binary characters by ten's digit combination or hexadecimal digit Combination conversion;
Determine whether are the corresponding string of binary characters of the operating gesture and the string of binary characters being converted to Unanimously;
If consistent, it is determined that the corresponding string of binary characters of the operating gesture is matched with the identifying code;
If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture and the identifying code are not Match somebody with somebody.
6. the method according to any one of claims 1 to 3, it is characterised in that it is determined that described two enter When character string processed is matched with the identifying code, also include:
If it is determined that the authentication information is incorrect, then refuse the authentication request.
7. the method according to any one of claims 1 to 3, it is characterised in that described according to the body When part checking request generates identifying code, also include:
Information is generated, the information is used to indicate operating gesture pass corresponding with binary-coded character System;
It is described to obtain user's operating gesture on the touch pad, including:User is obtained according to the information Operating gesture on the touch pad.
8. a kind of authentication means, it is characterised in that include:
Receiving unit, for the authentication request of receive user, the authentication request carries authentication letter Breath;
Identifying code signal generating unit, for generating identifying code according to the authentication request;
Acquiring unit, during for determining that user needs input validation code, obtains user's operation on the touch pad Gesture;
Text string generation unit, for generating corresponding string of binary characters according to the operating gesture;
Processing unit, for carrying out the string of binary characters and the identifying code according to presetting rule Match somebody with somebody, if matching, when it is determined that the authentication information is correct, determines that authentication passes through, if mismatching, Then refuse the authentication request.
9. authentication means according to claim 8, it is characterised in that
The text string generation unit, during specifically for determining the operating gesture to touch, generates character 1; When determining the operating gesture to press, character 0 is generated;By generate character according to operating gesture order Arranged, constituted string of binary characters.
10. authentication means according to claim 8, it is characterised in that
The text string generation unit, during specifically for determining the operating gesture to touch, generates character 0; When determining the operating gesture to press, character 1 is generated;By generate character according to operating gesture order Arranged, constituted string of binary characters.
11. authentication means according to any one of claim 8 to 10, it is characterised in that described Identifying code is string of binary characters, then:
The processing unit, specifically for determining that the corresponding string of binary characters of the operating gesture is tested with described Whether card code is consistent;If consistent, it is determined that the corresponding string of binary characters of the operating gesture and the checking Code matching;If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture is with the identifying code not Matching.
12. authentication means according to any one of claim 8 to 10, it is characterised in that described Identifying code is that ten's digit is combined or hexadecimal digit combination, then:
The processing unit, specifically for the ten's digit is combined or hexadecimal digit Combination conversion For string of binary characters;Determine the corresponding string of binary characters of the operating gesture and the binary system being converted to Whether character string is consistent;If consistent, it is determined that the corresponding string of binary characters of the operating gesture is tested with described Card code matching;If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture and the identifying code Mismatch.
13. authentication means according to any one of claim 8 to 10, it is characterised in that
The processing unit, is additionally operable to when it is determined that the string of binary characters is matched with the identifying code, if Determine that the authentication information is incorrect, then refuse the authentication request.
14. authentication means according to any one of claim 8 to 10, it is characterised in that
The identifying code signal generating unit, is additionally operable to generate information, and the information is used to indicate operation The corresponding relation of gesture and binary-coded character;
The acquiring unit, during specifically for determining that user needs input validation code, obtains user according to described Information operating gesture on the touch pad.
CN201510703867.8A 2015-10-26 2015-10-26 Identity verification method and device Pending CN106612181A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201510703867.8A CN106612181A (en) 2015-10-26 2015-10-26 Identity verification method and device
PCT/CN2016/083105 WO2017071192A1 (en) 2015-10-26 2016-05-24 Identity verification method and apparatus
US15/817,014 US10657244B2 (en) 2015-10-26 2017-11-17 Identity authentication method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510703867.8A CN106612181A (en) 2015-10-26 2015-10-26 Identity verification method and device

Publications (1)

Publication Number Publication Date
CN106612181A true CN106612181A (en) 2017-05-03

Family

ID=58614027

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510703867.8A Pending CN106612181A (en) 2015-10-26 2015-10-26 Identity verification method and device

Country Status (2)

Country Link
CN (1) CN106612181A (en)
WO (1) WO2017071192A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111160369B (en) * 2019-12-25 2024-03-05 携程旅游信息技术(上海)有限公司 Method, system, electronic equipment and storage medium for cracking Chinese character verification code
CN117768197A (en) * 2023-05-18 2024-03-26 洪碧群 Logging in big data blockchain cloud platform by means of intelligent handheld mobile terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104023029A (en) * 2014-06-19 2014-09-03 百度在线网络技术(北京)有限公司 Method and device for verifying verification codes
CN104778397A (en) * 2014-01-15 2015-07-15 联想(新加坡)私人有限公司 Information processing device and method thereof
CN105184126A (en) * 2015-08-27 2015-12-23 广东欧珀移动通信有限公司 Password setting method, authentication method and terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9147058B2 (en) * 2012-10-12 2015-09-29 Apple Inc. Gesture entry techniques
CN104580117B (en) * 2013-10-28 2018-07-27 深圳市腾讯计算机系统有限公司 Auth method, apparatus and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104778397A (en) * 2014-01-15 2015-07-15 联想(新加坡)私人有限公司 Information processing device and method thereof
CN104023029A (en) * 2014-06-19 2014-09-03 百度在线网络技术(北京)有限公司 Method and device for verifying verification codes
CN105184126A (en) * 2015-08-27 2015-12-23 广东欧珀移动通信有限公司 Password setting method, authentication method and terminal

Also Published As

Publication number Publication date
WO2017071192A1 (en) 2017-05-04

Similar Documents

Publication Publication Date Title
CN102880398B (en) A kind of mobile phone unlock method and mobile phone based on random digit array
CN103793815B (en) Mobile intelligent terminal acquirer system and method suitable for bank cards and business cards
EP3065074A1 (en) Fingerprint authentication method and device, intelligent terminal, and computer storage medium
WO2015161565A1 (en) Password verification device and password verification method
US20130269016A1 (en) Method for integrating account management function in input method software
CN104732121A (en) Encryption setting method, decryption setting method and corresponding device of application program
US20140245433A1 (en) Password authentication
US20190377863A1 (en) Password input method, computer device and storage medium
CN107480513B (en) Authentication implementation method and device, computer device and readable storage medium
CN103425944A (en) Information safety input method and information safety device
CN105260635A (en) Identity verifying method and system based on fingerprint for mobile terminal
US10108796B2 (en) System and method for PIN entry on mobile devices
CN104484942A (en) Client interaction terminal and counter transaction method thereof
CN105809445A (en) Password verifying and processing method, apparatus and terminal
CN104636917A (en) Mobile payment system and method with secure payment function
CN204069000U (en) Mobile encrypted authenticate device
CN106203176A (en) A kind of application encryption method and device
US10657244B2 (en) Identity authentication method and apparatus
CN106612181A (en) Identity verification method and device
KR102154896B1 (en) System and method for generating security code or virtual account
CN108200075B (en) Identity authentication method, system, terminal and storage medium
CN110990821B (en) Identity type verification method, device and storage medium
CN108566389A (en) A kind of fingerprint identity validation method and device across application
CN108572779A (en) A kind of combination gesture authentication method, system and mobile terminal
CN103942484A (en) Security auxiliary device using mobile phone as carrier and identity authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170503