CN106612181A - Identity verification method and device - Google Patents
Identity verification method and device Download PDFInfo
- Publication number
- CN106612181A CN106612181A CN201510703867.8A CN201510703867A CN106612181A CN 106612181 A CN106612181 A CN 106612181A CN 201510703867 A CN201510703867 A CN 201510703867A CN 106612181 A CN106612181 A CN 106612181A
- Authority
- CN
- China
- Prior art keywords
- string
- operating gesture
- identifying code
- binary characters
- character
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The embodiment of the invention discloses an identity verification method and device. According to the embodiment, the identity verification method comprises the steps of generating a verification code based on an identity verification request when the identity verification request of a user is received; obtaining an operating gesture of the user on a touch panel when determining that the user needs to input the verification code; then generating a corresponding binary character string based on the operating gesture; matching the binary character string with the verification code according to a preset rule; if so, determining that the identity verification is successful when determining that the authentication information carried by the identity verification request is correct; and otherwise, refusing the identity verification request. According to the scheme, more choices can be provided for the user to input the verification code, great convenience is brought to the operation of the user, and improvement of the operating flexibility is facilitated.
Description
Technical field
The present invention relates to communication technical field, and in particular to a kind of auth method and device.
Background technology
Nowadays, the every aspect of people's life nearly all be unable to do without data, such as carry out shopping at network, turn
Account and session etc., are related to the process of data invariably, therefore, how to ensure data safety, also into
For the problem that industry is all extremely paid close attention to all the time.
In the prior art, the safety of data typically all can be improved by way of authentication, such as,
According to the authentication information that user provides, such as account and password, it is compared with the checking information for prestoring, if
Unanimously, then it is verified, otherwise, it is determined that checking does not pass through.Wherein, in order to effectively prevent certain hacker
To some particular registered user, continuous login attempt is carried out (i.e. using specific program Brute Force mode
Checking is attempted), prior art has also been proposed " identifying code " technology, i.e., generate only mankind's ability at random
Can answer problem, such as string number, letter, word, picture or problem etc., it is desirable to lander according to
The requirement of the identifying code is input into, and is only input into correctly, and authentication information is correct, just can determine that checking is logical
Cross.In brief, the input that the presence of identifying code is exactly to distinguish authentication information is people or machine, with
Improve the safety of checking.
In the research and practice process to prior art, it was found by the inventors of the present invention that currently existing scheme exists
During input validation code, need just to be input into by keyboard, operating flexibility is not enough.
The content of the invention
The embodiment of the present invention provides a kind of auth method and device, can obtain Trackpad to obtain user
The identifying code of input, on the premise of data safety is ensured, improves the motility of operation.
The embodiment of the present invention provides a kind of auth method, including:
The authentication request of receive user, the authentication request carries authentication information;
Identifying code is generated according to the authentication request;
When determining that user needs input validation code, user's operating gesture on the touch pad is obtained;
Corresponding string of binary characters is generated according to the operating gesture;
The string of binary characters is matched with the identifying code according to presetting rule;
If matching, when it is determined that the authentication information is correct, determines that authentication passes through;
If mismatching, refuse the authentication request.
Accordingly, the embodiment of the present invention also provides a kind of authentication means, including:
Receiving unit, for the authentication request of receive user, the authentication request carries authentication letter
Breath;
Identifying code signal generating unit, for generating identifying code according to the authentication request;
Acquiring unit, during for determining that user needs input validation code, obtains user's operation on the touch pad
Gesture;
Text string generation unit, for generating corresponding string of binary characters according to the operating gesture;
Processing unit, for carrying out the string of binary characters and the identifying code according to presetting rule
Match somebody with somebody, if matching, when it is determined that the authentication information is correct, determines that authentication passes through, if mismatching,
Then refuse the authentication request.
The embodiment of the present invention is adopted when the authentication request of user is received, according to the authentication request
Identifying code is generated, and when it is determined that user needs input validation code, obtains user manipulator on the touch pad
Gesture, then generates corresponding string of binary characters according to the operating gesture, and two enters this according to presetting rule
Character string processed is matched with identifying code, if matching, it is determined that the authentication letter entrained by authentication request
When ceasing correct, determine that authentication passes through, if conversely, mismatch, refuse the authentication request, from
And realize carrying out user the purpose of authentication;The program obtain user input identifying code when, without the need for
By keyboard, but obtained by being monitored to Trackpad, can only be led to accordingly, with respect to prior art
For the technology for crossing keyboard to be input into, many a selections are provided for user input identifying code, it is big generous
User operation, be conducive to improve operation motility and interest.
Description of the drawings
Technical scheme in order to be illustrated more clearly that the embodiment of the present invention, below will be to institute in embodiment description
The accompanying drawing that needs are used is briefly described, it should be apparent that, drawings in the following description are only the present invention
Some embodiments, for those skilled in the art, on the premise of not paying creative work, also
Other accompanying drawings can be obtained according to these accompanying drawings.
Fig. 1 is the flow chart of auth method provided in an embodiment of the present invention;
Fig. 2 a are another flow charts of auth method provided in an embodiment of the present invention;
Fig. 2 b are the schematic diagrams of identifying code inputting interface in auth method provided in an embodiment of the present invention;
Fig. 3 a are the another flow charts of auth method provided in an embodiment of the present invention;
Fig. 3 b are another signals of identifying code inputting interface in auth method provided in an embodiment of the present invention
Figure
Fig. 4 is the structural representation of authentication means provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly
Chu, it is fully described by, it is clear that described embodiment is only a part of embodiment of the invention, rather than
Whole embodiments.Based on the embodiment in the present invention, those skilled in the art are not making creative labor
The every other embodiment obtained under the premise of dynamic, belongs to the scope of protection of the invention.
The embodiment of the present invention provides a kind of auth method and device.To be described in detail respectively below.
Embodiment one,
The present embodiment will be described from the angle of authentication means, and the authentication means specifically can collect
Into in terminal, server or during other need the equipment for carrying out authentication.
A kind of auth method, including:The authentication request of receive user, the authentication request is taken
Band authentication information, according to the authentication request identifying code is generated, when determining that user needs input validation code,
User's operating gesture on the touch pad is obtained, corresponding string of binary characters is generated according to the operating gesture,
The string of binary characters is matched with the identifying code according to presetting rule, if matching, it is determined that the mirror
When power information is correct, determine that authentication passes through, otherwise, if mismatching, refuse the authentication request.
As shown in figure 1, the idiographic flow of the auth method can be as follows:
101st, the authentication request of receive user.
Wherein, the authentication request can carry authentication information, such as the account of user and password etc. should
Account can include email address, the number of instant messaging, user's name or Customs Assigned Number etc..
102nd, identifying code is generated according to the authentication request.
For example, can when the authentication request of user is received, such as user open log-in interface when,
Or during user input authentication information, or, when user is on log-in interface, click on and generate identifying code
During triggering key, according to default strategy generating identifying code.
Wherein, depending on the preset strategy can be according to the demand of practical application, such as, the identifying code can be
Random generation, it is also possible to generate according to certain rule, the identifying code can be string of binary characters,
Can also be the numeral of other systems, such as decimal scale or hexadecimal numeral, or even, can also be figure
Piece is combined or color combination, such as the combination of the combination of male's photograph and women photograph, or black and white,
Blue and red combination, etc., will not be described here.
Optionally, for the ease of user operation, when identifying code is generated, corresponding prompting letter can also be generated
Breath, to indicate the corresponding relation of operating gesture and binary-coded character.
For example, touch if " 0 " represents, " 1 " represents and presses, then can point out user:" wherein, 0 table
Show and touch, 1 expression is pressed, and is please input in order ".
Again for example, touch if " 1 " represents, " 0 " represents and presses, then can point out user:" wherein, 1
Expression is touched, and 0 expression is pressed, and is please input in order ".
Again for example, if male's photograph is represented touching, women photograph is represented to be pressed, then can point out user:" its
In, male's photograph is represented and touched, and women photograph is represented to be pressed, and is please input in order ".
Again for example, if black is represented touching, white is represented and pressed, then can point out user:It is " wherein, black
Color table shows and touches that white is represented and pressed, and is please input in order ".
Again for example, it is also possible to distinguish the information of input, such as, Ke Yiru according to the difference of the dynamics for pressing
Under:
If " 0 " represents flicking, " 1 " represents and presses again, then can point out user:" wherein, 0 flicking is represented,
1 expression is pressed again, is please input in order ".
Or, if " 1 " represents flicking, " 0 " represents and presses again, then can point out user:" wherein, 1 table
Show flicking, 0 expression is pressed, is please input in order again ".
By that analogy, will not be described here.
It should be noted that, except " touching " and " pressing ", and outside " flicking " and " again by ",
Can also be other operating gestures, such as " draw a circle " etc., the operating gesture is corresponding with binary-coded character
Relation can be configured according to the demand of practical application, will not be described here.
When the 103rd, determining that user needs input validation code, user's operating gesture on the touch pad is obtained.
Wherein it is determined that user needs the mode of input validation code to have various, such as, test when user clicks on
During the input frame of card code, or, when input light is marked on the input frame of identifying code, then can determine that user needs
Want input validation code.
If in a step 102, having generated information, then now user can be according to the information
Operated on the touch pad, i.e., step " obtaining user's operating gesture on the touch pad " is specifically as follows:
Operating gesture of the user according to the information on the touch pad is obtained, such as " is pressed " or " touching ".
104th, corresponding string of binary characters is generated according to the operating gesture.
Wherein, generating the rule of string of binary characters can be set in advance, such as, with pressure touch
As a example by (Force touch), can be with using following any one mode:
(1) first kind of way;
When determining the operating gesture to touch, character 1 is generated;
When determining the operating gesture to press, character 0 is generated;
The character of generation is arranged according to the order of operating gesture, string of binary characters is constituted.
(2) second way;
When determining the operating gesture to touch, character 0 is generated;
When determining the operating gesture to press, character 1 is generated;
The character of generation is arranged according to the order of operating gesture, string of binary characters is constituted.
(3) the third mode;
Determine the operating gesture be flicking when, generate character 0;
Determine that the operating gesture is attached most importance on time, generate character 1;
The character of generation is arranged according to the order of operating gesture, string of binary characters is constituted.
(4) the 4th kinds of modes;
Determine the operating gesture be flicking when, generate character 1;
Determine that the operating gesture is attached most importance on time, generate character 0;
The character of generation is arranged according to the order of operating gesture, string of binary characters is constituted.
It should be noted that, the rule of the generation is corresponding with information, certainly, also there are others side
Formula, will not be described here.
105th, the string of binary characters is matched with the identifying code according to presetting rule, if matching,
Execution step 106, if mismatching, execution step 107.
For example, if the identifying code is string of binary characters, at this point it is possible to determine that the operating gesture is corresponding
Whether string of binary characters is consistent with the identifying code, if unanimously, it is determined that the corresponding binary system of the operating gesture
Character string is matched with the identifying code;If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture with
The identifying code is mismatched.
Again for example, combine or hexadecimal digit combination if the identifying code is ten's digit, now, can
With by ten's digit combination or hexadecimal digit Combination conversion as string of binary characters, then, it is determined that
Whether the corresponding string of binary characters of the operating gesture is consistent with the string of binary characters being converted to, if one
Cause, it is determined that the corresponding string of binary characters of the operating gesture is matched with the identifying code;If inconsistent, really
The fixed corresponding string of binary characters of the operating gesture is mismatched with the identifying code.
It should be noted that, wherein, ten's digit combination or hexadecimal digit Combination conversion are being entered for two
During character string processed, the ten's digit combination or each numeral in hexadecimal digit combination can be turned
Be changed to binary number, combination be then ranked up in order, it is also possible to directly by ten's digit combination or
Hexadecimal digit combination is changed as a numeral, and concrete transformational rule can be according to practical application
Depending on demand, however it is necessary that the transformational rule observed during with user input is consistent, will not be described here.
If the 106, matching, when it is determined that the authentication information is correct, determine that authentication passes through.
Anyway, however, it is determined that the authentication information is incorrect, then the authentication request is refused.
Wherein, whether authentication information correct, can by the authentication information, such as account number and password with prestore
Checking information, such as the account number and password for preserving compares to determine, will not be described here.
If the 107, mismatching, refuse the authentication request.
From the foregoing, it will be observed that the present embodiment is adopted when the authentication request of user is received, tested according to the identity
Card request generates identifying code, and when it is determined that user needs input validation code, obtains user on the touch pad
Operating gesture, then generates corresponding string of binary characters according to the operating gesture, and will according to presetting rule
The string of binary characters is matched with identifying code, if matching, it is determined that entrained by authentication request
When authentication information is correct, determine that authentication passes through, if conversely, mismatching, refusing the authentication please
Ask, so as to realize that the purpose of authentication is carried out to user;The program obtain user input identifying code when,
By keyboard, but need not be obtained by being monitored to Trackpad, accordingly, with respect to prior art only
For the technology that can be input into by keyboard, many a selections are provided for user input identifying code, greatly
The operation of user is facilitated greatly, is conducive to improving the motility, interesting and interactive of operation.
Embodiment two,
Method according to described by embodiment one, is below described in further detail citing.
In the present embodiment, will be with the identifying code as string of binary characters, and " 0 " represents and touches, " 1 "
Expression is illustrated as a example by pressing.
As shown in Figure 2 a, a kind of auth method, idiographic flow can be as follows:
201st, the authentication request of authentication means receive user.
Wherein, the authentication request can carry authentication information, such as the account of user and password etc. should
Account can include email address, the number of instant messaging, user's name or Customs Assigned Number etc..
202nd, authentication means generate identifying code according to the authentication request, and the identifying code specifically can be with
It is string of binary characters.
For example, can when the authentication request of user is received, such as user open log-in interface when,
Or during user input authentication information, or, when user is on log-in interface, click on and generate identifying code
During triggering key, identifying code is generated according to preset strategy.Wherein, the preset strategy can be according to practical application
Depending on demand, such as, and what the identifying code can be randomly generated, it is also possible to generate according to certain rule.
Optionally, for the ease of user operation, when identifying code is generated, corresponding prompting letter can also be generated
Breath, to indicate the corresponding relation of operating gesture and binary-coded character, such as, referring to Fig. 2 b, is showing checking
During code " 10110 ", user can be pointed out:" wherein, 0 expression is touched, and 1 expression is pressed, please defeated in order
Enter ", etc..
203rd, when authentication means determine that user needs input validation code, user is obtained on the touch pad
Operating gesture.
For example, user can on the touch pad make the behaviour of " pressing " or " touching " according to the information
Make a sign with the hand, be determined after input is finished, then now, authentication means just can receive these behaviour
Make a sign with the hand.
Wherein it is determined that user needs the mode of input validation code to have various, such as, test when user clicks on
During the input frame of card code, or, when input light is marked on the input frame of identifying code, then can determine that user needs
Want input validation code.
204th, when authentication means determine the operating gesture to touch, character 0 is generated, determines the manipulator
Gesture is arranged the character of generation according to the order of operating gesture when pressing, to generate character 1, is constituted
String of binary characters.
205th, authentication means determine whether are the corresponding string of binary characters of the operating gesture and the identifying code
Unanimously, if unanimously, it is determined that the corresponding string of binary characters of the operating gesture is matched with the identifying code, perform
Step 206;If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture and the identifying code are not
Match somebody with somebody, execution step 207.
206th, authentication means determine that authentication passes through when it is determined that the authentication information is correct.
Anyway, however, it is determined that the authentication information is incorrect, then the authentication request (i.e. execution step is refused
207)。
Wherein, whether authentication information correct, can by the authentication information, such as account number and password with prestore
Checking information, such as the account number and password for preserving compares to determine, will not be described here.
207th, authentication means refuse the authentication request.
It should be noted that, in addition to allowing user by Trackpad input validation code, it is also possible to allow user
By other approach, such as input through keyboard identifying code, i.e. user can select the approach of input validation code,
This is repeated no more.
From the foregoing, it will be observed that the present embodiment is adopted when the authentication request of user is received, tested according to the identity
Card request generates a string of binary characters as identifying code, and when it is determined that user needs input validation code,
User's operating gesture on the touch pad is obtained, such as, is pressed or is touched, then according to the operating gesture
Corresponding string of binary characters is generated, and the string of binary characters and identifying code are compared, if unanimously,
Then when it is determined that the authentication information entrained by authentication request is correct, determine that authentication passes through, conversely,
If inconsistent, refuse the authentication request, so as to realize that the purpose of authentication is carried out to user;Should
Scheme when the identifying code of user input is obtained, without the need for by keyboard, but by being monitored to Trackpad
It is user for the technology that can only be input into by keyboard accordingly, with respect to prior art to obtain
Input validation code provides many a selections, greatly facilitates the operation of user, is conducive to improving the spirit of operation
It is active, interesting and interactive.
Embodiment three,
Method according to described by embodiment one, is below described in further detail citing.
In the present embodiment, will be with the identifying code as character to decimal string, and " 0 " represents and touches, " 1 "
Expression is illustrated as a example by pressing.
As shown in Figure 3 a, a kind of auth method, idiographic flow can be as follows:
301st, the authentication request of authentication means receive user.
Wherein, the authentication request can carry authentication information, such as the account of user and password etc. should
Account can include email address, the number of instant messaging, user's name or Customs Assigned Number etc..
302nd, authentication means generate identifying code according to the authentication request, and the identifying code specifically can be with
It is character to decimal string.
For example, can when the authentication request of user is received, such as user open log-in interface when,
Or during user input authentication information, or, when user is on log-in interface, click on and generate identifying code
During triggering key, identifying code is generated according to preset strategy.Wherein, the preset strategy can be according to practical application
Depending on demand, such as, and what the identifying code can be randomly generated, it is also possible to generate according to certain rule.
Optionally, for the ease of user operation, when identifying code is generated, corresponding prompting letter can also be generated
Breath, to indicate the corresponding relation of operating gesture and binary-coded character, such as, referring to Fig. 3 b, is showing checking
During code " 4587 ", user can be pointed out:" numeral of display is converted to and be input into after binary system, its
In, 0 expression is touched, and 1 expression is pressed, and is please input in order ", etc..
Optionally, it is also possible to only require the binary system of certain part number in the user input character to decimal string
Number, such as, can be highlighted " 8 " in identifying code " 4587 ", such as be labeled as different
It is such as red in other digital colors, then require that user is corresponding in Trackpad input " 8 " in order
Binary number, wherein, 0 expression is touched, and 1 expression is pressed, etc..
303rd, when authentication means determine that user needs input validation code, user is obtained on the touch pad
Operating gesture.
For example, user can on the touch pad make the behaviour of " pressing " or " touching " according to the information
Make a sign with the hand, be determined after input is finished, then now, authentication means just can receive these behaviour
Make a sign with the hand.
Wherein it is determined that user needs the mode of input validation code to have various, such as, test when user clicks on
During the input frame of card code, or, when input light is marked on the input frame of identifying code, then can determine that user needs
Want input validation code.
304th, when authentication means determine the operating gesture to touch, character 0 is generated, determines the manipulator
Gesture is arranged the character of generation according to the order of operating gesture when pressing, to generate character 1, is constituted
String of binary characters.
305th, the identifying code, i.e. the ten's digit Combination conversion are binary-coded character by authentication means
String.
For example, each numeral in the ten's digit combination can be converted to binary number, is then pressed
Order is ranked up combination.
Such as, by taking " 4587 " as an example, then " 4 " therein can be converted to " 100 ", will be therein
" 5 " are converted to " 101 ", and " 8 " therein are converted to " 1000 ", and " 7 " therein are changed
For " 111 ", then, these numbers are combined in order, as " 1001011000111 ".
It is of course also possible to arrange directly the ten's digit is directly changed into into binary number, rather than will be every
Individual numeral is converted into binary number, such as, " 4587 " this number can be converted to into binary system and be
" 1000111101011 ", etc..Specifically need to be changed using which kind of mode, can be answered according to actual
Depending on demand, however it is necessary that the transformational rule observed during with user input is consistent.
306th, authentication means determine the corresponding string of binary characters of the operating gesture and two for being converted to
Whether system character string (i.e. identifying code) is consistent, if unanimously, it is determined that the corresponding binary system of the operating gesture
Character string is matched with the identifying code, execution step 307;If inconsistent, it is determined that the operating gesture is corresponding
String of binary characters is mismatched with the identifying code, execution step 308.
307th, authentication means determine that authentication passes through when it is determined that the authentication information is correct.
Anyway, however, it is determined that the authentication information is incorrect, then the authentication request (i.e. execution step is refused
307)。
Wherein, whether authentication information correct, can by the authentication information, such as account number and password with prestore
Checking information, such as the account number and password for preserving compares to determine, will not be described here.
308th, authentication means refuse the authentication request.
It should be noted that, the above is only illustrated so that the identifying code is for character to decimal string as an example, should be managed
Solve, the identifying code can also be represented in other forms, such as hexadecimal string or color group
Close etc., its implementation is similar to the above, will not be described here.
From the foregoing, it will be observed that the present embodiment is adopted when the authentication request of user is received, tested according to the identity
Card request generates a character to decimal string as identifying code, and when it is determined that user needs input validation code,
User's operating gesture on the touch pad is obtained, such as is pressed or is touched, then according to the operating gesture life
Into corresponding string of binary characters, identifying code is converted to into string of binary characters, then by the binary-coded character
The string of binary characters that string is converted into identifying code is compared, if unanimously, it is determined that authentication request
When entrained authentication information is correct, determine that authentication passes through, if conversely, inconsistent, refusing the body
Part checking request, so as to realize that the purpose of authentication is carried out to user;The program is obtaining user input
During identifying code, without the need for passing through keyboard, but obtained by being monitored to Trackpad, accordingly, with respect to
For the technology that prior art can only be input into by keyboard, for user input identifying code many one are provided
Part select, greatly facilitate the operation of user, be conducive to improving the motility, interesting and interactive of operation.
Example IV,
Accordingly, the embodiment of the present invention also provides a kind of authentication means, as shown in figure 4, the identity is tested
Card device includes receiving unit 401, identifying code signal generating unit 402, acquiring unit 403, text string generation list
Unit 404 and processing unit 405, it is as follows:
(1) receiving unit 401;
Receiving unit 401, for the authentication request of receive user.
Wherein, the authentication request can carry authentication information, such as the account of user and password etc. should
Account can include email address, the number of instant messaging, user's name or Customs Assigned Number etc..
(2) identifying code signal generating unit 402;
Identifying code signal generating unit 402, for generating identifying code according to the authentication request.
For example, can when the authentication request of user is received, such as user open log-in interface when,
Or during user input authentication information, or, when user is on log-in interface, click on and generate identifying code
During triggering key, according to default strategy generating identifying code.
Wherein, depending on the preset strategy can be according to the demand of practical application, such as, the identifying code can be
Random generation, it is also possible to generate according to certain rule, the identifying code can be string of binary characters,
Can also be the numeral of other systems, such as decimal scale or hexadecimal numeral, or even, can also be figure
Piece is combined or color combination, such as the combination of the combination of male's photograph and women photograph, or black and white,
Blue and red combination, etc., will not be described here.
Optionally, for the ease of user operation, when identifying code is generated, corresponding prompting letter can also be generated
Breath, to indicate the corresponding relation of operating gesture and binary-coded character.I.e.:
The identifying code signal generating unit 402, can be also used for generating information, and the information is used to indicate
The corresponding relation of operating gesture and binary-coded character.
For example, touch if " 0 " represents, " 1 " represents and presses, then can point out user:" wherein, 0 table
Show and touch, 1 expression is pressed, and is please input in order ".
Again for example, touch if " 1 " represents, " 0 " represents and presses, then can point out user:" wherein, 1
Expression is touched, and 0 expression is pressed, and is please input in order ".
Again for example, if male's photograph is represented touching, women photograph is represented to be pressed, then can point out user:" its
In, male's photograph is represented and touched, and women photograph is represented to be pressed, and is please input in order ".
Again for example, if black is represented touching, white is represented and pressed, then can point out user:It is " wherein, black
Color table shows and touches that white is represented and pressed, and is please input in order ".
Again for example, it is also possible to distinguish the information of input, such as, Ke Yiru according to the difference of the dynamics for pressing
Under:
If " 0 " represents flicking, " 1 " represents and presses again, then can point out user:" wherein, 0 flicking is represented,
1 expression is pressed again, is please input in order ".
Or, if " 1 " represents flicking, " 0 " represents and presses again, then can point out user:" wherein, 1 table
Show flicking, 0 expression is pressed, is please input in order again ".
By that analogy, will not be described here.
It should be noted that, except " touching " and " pressing ", and outside " flicking " and " again by ",
Can also be other operating gestures, such as " draw a circle " etc., the operating gesture is corresponding with binary-coded character
Relation can be configured according to the demand of practical application, will not be described here.
(3) acquiring unit 403;
Acquiring unit 403, during for determining that user needs input validation code, obtains user on the touch pad
Operating gesture.
For example, the acquiring unit 403, specifically can be used for obtaining user according to the information in Trackpad
On operating gesture, such as " press " or " touching " etc..
Wherein it is determined that user needs the mode of input validation code to have various, such as, test when user clicks on
During the input frame of card code, or, when input light is marked on the input frame of identifying code, then can determine that user needs
Want input validation code, etc..
(4) text string generation unit 404;
Text string generation unit 404, for generating corresponding string of binary characters according to the operating gesture;
Wherein, generating the rule of string of binary characters can be set in advance, for example, can be as follows:
The text string generation unit 404, when being specifically determined for the operating gesture to touch, generates word
Symbol 1;When determining the operating gesture to press, character 0 is generated;By the character for generating according to the suitable of operating gesture
Sequence is arranged, and constitutes string of binary characters.
Or, the text string generation unit 404, when being specifically determined for the operating gesture to touch,
Generate character 0;When determining the operating gesture to press, character 1 is generated;By the character for generating according to manipulator
The order of gesture is arranged, and constitutes string of binary characters.
Or, the text string generation unit 404, be specifically determined for the operating gesture for flicking when,
Generate character 0;Determine that the operating gesture is attached most importance on time, generate character 1;By the character for generating according to manipulator
The order of gesture is arranged, and constitutes string of binary characters.
Or, the text string generation unit 404, be specifically determined for the operating gesture for flicking when,
Generate character 1;Determine that the operating gesture is attached most importance on time, generate character 0;By the character for generating according to manipulator
The order of gesture is arranged, and constitutes string of binary characters.
It should be noted that, the rule of the generation is corresponding with information, certainly, also there are others side
Formula, will not be described here.
(5) processing unit 405;
Processing unit 405, for the string of binary characters to be matched with the identifying code according to presetting rule,
If matching, when it is determined that the authentication information is correct, determines that authentication passes through, if mismatching, refuse
The authentication request.
For example, if the identifying code is string of binary characters,
The processing unit 405, is specifically determined for the corresponding string of binary characters of the operating gesture and is somebody's turn to do
Whether identifying code is consistent;If consistent, it is determined that the corresponding string of binary characters of the operating gesture and the identifying code
Matching;If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture is mismatched with the identifying code.
Again for example, combine or hexadecimal digit combination if the identifying code is ten's digit,:
The processing unit 405, specifically can be used for the ten's digit combination or hexadecimal digit combination
Be converted to string of binary characters;Determine that the corresponding string of binary characters of the operating gesture enters with two for being converted to
Whether character string processed is consistent;If consistent, it is determined that the corresponding string of binary characters of the operating gesture and the checking
Code matching;If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture is mismatched with the identifying code.
It should be noted that, wherein, ten's digit combination or hexadecimal digit Combination conversion are being entered for two
During character string processed, the ten's digit combination or each numeral in hexadecimal digit combination can be turned
Be changed to binary number, combination be then ranked up in order, it is also possible to directly by ten's digit combination or
Hexadecimal digit combination is changed as a numeral, and concrete transformational rule can be according to practical application
Depending on demand, however it is necessary that the transformational rule observed during with user input is consistent, will not be described here.
Additionally, processing unit 405, can be also used for it is determined that the string of binary characters is matched with the identifying code
When, however, it is determined that the authentication information is incorrect, then refuse the authentication request.
When being embodied as, above unit can be realized as independent entity, it is also possible to be carried out arbitrarily
Combination, realizes as same or several entities, and being embodied as of above unit can be found in above
Embodiment of the method, will not be described here.
The authentication means specifically can be integrated in terminal, server or other need to carry out authentication
In equipment.
From the foregoing, it will be observed that the employing of the authentication means of the present embodiment is receiving the authentication request of user
When, identifying code is generated according to the authentication request by identifying code signal generating unit 402, and by acquiring unit 403
When it is determined that user needs input validation code, user's operating gesture on the touch pad is obtained, then by character
String signal generating unit 404 generates corresponding string of binary characters according to the operating gesture, and by processing unit 405
The string of binary characters is matched with identifying code according to presetting rule, if matching, it is determined that identity is tested
When the entrained authentication information of card request is correct, determine that authentication passes through, if conversely, mismatch, refuses
Exhausted authentication request, so as to realize that the purpose of authentication is carried out to user;The program is obtaining user
During the identifying code of input, without the need for passing through keyboard, but obtained by being monitored to Trackpad, therefore,
For the technology that prior art can only be input into by keyboard, provide for user input identifying code
It is many it is a select, greatly facilitate the operation of user, be conducive to improving the motility of operation, it is interesting and
It is interactive.
Example IV,
Additionally, the embodiment of the present invention also provides a kind of identity-validation device, embodiment of the present invention institute can be included
Any one authentication means for providing, specifically can be found in embodiment three, for example, can be as follows:
Authentication means, for the authentication request of receive user, the authentication request carries authentication
Information, according to the authentication request identifying code is generated, and when determining that user needs input validation code, is obtained and is used
Family operating gesture on the touch pad, generates corresponding string of binary characters, according to pre- according to the operating gesture
Put rule to be matched the string of binary characters with the identifying code, if matching, it is determined that the authentication information
When correct, determine that authentication passes through, otherwise, if mismatching, refuse the authentication request.
For example, when it is determined that the operating gesture is to touch, character 1 is generated, determines the operating gesture to press
When, character 0 is generated, then, the character of generation is arranged according to the order of operating gesture, composition two
System character string.
Or, and for example, when it is determined that the operating gesture is to touch, character 0 is generated, determine the manipulator
Then gesture, the character of generation is arranged according to the order of operating gesture when pressing, to generate character 1,
Composition string of binary characters.
The identity-validation device be specifically as follows terminal, server or other need the equipment that carries out authentication
Deng the operation of, the above is embodied as can be found in embodiment above, will not be described here.
Because the identity-validation device can include any one authentication dress that the embodiment of the present invention is provided
Put, it is thereby achieved that having achieved by any one authentication means for being provided of the embodiment of the present invention
Beneficial effect, the embodiment met each other above, will not be described here.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment
Suddenly can be by program to instruct the hardware of correlation to complete, the program can be stored in a computer-readable
In storage medium, storage medium can include:Read only memory (ROM, Read Only Memory),
Random access memory (RAM, Random Access Memory), disk or CD etc..
A kind of auth method for being provided the embodiment of the present invention above and device are described in detail,
Specific case used herein is set forth to the principle and embodiment of the present invention, above example
Illustrate that being only intended to help understands the method for the present invention and its core concept;Simultaneously for the technology of this area
Personnel, according to the thought of the present invention, will change in specific embodiments and applications, comprehensive
Upper described, this specification content should not be construed as limiting the invention.
Claims (14)
1. a kind of auth method, it is characterised in that include:
The authentication request of receive user, the authentication request carries authentication information;
Identifying code is generated according to the authentication request;
When determining that user needs input validation code, user's operating gesture on the touch pad is obtained;
Corresponding string of binary characters is generated according to the operating gesture;
The string of binary characters is matched with the identifying code according to presetting rule;
If matching, when it is determined that the authentication information is correct, determines that authentication passes through;
If mismatching, refuse the authentication request.
2. method according to claim 1, it is characterised in that described to be generated according to the operating gesture
Corresponding string of binary characters, including:
When determining the operating gesture to touch, character 1 is generated;
When determining the operating gesture to press, character 0 is generated;
The character of generation is arranged according to the order of operating gesture, string of binary characters is constituted.
3. method according to claim 1, it is characterised in that described to be generated according to the operating gesture
Corresponding string of binary characters, including:
When determining the operating gesture to touch, character 0 is generated;
When determining the operating gesture to press, character 1 is generated;
The character of generation is arranged according to the order of operating gesture, string of binary characters is constituted.
4. the method according to any one of claims 1 to 3, it is characterised in that the identifying code is two
System character string, then it is described to carry out the string of binary characters and the identifying code according to presetting rule
Match somebody with somebody, including:
Determine whether the corresponding string of binary characters of the operating gesture is consistent with the identifying code;
If consistent, it is determined that the corresponding string of binary characters of the operating gesture is matched with the identifying code;
If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture and the identifying code are not
Match somebody with somebody.
5. the method according to any one of claims 1 to 3, it is characterised in that the identifying code is ten
Binary digits are combined or hexadecimal digit combination, then it is described according to presetting rule by the string of binary characters
Matched with the identifying code, including:
It is string of binary characters by ten's digit combination or hexadecimal digit Combination conversion;
Determine whether are the corresponding string of binary characters of the operating gesture and the string of binary characters being converted to
Unanimously;
If consistent, it is determined that the corresponding string of binary characters of the operating gesture is matched with the identifying code;
If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture and the identifying code are not
Match somebody with somebody.
6. the method according to any one of claims 1 to 3, it is characterised in that it is determined that described two enter
When character string processed is matched with the identifying code, also include:
If it is determined that the authentication information is incorrect, then refuse the authentication request.
7. the method according to any one of claims 1 to 3, it is characterised in that described according to the body
When part checking request generates identifying code, also include:
Information is generated, the information is used to indicate operating gesture pass corresponding with binary-coded character
System;
It is described to obtain user's operating gesture on the touch pad, including:User is obtained according to the information
Operating gesture on the touch pad.
8. a kind of authentication means, it is characterised in that include:
Receiving unit, for the authentication request of receive user, the authentication request carries authentication letter
Breath;
Identifying code signal generating unit, for generating identifying code according to the authentication request;
Acquiring unit, during for determining that user needs input validation code, obtains user's operation on the touch pad
Gesture;
Text string generation unit, for generating corresponding string of binary characters according to the operating gesture;
Processing unit, for carrying out the string of binary characters and the identifying code according to presetting rule
Match somebody with somebody, if matching, when it is determined that the authentication information is correct, determines that authentication passes through, if mismatching,
Then refuse the authentication request.
9. authentication means according to claim 8, it is characterised in that
The text string generation unit, during specifically for determining the operating gesture to touch, generates character 1;
When determining the operating gesture to press, character 0 is generated;By generate character according to operating gesture order
Arranged, constituted string of binary characters.
10. authentication means according to claim 8, it is characterised in that
The text string generation unit, during specifically for determining the operating gesture to touch, generates character 0;
When determining the operating gesture to press, character 1 is generated;By generate character according to operating gesture order
Arranged, constituted string of binary characters.
11. authentication means according to any one of claim 8 to 10, it is characterised in that described
Identifying code is string of binary characters, then:
The processing unit, specifically for determining that the corresponding string of binary characters of the operating gesture is tested with described
Whether card code is consistent;If consistent, it is determined that the corresponding string of binary characters of the operating gesture and the checking
Code matching;If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture is with the identifying code not
Matching.
12. authentication means according to any one of claim 8 to 10, it is characterised in that described
Identifying code is that ten's digit is combined or hexadecimal digit combination, then:
The processing unit, specifically for the ten's digit is combined or hexadecimal digit Combination conversion
For string of binary characters;Determine the corresponding string of binary characters of the operating gesture and the binary system being converted to
Whether character string is consistent;If consistent, it is determined that the corresponding string of binary characters of the operating gesture is tested with described
Card code matching;If inconsistent, it is determined that the corresponding string of binary characters of the operating gesture and the identifying code
Mismatch.
13. authentication means according to any one of claim 8 to 10, it is characterised in that
The processing unit, is additionally operable to when it is determined that the string of binary characters is matched with the identifying code, if
Determine that the authentication information is incorrect, then refuse the authentication request.
14. authentication means according to any one of claim 8 to 10, it is characterised in that
The identifying code signal generating unit, is additionally operable to generate information, and the information is used to indicate operation
The corresponding relation of gesture and binary-coded character;
The acquiring unit, during specifically for determining that user needs input validation code, obtains user according to described
Information operating gesture on the touch pad.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510703867.8A CN106612181A (en) | 2015-10-26 | 2015-10-26 | Identity verification method and device |
PCT/CN2016/083105 WO2017071192A1 (en) | 2015-10-26 | 2016-05-24 | Identity verification method and apparatus |
US15/817,014 US10657244B2 (en) | 2015-10-26 | 2017-11-17 | Identity authentication method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510703867.8A CN106612181A (en) | 2015-10-26 | 2015-10-26 | Identity verification method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106612181A true CN106612181A (en) | 2017-05-03 |
Family
ID=58614027
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510703867.8A Pending CN106612181A (en) | 2015-10-26 | 2015-10-26 | Identity verification method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106612181A (en) |
WO (1) | WO2017071192A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111160369B (en) * | 2019-12-25 | 2024-03-05 | 携程旅游信息技术(上海)有限公司 | Method, system, electronic equipment and storage medium for cracking Chinese character verification code |
CN117768197A (en) * | 2023-05-18 | 2024-03-26 | 洪碧群 | Logging in big data blockchain cloud platform by means of intelligent handheld mobile terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104023029A (en) * | 2014-06-19 | 2014-09-03 | 百度在线网络技术(北京)有限公司 | Method and device for verifying verification codes |
CN104778397A (en) * | 2014-01-15 | 2015-07-15 | 联想(新加坡)私人有限公司 | Information processing device and method thereof |
CN105184126A (en) * | 2015-08-27 | 2015-12-23 | 广东欧珀移动通信有限公司 | Password setting method, authentication method and terminal |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9147058B2 (en) * | 2012-10-12 | 2015-09-29 | Apple Inc. | Gesture entry techniques |
CN104580117B (en) * | 2013-10-28 | 2018-07-27 | 深圳市腾讯计算机系统有限公司 | Auth method, apparatus and system |
-
2015
- 2015-10-26 CN CN201510703867.8A patent/CN106612181A/en active Pending
-
2016
- 2016-05-24 WO PCT/CN2016/083105 patent/WO2017071192A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104778397A (en) * | 2014-01-15 | 2015-07-15 | 联想(新加坡)私人有限公司 | Information processing device and method thereof |
CN104023029A (en) * | 2014-06-19 | 2014-09-03 | 百度在线网络技术(北京)有限公司 | Method and device for verifying verification codes |
CN105184126A (en) * | 2015-08-27 | 2015-12-23 | 广东欧珀移动通信有限公司 | Password setting method, authentication method and terminal |
Also Published As
Publication number | Publication date |
---|---|
WO2017071192A1 (en) | 2017-05-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102880398B (en) | A kind of mobile phone unlock method and mobile phone based on random digit array | |
CN103793815B (en) | Mobile intelligent terminal acquirer system and method suitable for bank cards and business cards | |
EP3065074A1 (en) | Fingerprint authentication method and device, intelligent terminal, and computer storage medium | |
WO2015161565A1 (en) | Password verification device and password verification method | |
US20130269016A1 (en) | Method for integrating account management function in input method software | |
CN104732121A (en) | Encryption setting method, decryption setting method and corresponding device of application program | |
US20140245433A1 (en) | Password authentication | |
US20190377863A1 (en) | Password input method, computer device and storage medium | |
CN107480513B (en) | Authentication implementation method and device, computer device and readable storage medium | |
CN103425944A (en) | Information safety input method and information safety device | |
CN105260635A (en) | Identity verifying method and system based on fingerprint for mobile terminal | |
US10108796B2 (en) | System and method for PIN entry on mobile devices | |
CN104484942A (en) | Client interaction terminal and counter transaction method thereof | |
CN105809445A (en) | Password verifying and processing method, apparatus and terminal | |
CN104636917A (en) | Mobile payment system and method with secure payment function | |
CN204069000U (en) | Mobile encrypted authenticate device | |
CN106203176A (en) | A kind of application encryption method and device | |
US10657244B2 (en) | Identity authentication method and apparatus | |
CN106612181A (en) | Identity verification method and device | |
KR102154896B1 (en) | System and method for generating security code or virtual account | |
CN108200075B (en) | Identity authentication method, system, terminal and storage medium | |
CN110990821B (en) | Identity type verification method, device and storage medium | |
CN108566389A (en) | A kind of fingerprint identity validation method and device across application | |
CN108572779A (en) | A kind of combination gesture authentication method, system and mobile terminal | |
CN103942484A (en) | Security auxiliary device using mobile phone as carrier and identity authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170503 |