CN106845180A - Verify identity method, using and computing device - Google Patents

Verify identity method, using and computing device Download PDF

Info

Publication number
CN106845180A
CN106845180A CN201710014983.8A CN201710014983A CN106845180A CN 106845180 A CN106845180 A CN 106845180A CN 201710014983 A CN201710014983 A CN 201710014983A CN 106845180 A CN106845180 A CN 106845180A
Authority
CN
China
Prior art keywords
symbol
display location
computing device
user interface
keying sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710014983.8A
Other languages
Chinese (zh)
Other versions
CN106845180B (en
Inventor
宋强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Che Zhi Interconnect (beijing) Technology Co Ltd
Original Assignee
Che Zhi Interconnect (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Che Zhi Interconnect (beijing) Technology Co Ltd filed Critical Che Zhi Interconnect (beijing) Technology Co Ltd
Priority to CN201710014983.8A priority Critical patent/CN106845180B/en
Publication of CN106845180A publication Critical patent/CN106845180A/en
Application granted granted Critical
Publication of CN106845180B publication Critical patent/CN106845180B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses checking identity method, using and computing device.Wherein, the method for checking identity is suitable to be performed in computing device.The computing device is configured with the keying sequence comprising at least one symbol, and the method comprises the steps.It is randomly assigned logo collection marking elements display location in the user interface.Wherein the logo collection includes symbol in keying sequence.After display location is randomly assigned every time, one is chosen according to the order of symbol in keying sequence, receive and judge whether this user input chooses the scheduled operation corresponding to the display location of symbol consistent with this.It is determined that when consistent with corresponding scheduled operation, judging whether this targeted symbol is last position in keying sequence.It is determined that at non-final one, the step of being randomly assigned logo collection marking elements display location in the user interface is being continued executing with.

Description

Verify identity method, using and computing device
Technical field
The present invention relates to computing device field, more particularly to checking identity method, using and computing device.
Background technology
With developing rapidly for electronic equipment and Internet technology, smart mobile phone, panel computer etc. carry touch-screen Computing device have become essential equipment in people's life.Computing device unblock, pay etc. link be required for into Row authentication.
At present, authentication operation can be realized by modes such as gesture, password or the two combinations.For example, calculating sets It is standby to be configured as sliding unblock (slide to unlock) mode.Again for example, computing device can be by numeral and letter Combination be unlocked.Again for example, computing device can be unlocked by judging in gesture input interface user input.
However, existing authentication mode be present.If for example, password unblock or gesture unlocking manner It is set too simply, the unblock operating process of user is easily noticeable, and there is certain information security hidden danger.If unlocking pin or If person's gesture unlocking manner is set too complicated, user is cumbersome and easy error.
Therefore, the present invention proposes a kind of new identity validation technology scheme.
The content of the invention
The present invention provides a kind of technical scheme of new authentication, with try hard to solve it is above-mentioned at least one problem.
According to an aspect of the invention, there is provided a kind of method for verifying identity, is suitable to be performed in computing device.Should Computing device is configured with the keying sequence comprising at least one symbol, and the method comprises the steps.It is randomly assigned logo collection Marking elements display location in the user interface.Wherein the logo collection includes symbol in keying sequence.At random point every time After with display location, one is chosen according to the order of symbol in keying sequence, receive and judge this user input whether with this Scheduled operation corresponding to the display location of secondary chosen symbol is consistent.It is determined that when consistent with corresponding scheduled operation, sentencing Whether disconnected this targeted symbol is last position in keying sequence.It is determined that at non-final one, continuing executing with and being randomly assigned Logo collection marking elements in the user interface display location the step of, until it is determined that last is corresponding in keying sequence User input is consistent with the corresponding scheduled operation in symbol display location.
Alternatively, in the method for checking identity of the invention, it is configured with to be allocated to identification element in user interface The precalculated position of element.Be randomly assigned logo collection marking elements in the user interface display location the step of include:Random point Mapping relations one by one with logo collection marking elements and precalculated position in user interface are simultaneously corresponding in each position display Marker element.In logo collection each marker element in following any one:Numeral, letter, picture and colouring information.
Alternatively, in the method for checking identity of the invention, precalculated position is distributed in a ring in user interface, should User interface is also configured with the destination object being located in annular spread region.For example, destination object is shown as safety box icon.
Alternatively, it is corresponding with the display location of chosen symbol pre- in the method for checking identity of the invention It is the gesture for dragging the symbol to the target object position to determine gesture.
Alternatively, it is corresponding with the display location of chosen symbol pre- in the method for checking identity of the invention Determine the gesture that gesture is display location of the dragging destination object to the symbol.
Alternatively, in the method for checking identity of the invention, computing device is mobile terminal, with chosen symbol The corresponding scheduled operation in display location be to accelerate the mobile movement end along the direction from the destination object to display location The operation at end.
Alternatively, in the method for checking identity of the invention, it is determined that last symbol pair in keying sequence When the user input answered prearranged gesture corresponding with the position that the symbol is distributed is consistent, the method also includes that performing correspondence passes through The operation of authentication.
Alternatively, in the method for checking identity of the invention, the identification element in execution is randomly assigned logo collection Before the step of plain display location in the user interface, computing device is in interface lock state.Correspondence is by authentication Operation includes releasing the interface lock state.
According to another aspect of the present invention, there is provided a kind of application of checking identity, it is suitable to be performed in computing device.The meter Calculation equipment is configured with the keying sequence comprising at least one symbol.The application includes allocation unit and authentication unit.Distribution is single Unit is suitable to be randomly assigned logo collection marking elements display location in the user interface.Wherein, the logo collection includes password Symbol in sequence.Authentication unit is suitable to after allocation unit is randomly assigned display location every time, according to symbol in keying sequence Order chooses one, receives and judge whether this user input is chosen with this predetermined corresponding to display location of symbol Operation is consistent.It is determined that when consistent with corresponding scheduled operation, authentication unit judges whether this targeted symbol is password Last position in sequence.It is determined that at non-final one, authentication unit indicates allocation unit to continue executing with and is randomly assigned identification sets Close marking elements in the user interface display location the step of, until it is determined that last corresponding user is defeated in keying sequence Enter consistent with the corresponding scheduled operation in symbol display location.
According to an aspect of the present invention, there is provided a kind of computing device, including at least one processor and including calculate At least one memory of machine programmed instruction.At least one memory and computer program instructions be configured as with least one at The method that reason device causes computing device checking identity of the invention together.
The technical scheme of checking identity of the invention, each can carry out user in user is directed to keying sequence Before input, the display location of logo collection is randomly assigned.Special instruction, the element of logo collection can be in the present invention The various modes such as numeral, letter, color and picture.Technical scheme can be greatly improved user input on this basis Security (being different from gesture during traditional user each authentication consistent) during gesture.In addition, by being randomly assigned to show Show position and the gestures direction that user's needs are input into is determined with the distribution situation of destination object according to display location, it is of the invention Technical scheme can increase the interest and randomness of user input, so as to improve user experience.
Brief description of the drawings
In order to realize above-mentioned and related purpose, some illustrative sides are described herein in conjunction with following description and accompanying drawing Face, these aspects indicate the various modes that can put into practice principles disclosed herein, and all aspects and its equivalent aspect It is intended to fall under in the range of theme required for protection.By being read in conjunction with the figure following detailed description, the disclosure it is above-mentioned And other purposes, feature and advantage will be apparent.Throughout the disclosure, identical reference generally refers to identical Part or element.
Fig. 1 is the structured flowchart of computing device 100 according to some embodiments of the invention;
Fig. 2 shows the flow chart of the method 200 of checking identity according to some embodiments of the invention;
Fig. 3 shows the interface schematic diagram after a step S210 is performed according to one embodiment of the invention;
Fig. 4 shows the schematic diagram of the method 400 of checking identity according to some embodiments of the invention;And
Fig. 5 shows the schematic diagram of the application 500 of checking identity according to some embodiments of the invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.Conversely, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Fig. 1 is the structured flowchart of computing device 100 according to some embodiments of the invention.Here, computing device can be by It is embodied as the various Intelligent hardwares such as the control centre of mobile phone, panel computer or intelligent express delivery cabinet.Typically, computing device 100 Memory interface 102, one or more data processors, image processor and/or CPU 104 can be included, with And peripheral interface 106.
Memory interface 102, one or more processors 104 and/or peripheral interface 106 both can be discrete components, Can be integrated in one or more integrated circuits.In computing device 100, various elements can be by one or more communication Bus or holding wire are coupled.Sensor, equipment and subsystem may be coupled to peripheral interface 106, various to help to realize Function.For example, motion sensor 110, light sensor 112 and range sensor 114 may be coupled to peripheral interface 106, with The functions such as convenient orientation, illumination and range finding.Other sensors 116 can equally be connected with peripheral interface 106, such as alignment system (such as GPS), temperature sensor, biometric sensor or other sensor devices, it is possible thereby to help implement correlation Function.
Camera sub-system 120 and optical pickocff 122 can be used for the camera of convenient such as recording photograph and video clipping The realization of function, wherein the camera sub-system and optical pickocff for example can be charge-coupled image sensor (CCD) or complementary gold Category oxide semiconductor (CMOS) optical pickocff.Can help realize by one or more radio communication subsystems 124 Communication function, wherein radio communication subsystem can include radio-frequency transmitter and emitter and/or light (such as infrared) receiver And emitter.The particular design and implementation method of radio communication subsystem 124 can depend on computing device 100 is supported one Individual or multiple communication networks.For example, computing device 100 can include be designed to support 3G, 4G, GSM network, GPRS network, EDGE network, Wi-Fi or WiMax network and BlueboothTMThe communication subsystem 124 of network.Audio subsystem 126 can be with It is coupled with loudspeaker 128 and microphone 130, to help implement the function of enabling voice, such as speech recognition, voice is multiple System, digital record and telephony feature.
I/O subsystems 140 can include touch screen controller 142 and/or one or more other input controllers 144. Touch screen controller 142 may be coupled to touch-screen 146.For example, the touch-screen 146 and touch screen controller 142 can be with The contact and movement or pause for carrying out therewith are detected using any one of various touch-sensing technologies, wherein sensing skill Art includes but is not limited to capacitive character, resistive, infrared and surface acoustic wave technique.One or more other input controllers 144 May be coupled to other input/control devicess 148, for example one or more buttons, rocker switch, thumb wheel, infrared port, The pointer device of USB port, and/or instruction pen etc.One or more of button (not shown)s can be included for controlling The up/down button of loudspeaker 128 and/or the volume of microphone 130.
Memory interface 102 can be coupled with memory 150.The memory 150 can be deposited including high random access Reservoir and/or nonvolatile memory, such as one or more disk storage equipments, one or more optical storage apparatus, and/ Or flash memories (such as NAND, NOR).Memory 150 can with storage program area 172, such as Android, iOS or The operating system of Windows Phone etc.The operating system 172 can be included for processing basic system services and execution Depend on the instruction of the task of hardware.Memory 150 can also be stored and apply 174.When mobile device runs, can be from memory Operating system 172 is loaded in 150, and is performed by processor 104.Using 174 operationally, can also add from memory 150 Carry, and performed by processor 104.Operated on operating system using 174, provided using operating system and bottom hardware Interface realizes the desired function of various users, such as instant messaging, web page browsing, pictures management.Can be independently of using 174 It is that operating system is provided, or that operating system is carried.In addition, when being installed in computing device 100 using 174, Drive module can be added to operating system 172.
Generally, when computing device 100 is used, touch-screen 146 can be used to show multiple user interfaces.Here institute The user interface of finger includes but is not limited to text, webpage, icon (such as including the user interface pair including various virtual keys As), video, animation etc..The state of user interface is the state that computing device 100 responds user input in a predefined manner. In some embodiments, the state of user interface includes lock-out state and released state.When user interface is in released state, meter Calculation equipment 100 can be detected and respond those user inputs corresponding with user interface interaction.For example, user input includes leading Boat, data input, activate or close various applications etc..In other words, computing device 100 can be carried out normally in the unlocked state Operation, scheduled operation set can be performed in response to user's contact with touch-screen 146.And computing device 100 is in lock When determining state, it is limited that meeting display portion in the user interface of lock-out state for example unlocks gesture, calendar, network state etc. User interface object, and can close or be hidden in the multiple user interface objects shown during released state.
The method of checking identity of the invention is suitable to be performed in above-mentioned computing device 100, but not limited to this.Here, body The typical scene of part checking is, for example, unblock, APP openings or payment verification etc..With reference to Fig. 2 and Fig. 3 to checking identity Scheme is illustrated.
Fig. 2 shows the flow chart of the method 200 of checking identity according to some embodiments of the invention.Method 200 is suitable to Performed in computing device (100).In addition, method 200 can also need authentication ATM or intelligent express delivery cabinet etc. are various Equipment in use, if these device configurations have touch-sensitive display device.In general, computing device is carrying out authentication behaviour Before work, the keying sequence comprising at least one symbol is had been configured with.Here, each symbol for example can be several in keying sequence Word, letter, picture or colouring information etc., the present invention are without limitation.It should be noted that embodiments of the invention can be with Using the keying sequence of various known manner configuring computing devices, the present invention is without limitation.On this basis, computing device Can verify whether user input meets keying sequence by execution method 200.
Specifically, according to the order of keying sequence, successively for each symbol in keying sequence, method 200 can be performed Step S210.In step S210, logo collection marking elements display location in the user interface is randomly assigned.Here, mark Knowing set includes symbol in keying sequence.
In an embodiment in accordance with the invention, the precalculated position to marker element to be allocated is configured with user interface. The quantity in precalculated position is consistent with number of elements in logo collection.Identification sets can be randomly assigned in the step of the present embodiment S210 The mapping relations one by one of marking elements and precalculated position in user interface are closed, and in the corresponding identification element of each position display Element.
According in another embodiment of the invention, the pre-determined bit to marker element to be allocated is configured with user interface Put.Precalculated position quantity is less than element sum in logo collection.On this basis, the step of the present embodiment S210 can first from Precalculated position sum identical marker element is selected in logo collection.Here, selected marker element needs to include this institute For symbol.Then, in step S210, it is randomly assigned selected marker element and is closed with the mapping one by one in precalculated position System.
According to the pre-determined bit that multiple marker element sums in another embodiment of the invention, are configured with user interface Put.On this basis, marker element can be randomly assigned marker element to precalculated position by step S210.Here, each mark Element can uniquely take a precalculated position.
According in another embodiment of the invention, being configured with one in user interface for showing the predetermined of marker element Region.The step of the present embodiment, S210 can be by marker element random display in predetermined areas.Typically, for the ease of with Mark shown in each position is checked at family, has space between any two precalculated position (i.e. the two is not overlapped).Except this it Outward, the present invention does not do excessive limitation to the position distribution in presumptive area.
According in another embodiment of the invention, the quantity in precalculated position is consistent with number of elements in logo collection.In advance Positioning is put for example can be with arranged in a ring.Fig. 3 shows boundary of the computing device of the present embodiment after a step S210 is performed Face schematic diagram.As shown in figure 3, logo collection (numeral 0-9 i.e. in figure) is not traditional interface layout mode, but random point With each digital position.It should be strongly noted that the target " being randomly assigned " in the present invention is to allow perform step every time During S210, display location when at least one of display location of marker element is from last time execution step S210 is different.Therefore, It can various known be randomly assigned algorithm to be randomly assigned mode in the present invention in step S210.In addition, for example it is upper once Display location on the basis of perform shifting function (i.e. along pointer or the display location of mobile logo element counterclockwise), it is also possible to It is considered as of the invention to be randomly assigned mode.It should be appreciated that on the basis of above-described embodiment, it is any to realize that position becomes The method of salary distribution changed should all be considered to belong to of the invention be randomly assigned mode.In addition, for distinct symbols in keying sequence The process of the step of being performed a plurality of times S210, the mode of being randomly assigned can be every time identical, or selects different distribution sides every time Formula.For example, keying sequence can be configured so that " 14235 ", totally 5.In for the step S210 performed by symbol " 1 ", mark Knowing set needs to include symbol " 1 ".Logo collection can for example include 0-9 totally 10 numerals.
After step S210 is performed every time, method 200 enters step S220, receives and judge this user input (i.e. Received user input after this execution step S210) whether perform targeted this institute of symbol of step S210 with this Position (i.e. the display location of the symbol) corresponding scheduled operation of distribution is consistent.Here, targeted symbol is according to password Symbol sequential selection in sequence.In fact, the operation of selection keying sequence can be completed in step S210 in the present invention, Can be completed in step S220, the invention is not limited in this regard.
In an embodiment as illustrated in figure 3, a destination object is also configured with user interface, and (what is shown i.e. in figure " protects Dangerous case ").Scheduled operation can be input of the drag target object to the symbol display location, or drag symbol to target pair The display location of elephant.As a example by scheming the position shown by marking elements " 1 ", the corresponding scheduled operation in the position is, for example, dragging " 1 " is in safety box, or dragging safety box is to the display location of " 1 ".In addition, the computing device shown in Fig. 3 is mobile terminal. In the fig. 3 embodiment, scheduled operation can also be accelerate the mobile movement along the direction from destination object to display location The operation of terminal.For example, the upper left of " 1 " positioned at safety box, scheduled operation is to accelerate the mobile movement end along upper left End.It should be noted that scheduled operation is not limited to shown in above-described embodiment, or for example clicks on the operation of shown symbol.
When step S220 determines that user input is consistent with scheduled operation, method 200 can perform step S230.In step In S230, judge whether this targeted symbol is last position in keying sequence.If it is determined that non-final one, method 200 can be continuing with next semiology analysis step S210 and S220, until it is determined that for last position symbol in keying sequence Number corresponding user input scheduled operation corresponding with the position that the symbol is distributed is consistent.In other words, method 200 is by multiple Perform verification operation of step S210 and the S220 completion to whole keying sequence.
To sum up, the method according to the invention 200 can user be directed to keying sequence in each carry out user input it Before, it is randomly assigned the display location of logo collection.So, the method for the present invention 200 can increase peace when user input is operated Full property (is different from gesture during traditional user each authentication consistent), and also can increase the entertaining of user input Property, such that it is able to user experience is greatly improved.
Fig. 4 shows the schematic diagram of the method 400 of checking identity according to some embodiments of the invention.As shown in figure 4, side Method 400 includes step S410, S420 and S430.Here, step S410 to S430 respectively with the reality of step S210 to S230 in Fig. 2 Apply mode consistent, repeat no more here.
Alternatively, when method 400 is not received or determines inconsistent with scheduled operation in the step s 420, can terminate This authentication.In yet another embodiment, when not receiving in the step s 420 or determining inconsistent with scheduled operation, Method 400 can be continuing with corresponding semiology analysis step S210 and step S220, until predetermined number of failed (for example, 3 It is secondary, but not limited to this) when terminating method 400.In addition, when determining inconsistent with scheduled operation in the step s 420, method 400 can With display reminding information in the user interface.
The corresponding user input of last symbol and the symbol are distributed in determining keying sequence in step S430 After the corresponding scheduled operation in position is consistent, method 400 can also carry out step S440.In step S440, perform correspondence and pass through The operation of authentication.According to one embodiment of the invention, the implement scene of method 400 is unblock link.That is, step is being performed Before S410, computing device is in interface lock state.Correspondingly, the operation of step S440 is releasing interface lock state.Root According to another embodiment of the invention, the implement scene of method 400 is payment verification link.Correspondingly, the operation of step S440 is Perform by the delivery operation after checking.To sum up, depending on the implement scene of method 400, step S440 can be configured as Implement corresponding operation, the present invention is without limitation.
Fig. 5 shows the schematic diagram of the application 500 of checking identity according to some embodiments of the invention.It is suitable to using 500 In residing in computing device.Can be that independent utility can also be used as the one of application using 500 depending on specific application scenarios Individual component.For example, when the unblock link of mobile phone is used in using 500, can be as a part for operating system using 500. Again for example, using 500 be used in for example shopping APP payment verification link when, can be as the component of the APP using 500 One of.
As shown in figure 5, including allocation unit 510 and authentication unit 520 using 500.
Allocation unit 510 is suitable to be randomly assigned logo collection marking elements display location in the user interface.Wherein should Logo collection includes symbol in keying sequence.Wherein, in logo collection each marker element in following any one:Numeral, word Female, picture and colouring information.Each symbol belongs to the logo collection in keying sequence.In an embodiment in accordance with the invention, The precalculated position to the marker element to be allocated is configured with user interface.Allocation unit 510 is suitable to be randomly assigned identification sets Close the mapping relations one by one in marking elements and precalculated position in user interface and in the corresponding marker element of each position display.
Authentication unit 520 is suitable to after allocation unit 510 performs the operation for being randomly assigned display location every time, receives and sentences This user input of breaking corresponding scheduled operation in position whether this is distributed with targeted symbol is consistent.Here, it is targeted Symbol chosen one by the order according to symbol in keying sequence.
In an embodiment in accordance with the invention, precalculated position is distributed in a ring in user interface.The user interface is also matched somebody with somebody It is equipped with the destination object in annular spread region.Destination object is, for example, safety box icon, but not limited to this.In a reality Apply in example, scheduled operation corresponding with the display location of chosen symbol is the gesture for dragging the symbol to target object position. In yet another embodiment, scheduled operation corresponding with the display location of chosen symbol is drag target object to the symbol The gesture of display location.In yet another embodiment, computing device is mobile terminal.Scheduled operation be along from destination object to The direction of display location accelerates the operation of the mobile mobile terminal.
It is determined that when consistent with corresponding scheduled operation, authentication unit 520 judges whether this targeted symbol is close Last position in code sequence.
It is determined that at non-final one, authentication unit 520 indicates allocation unit 510 to continue executing be randomly assigned next time and show Show the operation of position, until it is determined that the position that the corresponding user input of last symbol is distributed with the symbol in keying sequence Corresponding scheduled operation is consistent.
Alternatively, it is determined that the position that the corresponding user input of last symbol is distributed with the symbol in keying sequence When corresponding scheduled operation is consistent, authentication unit 520 is further adapted for performing the operation that correspondence passes through authentication.In one embodiment In, it is applied to unlocking screen link using 500.Before allocation unit 510 performs operation, computing device is locked in interface State.Correspondingly, the correspondence performed by authentication unit 520 is the releasing interface lock state by the operation of authentication.Should Method 400 is referred to 500 more specifically implementation methods, is repeated no more here.
A9, the method as any one of A1-8, wherein, it is determined that the corresponding use of last symbol in keying sequence When input scheduled operation corresponding with the position that the symbol is distributed in family is consistent, the method also includes:Perform correspondence and pass through identity The operation of checking.
A10, the method as described in A9, wherein, logo collection marking elements are being randomly assigned in user circle described in execution In face the step of display location before, the computing device be in interface lock state;
The correspondence is included by the operation of authentication:Release the interface lock state.
A12, the application as described in A11, wherein, it is configured with to be allocated to the pre- of the marker element in the user interface Positioning is put, and the allocation unit is suitable to be randomly assigned logo collection marking elements according to following manner to show in the user interface Position:
It is randomly assigned the mapping relations one by one in precalculated position in logo collection marking elements and user interface and at each The corresponding marker element of position display.
A13, the application as described in A11 or A12, wherein, each marker element is any in following in the logo collection Kind:Numeral, letter, picture and colouring information.
A14, the application as described in A12, wherein, precalculated position is distributed in a ring in the user interface, the user interface It is also configured with the destination object being located in annular spread region.
A15, the application as described in A14, wherein, the destination object is shown as safety box icon.
A16, the application as described in A14 or 15, wherein, scheduled operation corresponding with the display location of chosen symbol is to drag Move the gesture of the symbol to the target object position.
A17, the application as described in A14 or 15, wherein, scheduled operation corresponding with the display location of chosen symbol is to drag Move the gesture of the destination object to the display location of the symbol.
A18, the application as described in A14 or 15, wherein, the computing device is mobile terminal, aobvious with chosen symbol Show that the corresponding scheduled operation in position is to accelerate the mobile mobile terminal along the direction from the destination object to display location Operation.
A19, the application as any one of A10-16, wherein, it is last in the authentication unit determines keying sequence When the corresponding user input of one symbol scheduled operation corresponding with the position that the symbol is distributed is consistent, it is further adapted for performing correspondence By the operation of authentication.
A20, the application as described in A17, wherein, the allocation unit be randomly assigned logo collection marking elements with In the interface of family before display location, the computing device is in interface lock state;
The authentication unit is suitable to perform operation of the correspondence by authentication according to following manner:Release interface locking State.
Various technologies described herein can combined with hardware or software, or combinations thereof realizes together.So as to the present invention Method and apparatus, or the method for the present invention and equipment some aspect or part can take embedded tangible media, such as it is soft The form of the program code (instructing) in the storage medium of disk, CD-ROM, hard disk drive or other any machine readables, Wherein when program is written into the machine of such as computer etc, and when being performed by the machine, the machine becomes to put into practice this hair Bright equipment.
In the case where program code is performed on programmable computers, computing device generally comprises processor, processor Readable storage medium (including volatibility and nonvolatile memory and/or memory element), at least one input unit, and extremely A few output device.Wherein, memory is arranged to store program codes;Processor is arranged to according to the memory Instruction in the described program code of middle storage, the method for performing checking identity of the invention.
By way of example and not limitation, computer-readable medium includes computer-readable storage medium and communication media.Calculate Machine computer-readable recording medium includes computer-readable storage medium and communication media.Computer-readable storage medium storage such as computer-readable instruction, The information such as data structure, program module or other data.Communication media is general modulated with carrier wave or other transmission mechanisms etc. Data-signal processed embodies computer-readable instruction, data structure, program module or other data, and passes including any information Pass medium.The combination of any one above is also included within the scope of computer-readable medium.
In specification mentioned herein, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be put into practice in the case of without these details.In some instances, known method, knot is not been shown in detail Structure and technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify one or more that the disclosure and helping understands in each inventive aspect, exist Above to the description of exemplary embodiment of the invention in, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The application claims of shield are than the feature more features that is expressly recited in each claim.More precisely, as following As claims reflect, inventive aspect is all features less than single embodiment disclosed above.Therefore, abide by Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, and wherein each claim is in itself As separate embodiments of the invention.
Those skilled in the art should be understood the module or unit or group of the equipment in example disclosed herein Part can be arranged in equipment as depicted in this embodiment, or alternatively can be positioned at and the equipment in the example In one or more different equipment.Module in aforementioned exemplary can be combined as a module or be segmented into multiple in addition Submodule.
Those skilled in the art are appreciated that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Unit or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, can use any Combine to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power Profit is required, summary and accompanying drawing) disclosed in each feature can the alternative features of or similar purpose identical, equivalent by offer carry out generation Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment required for protection is appointed One of meaning mode can be used in any combination.
Additionally, some in the embodiment be described as herein can be by the processor of computer system or by performing The combination of method or method element that other devices of the function are implemented.Therefore, with for implementing methods described or method The processor of the necessary instruction of element forms the device for implementing the method or method element.Additionally, device embodiment Element described in this is the example of following device:The device is used to implement as performed by the element for the purpose for implementing the invention Function.
As used in this, unless specifically stated so, come using ordinal number " first ", " second ", " the 3rd " etc. Description plain objects are merely representative of and are related to the different instances of similar object, and are not intended to imply that the object being so described must Must have the time it is upper, spatially, sequence aspect or given order in any other manner.
Although the embodiment according to limited quantity describes the present invention, above description, the art are benefited from It is interior it is clear for the skilled person that in the scope of the present invention for thus describing, it can be envisaged that other embodiments.Additionally, it should be noted that The language that is used in this specification primarily to readable and teaching purpose and select, rather than in order to explain or limit Determine subject of the present invention and select.Therefore, in the case of without departing from the scope of the appended claims and spirit, for this Many modifications and changes will be apparent from for the those of ordinary skill of technical field.For the scope of the present invention, to this The done disclosure of invention is illustrative and not restrictive, and it is intended that the scope of the present invention be defined by the claims appended hereto.

Claims (10)

1. a kind of method for verifying identity, is suitable to be performed in computing device, and the computing device is configured with comprising at least one symbol Number keying sequence, the method includes:
Logo collection marking elements display location in the user interface is randomly assigned, the wherein logo collection includes keying sequence Middle symbol;
After display location is randomly assigned every time, one is chosen according to the order of symbol in keying sequence, receive and judge this Whether user input chooses the scheduled operation corresponding to the display location of symbol consistent with this;
It is determined that when consistent with corresponding scheduled operation, judge this targeted symbol whether be keying sequence in last Position;
It is determined that at non-final one, continuing executing with and being randomly assigned logo collection marking elements display location in the user interface The step of, until it is determined that last corresponding user input scheduled operation corresponding with the symbol display location in keying sequence Unanimously.
2. the method for claim 1, wherein it is configured with the user interface to be allocated to the pre- of the marker element Positioning is put, it is described be randomly assigned logo collection marking elements in the user interface display location the step of include:
It is randomly assigned the mapping relations one by one in precalculated position in logo collection marking elements and user interface and in each position Show corresponding marker element.
3. method as claimed in claim 1 or 2, wherein, in the logo collection each marker element in following any one: Numeral, letter, picture and colouring information.
4. method as claimed in claim 2, wherein, precalculated position is distributed in a ring in the user interface, the user interface It is also configured with the destination object being located in annular spread region.
5. method as claimed in claim 4, wherein, the destination object is shown as safety box icon.
6. the method as described in claim 4 or 5, wherein, scheduled operation corresponding with the display location of chosen symbol is to drag Move the gesture of the symbol to the target object position.
7. the method as described in claim 4 or 5, wherein, scheduled operation corresponding with the display location of chosen symbol is to drag Move the gesture of the destination object to the display location of the symbol.
8. the method as described in claim 4 or 5, wherein, the computing device is mobile terminal, the display with chosen symbol The corresponding scheduled operation in position is the behaviour for accelerating the mobile mobile terminal along the direction from the destination object to display location Make.
9. a kind of application for verifying identity, is suitable to be performed in computing device, and the computing device is configured with comprising at least one The keying sequence of symbol, the application includes:
Allocation unit, is suitable to be randomly assigned logo collection marking elements display location in the user interface, the wherein identification sets Conjunction includes symbol in keying sequence;
Authentication unit, is suitable to after allocation unit is randomly assigned display location every time, is selected according to the order of symbol in keying sequence In one, receive and judge whether this user input chooses the scheduled operation one corresponding to the display location of symbol with this Cause,
It is determined that when consistent with corresponding scheduled operation, judge this targeted symbol whether be keying sequence in last Position,
It is determined that at non-final one, indicating allocation unit to continue executing with and being randomly assigned logo collection marking elements in user circle In face the step of display location, until it is determined that last corresponding user input and the symbol display location pair in keying sequence The scheduled operation answered is consistent.
10. a kind of computing device, including:
At least one processor;And
At least one memory including computer program instructions;
At least one memory and the computer program instructions are configured as making together with least one processor Obtain method of the computing device as any one of claim 1-8.
CN201710014983.8A 2017-01-09 2017-01-09 Verify method, application and the calculating equipment of identity Active CN106845180B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710014983.8A CN106845180B (en) 2017-01-09 2017-01-09 Verify method, application and the calculating equipment of identity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710014983.8A CN106845180B (en) 2017-01-09 2017-01-09 Verify method, application and the calculating equipment of identity

Publications (2)

Publication Number Publication Date
CN106845180A true CN106845180A (en) 2017-06-13
CN106845180B CN106845180B (en) 2019-11-12

Family

ID=59117326

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710014983.8A Active CN106845180B (en) 2017-01-09 2017-01-09 Verify method, application and the calculating equipment of identity

Country Status (1)

Country Link
CN (1) CN106845180B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109902482A (en) * 2017-12-07 2019-06-18 厦门雅迅网络股份有限公司 A kind of New Graphics cipher-code input method, terminal device and storage medium
CN110033545A (en) * 2019-04-19 2019-07-19 中山市乐喜电子科技有限公司 Equipment unlocking method and intelligent door lock
CN113421087A (en) * 2018-06-12 2021-09-21 创新先进技术有限公司 Payment processing method and device and server

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2749985A1 (en) * 2012-12-27 2014-07-02 Vodafone Holding GmbH Unlocking a screen of a portable device
CN104516645A (en) * 2013-09-26 2015-04-15 上海斐讯数据通信技术有限公司 Electronic device unlocking method
CN104679418A (en) * 2013-11-26 2015-06-03 富泰华工业(深圳)有限公司 Screen unlocking system and method and touch display device
CN105589647A (en) * 2014-10-24 2016-05-18 富泰华工业(深圳)有限公司 Unlocking system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2749985A1 (en) * 2012-12-27 2014-07-02 Vodafone Holding GmbH Unlocking a screen of a portable device
CN104516645A (en) * 2013-09-26 2015-04-15 上海斐讯数据通信技术有限公司 Electronic device unlocking method
CN104679418A (en) * 2013-11-26 2015-06-03 富泰华工业(深圳)有限公司 Screen unlocking system and method and touch display device
CN105589647A (en) * 2014-10-24 2016-05-18 富泰华工业(深圳)有限公司 Unlocking system and method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109902482A (en) * 2017-12-07 2019-06-18 厦门雅迅网络股份有限公司 A kind of New Graphics cipher-code input method, terminal device and storage medium
CN113421087A (en) * 2018-06-12 2021-09-21 创新先进技术有限公司 Payment processing method and device and server
CN110033545A (en) * 2019-04-19 2019-07-19 中山市乐喜电子科技有限公司 Equipment unlocking method and intelligent door lock

Also Published As

Publication number Publication date
CN106845180B (en) 2019-11-12

Similar Documents

Publication Publication Date Title
US10963555B2 (en) Electronic device, method for authenticating user, and computer readable recording medium
US10764280B2 (en) Method and apparatus for authentication based on fingerprint recognition
US8997215B2 (en) Authentication using multi-tier multi-class objects
US9507928B2 (en) Preventing the discovery of access codes
US20130129162A1 (en) Method of Executing Software Functions Using Biometric Detection and Related Electronic Device
US9342673B2 (en) Method for user authentication in a device comprising a touch screen
US20110287741A1 (en) Secure application control in mobile terminal using biometric sensor
KR20190085543A (en) Method and apparatus for generating security questions and verifying identities
CN103902881A (en) Method for managing security for applications and an electronic device thereof
CN104063639B (en) Carry out the verification processing device of verification processing
KR20140099293A (en) Secure authorization
CN106843729A (en) A kind of terminal control method and terminal
CN104318186B (en) A kind of password changing method, equipment and terminal
CN105678147B (en) Touch operation method and device
CN105094652B (en) Touch screen unlocking method and device, electronic equipment, display and mobile terminal
CN105354455B (en) State switching method and electronic equipment
CN106845180B (en) Verify method, application and the calculating equipment of identity
WO2016101817A1 (en) Method and device for operating form on mobile terminal
CN105303096A (en) Symbol selection for swipe based authentication
KR20150089104A (en) Method and Device for Unlocking Input using the Combination of Number and Pattern Image at Smartphone
CN109271770A (en) Auth method, equipment and the storage medium of smartwatch
CN105824554A (en) Mobile terminal unlocking method and device
KR102295259B1 (en) Method for Unlocking Input using the Combination of Password Number and Pattern Image Input of Smartphone
US10237736B2 (en) Unlocking of a mobile device by a code received via a stencil on a touchscreen
CN108418829B (en) Account login verification method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant