CN106845180A - Verify identity method, using and computing device - Google Patents
Verify identity method, using and computing device Download PDFInfo
- Publication number
- CN106845180A CN106845180A CN201710014983.8A CN201710014983A CN106845180A CN 106845180 A CN106845180 A CN 106845180A CN 201710014983 A CN201710014983 A CN 201710014983A CN 106845180 A CN106845180 A CN 106845180A
- Authority
- CN
- China
- Prior art keywords
- symbol
- display location
- computing device
- user interface
- keying sequence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention discloses checking identity method, using and computing device.Wherein, the method for checking identity is suitable to be performed in computing device.The computing device is configured with the keying sequence comprising at least one symbol, and the method comprises the steps.It is randomly assigned logo collection marking elements display location in the user interface.Wherein the logo collection includes symbol in keying sequence.After display location is randomly assigned every time, one is chosen according to the order of symbol in keying sequence, receive and judge whether this user input chooses the scheduled operation corresponding to the display location of symbol consistent with this.It is determined that when consistent with corresponding scheduled operation, judging whether this targeted symbol is last position in keying sequence.It is determined that at non-final one, the step of being randomly assigned logo collection marking elements display location in the user interface is being continued executing with.
Description
Technical field
The present invention relates to computing device field, more particularly to checking identity method, using and computing device.
Background technology
With developing rapidly for electronic equipment and Internet technology, smart mobile phone, panel computer etc. carry touch-screen
Computing device have become essential equipment in people's life.Computing device unblock, pay etc. link be required for into
Row authentication.
At present, authentication operation can be realized by modes such as gesture, password or the two combinations.For example, calculating sets
It is standby to be configured as sliding unblock (slide to unlock) mode.Again for example, computing device can be by numeral and letter
Combination be unlocked.Again for example, computing device can be unlocked by judging in gesture input interface user input.
However, existing authentication mode be present.If for example, password unblock or gesture unlocking manner
It is set too simply, the unblock operating process of user is easily noticeable, and there is certain information security hidden danger.If unlocking pin or
If person's gesture unlocking manner is set too complicated, user is cumbersome and easy error.
Therefore, the present invention proposes a kind of new identity validation technology scheme.
The content of the invention
The present invention provides a kind of technical scheme of new authentication, with try hard to solve it is above-mentioned at least one problem.
According to an aspect of the invention, there is provided a kind of method for verifying identity, is suitable to be performed in computing device.Should
Computing device is configured with the keying sequence comprising at least one symbol, and the method comprises the steps.It is randomly assigned logo collection
Marking elements display location in the user interface.Wherein the logo collection includes symbol in keying sequence.At random point every time
After with display location, one is chosen according to the order of symbol in keying sequence, receive and judge this user input whether with this
Scheduled operation corresponding to the display location of secondary chosen symbol is consistent.It is determined that when consistent with corresponding scheduled operation, sentencing
Whether disconnected this targeted symbol is last position in keying sequence.It is determined that at non-final one, continuing executing with and being randomly assigned
Logo collection marking elements in the user interface display location the step of, until it is determined that last is corresponding in keying sequence
User input is consistent with the corresponding scheduled operation in symbol display location.
Alternatively, in the method for checking identity of the invention, it is configured with to be allocated to identification element in user interface
The precalculated position of element.Be randomly assigned logo collection marking elements in the user interface display location the step of include:Random point
Mapping relations one by one with logo collection marking elements and precalculated position in user interface are simultaneously corresponding in each position display
Marker element.In logo collection each marker element in following any one:Numeral, letter, picture and colouring information.
Alternatively, in the method for checking identity of the invention, precalculated position is distributed in a ring in user interface, should
User interface is also configured with the destination object being located in annular spread region.For example, destination object is shown as safety box icon.
Alternatively, it is corresponding with the display location of chosen symbol pre- in the method for checking identity of the invention
It is the gesture for dragging the symbol to the target object position to determine gesture.
Alternatively, it is corresponding with the display location of chosen symbol pre- in the method for checking identity of the invention
Determine the gesture that gesture is display location of the dragging destination object to the symbol.
Alternatively, in the method for checking identity of the invention, computing device is mobile terminal, with chosen symbol
The corresponding scheduled operation in display location be to accelerate the mobile movement end along the direction from the destination object to display location
The operation at end.
Alternatively, in the method for checking identity of the invention, it is determined that last symbol pair in keying sequence
When the user input answered prearranged gesture corresponding with the position that the symbol is distributed is consistent, the method also includes that performing correspondence passes through
The operation of authentication.
Alternatively, in the method for checking identity of the invention, the identification element in execution is randomly assigned logo collection
Before the step of plain display location in the user interface, computing device is in interface lock state.Correspondence is by authentication
Operation includes releasing the interface lock state.
According to another aspect of the present invention, there is provided a kind of application of checking identity, it is suitable to be performed in computing device.The meter
Calculation equipment is configured with the keying sequence comprising at least one symbol.The application includes allocation unit and authentication unit.Distribution is single
Unit is suitable to be randomly assigned logo collection marking elements display location in the user interface.Wherein, the logo collection includes password
Symbol in sequence.Authentication unit is suitable to after allocation unit is randomly assigned display location every time, according to symbol in keying sequence
Order chooses one, receives and judge whether this user input is chosen with this predetermined corresponding to display location of symbol
Operation is consistent.It is determined that when consistent with corresponding scheduled operation, authentication unit judges whether this targeted symbol is password
Last position in sequence.It is determined that at non-final one, authentication unit indicates allocation unit to continue executing with and is randomly assigned identification sets
Close marking elements in the user interface display location the step of, until it is determined that last corresponding user is defeated in keying sequence
Enter consistent with the corresponding scheduled operation in symbol display location.
According to an aspect of the present invention, there is provided a kind of computing device, including at least one processor and including calculate
At least one memory of machine programmed instruction.At least one memory and computer program instructions be configured as with least one at
The method that reason device causes computing device checking identity of the invention together.
The technical scheme of checking identity of the invention, each can carry out user in user is directed to keying sequence
Before input, the display location of logo collection is randomly assigned.Special instruction, the element of logo collection can be in the present invention
The various modes such as numeral, letter, color and picture.Technical scheme can be greatly improved user input on this basis
Security (being different from gesture during traditional user each authentication consistent) during gesture.In addition, by being randomly assigned to show
Show position and the gestures direction that user's needs are input into is determined with the distribution situation of destination object according to display location, it is of the invention
Technical scheme can increase the interest and randomness of user input, so as to improve user experience.
Brief description of the drawings
In order to realize above-mentioned and related purpose, some illustrative sides are described herein in conjunction with following description and accompanying drawing
Face, these aspects indicate the various modes that can put into practice principles disclosed herein, and all aspects and its equivalent aspect
It is intended to fall under in the range of theme required for protection.By being read in conjunction with the figure following detailed description, the disclosure it is above-mentioned
And other purposes, feature and advantage will be apparent.Throughout the disclosure, identical reference generally refers to identical
Part or element.
Fig. 1 is the structured flowchart of computing device 100 according to some embodiments of the invention;
Fig. 2 shows the flow chart of the method 200 of checking identity according to some embodiments of the invention;
Fig. 3 shows the interface schematic diagram after a step S210 is performed according to one embodiment of the invention;
Fig. 4 shows the schematic diagram of the method 400 of checking identity according to some embodiments of the invention;And
Fig. 5 shows the schematic diagram of the application 500 of checking identity according to some embodiments of the invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
Limited.Conversely, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
Fig. 1 is the structured flowchart of computing device 100 according to some embodiments of the invention.Here, computing device can be by
It is embodied as the various Intelligent hardwares such as the control centre of mobile phone, panel computer or intelligent express delivery cabinet.Typically, computing device 100
Memory interface 102, one or more data processors, image processor and/or CPU 104 can be included, with
And peripheral interface 106.
Memory interface 102, one or more processors 104 and/or peripheral interface 106 both can be discrete components,
Can be integrated in one or more integrated circuits.In computing device 100, various elements can be by one or more communication
Bus or holding wire are coupled.Sensor, equipment and subsystem may be coupled to peripheral interface 106, various to help to realize
Function.For example, motion sensor 110, light sensor 112 and range sensor 114 may be coupled to peripheral interface 106, with
The functions such as convenient orientation, illumination and range finding.Other sensors 116 can equally be connected with peripheral interface 106, such as alignment system
(such as GPS), temperature sensor, biometric sensor or other sensor devices, it is possible thereby to help implement correlation
Function.
Camera sub-system 120 and optical pickocff 122 can be used for the camera of convenient such as recording photograph and video clipping
The realization of function, wherein the camera sub-system and optical pickocff for example can be charge-coupled image sensor (CCD) or complementary gold
Category oxide semiconductor (CMOS) optical pickocff.Can help realize by one or more radio communication subsystems 124
Communication function, wherein radio communication subsystem can include radio-frequency transmitter and emitter and/or light (such as infrared) receiver
And emitter.The particular design and implementation method of radio communication subsystem 124 can depend on computing device 100 is supported one
Individual or multiple communication networks.For example, computing device 100 can include be designed to support 3G, 4G, GSM network, GPRS network,
EDGE network, Wi-Fi or WiMax network and BlueboothTMThe communication subsystem 124 of network.Audio subsystem 126 can be with
It is coupled with loudspeaker 128 and microphone 130, to help implement the function of enabling voice, such as speech recognition, voice is multiple
System, digital record and telephony feature.
I/O subsystems 140 can include touch screen controller 142 and/or one or more other input controllers 144.
Touch screen controller 142 may be coupled to touch-screen 146.For example, the touch-screen 146 and touch screen controller 142 can be with
The contact and movement or pause for carrying out therewith are detected using any one of various touch-sensing technologies, wherein sensing skill
Art includes but is not limited to capacitive character, resistive, infrared and surface acoustic wave technique.One or more other input controllers 144
May be coupled to other input/control devicess 148, for example one or more buttons, rocker switch, thumb wheel, infrared port,
The pointer device of USB port, and/or instruction pen etc.One or more of button (not shown)s can be included for controlling
The up/down button of loudspeaker 128 and/or the volume of microphone 130.
Memory interface 102 can be coupled with memory 150.The memory 150 can be deposited including high random access
Reservoir and/or nonvolatile memory, such as one or more disk storage equipments, one or more optical storage apparatus, and/
Or flash memories (such as NAND, NOR).Memory 150 can with storage program area 172, such as Android, iOS or
The operating system of Windows Phone etc.The operating system 172 can be included for processing basic system services and execution
Depend on the instruction of the task of hardware.Memory 150 can also be stored and apply 174.When mobile device runs, can be from memory
Operating system 172 is loaded in 150, and is performed by processor 104.Using 174 operationally, can also add from memory 150
Carry, and performed by processor 104.Operated on operating system using 174, provided using operating system and bottom hardware
Interface realizes the desired function of various users, such as instant messaging, web page browsing, pictures management.Can be independently of using 174
It is that operating system is provided, or that operating system is carried.In addition, when being installed in computing device 100 using 174,
Drive module can be added to operating system 172.
Generally, when computing device 100 is used, touch-screen 146 can be used to show multiple user interfaces.Here institute
The user interface of finger includes but is not limited to text, webpage, icon (such as including the user interface pair including various virtual keys
As), video, animation etc..The state of user interface is the state that computing device 100 responds user input in a predefined manner.
In some embodiments, the state of user interface includes lock-out state and released state.When user interface is in released state, meter
Calculation equipment 100 can be detected and respond those user inputs corresponding with user interface interaction.For example, user input includes leading
Boat, data input, activate or close various applications etc..In other words, computing device 100 can be carried out normally in the unlocked state
Operation, scheduled operation set can be performed in response to user's contact with touch-screen 146.And computing device 100 is in lock
When determining state, it is limited that meeting display portion in the user interface of lock-out state for example unlocks gesture, calendar, network state etc.
User interface object, and can close or be hidden in the multiple user interface objects shown during released state.
The method of checking identity of the invention is suitable to be performed in above-mentioned computing device 100, but not limited to this.Here, body
The typical scene of part checking is, for example, unblock, APP openings or payment verification etc..With reference to Fig. 2 and Fig. 3 to checking identity
Scheme is illustrated.
Fig. 2 shows the flow chart of the method 200 of checking identity according to some embodiments of the invention.Method 200 is suitable to
Performed in computing device (100).In addition, method 200 can also need authentication ATM or intelligent express delivery cabinet etc. are various
Equipment in use, if these device configurations have touch-sensitive display device.In general, computing device is carrying out authentication behaviour
Before work, the keying sequence comprising at least one symbol is had been configured with.Here, each symbol for example can be several in keying sequence
Word, letter, picture or colouring information etc., the present invention are without limitation.It should be noted that embodiments of the invention can be with
Using the keying sequence of various known manner configuring computing devices, the present invention is without limitation.On this basis, computing device
Can verify whether user input meets keying sequence by execution method 200.
Specifically, according to the order of keying sequence, successively for each symbol in keying sequence, method 200 can be performed
Step S210.In step S210, logo collection marking elements display location in the user interface is randomly assigned.Here, mark
Knowing set includes symbol in keying sequence.
In an embodiment in accordance with the invention, the precalculated position to marker element to be allocated is configured with user interface.
The quantity in precalculated position is consistent with number of elements in logo collection.Identification sets can be randomly assigned in the step of the present embodiment S210
The mapping relations one by one of marking elements and precalculated position in user interface are closed, and in the corresponding identification element of each position display
Element.
According in another embodiment of the invention, the pre-determined bit to marker element to be allocated is configured with user interface
Put.Precalculated position quantity is less than element sum in logo collection.On this basis, the step of the present embodiment S210 can first from
Precalculated position sum identical marker element is selected in logo collection.Here, selected marker element needs to include this institute
For symbol.Then, in step S210, it is randomly assigned selected marker element and is closed with the mapping one by one in precalculated position
System.
According to the pre-determined bit that multiple marker element sums in another embodiment of the invention, are configured with user interface
Put.On this basis, marker element can be randomly assigned marker element to precalculated position by step S210.Here, each mark
Element can uniquely take a precalculated position.
According in another embodiment of the invention, being configured with one in user interface for showing the predetermined of marker element
Region.The step of the present embodiment, S210 can be by marker element random display in predetermined areas.Typically, for the ease of with
Mark shown in each position is checked at family, has space between any two precalculated position (i.e. the two is not overlapped).Except this it
Outward, the present invention does not do excessive limitation to the position distribution in presumptive area.
According in another embodiment of the invention, the quantity in precalculated position is consistent with number of elements in logo collection.In advance
Positioning is put for example can be with arranged in a ring.Fig. 3 shows boundary of the computing device of the present embodiment after a step S210 is performed
Face schematic diagram.As shown in figure 3, logo collection (numeral 0-9 i.e. in figure) is not traditional interface layout mode, but random point
With each digital position.It should be strongly noted that the target " being randomly assigned " in the present invention is to allow perform step every time
During S210, display location when at least one of display location of marker element is from last time execution step S210 is different.Therefore,
It can various known be randomly assigned algorithm to be randomly assigned mode in the present invention in step S210.In addition, for example it is upper once
Display location on the basis of perform shifting function (i.e. along pointer or the display location of mobile logo element counterclockwise), it is also possible to
It is considered as of the invention to be randomly assigned mode.It should be appreciated that on the basis of above-described embodiment, it is any to realize that position becomes
The method of salary distribution changed should all be considered to belong to of the invention be randomly assigned mode.In addition, for distinct symbols in keying sequence
The process of the step of being performed a plurality of times S210, the mode of being randomly assigned can be every time identical, or selects different distribution sides every time
Formula.For example, keying sequence can be configured so that " 14235 ", totally 5.In for the step S210 performed by symbol " 1 ", mark
Knowing set needs to include symbol " 1 ".Logo collection can for example include 0-9 totally 10 numerals.
After step S210 is performed every time, method 200 enters step S220, receives and judge this user input (i.e.
Received user input after this execution step S210) whether perform targeted this institute of symbol of step S210 with this
Position (i.e. the display location of the symbol) corresponding scheduled operation of distribution is consistent.Here, targeted symbol is according to password
Symbol sequential selection in sequence.In fact, the operation of selection keying sequence can be completed in step S210 in the present invention,
Can be completed in step S220, the invention is not limited in this regard.
In an embodiment as illustrated in figure 3, a destination object is also configured with user interface, and (what is shown i.e. in figure " protects
Dangerous case ").Scheduled operation can be input of the drag target object to the symbol display location, or drag symbol to target pair
The display location of elephant.As a example by scheming the position shown by marking elements " 1 ", the corresponding scheduled operation in the position is, for example, dragging
" 1 " is in safety box, or dragging safety box is to the display location of " 1 ".In addition, the computing device shown in Fig. 3 is mobile terminal.
In the fig. 3 embodiment, scheduled operation can also be accelerate the mobile movement along the direction from destination object to display location
The operation of terminal.For example, the upper left of " 1 " positioned at safety box, scheduled operation is to accelerate the mobile movement end along upper left
End.It should be noted that scheduled operation is not limited to shown in above-described embodiment, or for example clicks on the operation of shown symbol.
When step S220 determines that user input is consistent with scheduled operation, method 200 can perform step S230.In step
In S230, judge whether this targeted symbol is last position in keying sequence.If it is determined that non-final one, method
200 can be continuing with next semiology analysis step S210 and S220, until it is determined that for last position symbol in keying sequence
Number corresponding user input scheduled operation corresponding with the position that the symbol is distributed is consistent.In other words, method 200 is by multiple
Perform verification operation of step S210 and the S220 completion to whole keying sequence.
To sum up, the method according to the invention 200 can user be directed to keying sequence in each carry out user input it
Before, it is randomly assigned the display location of logo collection.So, the method for the present invention 200 can increase peace when user input is operated
Full property (is different from gesture during traditional user each authentication consistent), and also can increase the entertaining of user input
Property, such that it is able to user experience is greatly improved.
Fig. 4 shows the schematic diagram of the method 400 of checking identity according to some embodiments of the invention.As shown in figure 4, side
Method 400 includes step S410, S420 and S430.Here, step S410 to S430 respectively with the reality of step S210 to S230 in Fig. 2
Apply mode consistent, repeat no more here.
Alternatively, when method 400 is not received or determines inconsistent with scheduled operation in the step s 420, can terminate
This authentication.In yet another embodiment, when not receiving in the step s 420 or determining inconsistent with scheduled operation,
Method 400 can be continuing with corresponding semiology analysis step S210 and step S220, until predetermined number of failed (for example, 3
It is secondary, but not limited to this) when terminating method 400.In addition, when determining inconsistent with scheduled operation in the step s 420, method 400 can
With display reminding information in the user interface.
The corresponding user input of last symbol and the symbol are distributed in determining keying sequence in step S430
After the corresponding scheduled operation in position is consistent, method 400 can also carry out step S440.In step S440, perform correspondence and pass through
The operation of authentication.According to one embodiment of the invention, the implement scene of method 400 is unblock link.That is, step is being performed
Before S410, computing device is in interface lock state.Correspondingly, the operation of step S440 is releasing interface lock state.Root
According to another embodiment of the invention, the implement scene of method 400 is payment verification link.Correspondingly, the operation of step S440 is
Perform by the delivery operation after checking.To sum up, depending on the implement scene of method 400, step S440 can be configured as
Implement corresponding operation, the present invention is without limitation.
Fig. 5 shows the schematic diagram of the application 500 of checking identity according to some embodiments of the invention.It is suitable to using 500
In residing in computing device.Can be that independent utility can also be used as the one of application using 500 depending on specific application scenarios
Individual component.For example, when the unblock link of mobile phone is used in using 500, can be as a part for operating system using 500.
Again for example, using 500 be used in for example shopping APP payment verification link when, can be as the component of the APP using 500
One of.
As shown in figure 5, including allocation unit 510 and authentication unit 520 using 500.
Allocation unit 510 is suitable to be randomly assigned logo collection marking elements display location in the user interface.Wherein should
Logo collection includes symbol in keying sequence.Wherein, in logo collection each marker element in following any one:Numeral, word
Female, picture and colouring information.Each symbol belongs to the logo collection in keying sequence.In an embodiment in accordance with the invention,
The precalculated position to the marker element to be allocated is configured with user interface.Allocation unit 510 is suitable to be randomly assigned identification sets
Close the mapping relations one by one in marking elements and precalculated position in user interface and in the corresponding marker element of each position display.
Authentication unit 520 is suitable to after allocation unit 510 performs the operation for being randomly assigned display location every time, receives and sentences
This user input of breaking corresponding scheduled operation in position whether this is distributed with targeted symbol is consistent.Here, it is targeted
Symbol chosen one by the order according to symbol in keying sequence.
In an embodiment in accordance with the invention, precalculated position is distributed in a ring in user interface.The user interface is also matched somebody with somebody
It is equipped with the destination object in annular spread region.Destination object is, for example, safety box icon, but not limited to this.In a reality
Apply in example, scheduled operation corresponding with the display location of chosen symbol is the gesture for dragging the symbol to target object position.
In yet another embodiment, scheduled operation corresponding with the display location of chosen symbol is drag target object to the symbol
The gesture of display location.In yet another embodiment, computing device is mobile terminal.Scheduled operation be along from destination object to
The direction of display location accelerates the operation of the mobile mobile terminal.
It is determined that when consistent with corresponding scheduled operation, authentication unit 520 judges whether this targeted symbol is close
Last position in code sequence.
It is determined that at non-final one, authentication unit 520 indicates allocation unit 510 to continue executing be randomly assigned next time and show
Show the operation of position, until it is determined that the position that the corresponding user input of last symbol is distributed with the symbol in keying sequence
Corresponding scheduled operation is consistent.
Alternatively, it is determined that the position that the corresponding user input of last symbol is distributed with the symbol in keying sequence
When corresponding scheduled operation is consistent, authentication unit 520 is further adapted for performing the operation that correspondence passes through authentication.In one embodiment
In, it is applied to unlocking screen link using 500.Before allocation unit 510 performs operation, computing device is locked in interface
State.Correspondingly, the correspondence performed by authentication unit 520 is the releasing interface lock state by the operation of authentication.Should
Method 400 is referred to 500 more specifically implementation methods, is repeated no more here.
A9, the method as any one of A1-8, wherein, it is determined that the corresponding use of last symbol in keying sequence
When input scheduled operation corresponding with the position that the symbol is distributed in family is consistent, the method also includes:Perform correspondence and pass through identity
The operation of checking.
A10, the method as described in A9, wherein, logo collection marking elements are being randomly assigned in user circle described in execution
In face the step of display location before, the computing device be in interface lock state;
The correspondence is included by the operation of authentication:Release the interface lock state.
A12, the application as described in A11, wherein, it is configured with to be allocated to the pre- of the marker element in the user interface
Positioning is put, and the allocation unit is suitable to be randomly assigned logo collection marking elements according to following manner to show in the user interface
Position:
It is randomly assigned the mapping relations one by one in precalculated position in logo collection marking elements and user interface and at each
The corresponding marker element of position display.
A13, the application as described in A11 or A12, wherein, each marker element is any in following in the logo collection
Kind:Numeral, letter, picture and colouring information.
A14, the application as described in A12, wherein, precalculated position is distributed in a ring in the user interface, the user interface
It is also configured with the destination object being located in annular spread region.
A15, the application as described in A14, wherein, the destination object is shown as safety box icon.
A16, the application as described in A14 or 15, wherein, scheduled operation corresponding with the display location of chosen symbol is to drag
Move the gesture of the symbol to the target object position.
A17, the application as described in A14 or 15, wherein, scheduled operation corresponding with the display location of chosen symbol is to drag
Move the gesture of the destination object to the display location of the symbol.
A18, the application as described in A14 or 15, wherein, the computing device is mobile terminal, aobvious with chosen symbol
Show that the corresponding scheduled operation in position is to accelerate the mobile mobile terminal along the direction from the destination object to display location
Operation.
A19, the application as any one of A10-16, wherein, it is last in the authentication unit determines keying sequence
When the corresponding user input of one symbol scheduled operation corresponding with the position that the symbol is distributed is consistent, it is further adapted for performing correspondence
By the operation of authentication.
A20, the application as described in A17, wherein, the allocation unit be randomly assigned logo collection marking elements with
In the interface of family before display location, the computing device is in interface lock state;
The authentication unit is suitable to perform operation of the correspondence by authentication according to following manner:Release interface locking
State.
Various technologies described herein can combined with hardware or software, or combinations thereof realizes together.So as to the present invention
Method and apparatus, or the method for the present invention and equipment some aspect or part can take embedded tangible media, such as it is soft
The form of the program code (instructing) in the storage medium of disk, CD-ROM, hard disk drive or other any machine readables,
Wherein when program is written into the machine of such as computer etc, and when being performed by the machine, the machine becomes to put into practice this hair
Bright equipment.
In the case where program code is performed on programmable computers, computing device generally comprises processor, processor
Readable storage medium (including volatibility and nonvolatile memory and/or memory element), at least one input unit, and extremely
A few output device.Wherein, memory is arranged to store program codes;Processor is arranged to according to the memory
Instruction in the described program code of middle storage, the method for performing checking identity of the invention.
By way of example and not limitation, computer-readable medium includes computer-readable storage medium and communication media.Calculate
Machine computer-readable recording medium includes computer-readable storage medium and communication media.Computer-readable storage medium storage such as computer-readable instruction,
The information such as data structure, program module or other data.Communication media is general modulated with carrier wave or other transmission mechanisms etc.
Data-signal processed embodies computer-readable instruction, data structure, program module or other data, and passes including any information
Pass medium.The combination of any one above is also included within the scope of computer-readable medium.
In specification mentioned herein, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be put into practice in the case of without these details.In some instances, known method, knot is not been shown in detail
Structure and technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify one or more that the disclosure and helping understands in each inventive aspect, exist
Above to the description of exemplary embodiment of the invention in, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor
The application claims of shield are than the feature more features that is expressly recited in each claim.More precisely, as following
As claims reflect, inventive aspect is all features less than single embodiment disclosed above.Therefore, abide by
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, and wherein each claim is in itself
As separate embodiments of the invention.
Those skilled in the art should be understood the module or unit or group of the equipment in example disclosed herein
Part can be arranged in equipment as depicted in this embodiment, or alternatively can be positioned at and the equipment in the example
In one or more different equipment.Module in aforementioned exemplary can be combined as a module or be segmented into multiple in addition
Submodule.
Those skilled in the art are appreciated that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment
Unit or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit exclude each other, can use any
Combine to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed appoint
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power
Profit is required, summary and accompanying drawing) disclosed in each feature can the alternative features of or similar purpose identical, equivalent by offer carry out generation
Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments
In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment required for protection is appointed
One of meaning mode can be used in any combination.
Additionally, some in the embodiment be described as herein can be by the processor of computer system or by performing
The combination of method or method element that other devices of the function are implemented.Therefore, with for implementing methods described or method
The processor of the necessary instruction of element forms the device for implementing the method or method element.Additionally, device embodiment
Element described in this is the example of following device:The device is used to implement as performed by the element for the purpose for implementing the invention
Function.
As used in this, unless specifically stated so, come using ordinal number " first ", " second ", " the 3rd " etc.
Description plain objects are merely representative of and are related to the different instances of similar object, and are not intended to imply that the object being so described must
Must have the time it is upper, spatially, sequence aspect or given order in any other manner.
Although the embodiment according to limited quantity describes the present invention, above description, the art are benefited from
It is interior it is clear for the skilled person that in the scope of the present invention for thus describing, it can be envisaged that other embodiments.Additionally, it should be noted that
The language that is used in this specification primarily to readable and teaching purpose and select, rather than in order to explain or limit
Determine subject of the present invention and select.Therefore, in the case of without departing from the scope of the appended claims and spirit, for this
Many modifications and changes will be apparent from for the those of ordinary skill of technical field.For the scope of the present invention, to this
The done disclosure of invention is illustrative and not restrictive, and it is intended that the scope of the present invention be defined by the claims appended hereto.
Claims (10)
1. a kind of method for verifying identity, is suitable to be performed in computing device, and the computing device is configured with comprising at least one symbol
Number keying sequence, the method includes:
Logo collection marking elements display location in the user interface is randomly assigned, the wherein logo collection includes keying sequence
Middle symbol;
After display location is randomly assigned every time, one is chosen according to the order of symbol in keying sequence, receive and judge this
Whether user input chooses the scheduled operation corresponding to the display location of symbol consistent with this;
It is determined that when consistent with corresponding scheduled operation, judge this targeted symbol whether be keying sequence in last
Position;
It is determined that at non-final one, continuing executing with and being randomly assigned logo collection marking elements display location in the user interface
The step of, until it is determined that last corresponding user input scheduled operation corresponding with the symbol display location in keying sequence
Unanimously.
2. the method for claim 1, wherein it is configured with the user interface to be allocated to the pre- of the marker element
Positioning is put, it is described be randomly assigned logo collection marking elements in the user interface display location the step of include:
It is randomly assigned the mapping relations one by one in precalculated position in logo collection marking elements and user interface and in each position
Show corresponding marker element.
3. method as claimed in claim 1 or 2, wherein, in the logo collection each marker element in following any one:
Numeral, letter, picture and colouring information.
4. method as claimed in claim 2, wherein, precalculated position is distributed in a ring in the user interface, the user interface
It is also configured with the destination object being located in annular spread region.
5. method as claimed in claim 4, wherein, the destination object is shown as safety box icon.
6. the method as described in claim 4 or 5, wherein, scheduled operation corresponding with the display location of chosen symbol is to drag
Move the gesture of the symbol to the target object position.
7. the method as described in claim 4 or 5, wherein, scheduled operation corresponding with the display location of chosen symbol is to drag
Move the gesture of the destination object to the display location of the symbol.
8. the method as described in claim 4 or 5, wherein, the computing device is mobile terminal, the display with chosen symbol
The corresponding scheduled operation in position is the behaviour for accelerating the mobile mobile terminal along the direction from the destination object to display location
Make.
9. a kind of application for verifying identity, is suitable to be performed in computing device, and the computing device is configured with comprising at least one
The keying sequence of symbol, the application includes:
Allocation unit, is suitable to be randomly assigned logo collection marking elements display location in the user interface, the wherein identification sets
Conjunction includes symbol in keying sequence;
Authentication unit, is suitable to after allocation unit is randomly assigned display location every time, is selected according to the order of symbol in keying sequence
In one, receive and judge whether this user input chooses the scheduled operation one corresponding to the display location of symbol with this
Cause,
It is determined that when consistent with corresponding scheduled operation, judge this targeted symbol whether be keying sequence in last
Position,
It is determined that at non-final one, indicating allocation unit to continue executing with and being randomly assigned logo collection marking elements in user circle
In face the step of display location, until it is determined that last corresponding user input and the symbol display location pair in keying sequence
The scheduled operation answered is consistent.
10. a kind of computing device, including:
At least one processor;And
At least one memory including computer program instructions;
At least one memory and the computer program instructions are configured as making together with least one processor
Obtain method of the computing device as any one of claim 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710014983.8A CN106845180B (en) | 2017-01-09 | 2017-01-09 | Verify method, application and the calculating equipment of identity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710014983.8A CN106845180B (en) | 2017-01-09 | 2017-01-09 | Verify method, application and the calculating equipment of identity |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106845180A true CN106845180A (en) | 2017-06-13 |
CN106845180B CN106845180B (en) | 2019-11-12 |
Family
ID=59117326
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710014983.8A Active CN106845180B (en) | 2017-01-09 | 2017-01-09 | Verify method, application and the calculating equipment of identity |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106845180B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109902482A (en) * | 2017-12-07 | 2019-06-18 | 厦门雅迅网络股份有限公司 | A kind of New Graphics cipher-code input method, terminal device and storage medium |
CN110033545A (en) * | 2019-04-19 | 2019-07-19 | 中山市乐喜电子科技有限公司 | Equipment unlocking method and intelligent door lock |
CN113421087A (en) * | 2018-06-12 | 2021-09-21 | 创新先进技术有限公司 | Payment processing method and device and server |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2749985A1 (en) * | 2012-12-27 | 2014-07-02 | Vodafone Holding GmbH | Unlocking a screen of a portable device |
CN104516645A (en) * | 2013-09-26 | 2015-04-15 | 上海斐讯数据通信技术有限公司 | Electronic device unlocking method |
CN104679418A (en) * | 2013-11-26 | 2015-06-03 | 富泰华工业(深圳)有限公司 | Screen unlocking system and method and touch display device |
CN105589647A (en) * | 2014-10-24 | 2016-05-18 | 富泰华工业(深圳)有限公司 | Unlocking system and method |
-
2017
- 2017-01-09 CN CN201710014983.8A patent/CN106845180B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2749985A1 (en) * | 2012-12-27 | 2014-07-02 | Vodafone Holding GmbH | Unlocking a screen of a portable device |
CN104516645A (en) * | 2013-09-26 | 2015-04-15 | 上海斐讯数据通信技术有限公司 | Electronic device unlocking method |
CN104679418A (en) * | 2013-11-26 | 2015-06-03 | 富泰华工业(深圳)有限公司 | Screen unlocking system and method and touch display device |
CN105589647A (en) * | 2014-10-24 | 2016-05-18 | 富泰华工业(深圳)有限公司 | Unlocking system and method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109902482A (en) * | 2017-12-07 | 2019-06-18 | 厦门雅迅网络股份有限公司 | A kind of New Graphics cipher-code input method, terminal device and storage medium |
CN113421087A (en) * | 2018-06-12 | 2021-09-21 | 创新先进技术有限公司 | Payment processing method and device and server |
CN110033545A (en) * | 2019-04-19 | 2019-07-19 | 中山市乐喜电子科技有限公司 | Equipment unlocking method and intelligent door lock |
Also Published As
Publication number | Publication date |
---|---|
CN106845180B (en) | 2019-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10963555B2 (en) | Electronic device, method for authenticating user, and computer readable recording medium | |
US10764280B2 (en) | Method and apparatus for authentication based on fingerprint recognition | |
US8997215B2 (en) | Authentication using multi-tier multi-class objects | |
US9507928B2 (en) | Preventing the discovery of access codes | |
US20130129162A1 (en) | Method of Executing Software Functions Using Biometric Detection and Related Electronic Device | |
US9342673B2 (en) | Method for user authentication in a device comprising a touch screen | |
US20110287741A1 (en) | Secure application control in mobile terminal using biometric sensor | |
KR20190085543A (en) | Method and apparatus for generating security questions and verifying identities | |
CN103902881A (en) | Method for managing security for applications and an electronic device thereof | |
CN104063639B (en) | Carry out the verification processing device of verification processing | |
KR20140099293A (en) | Secure authorization | |
CN106843729A (en) | A kind of terminal control method and terminal | |
CN104318186B (en) | A kind of password changing method, equipment and terminal | |
CN105678147B (en) | Touch operation method and device | |
CN105094652B (en) | Touch screen unlocking method and device, electronic equipment, display and mobile terminal | |
CN105354455B (en) | State switching method and electronic equipment | |
CN106845180B (en) | Verify method, application and the calculating equipment of identity | |
WO2016101817A1 (en) | Method and device for operating form on mobile terminal | |
CN105303096A (en) | Symbol selection for swipe based authentication | |
KR20150089104A (en) | Method and Device for Unlocking Input using the Combination of Number and Pattern Image at Smartphone | |
CN109271770A (en) | Auth method, equipment and the storage medium of smartwatch | |
CN105824554A (en) | Mobile terminal unlocking method and device | |
KR102295259B1 (en) | Method for Unlocking Input using the Combination of Password Number and Pattern Image Input of Smartphone | |
US10237736B2 (en) | Unlocking of a mobile device by a code received via a stencil on a touchscreen | |
CN108418829B (en) | Account login verification method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |