CN106845180B - Verify method, application and the calculating equipment of identity - Google Patents

Verify method, application and the calculating equipment of identity Download PDF

Info

Publication number
CN106845180B
CN106845180B CN201710014983.8A CN201710014983A CN106845180B CN 106845180 B CN106845180 B CN 106845180B CN 201710014983 A CN201710014983 A CN 201710014983A CN 106845180 B CN106845180 B CN 106845180B
Authority
CN
China
Prior art keywords
symbol
display position
randomly assigned
user interface
logo collection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710014983.8A
Other languages
Chinese (zh)
Other versions
CN106845180A (en
Inventor
宋强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chezhi Interconnection (beijing) Technology Co Ltd
Original Assignee
Chezhi Interconnection (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chezhi Interconnection (beijing) Technology Co Ltd filed Critical Chezhi Interconnection (beijing) Technology Co Ltd
Priority to CN201710014983.8A priority Critical patent/CN106845180B/en
Publication of CN106845180A publication Critical patent/CN106845180A/en
Application granted granted Critical
Publication of CN106845180B publication Critical patent/CN106845180B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Abstract

The invention discloses the method for verifying identity, application and calculate equipment.Wherein, the method for verifying identity is suitable for executing in calculating equipment.The calculating device configuration has the keying sequence comprising at least one symbol, and this method includes the following steps.It is randomly assigned logo collection marking elements display position in the user interface.Wherein the logo collection includes symbol in keying sequence.After being randomly assigned display position every time, one is chosen according to the sequence of symbol in keying sequence, receive and judges whether this user input is consistent with predetermined operation corresponding to the display position of this chosen symbol.When determining consistent with corresponding predetermined operation, judge whether this targeted symbol is last position in keying sequence.Determine it is non-last when, continue to execute be randomly assigned logo collection marking elements in the user interface display position the step of.

Description

Verify method, application and the calculating equipment of identity
Technical field
The present invention relates to calculate apparatus field, more particularly to method, application and the calculating equipment of verifying identity.
Background technique
With the rapid development of electronic equipment and Internet technology, smart phone, tablet computer etc. have touch screen Calculating equipment have become people life in essential equipment.Calculate equipment unlock, payment etc. links require into Row authentication.
Currently, authentication operation can be realized by modes such as gestures, password or a combination of both.It is set for example, calculating It is standby to can be configured as sliding unlock (slide to unlock) mode.It can be by number and letter in another example calculating equipment Combination be unlocked.In another example calculating equipment can be unlocked by judge in gesture input interface that user inputs.
However, there are some problems for existing authentication mode.If for example, password unlock or gesture unlocking manner It is set too simply, the unlock operating process of user is easy to be noticeable, and there are certain information security hidden danger.If unlocking pin or If person's gesture unlocking manner is set too complicated, user's operation is cumbersome and easy error.
For this purpose, the invention proposes a kind of new identity validation technology schemes.
Summary of the invention
The present invention provides a kind of technical solution of new authentication, with try hard to solve the problems, such as among the above at least one.
According to an aspect of the invention, there is provided a kind of method for verifying identity, suitable for being executed in calculating equipment.It should Calculating device configuration has the keying sequence comprising at least one symbol, and this method includes the following steps.It is randomly assigned logo collection Marking elements display position in the user interface.Wherein the logo collection includes symbol in keying sequence.At random point every time Behind display position, choose one according to the sequence of symbol in keying sequence, receive and judge this user input whether with this Predetermined operation corresponding to the display position of secondary chosen symbol is consistent.When determining consistent with corresponding predetermined operation, sentence Whether this targeted symbol that breaks is last position in keying sequence.Determine it is non-last when, continue to execute and be randomly assigned Logo collection marking elements in the user interface display position the step of, until determining that last in keying sequence is corresponding It is consistent that user inputs predetermined operation corresponding with the symbol display position.
Optionally, in the method for verifying identity according to the present invention, identification element is given configured with to be allocated in user interface The predetermined position of element.Be randomly assigned logo collection marking elements in the user interface display position the step of include: random point It is shown with logo collection marking elements with the mapping relations one by one in predetermined position in user interface and in each position corresponding Marker element.Each marker element is any in following in logo collection: number, letter, picture and colouring information.
Optionally, in the method for verifying identity according to the present invention, predetermined position is distributed in a ring in user interface, should User interface is also configured with the target object in annular spread region.For example, target object is shown as safety box icon.
Optionally, corresponding with the display position of chosen symbol pre- in the method for verifying identity according to the present invention Determining gesture is to drag the gesture of the symbol to the target object position.
Optionally, corresponding with the display position of chosen symbol pre- in the method for verifying identity according to the present invention Determine the gesture that gesture is display position of the dragging target object to the symbol.
Optionally, in the method for verifying identity according to the present invention, calculating equipment is mobile terminal, with chosen symbol The corresponding predetermined operation in display position be to accelerate to move this and move end along the direction from the target object to display position The operation at end.
Optionally, in the method for verifying identity according to the present invention, the last symbol pair in determining keying sequence When the user's input prearranged gesture corresponding with the position that the symbol is distributed answered is consistent, this method further includes executing correspondence to pass through The operation of authentication.
Optionally, in the method for verifying identity according to the present invention, identification element in logo collection is randomly assigned in execution Before the step of plain display position in the user interface, calculates equipment and be in interface lock state.It corresponds to through authentication Operation includes releasing the interface lock state.
Another aspect according to the present invention provides a kind of application for verifying identity, suitable for executing in calculating equipment.The meter It calculates equipment and is configured with the keying sequence comprising at least one symbol.The application includes allocation unit and authentication unit.Distribution is single Member is suitable for being randomly assigned logo collection marking elements display position in the user interface.Wherein, which includes password Symbol in sequence.Authentication unit is suitable for after allocation unit is randomly assigned display position every time, according to symbol in keying sequence Sequence chooses one, receives and judges whether this user input is predetermined corresponding to the display position with this chosen symbol Operation is consistent.When determining consistent with corresponding predetermined operation, authentication unit judges whether this targeted symbol is password Last position in sequence.Determine it is non-last when, authentication unit instruction allocation unit continues to execute and is randomly assigned identification sets Close marking elements in the user interface display position the step of, until determining that the corresponding user of last in keying sequence is defeated It is consistent to enter predetermined operation corresponding with the symbol display position.
According to an aspect of the present invention, a kind of calculating equipment is provided, including at least one processor and including calculating At least one processor of machine program instruction.At least one processor and computer program instructions be configured as at least one Reason device makes to calculate the method that equipment executes verifying identity according to the present invention together.
The technical solution of verifying identity according to the present invention can carry out user for each in keying sequence in user Before input, it is randomly assigned the display position of logo collection.It illustrates, the element of logo collection can be in the present invention The various modes such as number, letter, color and picture.User's input can be greatly improved in technical solution of the present invention on this basis Safety when gesture (gesture is consistent when authentication each different from traditional user).In addition, by being randomly assigned to show Show position and determines the gestures direction that user needs to input according to the distribution situation of display position and target object, it is of the invention Technical solution can increase the interest and randomness of user's input, to improve user experience.
Detailed description of the invention
To the accomplishment of the foregoing and related purposes, certain illustrative sides are described herein in conjunction with following description and drawings Face, these aspects indicate the various modes that can practice principles disclosed herein, and all aspects and its equivalent aspect It is intended to fall in the range of theme claimed.Read following detailed description in conjunction with the accompanying drawings, the disclosure it is above-mentioned And other purposes, feature and advantage will be apparent.Throughout the disclosure, identical appended drawing reference generally refers to identical Component or element.
Fig. 1 is the structural block diagram of calculating equipment 100 according to some embodiments of the invention;
Fig. 2 shows the flow charts of the method 200 of verifying identity according to some embodiments of the invention;
Fig. 3 shows the interface schematic diagram after executing a step S210 according to an embodiment of the present invention;
Fig. 4 shows the schematic diagram of the method 400 of verifying identity according to some embodiments of the invention;And
Fig. 5 shows the schematic diagram of the application 500 of verifying identity according to some embodiments of the invention.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
Fig. 1 is the structural block diagram of calculating equipment 100 according to some embodiments of the invention.Here, calculating equipment can be by It is embodied as the various Intelligent hardwares such as the control centre of mobile phone, tablet computer or intelligent express delivery cabinet.Typically, equipment 100 is calculated It may include memory interface 102, one or more data processor, image processor and/or central processing unit 104, with And peripheral interface 106.
Memory interface 102, one or more processors 104 and/or peripheral interface 106 either discrete component, It can integrate in one or more integrated circuits.In calculating equipment 100, various elements can pass through one or more communication Bus or signal wire couple.Sensor, equipment and subsystem may be coupled to peripheral interface 106, a variety of to help to realize Function.For example, motion sensor 110, light sensor 112 and range sensor 114 may be coupled to peripheral interface 106, with Facilitate the functions such as orientation, illumination and ranging.Other sensors 116 can equally be connected with peripheral interface 106, such as positioning system (such as GPS receiver), temperature sensor, biometric sensor or other sensor devices, it is possible thereby to help to implement correlation Function.
Camera sub-system 120 and optical sensor 122 can be used for the camera of convenient such as record photos and video clips The realization of function, wherein the camera sub-system and optical sensor for example can be charge-coupled device (CCD) or complementary gold Belong to oxide semiconductor (CMOS) optical sensor.It can help to realize by one or more radio communication subsystems 124 Communication function, wherein radio communication subsystem may include radio-frequency transmitter and transmitter and/or light (such as infrared) receiver And transmitter.The particular design and embodiment of radio communication subsystem 124 can depend on calculating equipment 100 is supported one A or multiple communication networks.For example, calculate equipment 100 may include be designed to support 3G, 4G, GSM network, GPRS network, EDGE network, Wi-Fi or WiMax network and BlueboothTMThe communication subsystem 124 of network.Audio subsystem 126 can be with It is coupled with loudspeaker 128 and microphone 130, to help to implement to enable the function of voice, such as speech recognition, voice are multiple System, digital record and telephony feature.
I/O subsystem 140 may include touch screen controller 142 and/or other one or more input controllers 144. Touch screen controller 142 may be coupled to touch screen 146.For example, the touch screen 146 and touch screen controller 142 can be with The contact carried out therewith and movement or pause are detected using any one of a variety of touch-sensing technologies, wherein sensing skill Art includes but is not limited to capacitive character, resistive, infrared and surface acoustic wave technique.Other one or more input controllers 144 May be coupled to other input/control devicess 148, for example, one or more buttons, rocker switch, thumb wheel, infrared port, The pointer device of USB port, and/or stylus etc.One or more of button (not shown)s may include for controlling The up/down button of 130 volume of loudspeaker 128 and/or microphone.
Memory interface 102 can be coupled with memory 150.The memory 150 may include that high random access is deposited Reservoir and/or nonvolatile memory, such as one or more disk storage equipments, one or more optical storage apparatus, and/ Or flash memories (such as NAND, NOR).Memory 150 can store an operating system 172, for example, Android, iOS or The operating system of Windows Phone etc.The operating system 172 may include for handling basic system services and execution The instruction of task dependent on hardware.Memory 150 can also be stored using 174.It, can be from memory in mobile device operation Load operating system 172 in 150, and executed by processor 104.At runtime using 174, can also add from memory 150 It carries, and is executed by processor 104.It operates on operating system using 174, is provided using operating system and bottom hardware Interface realizes the various desired functions of user, such as instant messaging, web page browsing, pictures management.Using 174 can be independently of What operating system provided, it is also possible to what operating system carried.In addition, when being mounted in calculating equipment 100 using 174, Drive module can be added to operating system 172.
In general, calculating equipment 100 by use, touch screen 146 can be used to show multiple user interfaces.Here institute The user interface of finger includes but is not limited to text, webpage, icon (for example including the user interface pair including various virtual keys As), video, animation etc..The state of user interface is the state for calculating equipment 100 and responding user's input in a predefined manner.In In some embodiments, the state of user interface includes lock state and unlocked state.When user interface is in the unlocked state, meter Calculating equipment 100 can detecte and respond those user's inputs corresponding with user interface interaction.For example, user's input includes leading Boat, activates or closes a variety of applications etc. data input.In other words, calculating equipment 100 can carry out normally in the unlocked state Operation, predetermined operation set can be executed with the contact of touch screen 146 in response to user.And it calculates equipment 100 and is in lock It, only can for example to unlock gesture, calendar, network state etc. limited for display portion in the user interface of lock state when determining state User interface object, and can close or hide the multiple user interface objects shown when unlocked.
The method of verifying identity of the invention is suitable for executing in above-mentioned calculating equipment 100, but not limited to this.Here, body The typical scene of part verifying is, for example, unlock, APP opening or payment verification etc..Below with reference to Fig. 2 and Fig. 3 to verifying identity Scheme is illustrated.
Fig. 2 shows the flow charts of the method 200 of verifying identity according to some embodiments of the invention.Method 200 is suitable for It is executed in calculating equipment (100).In addition, method 200 can also need authentication ATM or intelligent express delivery cabinet etc. are various Equipment in use, if these device configurations have touch-sensitive display device.In general, calculating equipment is carrying out authentication behaviour Before work, configured with the keying sequence comprising at least one symbol.Here, each symbol for example can be number in keying sequence Word, letter, picture or colouring information etc., the present invention are without limitation.It should be noted that the embodiment of the present invention can be with Using the keying sequence of a variety of known manner configuring computing devices, the present invention is without limitation.On this basis, equipment is calculated It can verify whether user's input meets keying sequence by execution method 200.
Specifically, according to the sequence of keying sequence, successively for each symbol in keying sequence, method 200 can be executed Step S210.In step S210, it is randomly assigned logo collection marking elements display position in the user interface.Here, it marks Knowing set includes symbol in keying sequence.
In an embodiment in accordance with the invention, the predetermined position to be allocated to marker element is configured in user interface. The quantity in predetermined position is consistent with number of elements in logo collection.Identification sets can be randomly assigned in the step S210 of the present embodiment The mapping relations one by one in predetermined position in marking elements and user interface are closed, and show corresponding identification element in each position Element.
In another embodiment according to the present invention, the pre-determined bit to be allocated to marker element is configured in user interface It sets.Predetermined position quantity is less than element sum in logo collection.On this basis, the step S210 of the present embodiment can first from Sum identical marker element in predetermined position is selected in logo collection.Here, selected marker element needs to include this institute For symbol.Then, in step S210, the mapping one by one for being randomly assigned selected marker element and predetermined position is closed System.
In another embodiment according to the present invention, the pre-determined bit of multiple marker element sums is configured in user interface It sets.On this basis, marker element can be randomly assigned marker element to predetermined position by step S210.Here, each mark Element can uniquely occupy a predetermined position.
In another embodiment according to the present invention, configured with one for showing the predetermined of marker element in user interface Region.The step S210 of the present embodiment can be by marker element random display in predetermined areas.Typically, for the ease of with Mark shown in each position is checked at family, has space between any two predetermined position (i.e. the two is not overlapped).Except this it Outside, the present invention does not do excessive limitation to the position distribution in presumptive area.
In another embodiment according to the present invention, the quantity in predetermined position is consistent with number of elements in logo collection.In advance Positioning is set for example can be arranged in a ring.Fig. 3 shows boundary of the calculating equipment of the present embodiment after executing a step S210 Face schematic diagram.As shown in figure 3, logo collection (number 0-9 i.e. in figure) is not traditional interface layout mode, but random point Position with each number.It should be strongly noted that the target " being randomly assigned " in the present invention is to allow execute step every time When S210, at least part of display position of marker element is different from display position when last execution step S210.Therefore, It mode is randomly assigned in the present invention in step S210 can be various well known to be randomly assigned algorithm.In addition, for example upper primary Display position on the basis of execute shifting function (i.e. along the display position of pointer or mobile logo element counterclockwise), can also be with It is considered as of the invention being randomly assigned mode.It should be appreciated that on the basis of the above embodiments, it is any that position change may be implemented The method of salary distribution changed should all be considered to belong to of the invention be randomly assigned mode.In addition, for distinct symbols in keying sequence and The process for the step S210 being performed a plurality of times, the mode of being randomly assigned can be every time identical, or selects different distribution sides every time Formula.For example, keying sequence can be set to " 14235 ", totally 5.In for step S210 performed by symbol " 1 ", mark Know set to need to include symbol " 1 ".Logo collection for example may include 0-9 totally 10 numbers.
After executing step S210 every time, method 200 enters step S220, receives and judges this user input (i.e. This executes received user's input after step S210) whether with this execute targeted this institute of symbol of step S210 Position (i.e. the display position of the symbol) corresponding predetermined operation of distribution is consistent.Here, targeted symbol is according to password Symbol sequential selection in sequence.In fact, select the operation of keying sequence that can complete in step S210 in the present invention, It can be completed in step S220, the invention is not limited in this regard.
In an embodiment as illustrated in figure 3, a target object is also configured in user interface, and (what is shown in figure " protects Dangerous case ").Predetermined operation can be the input of drag target object to the symbol display position, or drag symbol to target pair The display position of elephant.For scheming position shown by marking elements " 1 ", the corresponding predetermined operation in the position is, for example, to drag " 1 " is into safety box, or drags the display position of safety box to " 1 ".In addition, calculating equipment shown in Fig. 3 is mobile terminal. In the fig. 3 embodiment, predetermined operation can also be that moving this along the direction acceleration from target object to display position moves The operation of terminal.For example, " 1 " is located at the upper left of safety box, predetermined operation is to move this along upper left acceleration to move end End.It should be noted that predetermined operation is not limited to shown in above-described embodiment, it is also possible to for example click the operation of shown symbol.
When step S220 determines that user's input is consistent with predetermined operation, method 200 can execute step S230.In step In S230, judge whether this targeted symbol is last position in keying sequence.If it is determined that last non-position, method 200 can be continuing with next semiology analysis step S210 and S220, until determining for last position symbol in keying sequence It is consistent that number corresponding user inputs predetermined operation corresponding with the position that the symbol is distributed.In other words, method 200 passes through multiple Step S210 and S220 completion are executed to the verification operation of entire keying sequence.
To sum up, 200 it can be inputted for each progress user in keying sequence in user according to the method for the present invention Before, it is randomly assigned the display position of logo collection.In this way, method 200 of the invention can increase peace when user inputs operation Full property (gesture is consistent when authentication each different from traditional user), and the entertaining of user's input can also be increased Property, so as to which user experience is greatly improved.
Fig. 4 shows the schematic diagram of the method 400 of verifying identity according to some embodiments of the invention.As shown in figure 4, side Method 400 includes step S410, S420 and S430.Here, step S410 to the S430 reality with step S210 to S230 in Fig. 2 respectively It is consistent to apply mode, which is not described herein again.
Optionally, it when method 400 does not receive or determine inconsistent with predetermined operation in the step s 420, can terminate This authentication.In yet another embodiment, when not receiving or determine inconsistent with predetermined operation in the step s 420, Method 400 can be continuing with corresponding semiology analysis step S210 and step S220, until predetermined number of failed (for example, 3 It is secondary, but not limited to this) when terminating method 400.In addition, method 400 can when determining inconsistent with predetermined operation in the step s 420 With display reminding information in the user interface.
Determine that last symbol corresponding user input in keying sequence is distributed with the symbol in step S430 After the corresponding predetermined operation in position is consistent, step S440 is can also be performed in method 400.In step S440, executes correspondence and pass through The operation of authentication.According to an embodiment of the present invention, the implement scene of method 400 is unlock link.That is, executing step Before S410, calculates equipment and be in interface lock state.Correspondingly, the operation of step S440 is to release interface lock state.Root According to another embodiment of the invention, the implement scene of method 400 is payment verification link.Correspondingly, the operation of step S440 is It executes through the delivery operation after verifying.To sum up, the implement scene depending on method 400, step S440 can be configured as Implement corresponding operation, the present invention is without limitation.
Fig. 5 shows the schematic diagram of the application 500 of verifying identity according to some embodiments of the invention.It is suitable for using 500 It resides in and calculates in equipment.Depending on specific application scenarios, application 500 can also be used as the one of application for independent utility A component.For example, application 500 can be used as a part of operating system when being used in the unlock link of mobile phone using 500. In another example application 500 can be used as the component of the APP when application 500 is used in the payment verification link for the APP that for example does shopping One of.
As shown in figure 5, including allocation unit 510 and authentication unit 520 using 500.
Allocation unit 510 is suitable for being randomly assigned logo collection marking elements display position in the user interface.Wherein should Logo collection includes symbol in keying sequence.Wherein, each marker element is any in following in logo collection: number, word Female, picture and colouring information.Each symbol belongs to the logo collection in keying sequence.In an embodiment in accordance with the invention, The predetermined position to be allocated to the marker element is configured in user interface.Allocation unit 510 is suitable for being randomly assigned identification sets It closes marking elements and shows corresponding marker element with the mapping relations one by one in predetermined position in user interface and in each position.
Authentication unit 520 is suitable for after each execution of allocation unit 510 is randomly assigned the operation of display position, receives and sentences The corresponding predetermined operation in this user input position that whether this is distributed with targeted symbol of breaking is consistent.Here, targeted Symbol to be chosen one according to the sequence of symbol in keying sequence.
In an embodiment in accordance with the invention, predetermined position is distributed in a ring in user interface.The user interface is also matched It is equipped with the target object being located in annular spread region.Target object is, for example, safety box icon, but not limited to this.In a reality It applies in example, predetermined operation corresponding with the display position of chosen symbol is to drag the gesture of the symbol to target object position. In yet another embodiment, predetermined operation corresponding with the display position of chosen symbol is drag target object to the symbol The gesture of display position.In yet another embodiment, calculating equipment is mobile terminal.Predetermined operation be along from target object to The direction of display position accelerates the operation of the mobile mobile terminal.
When determining consistent with corresponding predetermined operation, authentication unit 520 judges whether this targeted symbol is close Last position in code sequence.
Determine it is non-last when, authentication unit 520 indicates that allocation unit 510 continues to execute and is randomly assigned to show next time The operation for showing position, until determining, the corresponding user of last symbol inputs the position distributed with the symbol in keying sequence Corresponding predetermined operation is consistent.
Optionally, the position that the corresponding user's input of last symbol is distributed with the symbol in determining keying sequence When corresponding predetermined operation is consistent, authentication unit 520 is further adapted for executing the corresponding operation for passing through authentication.In one embodiment In, application 500 is applied to unlocking screen link.Before allocation unit 510 executes operation, calculates equipment and be in interface locking State.Correspondingly, the operation that correspondence performed by authentication unit 520 passes through authentication is to release the interface lock state.It answers Method 400 is referred to 500 more specific embodiments, which is not described herein again.
A9, the method as described in any one of A1-8, wherein the corresponding use of last symbol in determining keying sequence When input predetermined operation corresponding with the position that the symbol is distributed in family is consistent, this method further include: execute correspondence and passes through identity The operation of verifying.
A10, the method as described in A9, wherein be randomly assigned logo collection marking elements in user circle described in the execution In face the step of display position before, the calculating equipment is in interface lock state;
The operation that the correspondence passes through authentication includes: to release the interface lock state.
A12, the application as described in A11, wherein configured with to be allocated to the pre- of the marker element in the user interface Positioning is set, and the allocation unit is suitable for being randomly assigned logo collection marking elements according to following manner showing in the user interface Position:
It is randomly assigned the mapping relations one by one of logo collection marking elements and predetermined position in user interface and each Position shows corresponding marker element.
A13, the application as described in A11 or A12, wherein each marker element is any in following in the logo collection Kind: number, letter, picture and colouring information.
A14, the application as described in A12, wherein predetermined position is distributed in a ring in the user interface, the user interface It is also configured with the target object being located in annular spread region.
A15, the application as described in A14, wherein the target object is shown as safety box icon.
A16, the application as described in A14 or 15, wherein predetermined operation corresponding with the display position of chosen symbol is to drag Move the gesture of the symbol to the target object position.
A17, the application as described in A14 or 15, wherein predetermined operation corresponding with the display position of chosen symbol is to drag Move the gesture of the target object to the display position of the symbol.
A18, the application as described in A14 or 15, wherein the calculating equipment is mobile terminal, aobvious with chosen symbol Show that the corresponding predetermined operation in position is to accelerate to move the mobile terminal along the direction from the target object to display position Operation.
A19, the application as described in any one of A10-16, wherein determined in the authentication unit last in keying sequence When the corresponding user's input of one symbol predetermined operation corresponding with the position that the symbol is distributed is consistent, it is further adapted for executing correspondence Pass through the operation of authentication.
A20, the application as described in A17, wherein the allocation unit be randomly assigned logo collection marking elements with In the interface of family before display position, the calculating equipment is in interface lock state;
The authentication unit is suitable for executing the corresponding operation by authentication according to following manner: releasing interface locking State.
Various technologies described herein are realized together in combination with hardware or software or their combination.To the present invention Method and apparatus or the process and apparatus of the present invention some aspects or part can take insertion tangible media, such as it is soft The form of program code (instructing) in disk, CD-ROM, hard disk drive or other any machine readable storage mediums, Wherein when program is loaded into the machine of such as computer etc, and is executed by the machine, the machine becomes to practice this hair Bright equipment.
In the case where program code executes on programmable computers, calculates equipment and generally comprise processor, processor Readable storage medium (including volatile and non-volatile memory and or memory element), at least one input unit, and extremely A few output device.Wherein, memory is configured for storage program code;Processor is configured for according to the memory Instruction in the said program code of middle storage, the method for executing verifying identity of the invention.
By way of example and not limitation, computer-readable medium includes computer storage media and communication media.It calculates Machine readable medium includes computer storage media and communication media.Computer storage medium storage such as computer-readable instruction, The information such as data structure, program module or other data.Communication media is generally modulated with carrier wave or other transmission mechanisms etc. Data-signal processed passes to embody computer readable instructions, data structure, program module or other data including any information Pass medium.Above any combination is also included within the scope of computer-readable medium.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, knot is not been shown in detail Structure and technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, In Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims than feature more features expressly recited in each claim.More precisely, as following As claims reflect, inventive aspect is all features less than single embodiment disclosed above.Therefore, it abides by Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself As a separate embodiment of the present invention.
Those skilled in the art should understand that the module of the equipment in example disclosed herein or unit or groups Part can be arranged in equipment as depicted in this embodiment, or alternatively can be positioned at and the equipment in the example In different one or more equipment.Module in aforementioned exemplary can be combined into a module or furthermore be segmented into multiple Submodule.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed Meaning one of can in any combination mode come using.
In addition, be described as herein can be by the processor of computer system or by executing by some in the embodiment The combination of method or method element that other devices of the function are implemented.Therefore, have for implementing the method or method The processor of the necessary instruction of element forms the device for implementing this method or method element.In addition, Installation practice Element described in this is the example of following device: the device be used for implement as in order to implement the purpose of the invention element performed by Function.
As used in this, unless specifically stated, come using ordinal number " first ", " second ", " third " etc. Description plain objects, which are merely representative of, is related to the different instances of similar object, and is not intended to imply that the object being described in this way must Must have the time it is upper, spatially, sequence aspect or given sequence in any other manner.
Although the embodiment according to limited quantity describes the present invention, above description, the art are benefited from It is interior it is clear for the skilled person that in the scope of the present invention thus described, it can be envisaged that other embodiments.Additionally, it should be noted that Language used in this specification primarily to readable and introduction purpose and select, rather than in order to explain or limit Determine subject of the present invention and selects.Therefore, without departing from the scope and spirit of the appended claims, for this Many modifications and changes are obvious for the those of ordinary skill of technical field.For the scope of the present invention, to this Invent done disclosure be it is illustrative and not restrictive, it is intended that the scope of the present invention be defined by the claims appended hereto.

Claims (7)

1. a kind of method for verifying identity, suitable for executing in calculating equipment, which has comprising at least one symbol Number keying sequence, this method comprises:
It is randomly assigned logo collection marking elements display position in the user interface, wherein the logo collection includes keying sequence Middle symbol;
After being randomly assigned display position every time, one is chosen according to the sequence of symbol in keying sequence, receives and judges this Whether user's input is consistent with predetermined operation corresponding to the display position of this chosen symbol;
When determining consistent with corresponding predetermined operation, judge whether this targeted symbol is last in keying sequence Position;
Determine it is non-last when, continue to execute and be randomly assigned logo collection marking elements display position in the user interface The step of, until determining that the corresponding user of last in keying sequence inputs predetermined operation one corresponding with symbol display position It causes, and then executes the corresponding operation by authentication;And
When determining inconsistent with corresponding predetermined operation, this authentication is terminated;
Wherein, the predetermined position to be allocated to the marker element is configured in the user interface, it is described to be randomly assigned to identify Set marking elements in the user interface display position the step of include:
It is randomly assigned the mapping relations one by one of logo collection marking elements and predetermined position in user interface and in each position Show corresponding marker element;
Predetermined position is distributed in a ring in the user interface, which is also configured with the mesh in annular spread region Object is marked, the target object is shown as safety box icon, and predetermined operation corresponding with the display position of chosen symbol is to drag Move the gesture of the symbol to the target object position;And
If the calculating equipment is mobile terminal, predetermined operation corresponding with the display position of chosen symbol is along from described The direction of target object to display position accelerates the operation of the mobile mobile terminal.
2. the method for claim 1, wherein each marker element is any in following in the logo collection: number Word, letter, picture and colouring information.
3. being the method for claim 1, wherein randomly assigned logo collection marking elements in user circle described in the execution In face the step of display position before, the calculating equipment is in interface lock state;
The operation that the correspondence passes through authentication includes: to release the interface lock state.
4. a kind of application for verifying identity, suitable for executing in calculating equipment, which is configured with comprising at least one The keying sequence of symbol, the application include:
Allocation unit, suitable for being randomly assigned logo collection marking elements display position in the user interface, the wherein identification sets Closing includes symbol in keying sequence;
Authentication unit, suitable for being selected according to the sequence of symbol in keying sequence after allocation unit is randomly assigned display position every time In one, receive and judge this user input whether predetermined operation one corresponding to the display position with this chosen symbol It causes,
When determining consistent with corresponding predetermined operation, judge whether this targeted symbol is last in keying sequence Position,
Determine it is non-last when, instruction allocation unit continues to execute and is randomly assigned logo collection marking elements in user circle In face the step of display position, until determining that the corresponding user's input of last in keying sequence is corresponding with symbol display position Predetermined operation it is consistent, and then execute the corresponding operation for passing through authentication;And
When determining inconsistent with corresponding predetermined operation, this authentication is terminated;
Wherein, the predetermined position to be allocated to the marker element is configured in the user interface, the allocation unit is suitable for Logo collection marking elements display position in the user interface is randomly assigned according to following manner:
It is randomly assigned the mapping relations one by one of logo collection marking elements and predetermined position in user interface and in each position Show corresponding marker element;
Predetermined position is distributed in a ring in the user interface, which is also configured with the mesh in annular spread region Object is marked, the target object is shown as safety box icon, and predetermined operation corresponding with the display position of chosen symbol is to drag Move the gesture of the symbol to the target object position;And
If the calculating equipment is mobile terminal, predetermined operation corresponding with the display position of chosen symbol is along from described The direction of target object to display position accelerates the operation of the mobile mobile terminal.
5. application as claimed in claim 4, wherein each marker element is any in following in the logo collection: number Word, letter, picture and colouring information.
6. application as claimed in claim 4, wherein the allocation unit be randomly assigned logo collection marking elements with In the interface of family before display position, the calculating equipment is in interface lock state;
The authentication unit is suitable for executing the corresponding operation by authentication according to following manner: releasing the interface and locks shape State.
7. a kind of calculating equipment, comprising:
At least one processor;And
At least one processor including computer program instructions;
At least one processor and the computer program instructions are configured as making together at least one described processor It obtains the calculating equipment and executes method as claimed in any one of claims 1-3.
CN201710014983.8A 2017-01-09 2017-01-09 Verify method, application and the calculating equipment of identity Active CN106845180B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710014983.8A CN106845180B (en) 2017-01-09 2017-01-09 Verify method, application and the calculating equipment of identity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710014983.8A CN106845180B (en) 2017-01-09 2017-01-09 Verify method, application and the calculating equipment of identity

Publications (2)

Publication Number Publication Date
CN106845180A CN106845180A (en) 2017-06-13
CN106845180B true CN106845180B (en) 2019-11-12

Family

ID=59117326

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710014983.8A Active CN106845180B (en) 2017-01-09 2017-01-09 Verify method, application and the calculating equipment of identity

Country Status (1)

Country Link
CN (1) CN106845180B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109902482A (en) * 2017-12-07 2019-06-18 厦门雅迅网络股份有限公司 A kind of New Graphics cipher-code input method, terminal device and storage medium
CN109118215B (en) * 2018-06-12 2021-04-27 创新先进技术有限公司 Payment processing method and device and server
CN110033545A (en) * 2019-04-19 2019-07-19 中山市乐喜电子科技有限公司 Equipment unlocking method and intelligent door lock

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104679418A (en) * 2013-11-26 2015-06-03 富泰华工业(深圳)有限公司 Screen unlocking system and method and touch display device
CN105589647A (en) * 2014-10-24 2016-05-18 富泰华工业(深圳)有限公司 Unlocking system and method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2749985B1 (en) * 2012-12-27 2017-06-14 Vodafone Holding GmbH Unlocking a screen of a portable device
CN104516645A (en) * 2013-09-26 2015-04-15 上海斐讯数据通信技术有限公司 Electronic device unlocking method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104679418A (en) * 2013-11-26 2015-06-03 富泰华工业(深圳)有限公司 Screen unlocking system and method and touch display device
CN105589647A (en) * 2014-10-24 2016-05-18 富泰华工业(深圳)有限公司 Unlocking system and method

Also Published As

Publication number Publication date
CN106845180A (en) 2017-06-13

Similar Documents

Publication Publication Date Title
CN107402663B (en) Fingerprint verification method and electronic device for executing the method
US9760707B2 (en) Unlocking electronic devices using touchscreen input gestures
US10764280B2 (en) Method and apparatus for authentication based on fingerprint recognition
US9507928B2 (en) Preventing the discovery of access codes
US20150047017A1 (en) Mobile device and method of controlling therefor
US20140075552A1 (en) Authentication using multi-tier multi-class objects
KR20190085543A (en) Method and apparatus for generating security questions and verifying identities
US9430144B1 (en) Unlocking electronic devices with touchscreen input gestures
KR20140099293A (en) Secure authorization
CN103902881A (en) Method for managing security for applications and an electronic device thereof
CN105677140A (en) Method and apparatus for arranging objects according to content of background image
JP6682628B2 (en) Method, system and apparatus for process triggering
CN105706100A (en) Directional touch unlocking for electronic devices
CN105678147B (en) Touch operation method and device
CN111814885B (en) Method, system, device and medium for managing image frames
CN106845180B (en) Verify method, application and the calculating equipment of identity
CN104318185B (en) A kind of application control method, equipment and mobile terminal
EP3447666B1 (en) Processing fingerprint information
CN104769601A (en) Method for recognition of user identity and electronic equipment
CN105094652B (en) Touch screen unlocking method and device, electronic equipment, display and mobile terminal
CN105243304B (en) A kind of unlocking method and device of mobile terminal
CN105808032B (en) Focus control method and device based on android control
CN105786370A (en) Method and device for unlocking user interface
CN109271770A (en) Auth method, equipment and the storage medium of smartwatch
EP3249878B1 (en) Systems and methods for directional sensing of objects on an electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant