CN106919818A - A kind of verification method and device - Google Patents
A kind of verification method and device Download PDFInfo
- Publication number
- CN106919818A CN106919818A CN201710141962.2A CN201710141962A CN106919818A CN 106919818 A CN106919818 A CN 106919818A CN 201710141962 A CN201710141962 A CN 201710141962A CN 106919818 A CN106919818 A CN 106919818A
- Authority
- CN
- China
- Prior art keywords
- verification
- information
- authentication
- user
- acquired
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 196
- 238000000034 method Methods 0.000 title claims abstract description 51
- 230000001186 cumulative effect Effects 0.000 claims description 11
- 230000008569 process Effects 0.000 description 16
- 230000006870 function Effects 0.000 description 9
- 238000003825 pressing Methods 0.000 description 5
- 230000001960 triggered effect Effects 0.000 description 5
- 230000009286 beneficial effect Effects 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
- G06F11/324—Display of status information
- G06F11/327—Alarm or error message display
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Quality & Reliability (AREA)
- Mobile Radio Communication Systems (AREA)
- Alarm Systems (AREA)
- Burglar Alarm Systems (AREA)
Abstract
The embodiment of the invention provides a kind of verification method and device.In the embodiment of the present invention, when power-off operation is collected, prompt message is exported, to point out user input checking information, then, the checking information of user input is obtained, so that, according to checking message, authentication is carried out to user and the result is obtained, and then, when the result is not verified, exports warning message and be not responding to power-off operation.Therefore, technical scheme provided in an embodiment of the present invention can to a certain extent solve the problems, such as that the security of terminal in the prior art is relatively low.
Description
[ technical field ] A method for producing a semiconductor device
The present invention relates to the field of communications technologies, and in particular, to a verification method and apparatus.
[ background of the invention ]
Currently, the theft of the terminal frequently occurs. If the terminal is stolen in a public transport means or other public places, a thief generally forcibly shuts down the terminal so as to hide evidence, and thus when the user finds that the terminal is lost, the terminal may be forcibly shut down, and the terminal cannot be found back by dialing a call or other modes fed back by the terminal.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art:
in the prior art, the terminal is shut down after being stolen by a thief, so that the terminal is difficult to search after being shut down, and the safety is low.
[ summary of the invention ]
In view of this, embodiments of the present invention provide a verification method and apparatus, which can solve the problem of low security of a terminal in the prior art to a certain extent.
In one aspect, an embodiment of the present invention provides a verification method, including:
when the shutdown operation is acquired, outputting prompt information to prompt a user to input verification information;
acquiring verification information input by the user;
according to the verification message, performing identity verification on the user and obtaining a verification result;
and when the verification result is that the verification is not passed, outputting alarm information and not responding to shutdown operation.
The above-described aspect and any possible implementation further provide an implementation, where the verification information includes: at least one of fingerprint authentication information, password authentication information, face authentication information, iris authentication information, and voice authentication information.
The above-mentioned aspect and any possible implementation manner further provide an implementation manner, where the authenticating the user and obtaining an authentication result according to the authentication message includes:
matching the acquired verification information with target information, wherein the target information is used for performing identity verification on the user;
when the verification information does not match the target information, the obtained verification result is non-verification.
The above-described aspects and any possible implementations further provide an implementation, and the method further includes:
acquiring the accumulated number of verification results which fail to pass verification;
when the accumulated number reaches a preset number threshold, acquiring the current position information of the terminal at regular time;
and sending the acquired position information to a designated contact person.
The above-described aspect and any possible implementation manner further provide an implementation manner, where obtaining a cumulative number of verification results in which the failed verification occurs includes:
when the latest verification result is that the verification is not passed, adding one to the acquired accumulated number; or,
and when the latest verification result is that the verification is passed, clearing the acquired accumulated number.
The above-described aspect and any possible implementation manner further provide an implementation manner, where the outputting the alarm information includes:
outputting sound alarm information; and/or the presence of a gas in the gas,
and outputting flickering alarm information.
In another aspect, an embodiment of the present invention provides a verification apparatus, including:
the prompting unit is used for outputting prompting information to prompt a user to input verification information when shutdown operation is acquired;
a first acquisition unit configured to acquire authentication information input by the user;
the verification unit is used for carrying out identity verification on the user according to the verification message and obtaining a verification result;
and the alarm unit is used for outputting alarm information and not responding to shutdown operation when the verification result is that the verification is not passed.
The above-described aspect and any possible implementation further provide an implementation, where the verification information includes: at least one of fingerprint authentication information, password authentication information, face authentication information, iris authentication information, and voice authentication information.
The above-described aspect and any possible implementation further provide an implementation, where the verification unit is specifically configured to:
matching the acquired verification information with target information, wherein the target information is used for performing identity verification on the user;
when the verification information does not match the target information, the obtained verification result is non-verification.
The above-described aspects and any possible implementations further provide an implementation, where the apparatus further includes:
a second acquisition unit configured to acquire the cumulative number of verification results for which verification fails;
the third acquisition unit is used for acquiring the current position information of the terminal at regular time when the accumulated number reaches a preset number threshold;
and the sending unit is used for sending the acquired position information to the designated contact person.
As for the above-mentioned aspect and any possible implementation manner, an implementation manner is further provided, where the second obtaining unit is specifically configured to:
when the latest verification result is that the verification is not passed, adding one to the acquired accumulated number; or,
and when the latest verification result is that the verification is passed, clearing the acquired accumulated number.
The above-described aspect and any possible implementation manner further provide an implementation manner, where the alarm unit is specifically configured to:
outputting sound alarm information; and/or the presence of a gas in the gas,
and outputting flickering alarm information.
One of the above technical solutions has the following beneficial effects:
in the embodiment of the invention, when the shutdown operation is acquired, the prompt information is output to prompt the user to input the verification information, then the verification information input by the user is acquired, so that the user is authenticated and the verification result is obtained according to the verification information, and further, when the verification result is not verified, the alarm information is output and the shutdown operation is not responded. In the embodiment of the invention, when the terminal is triggered to execute the shutdown operation, the verification process is started, the verification information input by the user is verified, when the verification information cannot pass the identity verification, the currently requested shutdown operation is not an instruction sent by the user, the shutdown operation is not executed, and meanwhile, the alarm information is output. Therefore, the technical scheme provided by the embodiment of the invention can solve the problem of lower security of the terminal in the prior art to a certain extent.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
Fig. 1 is a schematic flow chart of a first embodiment of a verification method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a second embodiment of the verification method according to the embodiment of the present invention;
FIG. 3 is a block diagram of an exemplary embodiment of a verification device.
[ detailed description ] embodiments
For better understanding of the technical solutions of the present invention, the following detailed descriptions of the embodiments of the present invention are provided with reference to the accompanying drawings.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
In the prior art, when a terminal is powered off by a thief, the terminal cannot be searched, and the security of the terminal is low, aiming at the problem, the embodiment of the invention provides the following solution ideas: when the terminal is triggered to execute the shutdown operation, the identity of the user is verified, if the obtained verification result is that the verification is not passed, the alarm information can be output and the shutdown operation is not responded, so that the user can conveniently retrieve the terminal according to the alarm information and the terminal which is not shutdown.
Under the guidance of this idea, the present embodiment provides the following feasible embodiments.
Example one
The embodiment of the invention provides a verification method.
Specifically, referring to fig. 1, which is a schematic flow chart of a first embodiment of the verification method according to the embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
s101, when the shutdown operation is collected, outputting prompt information to prompt a user to input verification information.
Specifically, the embodiment of the present invention does not particularly limit the implementation manner of outputting the prompt information.
In a specific implementation process, the prompt information may be output according to a preset target information manner. For example, if the target information is digital password type information, the password input box may be directly output to prompt the user to input the authentication information. Alternatively, for another example, if the target information is fingerprint verification information, at this time, text prompt information may be output to prompt the user to input the user fingerprint in the designated area.
It should be noted that, in the embodiment of the present invention, the trigger instruction or the trigger information for triggering the terminal to execute the shutdown operation is not particularly limited. For example, when the trigger instruction for triggering the terminal to execute the shutdown operation is: and detecting that the user presses the power-off key for a long time, and triggering the terminal to execute the power-off operation if the terminal detects that the user executes the operation of pressing the power-off key for the long time.
In a specific implementation process, before prompting the user to input the verification information, it may be detected whether the verification function is turned on, and when it is determined that the verification function is in the on state, the operation of prompting the user to output the verification information in the above S101 is performed; or, when it is determined that the verification function is in the off state, the shutdown operation may be directly performed, which is not described herein again.
Hereinafter, only the authentication method when the authentication function is on will be specifically described.
It should be noted that, in the embodiment of the present invention, when the verification function is turned on, in order to prevent a thief from forcibly turning off the terminal, a trigger condition for the terminal to perform forced turning off may be further adjusted.
For example, in general, when the verification function is not started, the terminal may be triggered to perform a forced shutdown operation by pressing the shutdown key for ten seconds, when the verification function starts, the duration of pressing the shutdown key for a long time may be adaptively extended, for example, it may be set that the terminal may be triggered to perform the forced shutdown operation by pressing the shutdown key for a long time for tens of minutes, which is equivalent to canceling a condition for triggering the terminal to perform the forced shutdown operation when the verification function is not started, and when a thief steals the terminal, the terminal may not be forced to perform the shutdown operation by simply pressing the shutdown key for tens of seconds.
S102, obtaining the verification information input by the user.
In this embodiment of the present invention, the verification information may include, but is not limited to: at least one of fingerprint authentication information, password authentication information, face authentication information, iris authentication information, and voice authentication information.
The password authentication information may include, but is not limited to: numeric password information, pattern password information, alphabetic password information, or alphanumeric combination information, etc.
Specifically, the manner of acquiring each piece of information is different according to the different pieces of verification information. In the actual implementation process, the mode of obtaining the verification information can be selected according to actual needs.
For example, a fingerprint identification module built in the terminal may be called to acquire fingerprint verification information input by the user; for another example, the face verification information of the user captured by a camera built in the terminal may be acquired; for another example, the voice authentication information of the user may be identified and acquired by a voice recognition module built in the terminal.
S103, according to the verification message, performing identity verification on the user and obtaining a verification result.
Specifically, according to the acquired authentication information, the user is authenticated, so that the user identity can be determined conveniently, and the safety of the terminal is guaranteed.
Before the authentication, target information needs to be preset, and the target information is used for authenticating the user. The number of the target information may be determined according to actual needs, one target information may be preset, or a plurality of target information may be preset, which is not particularly limited in the embodiment of the present invention.
Therefore, in the process of performing identity authentication, the acquired authentication information needs to be matched with the target information.
Specifically, when the verification information does not match all the target information, the verification result obtained is non-verification.
Or when the verification information is matched with at least one piece of target information, the verification result is obtained as passing verification.
For example, if 2 pieces of target information are preset in advance, the two pieces of target information are fingerprint information a and fingerprint information B, respectively, and the acquired fingerprint verification information of the user is fingerprint information C, then the fingerprint information C is matched with the fingerprint information a and the fingerprint information B, respectively. At this time, if the fingerprint information C matches the fingerprint information a, the obtained fingerprint authentication information matches one target information, and the obtained authentication result is a pass authentication; if the fingerprint information C is not matched with the fingerprint information A and the fingerprint information C is not matched with the fingerprint information B, the obtained fingerprint verification information is not matched with the target information, and the obtained verification result is that the verification is failed.
And S104, outputting alarm information and not responding to shutdown operation when the verification result is that the verification is not passed.
Or responding to the shutdown operation when the verification result is that the verification is passed.
In the embodiment of the present invention, the manner of outputting the alarm information may include, but is not limited to: outputting sound alarm information; and/or, outputting flickering alarm information.
In a specific implementation process, in this way, when a thief steals the terminal of the user, since the target information set by the user cannot be obtained, the verification information input by the thief may not pass the identity verification in S103, therefore, when the verification result is that the verification is not passed, the shutdown operation is not performed, the terminal maintains the startup state, and the terminal can output alarm information.
In other application scenarios, if the thief does not trigger the power-off operation of the terminal, the terminal remains in the power-on state, and at this time, if the user finds that the terminal is lost, the terminal can be retrieved by dialing a phone call or the like, which is not described herein again.
In addition, the verification method provided by the embodiment of the invention can further comprise the following steps:
first, the cumulative number of verification results in which the failed verification occurs is acquired.
It should be noted that the accumulated number obtained in the embodiment of the present invention refers to a continuous accumulated number that fails to pass the verification. In a specific implementation process, when the latest verification result is that the verification is not passed, adding one to the obtained accumulated number; alternatively, when the latest verification result is that verification is passed, the obtained cumulative number is cleared.
For example, assume that when the terminal performs the first authentication, the obtained authentication result is: if the verification is not passed, the accumulated number is 1; and then, the terminal performs second identity authentication again, and if the acquired authentication result is as follows: if the verification fails, adding one to the accumulated number, wherein the accumulated number is 2; or, if the result of the second authentication performed by the terminal is that the authentication is passed, the cumulative number is cleared, and the cumulative number at this time is 0.
And then, when the accumulated number reaches a preset number threshold, acquiring the current position information of the terminal at regular time.
And finally, sending the acquired position information to the designated contact person.
The number threshold may be preset according to actual needs. For example, if the number threshold is preset to 3, when the cumulative number reaches 3 times, an operation of acquiring and transmitting the position information at a timing is performed. The designated contact may be a contact stored in the address book of the terminal, or may be a contact not stored in the address book, which is not particularly limited. The time interval or the time of the timed transmission may be preset according to actual needs, which is not particularly limited in the embodiment of the present invention.
In the process of specifically implementing the scheme, the operation of regularly acquiring and sending the position information can be set to be directly operated in the background of the terminal, so that the position of the terminal can be exposed under the condition that a thief does not know, and clues and basis are provided for an police to search the terminal for a theft case.
Specifically, the verification method provided by the embodiment of the invention can be realized by software completely, and is realized by matching some existing functional units of the terminal, so that additional hardware investment cost is not required, adverse effects on the appearance of the terminal are avoided, and the safety of the terminal is effectively improved on the premise of not influencing the normal operation of the terminal.
It should be noted that the terminal according to the embodiment of the present invention may include, but is not limited to, a Personal Computer (PC), a Personal Digital Assistant (PDA), a wireless handheld device, a Tablet Computer (Tablet Computer), a mobile phone, an MP3 player, an MP4 player, and the like.
It should be noted that the execution subjects of S101 to S104 may be verification apparatuses, and the apparatuses may be applications located in the local terminal, or may also be functional units such as a plug-in or Software Development Kit (SDK) located in the applications located in the local terminal, which is not particularly limited in this embodiment of the present invention.
It should be understood that the application may be an application program (native app) installed on the terminal, or may also be a web page program (webApp) of a browser on the terminal, which is not limited in this embodiment of the present invention.
The technical scheme of the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, when the terminal is triggered to execute the shutdown operation, the verification process is started, the verification information input by the user is verified, when the verification information cannot pass the identity verification, the currently requested shutdown operation is not an instruction sent by the user, the shutdown operation is not executed, and meanwhile, the alarm information is output. Therefore, the technical scheme provided by the embodiment of the invention can solve the problem of lower security of the terminal in the prior art to a certain extent.
Example two
Based on the verification method provided by the first embodiment, a specific implementation manner of the verification method is provided in the embodiment of the present invention.
Specifically, please refer to fig. 2, which is a schematic flowchart illustrating a second embodiment of the verification method according to the embodiment of the present invention, as shown in fig. 2, the method includes the following steps:
s201, judging whether the terminal acquires shutdown operation; if yes, go to S202; if not, S201 is executed.
S202, judging whether the verification function is started or not; if yes, go to S203; if not, go to S211.
And S203, outputting prompt information to prompt the user to input verification information.
And S204, acquiring the verification information input by the user.
S205, judging whether the verification information is matched with the target information; if yes, the verification information is matched with at least one piece of target information, and S211 is executed; if not, the verification information is not matched with the target information, and S206 is executed.
And S206, outputting alarm information without responding to shutdown operation.
S207, the cumulative number of verification results for which verification failed is obtained.
S208, judging whether the accumulated number reaches a number threshold value; if yes, go to S209; if not, ending.
And S209, acquiring the current position information of the terminal at fixed time.
And S210, sending the acquired position information to the designated contact.
And S211, responding to shutdown operation.
It should be understood that the verification method provided in the embodiment of the present invention is a specific implementation manner of the method described in the embodiment, and is not intended to limit the present application.
The technical scheme of the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, when the shutdown operation is acquired, the verification process is started, the verification information input by the user is verified, when the verification information cannot pass the identity verification, the currently requested shutdown operation is not an instruction sent by the user, the shutdown operation is not executed, and meanwhile, the alarm information is output. Therefore, the technical scheme provided by the embodiment of the invention can solve the problem of lower security of the terminal in the prior art to a certain extent.
EXAMPLE III
Based on the verification method provided in the first embodiment, the embodiment of the present invention further provides an embodiment of an apparatus for implementing each step and method in the above method embodiment.
Please refer to fig. 3, which is a functional block diagram of an authentication apparatus according to an embodiment of the present invention. As shown in fig. 3, the apparatus includes:
the prompting unit 31 is used for outputting prompting information to prompt a user to input verification information when the shutdown operation is acquired;
a first acquisition unit 32 for acquiring authentication information input by a user;
the verification unit 33 is configured to perform identity verification on the user according to the verification message and obtain a verification result;
and an alarm unit 34 for outputting alarm information without responding to the shutdown operation when the verification result is that the verification is not passed.
Specifically, in the embodiment of the present invention, the verification information includes: at least one of fingerprint authentication information, password authentication information, face authentication information, iris authentication information, and voice authentication information.
In a specific implementation process, the verification unit 33 is specifically configured to:
matching the acquired verification information with target information, wherein the target information is used for performing identity verification on a user;
when the verification information does not match the target information, the obtained verification result is non-verification.
In another specific implementation process, the apparatus further includes:
a second obtaining unit 35 configured to obtain the cumulative number of verification results for which verification fails;
a third obtaining unit 36, configured to obtain current location information of the terminal at regular time when the accumulated number reaches a preset number threshold;
and a sending unit 37, configured to send the acquired location information to the designated contact.
Specifically, the second obtaining unit 35 is specifically configured to:
when the latest verification result is that the verification is not passed, adding one to the obtained accumulated number; or,
and when the latest verification result is that the verification is passed, clearing the acquired accumulated number.
In the embodiment of the present invention, the alarm unit 34 is specifically configured to:
outputting sound alarm information; and/or the presence of a gas in the gas,
and outputting flickering alarm information.
Since each unit in the present embodiment can execute the method shown in fig. 1, reference may be made to the related description of fig. 1 for a part of the present embodiment that is not described in detail.
The technical scheme of the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, when the shutdown operation is acquired, the verification process is started, the verification information input by the user is verified, when the verification information cannot pass the identity verification, the currently requested shutdown operation is not an instruction sent by the user, the shutdown operation is not executed, and meanwhile, the alarm information is output. Therefore, the technical scheme provided by the embodiment of the invention can solve the problem of lower security of the terminal in the prior art to a certain extent.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) or a Processor (Processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (12)
1. A method of authentication, the method comprising:
when the shutdown operation is acquired, outputting prompt information to prompt a user to input verification information;
acquiring verification information input by the user;
according to the verification message, performing identity verification on the user and obtaining a verification result;
and when the verification result is that the verification is not passed, outputting alarm information and not responding to shutdown operation.
2. The method of claim 1, wherein the authentication information comprises: at least one of fingerprint authentication information, password authentication information, face authentication information, iris authentication information, and voice authentication information.
3. The method of claim 1, wherein the authenticating the user and obtaining the authentication result according to the authentication message comprises:
matching the acquired verification information with target information, wherein the target information is used for performing identity verification on the user;
when the verification information does not match the target information, the obtained verification result is non-verification.
4. The method of claim 1, further comprising:
acquiring the accumulated number of verification results which fail to pass verification;
when the accumulated number reaches a preset number threshold, acquiring the current position information of the terminal;
and sending the acquired position information to a designated contact person.
5. The method of claim 4, wherein obtaining a cumulative number of authentication results for which a failed authentication occurred comprises:
when the latest verification result is that the verification is not passed, adding one to the acquired accumulated number; or,
and when the latest verification result is that the verification is passed, clearing the acquired accumulated number.
6. The method of claim 1, wherein the outputting alert information comprises:
outputting sound alarm information; and/or the presence of a gas in the gas,
and outputting flickering alarm information.
7. An authentication apparatus, the apparatus comprising:
the prompting unit is used for outputting prompting information to prompt a user to input verification information when shutdown operation is acquired;
a first acquisition unit configured to acquire authentication information input by the user;
the verification unit is used for carrying out identity verification on the user according to the verification message and obtaining a verification result;
and the alarm unit is used for outputting alarm information and not responding to shutdown operation when the verification result is that the verification is not passed.
8. The apparatus of claim 7, wherein the authentication information comprises: at least one of fingerprint authentication information, password authentication information, face authentication information, iris authentication information, and voice authentication information.
9. The apparatus according to claim 6, wherein the verification unit is specifically configured to:
matching the acquired verification information with target information, wherein the target information is used for performing identity verification on the user;
when the verification information does not match the target information, the obtained verification result is non-verification.
10. The apparatus of claim 6, further comprising:
a second acquisition unit configured to acquire the cumulative number of verification results for which verification fails;
the third acquisition unit is used for acquiring the current position information of the terminal at regular time when the accumulated number reaches a preset number threshold;
and the sending unit is used for sending the acquired position information to the designated contact person.
11. The apparatus according to claim 10, wherein the second obtaining unit is specifically configured to:
when the latest verification result is that the verification is not passed, adding one to the acquired accumulated number; or,
and when the latest verification result is that the verification is passed, clearing the acquired accumulated number.
12. The device according to claim 6, characterized in that the alarm unit is specifically configured to:
outputting sound alarm information; and/or the presence of a gas in the gas,
and outputting flickering alarm information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710141962.2A CN106919818A (en) | 2017-03-10 | 2017-03-10 | A kind of verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710141962.2A CN106919818A (en) | 2017-03-10 | 2017-03-10 | A kind of verification method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106919818A true CN106919818A (en) | 2017-07-04 |
Family
ID=59460781
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710141962.2A Pending CN106919818A (en) | 2017-03-10 | 2017-03-10 | A kind of verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106919818A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108509778A (en) * | 2018-02-07 | 2018-09-07 | 平安普惠企业管理有限公司 | End message guard method, device, computer equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101035173A (en) * | 2006-03-08 | 2007-09-12 | 乐金电子(中国)研究开发中心有限公司 | Theft-robbery prevention mobile phone |
CN103973892A (en) * | 2014-05-12 | 2014-08-06 | 深圳市威富多媒体有限公司 | Method and device for starting and stopping mobile terminal based on voice and face recognition |
CN104123514A (en) * | 2013-04-26 | 2014-10-29 | 腾讯科技(深圳)有限公司 | Shutdown validation method and device |
CN105701426A (en) * | 2014-11-28 | 2016-06-22 | 富泰华工业(深圳)有限公司 | Electronic device subjected to shutdown protection and shutdown protection system and method |
US20160254906A1 (en) * | 2013-12-30 | 2016-09-01 | Palantir Technologies Inc. | Verifiable redactable audit log |
-
2017
- 2017-03-10 CN CN201710141962.2A patent/CN106919818A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101035173A (en) * | 2006-03-08 | 2007-09-12 | 乐金电子(中国)研究开发中心有限公司 | Theft-robbery prevention mobile phone |
CN104123514A (en) * | 2013-04-26 | 2014-10-29 | 腾讯科技(深圳)有限公司 | Shutdown validation method and device |
US20160254906A1 (en) * | 2013-12-30 | 2016-09-01 | Palantir Technologies Inc. | Verifiable redactable audit log |
CN103973892A (en) * | 2014-05-12 | 2014-08-06 | 深圳市威富多媒体有限公司 | Method and device for starting and stopping mobile terminal based on voice and face recognition |
CN105701426A (en) * | 2014-11-28 | 2016-06-22 | 富泰华工业(深圳)有限公司 | Electronic device subjected to shutdown protection and shutdown protection system and method |
Non-Patent Citations (1)
Title |
---|
(美)特蕾莎·M·佩顿: "《大数据时代的隐私》", 31 January 2017, 上海科学技术出版社 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108509778A (en) * | 2018-02-07 | 2018-09-07 | 平安普惠企业管理有限公司 | End message guard method, device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109684799B (en) | Account login method, login device, account login equipment and storage medium | |
US8634808B1 (en) | Mobile device loss prevention | |
US20180203986A1 (en) | Fingerprint Recognition Method and Apparatus, and Touchscreen Terminal | |
KR20190007374A (en) | Mobile security countermeasures | |
EP3147768A1 (en) | Screen interface unlocking method and screen interface unlocking device | |
WO2016015551A1 (en) | Method and system for improving safety of mobile terminal | |
US20170098073A1 (en) | Method and apparatus for identifying malicious operation in mobile terminal | |
CN104850771A (en) | Identity verification method and related equipment | |
WO2013107395A1 (en) | Mobile phone security protection method and device | |
CN108564948B (en) | Voice recognition method and electronic equipment | |
CN106843729A (en) | A kind of terminal control method and terminal | |
US9704366B2 (en) | Method to detect an alarm situation and to send silent alerts to external systems using voice input to mobile devices | |
CN107493378B (en) | Method and device for logging in application program, computer equipment and readable storage medium | |
WO2014134945A1 (en) | Method and browser for browsing web page, and storage medium | |
CN104660907A (en) | Shooting method and device as well as mobile terminal | |
CN105592146A (en) | Equipment control method, device and terminal | |
CN103955637A (en) | Identification method and device for user identity of mobile terminal | |
CN107533598B (en) | Input method and device of login password of application program and terminal | |
CN107908939B (en) | Terminal alarm method and device and mobile terminal | |
CN107590404A (en) | Method for tracing and system and terminal device | |
CN105050061A (en) | Method and device for sending messages on the basis of user voiceprint information | |
CN104751086A (en) | Terminal anti-theft method | |
WO2017201874A1 (en) | Method and apparatus for prompting loss of terminal | |
CN108399710B (en) | Fingerprint identification alarm method, system and terminal equipment | |
US20120093374A1 (en) | Electronic device and method for identifying use by unauthorized users |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170704 |