CN106919818A - A kind of verification method and device - Google Patents

A kind of verification method and device Download PDF

Info

Publication number
CN106919818A
CN106919818A CN201710141962.2A CN201710141962A CN106919818A CN 106919818 A CN106919818 A CN 106919818A CN 201710141962 A CN201710141962 A CN 201710141962A CN 106919818 A CN106919818 A CN 106919818A
Authority
CN
China
Prior art keywords
verification
information
authentication
user
acquired
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710141962.2A
Other languages
Chinese (zh)
Inventor
黄腊渠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tinno Wireless Technology Co Ltd
Original Assignee
Shenzhen Tinno Wireless Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tinno Wireless Technology Co Ltd filed Critical Shenzhen Tinno Wireless Technology Co Ltd
Priority to CN201710141962.2A priority Critical patent/CN106919818A/en
Publication of CN106919818A publication Critical patent/CN106919818A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The embodiment of the invention provides a kind of verification method and device.In the embodiment of the present invention, when power-off operation is collected, prompt message is exported, to point out user input checking information, then, the checking information of user input is obtained, so that, according to checking message, authentication is carried out to user and the result is obtained, and then, when the result is not verified, exports warning message and be not responding to power-off operation.Therefore, technical scheme provided in an embodiment of the present invention can to a certain extent solve the problems, such as that the security of terminal in the prior art is relatively low.

Description

Verification method and device
[ technical field ] A method for producing a semiconductor device
The present invention relates to the field of communications technologies, and in particular, to a verification method and apparatus.
[ background of the invention ]
Currently, the theft of the terminal frequently occurs. If the terminal is stolen in a public transport means or other public places, a thief generally forcibly shuts down the terminal so as to hide evidence, and thus when the user finds that the terminal is lost, the terminal may be forcibly shut down, and the terminal cannot be found back by dialing a call or other modes fed back by the terminal.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art:
in the prior art, the terminal is shut down after being stolen by a thief, so that the terminal is difficult to search after being shut down, and the safety is low.
[ summary of the invention ]
In view of this, embodiments of the present invention provide a verification method and apparatus, which can solve the problem of low security of a terminal in the prior art to a certain extent.
In one aspect, an embodiment of the present invention provides a verification method, including:
when the shutdown operation is acquired, outputting prompt information to prompt a user to input verification information;
acquiring verification information input by the user;
according to the verification message, performing identity verification on the user and obtaining a verification result;
and when the verification result is that the verification is not passed, outputting alarm information and not responding to shutdown operation.
The above-described aspect and any possible implementation further provide an implementation, where the verification information includes: at least one of fingerprint authentication information, password authentication information, face authentication information, iris authentication information, and voice authentication information.
The above-mentioned aspect and any possible implementation manner further provide an implementation manner, where the authenticating the user and obtaining an authentication result according to the authentication message includes:
matching the acquired verification information with target information, wherein the target information is used for performing identity verification on the user;
when the verification information does not match the target information, the obtained verification result is non-verification.
The above-described aspects and any possible implementations further provide an implementation, and the method further includes:
acquiring the accumulated number of verification results which fail to pass verification;
when the accumulated number reaches a preset number threshold, acquiring the current position information of the terminal at regular time;
and sending the acquired position information to a designated contact person.
The above-described aspect and any possible implementation manner further provide an implementation manner, where obtaining a cumulative number of verification results in which the failed verification occurs includes:
when the latest verification result is that the verification is not passed, adding one to the acquired accumulated number; or,
and when the latest verification result is that the verification is passed, clearing the acquired accumulated number.
The above-described aspect and any possible implementation manner further provide an implementation manner, where the outputting the alarm information includes:
outputting sound alarm information; and/or the presence of a gas in the gas,
and outputting flickering alarm information.
In another aspect, an embodiment of the present invention provides a verification apparatus, including:
the prompting unit is used for outputting prompting information to prompt a user to input verification information when shutdown operation is acquired;
a first acquisition unit configured to acquire authentication information input by the user;
the verification unit is used for carrying out identity verification on the user according to the verification message and obtaining a verification result;
and the alarm unit is used for outputting alarm information and not responding to shutdown operation when the verification result is that the verification is not passed.
The above-described aspect and any possible implementation further provide an implementation, where the verification information includes: at least one of fingerprint authentication information, password authentication information, face authentication information, iris authentication information, and voice authentication information.
The above-described aspect and any possible implementation further provide an implementation, where the verification unit is specifically configured to:
matching the acquired verification information with target information, wherein the target information is used for performing identity verification on the user;
when the verification information does not match the target information, the obtained verification result is non-verification.
The above-described aspects and any possible implementations further provide an implementation, where the apparatus further includes:
a second acquisition unit configured to acquire the cumulative number of verification results for which verification fails;
the third acquisition unit is used for acquiring the current position information of the terminal at regular time when the accumulated number reaches a preset number threshold;
and the sending unit is used for sending the acquired position information to the designated contact person.
As for the above-mentioned aspect and any possible implementation manner, an implementation manner is further provided, where the second obtaining unit is specifically configured to:
when the latest verification result is that the verification is not passed, adding one to the acquired accumulated number; or,
and when the latest verification result is that the verification is passed, clearing the acquired accumulated number.
The above-described aspect and any possible implementation manner further provide an implementation manner, where the alarm unit is specifically configured to:
outputting sound alarm information; and/or the presence of a gas in the gas,
and outputting flickering alarm information.
One of the above technical solutions has the following beneficial effects:
in the embodiment of the invention, when the shutdown operation is acquired, the prompt information is output to prompt the user to input the verification information, then the verification information input by the user is acquired, so that the user is authenticated and the verification result is obtained according to the verification information, and further, when the verification result is not verified, the alarm information is output and the shutdown operation is not responded. In the embodiment of the invention, when the terminal is triggered to execute the shutdown operation, the verification process is started, the verification information input by the user is verified, when the verification information cannot pass the identity verification, the currently requested shutdown operation is not an instruction sent by the user, the shutdown operation is not executed, and meanwhile, the alarm information is output. Therefore, the technical scheme provided by the embodiment of the invention can solve the problem of lower security of the terminal in the prior art to a certain extent.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
Fig. 1 is a schematic flow chart of a first embodiment of a verification method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a second embodiment of the verification method according to the embodiment of the present invention;
FIG. 3 is a block diagram of an exemplary embodiment of a verification device.
[ detailed description ] embodiments
For better understanding of the technical solutions of the present invention, the following detailed descriptions of the embodiments of the present invention are provided with reference to the accompanying drawings.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
In the prior art, when a terminal is powered off by a thief, the terminal cannot be searched, and the security of the terminal is low, aiming at the problem, the embodiment of the invention provides the following solution ideas: when the terminal is triggered to execute the shutdown operation, the identity of the user is verified, if the obtained verification result is that the verification is not passed, the alarm information can be output and the shutdown operation is not responded, so that the user can conveniently retrieve the terminal according to the alarm information and the terminal which is not shutdown.
Under the guidance of this idea, the present embodiment provides the following feasible embodiments.
Example one
The embodiment of the invention provides a verification method.
Specifically, referring to fig. 1, which is a schematic flow chart of a first embodiment of the verification method according to the embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
s101, when the shutdown operation is collected, outputting prompt information to prompt a user to input verification information.
Specifically, the embodiment of the present invention does not particularly limit the implementation manner of outputting the prompt information.
In a specific implementation process, the prompt information may be output according to a preset target information manner. For example, if the target information is digital password type information, the password input box may be directly output to prompt the user to input the authentication information. Alternatively, for another example, if the target information is fingerprint verification information, at this time, text prompt information may be output to prompt the user to input the user fingerprint in the designated area.
It should be noted that, in the embodiment of the present invention, the trigger instruction or the trigger information for triggering the terminal to execute the shutdown operation is not particularly limited. For example, when the trigger instruction for triggering the terminal to execute the shutdown operation is: and detecting that the user presses the power-off key for a long time, and triggering the terminal to execute the power-off operation if the terminal detects that the user executes the operation of pressing the power-off key for the long time.
In a specific implementation process, before prompting the user to input the verification information, it may be detected whether the verification function is turned on, and when it is determined that the verification function is in the on state, the operation of prompting the user to output the verification information in the above S101 is performed; or, when it is determined that the verification function is in the off state, the shutdown operation may be directly performed, which is not described herein again.
Hereinafter, only the authentication method when the authentication function is on will be specifically described.
It should be noted that, in the embodiment of the present invention, when the verification function is turned on, in order to prevent a thief from forcibly turning off the terminal, a trigger condition for the terminal to perform forced turning off may be further adjusted.
For example, in general, when the verification function is not started, the terminal may be triggered to perform a forced shutdown operation by pressing the shutdown key for ten seconds, when the verification function starts, the duration of pressing the shutdown key for a long time may be adaptively extended, for example, it may be set that the terminal may be triggered to perform the forced shutdown operation by pressing the shutdown key for a long time for tens of minutes, which is equivalent to canceling a condition for triggering the terminal to perform the forced shutdown operation when the verification function is not started, and when a thief steals the terminal, the terminal may not be forced to perform the shutdown operation by simply pressing the shutdown key for tens of seconds.
S102, obtaining the verification information input by the user.
In this embodiment of the present invention, the verification information may include, but is not limited to: at least one of fingerprint authentication information, password authentication information, face authentication information, iris authentication information, and voice authentication information.
The password authentication information may include, but is not limited to: numeric password information, pattern password information, alphabetic password information, or alphanumeric combination information, etc.
Specifically, the manner of acquiring each piece of information is different according to the different pieces of verification information. In the actual implementation process, the mode of obtaining the verification information can be selected according to actual needs.
For example, a fingerprint identification module built in the terminal may be called to acquire fingerprint verification information input by the user; for another example, the face verification information of the user captured by a camera built in the terminal may be acquired; for another example, the voice authentication information of the user may be identified and acquired by a voice recognition module built in the terminal.
S103, according to the verification message, performing identity verification on the user and obtaining a verification result.
Specifically, according to the acquired authentication information, the user is authenticated, so that the user identity can be determined conveniently, and the safety of the terminal is guaranteed.
Before the authentication, target information needs to be preset, and the target information is used for authenticating the user. The number of the target information may be determined according to actual needs, one target information may be preset, or a plurality of target information may be preset, which is not particularly limited in the embodiment of the present invention.
Therefore, in the process of performing identity authentication, the acquired authentication information needs to be matched with the target information.
Specifically, when the verification information does not match all the target information, the verification result obtained is non-verification.
Or when the verification information is matched with at least one piece of target information, the verification result is obtained as passing verification.
For example, if 2 pieces of target information are preset in advance, the two pieces of target information are fingerprint information a and fingerprint information B, respectively, and the acquired fingerprint verification information of the user is fingerprint information C, then the fingerprint information C is matched with the fingerprint information a and the fingerprint information B, respectively. At this time, if the fingerprint information C matches the fingerprint information a, the obtained fingerprint authentication information matches one target information, and the obtained authentication result is a pass authentication; if the fingerprint information C is not matched with the fingerprint information A and the fingerprint information C is not matched with the fingerprint information B, the obtained fingerprint verification information is not matched with the target information, and the obtained verification result is that the verification is failed.
And S104, outputting alarm information and not responding to shutdown operation when the verification result is that the verification is not passed.
Or responding to the shutdown operation when the verification result is that the verification is passed.
In the embodiment of the present invention, the manner of outputting the alarm information may include, but is not limited to: outputting sound alarm information; and/or, outputting flickering alarm information.
In a specific implementation process, in this way, when a thief steals the terminal of the user, since the target information set by the user cannot be obtained, the verification information input by the thief may not pass the identity verification in S103, therefore, when the verification result is that the verification is not passed, the shutdown operation is not performed, the terminal maintains the startup state, and the terminal can output alarm information.
In other application scenarios, if the thief does not trigger the power-off operation of the terminal, the terminal remains in the power-on state, and at this time, if the user finds that the terminal is lost, the terminal can be retrieved by dialing a phone call or the like, which is not described herein again.
In addition, the verification method provided by the embodiment of the invention can further comprise the following steps:
first, the cumulative number of verification results in which the failed verification occurs is acquired.
It should be noted that the accumulated number obtained in the embodiment of the present invention refers to a continuous accumulated number that fails to pass the verification. In a specific implementation process, when the latest verification result is that the verification is not passed, adding one to the obtained accumulated number; alternatively, when the latest verification result is that verification is passed, the obtained cumulative number is cleared.
For example, assume that when the terminal performs the first authentication, the obtained authentication result is: if the verification is not passed, the accumulated number is 1; and then, the terminal performs second identity authentication again, and if the acquired authentication result is as follows: if the verification fails, adding one to the accumulated number, wherein the accumulated number is 2; or, if the result of the second authentication performed by the terminal is that the authentication is passed, the cumulative number is cleared, and the cumulative number at this time is 0.
And then, when the accumulated number reaches a preset number threshold, acquiring the current position information of the terminal at regular time.
And finally, sending the acquired position information to the designated contact person.
The number threshold may be preset according to actual needs. For example, if the number threshold is preset to 3, when the cumulative number reaches 3 times, an operation of acquiring and transmitting the position information at a timing is performed. The designated contact may be a contact stored in the address book of the terminal, or may be a contact not stored in the address book, which is not particularly limited. The time interval or the time of the timed transmission may be preset according to actual needs, which is not particularly limited in the embodiment of the present invention.
In the process of specifically implementing the scheme, the operation of regularly acquiring and sending the position information can be set to be directly operated in the background of the terminal, so that the position of the terminal can be exposed under the condition that a thief does not know, and clues and basis are provided for an police to search the terminal for a theft case.
Specifically, the verification method provided by the embodiment of the invention can be realized by software completely, and is realized by matching some existing functional units of the terminal, so that additional hardware investment cost is not required, adverse effects on the appearance of the terminal are avoided, and the safety of the terminal is effectively improved on the premise of not influencing the normal operation of the terminal.
It should be noted that the terminal according to the embodiment of the present invention may include, but is not limited to, a Personal Computer (PC), a Personal Digital Assistant (PDA), a wireless handheld device, a Tablet Computer (Tablet Computer), a mobile phone, an MP3 player, an MP4 player, and the like.
It should be noted that the execution subjects of S101 to S104 may be verification apparatuses, and the apparatuses may be applications located in the local terminal, or may also be functional units such as a plug-in or Software Development Kit (SDK) located in the applications located in the local terminal, which is not particularly limited in this embodiment of the present invention.
It should be understood that the application may be an application program (native app) installed on the terminal, or may also be a web page program (webApp) of a browser on the terminal, which is not limited in this embodiment of the present invention.
The technical scheme of the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, when the terminal is triggered to execute the shutdown operation, the verification process is started, the verification information input by the user is verified, when the verification information cannot pass the identity verification, the currently requested shutdown operation is not an instruction sent by the user, the shutdown operation is not executed, and meanwhile, the alarm information is output. Therefore, the technical scheme provided by the embodiment of the invention can solve the problem of lower security of the terminal in the prior art to a certain extent.
Example two
Based on the verification method provided by the first embodiment, a specific implementation manner of the verification method is provided in the embodiment of the present invention.
Specifically, please refer to fig. 2, which is a schematic flowchart illustrating a second embodiment of the verification method according to the embodiment of the present invention, as shown in fig. 2, the method includes the following steps:
s201, judging whether the terminal acquires shutdown operation; if yes, go to S202; if not, S201 is executed.
S202, judging whether the verification function is started or not; if yes, go to S203; if not, go to S211.
And S203, outputting prompt information to prompt the user to input verification information.
And S204, acquiring the verification information input by the user.
S205, judging whether the verification information is matched with the target information; if yes, the verification information is matched with at least one piece of target information, and S211 is executed; if not, the verification information is not matched with the target information, and S206 is executed.
And S206, outputting alarm information without responding to shutdown operation.
S207, the cumulative number of verification results for which verification failed is obtained.
S208, judging whether the accumulated number reaches a number threshold value; if yes, go to S209; if not, ending.
And S209, acquiring the current position information of the terminal at fixed time.
And S210, sending the acquired position information to the designated contact.
And S211, responding to shutdown operation.
It should be understood that the verification method provided in the embodiment of the present invention is a specific implementation manner of the method described in the embodiment, and is not intended to limit the present application.
The technical scheme of the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, when the shutdown operation is acquired, the verification process is started, the verification information input by the user is verified, when the verification information cannot pass the identity verification, the currently requested shutdown operation is not an instruction sent by the user, the shutdown operation is not executed, and meanwhile, the alarm information is output. Therefore, the technical scheme provided by the embodiment of the invention can solve the problem of lower security of the terminal in the prior art to a certain extent.
EXAMPLE III
Based on the verification method provided in the first embodiment, the embodiment of the present invention further provides an embodiment of an apparatus for implementing each step and method in the above method embodiment.
Please refer to fig. 3, which is a functional block diagram of an authentication apparatus according to an embodiment of the present invention. As shown in fig. 3, the apparatus includes:
the prompting unit 31 is used for outputting prompting information to prompt a user to input verification information when the shutdown operation is acquired;
a first acquisition unit 32 for acquiring authentication information input by a user;
the verification unit 33 is configured to perform identity verification on the user according to the verification message and obtain a verification result;
and an alarm unit 34 for outputting alarm information without responding to the shutdown operation when the verification result is that the verification is not passed.
Specifically, in the embodiment of the present invention, the verification information includes: at least one of fingerprint authentication information, password authentication information, face authentication information, iris authentication information, and voice authentication information.
In a specific implementation process, the verification unit 33 is specifically configured to:
matching the acquired verification information with target information, wherein the target information is used for performing identity verification on a user;
when the verification information does not match the target information, the obtained verification result is non-verification.
In another specific implementation process, the apparatus further includes:
a second obtaining unit 35 configured to obtain the cumulative number of verification results for which verification fails;
a third obtaining unit 36, configured to obtain current location information of the terminal at regular time when the accumulated number reaches a preset number threshold;
and a sending unit 37, configured to send the acquired location information to the designated contact.
Specifically, the second obtaining unit 35 is specifically configured to:
when the latest verification result is that the verification is not passed, adding one to the obtained accumulated number; or,
and when the latest verification result is that the verification is passed, clearing the acquired accumulated number.
In the embodiment of the present invention, the alarm unit 34 is specifically configured to:
outputting sound alarm information; and/or the presence of a gas in the gas,
and outputting flickering alarm information.
Since each unit in the present embodiment can execute the method shown in fig. 1, reference may be made to the related description of fig. 1 for a part of the present embodiment that is not described in detail.
The technical scheme of the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, when the shutdown operation is acquired, the verification process is started, the verification information input by the user is verified, when the verification information cannot pass the identity verification, the currently requested shutdown operation is not an instruction sent by the user, the shutdown operation is not executed, and meanwhile, the alarm information is output. Therefore, the technical scheme provided by the embodiment of the invention can solve the problem of lower security of the terminal in the prior art to a certain extent.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) or a Processor (Processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (12)

1. A method of authentication, the method comprising:
when the shutdown operation is acquired, outputting prompt information to prompt a user to input verification information;
acquiring verification information input by the user;
according to the verification message, performing identity verification on the user and obtaining a verification result;
and when the verification result is that the verification is not passed, outputting alarm information and not responding to shutdown operation.
2. The method of claim 1, wherein the authentication information comprises: at least one of fingerprint authentication information, password authentication information, face authentication information, iris authentication information, and voice authentication information.
3. The method of claim 1, wherein the authenticating the user and obtaining the authentication result according to the authentication message comprises:
matching the acquired verification information with target information, wherein the target information is used for performing identity verification on the user;
when the verification information does not match the target information, the obtained verification result is non-verification.
4. The method of claim 1, further comprising:
acquiring the accumulated number of verification results which fail to pass verification;
when the accumulated number reaches a preset number threshold, acquiring the current position information of the terminal;
and sending the acquired position information to a designated contact person.
5. The method of claim 4, wherein obtaining a cumulative number of authentication results for which a failed authentication occurred comprises:
when the latest verification result is that the verification is not passed, adding one to the acquired accumulated number; or,
and when the latest verification result is that the verification is passed, clearing the acquired accumulated number.
6. The method of claim 1, wherein the outputting alert information comprises:
outputting sound alarm information; and/or the presence of a gas in the gas,
and outputting flickering alarm information.
7. An authentication apparatus, the apparatus comprising:
the prompting unit is used for outputting prompting information to prompt a user to input verification information when shutdown operation is acquired;
a first acquisition unit configured to acquire authentication information input by the user;
the verification unit is used for carrying out identity verification on the user according to the verification message and obtaining a verification result;
and the alarm unit is used for outputting alarm information and not responding to shutdown operation when the verification result is that the verification is not passed.
8. The apparatus of claim 7, wherein the authentication information comprises: at least one of fingerprint authentication information, password authentication information, face authentication information, iris authentication information, and voice authentication information.
9. The apparatus according to claim 6, wherein the verification unit is specifically configured to:
matching the acquired verification information with target information, wherein the target information is used for performing identity verification on the user;
when the verification information does not match the target information, the obtained verification result is non-verification.
10. The apparatus of claim 6, further comprising:
a second acquisition unit configured to acquire the cumulative number of verification results for which verification fails;
the third acquisition unit is used for acquiring the current position information of the terminal at regular time when the accumulated number reaches a preset number threshold;
and the sending unit is used for sending the acquired position information to the designated contact person.
11. The apparatus according to claim 10, wherein the second obtaining unit is specifically configured to:
when the latest verification result is that the verification is not passed, adding one to the acquired accumulated number; or,
and when the latest verification result is that the verification is passed, clearing the acquired accumulated number.
12. The device according to claim 6, characterized in that the alarm unit is specifically configured to:
outputting sound alarm information; and/or the presence of a gas in the gas,
and outputting flickering alarm information.
CN201710141962.2A 2017-03-10 2017-03-10 A kind of verification method and device Pending CN106919818A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710141962.2A CN106919818A (en) 2017-03-10 2017-03-10 A kind of verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710141962.2A CN106919818A (en) 2017-03-10 2017-03-10 A kind of verification method and device

Publications (1)

Publication Number Publication Date
CN106919818A true CN106919818A (en) 2017-07-04

Family

ID=59460781

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710141962.2A Pending CN106919818A (en) 2017-03-10 2017-03-10 A kind of verification method and device

Country Status (1)

Country Link
CN (1) CN106919818A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108509778A (en) * 2018-02-07 2018-09-07 平安普惠企业管理有限公司 End message guard method, device, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101035173A (en) * 2006-03-08 2007-09-12 乐金电子(中国)研究开发中心有限公司 Theft-robbery prevention mobile phone
CN103973892A (en) * 2014-05-12 2014-08-06 深圳市威富多媒体有限公司 Method and device for starting and stopping mobile terminal based on voice and face recognition
CN104123514A (en) * 2013-04-26 2014-10-29 腾讯科技(深圳)有限公司 Shutdown validation method and device
CN105701426A (en) * 2014-11-28 2016-06-22 富泰华工业(深圳)有限公司 Electronic device subjected to shutdown protection and shutdown protection system and method
US20160254906A1 (en) * 2013-12-30 2016-09-01 Palantir Technologies Inc. Verifiable redactable audit log

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101035173A (en) * 2006-03-08 2007-09-12 乐金电子(中国)研究开发中心有限公司 Theft-robbery prevention mobile phone
CN104123514A (en) * 2013-04-26 2014-10-29 腾讯科技(深圳)有限公司 Shutdown validation method and device
US20160254906A1 (en) * 2013-12-30 2016-09-01 Palantir Technologies Inc. Verifiable redactable audit log
CN103973892A (en) * 2014-05-12 2014-08-06 深圳市威富多媒体有限公司 Method and device for starting and stopping mobile terminal based on voice and face recognition
CN105701426A (en) * 2014-11-28 2016-06-22 富泰华工业(深圳)有限公司 Electronic device subjected to shutdown protection and shutdown protection system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
(美)特蕾莎·M·佩顿: "《大数据时代的隐私》", 31 January 2017, 上海科学技术出版社 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108509778A (en) * 2018-02-07 2018-09-07 平安普惠企业管理有限公司 End message guard method, device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109684799B (en) Account login method, login device, account login equipment and storage medium
US8634808B1 (en) Mobile device loss prevention
US20180203986A1 (en) Fingerprint Recognition Method and Apparatus, and Touchscreen Terminal
KR20190007374A (en) Mobile security countermeasures
EP3147768A1 (en) Screen interface unlocking method and screen interface unlocking device
WO2016015551A1 (en) Method and system for improving safety of mobile terminal
US20170098073A1 (en) Method and apparatus for identifying malicious operation in mobile terminal
CN104850771A (en) Identity verification method and related equipment
WO2013107395A1 (en) Mobile phone security protection method and device
CN108564948B (en) Voice recognition method and electronic equipment
CN106843729A (en) A kind of terminal control method and terminal
US9704366B2 (en) Method to detect an alarm situation and to send silent alerts to external systems using voice input to mobile devices
CN107493378B (en) Method and device for logging in application program, computer equipment and readable storage medium
WO2014134945A1 (en) Method and browser for browsing web page, and storage medium
CN104660907A (en) Shooting method and device as well as mobile terminal
CN105592146A (en) Equipment control method, device and terminal
CN103955637A (en) Identification method and device for user identity of mobile terminal
CN107533598B (en) Input method and device of login password of application program and terminal
CN107908939B (en) Terminal alarm method and device and mobile terminal
CN107590404A (en) Method for tracing and system and terminal device
CN105050061A (en) Method and device for sending messages on the basis of user voiceprint information
CN104751086A (en) Terminal anti-theft method
WO2017201874A1 (en) Method and apparatus for prompting loss of terminal
CN108399710B (en) Fingerprint identification alarm method, system and terminal equipment
US20120093374A1 (en) Electronic device and method for identifying use by unauthorized users

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170704