CN107528978A - Verification method, checking system and electronic equipment - Google Patents

Verification method, checking system and electronic equipment Download PDF

Info

Publication number
CN107528978A
CN107528978A CN201710777034.5A CN201710777034A CN107528978A CN 107528978 A CN107528978 A CN 107528978A CN 201710777034 A CN201710777034 A CN 201710777034A CN 107528978 A CN107528978 A CN 107528978A
Authority
CN
China
Prior art keywords
authentication information
password authentication
electronic equipment
input
shutdown
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710777034.5A
Other languages
Chinese (zh)
Inventor
张壬槟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tinno Mobile Technology Co Ltd
Shenzhen Tinno Wireless Technology Co Ltd
Original Assignee
Shenzhen Tinno Mobile Technology Co Ltd
Shenzhen Tinno Wireless Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tinno Mobile Technology Co Ltd, Shenzhen Tinno Wireless Technology Co Ltd filed Critical Shenzhen Tinno Mobile Technology Co Ltd
Priority to CN201710777034.5A priority Critical patent/CN107528978A/en
Publication of CN107528978A publication Critical patent/CN107528978A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the present invention provides a kind of verification method, checking system and electronic equipment, the verification method and is applied to electronic equipment, including when receiving shutdown command, sends and input the biological characteristic recognition information prompting related to shutdown command;When receiving the biological characteristic recognition information related to shutdown command, shutdown command is performed.Verification method provided in an embodiment of the present invention passes through when electronic equipment receives shutdown command, generation requires that input is used for the prompting for confirming the password authentication information of shutdown, and, when electronic equipment receives the password authentication information of input, the password authentication information is verified, if the verification passes, then performs the mode of shutdown command, the security of the electronic equipments such as mobile phone is improved, reduces the risk of privacy of user leakage.

Description

Verification method, checking system and electronic equipment
Technical field
The present invention relates to communication technique field, and in particular to a kind of verification method, checking system and electronic equipment.
Background technology
With the photography and vedio recording function of the electronic equipment such as development and progress, mobile phone of science and technology, social functions and online branch Pay that function etc. is stronger and stronger, and the various functions become stronger day by day improve the privacy degree of the electronic equipments such as mobile phone, Ye Jiti The loss cost of the electronic equipments such as high mobile phone.
The electronic equipments such as some existing mobile phones do not have switching on and shutting down to protect privacy function, as long as pressing power key or major key Easily realize that the electronic equipment such as the switching on and shutting down operation of electronic equipment, the mobile phone of no switching on and shutting down protection privacy function can reduce it certainly The security of body.In addition, the electronic equipment such as some existing mobile phones in terms of privacy is protected in switching on and shutting down mainly by means of numerical ciphers, The electronic equipments such as i.e. existing mobile phone need to input the switching on and shutting down numerical ciphers of owner's setting in facility switching machine.Because numeral is close Code cracks that rate is high, therefore carries out mode security that the switching on and shutting down of the electronic equipments such as mobile phone protect also by means of numerical ciphers It is not high.Numerical ciphers are once cracked, the electronic equipment such as mobile phone can equally face album privacy leakage, address list leakage with And social account be utilized etc. caused by economic loss and credibility loss.
The content of the invention
In view of this, the embodiment of the present invention provides a kind of verification method, checking system and electronic equipment, to solve existing hand The problem of security of the electronic equipments such as machine is not high.
In a first aspect, one embodiment of the invention provides a kind of verification method, applied to electronic equipment, including:Electronic equipment When receiving shutdown command, generation requires that input is used for the prompting for confirming the password authentication information of shutdown;Electronic equipment receives The password authentication information of input, and the password authentication information is verified, if the verification passes, then perform shutdown command.
In an embodiment of the present invention, this method further comprises:When electronic equipment receives start-up command, generation requires Input the prompting of the password authentication information for confirming start;Electronic equipment receives the password authentication information of input, and to this Password authentication information is verified, if the verification passes, then performs start-up command.
In an embodiment of the present invention, password authentication information is verified, including:By password authentication information and prestore Password authentication information is contrasted, if both matchings, are judged as being verified.
In an embodiment of the present invention, password authentication information includes the password authentication information inputted at least twice.
In an embodiment of the present invention, password authentication information is numerical ciphers or biological characteristic recognition information.
In an embodiment of the present invention, biological characteristic recognition information is finger print information, voiceprint, iris information and face At least one of characteristic information.
In an embodiment of the present invention, when biological characteristic recognition information is finger print information, with shutdown and/or start-up command The quantity of related biological characteristic recognition information is at least two groups.
In an embodiment of the present invention, when biological characteristic recognition information is voiceprint, voiceprint is related to text It is or unrelated with text.
Second aspect, one embodiment of the invention provides a kind of checking system, applied to electronic equipment, including:Prompting shutdown MIM message input module, when receiving shutdown command for electronic equipment, generation requires that input is used for the password authentification for confirming shutdown The prompting of information;Shutdown module is performed, the password authentication information of input is received for electronic equipment, and the password authentification is believed Breath is verified, if the verification passes, then performs shutdown command.
In an embodiment of the present invention, the system further comprises:Boot-strap information input module is prompted, for electronic equipment When receiving start-up command, generation requires that input is used for the prompting for confirming the password authentication information of start;Starting module is performed, is used The password authentication information of input is received in electronic equipment, and the password authentication information is verified, if the verification passes, then Perform start-up command.
The third aspect, one embodiment of the invention provide a kind of checking system, including:Processor, received for electronic equipment During to shutdown command, generation requires that input is used for the prompting for confirming the password authentication information of shutdown;Electronic equipment receives input Password authentication information, and the password authentication information is verified, if the verification passes, then performs shutdown command.
In an embodiment of the present invention, when the processor in checking system is additionally operable to electronic equipment and receives start-up command, Generation requires that input is used for the prompting for confirming the password authentication information of start;Electronic equipment receives the password authentification letter of input Breath, and the password authentication information is verified, if the verification passes, then perform start-up command.
Fourth aspect, one embodiment of the invention provide a kind of electronic equipment, including testing described by any of the above-described embodiment Card system.
5th aspect, one embodiment of the invention provide a kind of terminal, and the terminal includes processor, memory and is stored in On reservoir and the proving program that can run on a processor, the proving program realize that any of the above-described is implemented when being executed by processor Example described by verification method the step of.
6th aspect, one embodiment of the invention provide a kind of computer-readable recording medium, computer-readable recording medium On be stored with proving program, the proving program realizes the verification method described by any of the above-described embodiment when being executed by processor The step of.
Verification method provided in an embodiment of the present invention is by the way that when electronic equipment receives shutdown command, generation requires input For the prompting for the password authentication information for confirming shutdown, also, work as the password authentication information that electronic equipment receives input, to this Password authentication information is verified, if the verification passes, is then performed the mode of shutdown command, is improved the electronic equipments such as mobile phone Security, reduce the risk of privacy of user leakage.
Brief description of the drawings
Fig. 1 show the schematic flow sheet of the verification method of first embodiment of the invention offer.
Fig. 2 show the schematic flow sheet of the verification method of second embodiment of the invention offer.
Fig. 3 show the structural representation of the checking system of third embodiment of the invention offer.
Fig. 4 show the structural representation of the checking system of fourth embodiment of the invention offer.
Fig. 5 show the structural representation of the checking system of fifth embodiment of the invention offer.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Based on this Embodiment in invention, the every other reality that those of ordinary skill in the art are obtained under the premise of creative work is not made Example is applied, belongs to the scope of protection of the invention.
Fig. 1 show the schematic flow sheet of the verification method of first embodiment of the invention offer.It is as shown in figure 1, of the invention The verification method that first embodiment provides includes:
10:When electronic equipment receives shutdown command, generation requires that input is used for the password authentication information of confirmation shutdown Prompting.
It should be appreciated that the password authentication information related to shutdown command mentioned in step 10 can be by owner according to reality Situation is freely set.
20:Electronic equipment receives the password authentication information of input, and the password authentication information is verified, if tested Card passes through, then performs shutdown command.
When electronic equipment is started shooting for the first time, owner needs the typing password authentication information related to shutdown command, so as to Follow-up checking work.
It should be appreciated that when owner or other users want the modification password authentication information related to shutdown command, it is necessary to The original password authentication information related to shutdown command of input first, with the security of abundant raising modification process, prevent it His user arbitrarily distorts the password authentication information related to shutdown command.
In actual application, when electronic equipment need shutdown when, user first click on electronic equipment power key or its He sets button as shutdown command, and when electronic equipment receives the shutdown command of user, electronic equipment issues the user with defeated Enter the prompting of the password authentication information related to shutdown command, now user inputs password authentication information as requested, works as electronics When equipment receives above-mentioned related to shutdown command password authentication information, the password authentication information is verified, if tested Card passes through, and the shutdown command that electronic equipment performs user carries out power-off operation.
In an embodiment of the present invention, when electronic equipment is verified to the password authentication information received, if checking knot Fruit is by then not prompting user to re-enter password authentication information;If continuous several times the result is not by electronics Equipment enters temporary transient lock-out state and carries out locking processing, wherein, locking processing, which includes but is not limited to send to designated equipment, determines The processing operation such as position data.
It should be appreciated that temporarily lock-out state can be treated temporarily by user's sets itself duration, such as 5 minutes, 10 minutes Lock-out state can re-start the input of password authentication information after releasing.
In an embodiment of the present invention, the checking information if owner forgets Password, owner can enable the standby of electronic equipment With password authentication information, wherein, standby password authentication information includes validation problem, numerical ciphers, biological characteristic recognition information etc. Data, the embodiment of the present invention are not limited thereto.
For example, if electronic equipment is stolen, the people for stealing electronic equipment nothing due to incorrect password authentication information Method realizes power-off operation so that the owner of electronic equipment finds the electricity of loss possibly through the mode for dialing phone or positioning Sub- equipment.
The verification method that first embodiment of the invention provides is by the way that when electronic equipment receives shutdown command, generation requires The prompting of the password authentication information for confirming shutdown is inputted, also, works as the password authentication information that electronic equipment receives input, The password authentication information is verified, if the verification passes, then the mode of shutdown command is performed, improves the electronics such as mobile phone and set Standby security, reduce the risk of privacy of user leakage.
During the input password authentication information of one embodiment of the invention, the password authentication information number of input is extremely Less twice, fully to reduce error originated from input, input accuracy is improved.
In an embodiment of the present invention, the password authentication information received to electronic equipment in step 20 carries out checking bag Include:Receive the password authentication information of input;By the password authentication information of input and the password authentication information related to shutdown command It is compared;When the password authentication information of input and the password authentication information similarity related to shutdown command reach the pass of setting During machine threshold value, power-off operation is performed.
It should be appreciated that shutdown threshold value can be by owner's sets itself, or can be automatically generated by electronic equipment, the embodiment of the present invention This is not construed as limiting.
In an embodiment of the present invention, the shutdown threshold value set by owner sets warning value.Such as when set by owner Shutdown threshold value when being less than warning value, electronic equipment provides safety instruction or sends alarm, prompts owner's shutdown threshold value to set It is low, security risk increase.The embodiment of the present invention is improved by way of warning value is set for the shutdown threshold value set by owner Verification method security.
In an embodiment of the present invention, the password authentication information when input and the password authentication information related to shutdown command When matching completely, privacy of user leakage could be reduced by verifying and performing power-off operation, to improve the security of checking Risk.
In an embodiment of the present invention, password authentication information is numerical ciphers or biological characteristic recognition information, fully to carry The adaptability and scalability of high verification method provided in an embodiment of the present invention.
In an embodiment of the present invention, biological characteristic recognition information is finger print information, and the biology related to shutdown command is special The quantity for levying identification information is at least two groups, i.e., finger print information is at least two groups.Finger print information is arranged at least two groups can Effectively prevent finger wear or fingerprint to be stained with the generation of fingerprint failure conditions caused by foreign matter, while be also convenient for user's use, carry High user experience.
In an embodiment of the present invention, biological characteristic recognition information is voiceprint, and voiceprint is related to text.Specifically Ground, when voiceprint is related to text, the voiceprint and the voiceprint related to shutdown command of user's input are compared Pair when, not only need to compare the characteristic information of vocal print, such as pitch, loudness of a sound, the duration of a sound and tone color etc., it is also necessary to compare voiceprint Content of text, i.e., the content of text in the content of text described in user and the voiceprint related to shutdown command is compared It is right, only simultaneously when the characteristic information of vocal print and the content of text of voiceprint reach set shutdown threshold value, it can just hold Row power-off operation.
It should be appreciated that the characteristic information of vocal print and the shutdown threshold value of content of text of voiceprint can be entered respectively by owner Row setting.
In an embodiment of the present invention, biological characteristic recognition information is voiceprint, and voiceprint is unrelated with text.Also It is to say, when the voiceprint and the voiceprint related with shutdown command of user's input are compared, it is only necessary to compare vocal print Characteristic information, such as the information such as pitch, loudness of a sound, the duration of a sound and tone color, without comparing the content of text of voiceprint, to prevent Owner's trouble unnecessary because caused by forgetting content of text.
In an embodiment of the present invention, biological characteristic recognition information is iris information, due to the stability of iris in itself and Uniqueness speciality, therefore it is provided in an embodiment of the present invention that biological characteristic recognition information is set as into iris information can be improved fully The security of verification method.
In an embodiment of the present invention, biological characteristic recognition information is face feature information, because facial characteristics identifies skill Art has the advantage such as non-imposed, untouchable, therefore the biological characteristic in verification method provided in an embodiment of the present invention is known Other information setting is the security and convenience that face feature information can fully improve verification method.
Fig. 2 show the schematic flow sheet of the verification method of second embodiment of the invention offer.Implement in the present invention first Extend second embodiment of the invention on the basis of example, second embodiment of the invention is essentially identical with first embodiment of the invention, Narration difference, something in common repeat no more emphatically below.As shown in Fig. 2 the authentication that second embodiment of the invention provides Method further comprises after the step 20 of first embodiment:
30:When electronic equipment receives start-up command, generation requires that input is used for the password authentication information of confirmation start Prompting.
It should be appreciated that the password authentication information related to start-up command mentioned in step 30 can be by owner according to reality Situation is freely set.
40:Electronic equipment receives the password authentication information of input, and the password authentication information is verified, if tested Card passes through, then performs start-up command.
When electronic equipment is started shooting for the first time, owner needs the typing password authentication information related to start-up command, so as to Follow-up checking work.
It should be appreciated that when owner or other users want the modification password authentication information related to start-up command, it is necessary to The original password authentication information related to start-up command of input first, with the security of abundant raising modification process, prevent it His user arbitrarily distorts the password authentication information related to start-up command.
It should be appreciated that the password authentication information related to start-up command in the embodiment of the present invention and with shutdown command phase The password authentication information of pass can be different types of password authentication information, such as the password authentication information related to start-up command For iris information, the password authentication information related to shutdown command is finger print information.
In an embodiment of the present invention, the password authentication information related to start-up command and related with shutdown command close Code checking information is same type of password authentication information.
In actual application, when electronic equipment needs to shut down or started shooting, user first clicks on the power supply of electronic equipment Key or other setting buttons are as shutdown or start-up command, when electronic equipment receives shutdown or the start-up command of user, electricity Sub- equipment issues the user with the prompting of the input password authentication information related to shutdown or start-up command, and now user is as requested Input password authentication information, when electronic equipment receive it is above-mentioned with shutting down or during the related password authentication information of start-up command, it is right The password authentication information is verified that if the verification passes, electronic equipment performs the shutdown of user or start-up command is carried out accordingly Shutdown or power-on operation.
The verification method that second embodiment of the invention provides by when receiving shutdown or during start-up command, send input with The password authentication information prompting of shutdown command or start-up command correlation, also, work as and receive and shutdown command or start-up command phase During the password authentication information of pass, the password authentication information is verified, if the verification passes, shutdown command is performed or start refers to The mode of order, the security of the electronic equipments such as mobile phone is further increased, reduce the risk of privacy of user leakage.
In an embodiment of the present invention, the password authentication information received to electronic equipment in step 40 carries out checking bag Include:Receive the password authentication information of input;By the password authentication information of input and the password authentication information related to start-up command It is compared;When the password authentication information of input and the password authentication information similarity related to start-up command reach opening for setting During machine threshold value, power-on operation is performed.
It should be appreciated that start threshold value can be by owner's sets itself, or can be automatically generated by electronic equipment, the embodiment of the present invention This is not construed as limiting.
In an embodiment of the present invention, the password authentication information when input and the password authentication information related to start-up command When matching completely, privacy of user leakage could be reduced by verifying and performing power-on operation, to improve the security of checking Risk.
Fig. 3 show the structural representation of the checking system of third embodiment of the invention offer.It is as shown in figure 3, of the invention The checking system that 3rd embodiment provides includes:
Shutdown information input module 100 is prompted, when receiving shutdown command for electronic equipment, generation requires that input is used for Confirm the prompting of the password authentication information of shutdown;
Shutdown module 200 is performed, the password authentication information of input is received for electronic equipment, and the password authentification is believed Breath is verified, if the verification passes, then performs shutdown command.
In an embodiment of the present invention, performing shutdown module 200 includes:Shutdown information receiving unit, it is defeated for receiving The password authentication information entered;Shutdown information comparing unit, for by the password authentication information of input and related to shutdown command Password authentication information is compared;Shutdown unit is performed, for when the password authentication information and related to shutdown command of input When password authentication information similarity reaches the shutdown threshold value of setting, power-off operation is performed.
Fig. 4 show the structural representation of the checking system of fourth embodiment of the invention offer.Implement in the present invention the 3rd Extend fourth embodiment of the invention on the basis of example, fourth embodiment of the invention is essentially identical with third embodiment of the invention, Narration difference, something in common repeat no more emphatically below.As shown in figure 4, the checking system that fourth embodiment of the invention provides Unite and further comprise after the execution shutdown module 200 of 3rd embodiment:
Boot-strap information input module 300 is prompted, when receiving start-up command for electronic equipment, generation requires that input is used for Confirm the prompting of the password authentication information of start;
Starting module 400 is performed, the password authentication information of input is received for electronic equipment, and the password authentification is believed Breath is verified, if the verification passes, then performs start-up command.
In an embodiment of the present invention, performing starting module 400 includes:Boot-strap information receiving unit, it is defeated for receiving The password authentication information entered;Boot-strap information comparing unit, for by the password authentication information of input and related to start-up command Password authentication information is compared;Start-up unit is performed, for when the password authentication information and related to start-up command of input When password authentication information similarity reaches the start threshold value of setting, power-on operation is performed.
Prompting shutdown information input module 100, execution shutdown module 200, prompting start letter in Fig. 3-4 checking system Input module 300 is ceased, perform starting module 400 and performs shutdown information receiving unit, the shutdown information in shutdown module 200 Comparing unit, perform shutdown unit and perform starting module 400 in boot-strap information receiving unit, boot-strap information comparing unit, The operation and function for performing start-up unit may be referred to above-mentioned Fig. 1-2 and the verification method of extension, in order to avoid repeating, herein not Repeat again.
Fig. 5 show the structural representation of the checking system of fifth embodiment of the invention offer.Fig. 5 checking system is used for Perform the verification method described in Fig. 1-2 embodiment.As shown in figure 5, the checking system includes processor 510, memory 520 With bus 530.
Processor 510, for calling the code stored in memory 520 by bus 530, pass is received with electronic equipment When machine instructs, generation requires that input is used for the prompting for confirming the password authentication information of shutdown;Electronic equipment receives the close of input Code checking information, and the password authentication information is verified, if the verification passes, then perform shutdown command.
In an embodiment of the present invention, a kind of electronic equipment is also provided, the electronic equipment includes any of the above-described embodiment institute The checking system of description.
In an embodiment of the present invention, a kind of terminal is also provided, the terminal includes processor, memory and is stored in storage On device and the proving program that can run on a processor, the proving program realize any of the above-described embodiment when being executed by processor The step of described verification method.The terminal includes but is not limited to the user terminals such as mobile phone, tablet personal computer.
In an embodiment of the present invention, a kind of computer-readable recording medium is also provided, on computer-readable recording medium Proving program is stored with, the proving program realizes the verification method described by any of the above-described embodiment when being executed by processor Step.The computer-readable storage medium can be any tangible media, such as floppy disk, CD-ROM, DVD, even hard disk drive, net Network medium etc..
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, it can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specially Industry technical staff can realize described function using distinct methods to each specific application, but this realization is not It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, can be with Realize by another way.For example, device embodiment described above is only schematical, for example, the unit Division, only a kind of division of logic function, can there is other dividing mode, such as multiple units or component when actually realizing Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or The mutual coupling discussed or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit Close or communicate to connect, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention Within god and principle, any modification for being made, equivalent substitution etc., it should be included in the scope of the protection.

Claims (10)

  1. A kind of 1. verification method, applied to electronic equipment, it is characterised in that including:
    When the electronic equipment receives shutdown command, generation requires carrying for the password authentication information that input is used to confirm shutdown Show;
    The electronic equipment receives the password authentication information of input, and the password authentication information is verified, if checking By then performing the shutdown command.
  2. 2. verification method as claimed in claim 1, it is characterised in that further comprise:
    When the electronic equipment receives start-up command, generation requires carrying for the password authentication information that input is used to confirm start Show;
    The electronic equipment receives the password authentication information of input, and the password authentication information is verified, if checking By then performing the start-up command.
  3. 3. verification method as claimed in claim 1 or 2, it is characterised in that verify, wrap to the password authentication information Include:The password authentication information is contrasted with the password authentication information to prestore, if both matchings, is judged as that checking is logical Cross.
  4. 4. verification method as claimed in claim 1 or 2, it is characterised in that the password authentication information includes defeated at least twice The password authentication information entered.
  5. 5. verification method as claimed in claim 1 or 2, it is characterised in that the password authentication information is numerical ciphers or life Thing feature identification information.
  6. 6. verification method as claimed in claim 5, it is characterised in that the biological characteristic recognition information is finger print information, sound At least one of line information, iris information and face feature information.
  7. A kind of 7. checking system, applied to electronic equipment, it is characterised in that including:
    Shutdown information input module is prompted, when receiving shutdown command for the electronic equipment, it is true that generation requires that input is used for Recognize the prompting of the password authentication information of shutdown;
    Shutdown module is performed, the password authentication information of input is received for the electronic equipment, and to the password authentication information Verified, if the verification passes, then perform the shutdown command.
  8. 8. checking system as claimed in claim 7, it is characterised in that further comprise:
    Boot-strap information input module is prompted, when receiving start-up command for the electronic equipment, it is true that generation requires that input is used for Recognize the prompting of the password authentication information of start;
    Starting module is performed, the password authentication information of input is received for the electronic equipment, and to the password authentication information Verified, if the verification passes, then perform the start-up command.
  9. 9. a kind of terminal, it is characterised in that the terminal includes processor, memory and is stored on the memory and can be The proving program run on the processor, the proving program are realized during the computing device as in claim 1 to 6 The step of verification method described in any one.
  10. 10. a kind of computer-readable recording medium, it is characterised in that checking journey is stored with the computer-readable recording medium Sequence, the step of verification method as any one of claim 1 to 6 is realized when the proving program is executed by processor.
CN201710777034.5A 2017-08-30 2017-08-30 Verification method, checking system and electronic equipment Pending CN107528978A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710777034.5A CN107528978A (en) 2017-08-30 2017-08-30 Verification method, checking system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710777034.5A CN107528978A (en) 2017-08-30 2017-08-30 Verification method, checking system and electronic equipment

Publications (1)

Publication Number Publication Date
CN107528978A true CN107528978A (en) 2017-12-29

Family

ID=60683123

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710777034.5A Pending CN107528978A (en) 2017-08-30 2017-08-30 Verification method, checking system and electronic equipment

Country Status (1)

Country Link
CN (1) CN107528978A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112036861A (en) * 2020-08-31 2020-12-04 深圳市兆珑科技有限公司 Safety device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101382973A (en) * 2007-09-03 2009-03-11 纬创资通股份有限公司 Method for raising information safety for computer system and relevant apparatus thereof
CN103973892A (en) * 2014-05-12 2014-08-06 深圳市威富多媒体有限公司 Method and device for starting and stopping mobile terminal based on voice and face recognition
CN104123514A (en) * 2013-04-26 2014-10-29 腾讯科技(深圳)有限公司 Shutdown validation method and device
CN105701426A (en) * 2014-11-28 2016-06-22 富泰华工业(深圳)有限公司 Electronic device subjected to shutdown protection and shutdown protection system and method
US20160254906A1 (en) * 2013-12-30 2016-09-01 Palantir Technologies Inc. Verifiable redactable audit log

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101382973A (en) * 2007-09-03 2009-03-11 纬创资通股份有限公司 Method for raising information safety for computer system and relevant apparatus thereof
CN104123514A (en) * 2013-04-26 2014-10-29 腾讯科技(深圳)有限公司 Shutdown validation method and device
US20160254906A1 (en) * 2013-12-30 2016-09-01 Palantir Technologies Inc. Verifiable redactable audit log
CN103973892A (en) * 2014-05-12 2014-08-06 深圳市威富多媒体有限公司 Method and device for starting and stopping mobile terminal based on voice and face recognition
CN105701426A (en) * 2014-11-28 2016-06-22 富泰华工业(深圳)有限公司 Electronic device subjected to shutdown protection and shutdown protection system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112036861A (en) * 2020-08-31 2020-12-04 深圳市兆珑科技有限公司 Safety device
CN112036861B (en) * 2020-08-31 2024-05-10 百富计算机技术(深圳)有限公司 Safety equipment

Similar Documents

Publication Publication Date Title
JP5727008B2 (en) Operating system unlocking method and mobile phone
US8396711B2 (en) Voice authentication system and method
CN104104672B (en) The method that dynamic authorization code is established in identity-based certification
US10380591B2 (en) Pro-active identity verification for authentication of transaction initiated via non-voice channel
CN101335619B (en) Authorized using method of disposal dynamic cipher telephone or short message
CN106453205B (en) identity verification method and device
CN102930436A (en) Mobile payment method and device
CN105929974B (en) A kind of Password Input management method and mobile terminal
CN105809007A (en) Privacy protection method and device
CN104104671B (en) Establish the unified dynamic authorization code system of business entity's account
CN106845181A (en) The acquisition methods and electronic equipment of a kind of password
CN106790208A (en) A kind of communication encrypting method and device
CN102025506A (en) User authentication method and device
CN102521169B (en) Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk
CN106156575A (en) A kind of user interface control method and terminal
CN104820805A (en) Method and device for burglary prevention of user identity identification card information
CN104967553A (en) Message interaction method, related device and communication system
CN107846406A (en) A kind of account logon method and device
CN105050061A (en) Method and device for sending messages on the basis of user voiceprint information
CN108647510A (en) Application program access method and device
US11372958B1 (en) Multi-channel authentication using smart cards
CN106453243A (en) Server, terminal and validation method of authorization code of terminal
AU2013205126A1 (en) Facial recognition streamlined login
CN105653918B (en) Method for safely carrying out, safe operating device and terminal
CN108122111B (en) Secure payment method, device, storage medium and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171229

RJ01 Rejection of invention patent application after publication