CN107563161A - A kind of user anthority identifying method and equipment based on sliding trajectory - Google Patents
A kind of user anthority identifying method and equipment based on sliding trajectory Download PDFInfo
- Publication number
- CN107563161A CN107563161A CN201710829859.7A CN201710829859A CN107563161A CN 107563161 A CN107563161 A CN 107563161A CN 201710829859 A CN201710829859 A CN 201710829859A CN 107563161 A CN107563161 A CN 107563161A
- Authority
- CN
- China
- Prior art keywords
- ordered sequence
- user
- sliding trajectory
- module
- input module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- User Interface Of Digital Computer (AREA)
Abstract
The present invention provides a kind of user anthority identifying method based on sliding trajectory, including:User produces one group of ordered sequence in input module sliding trajectory, and equipment is according to the ordered sequence compared with the ordered sequence preserved, if comparative result is consistent, the ordered sequence is authenticated passing through;If comparative result is inconsistent, the ordered sequence can not pass through authentication.A kind of subscription authentication equipment based on sliding trajectory, including:Input module, for being supplied to user in the input module sliding trajectory;Acquisition module, user obtain the ordered sequence of armed state caused by sliding trajectory;Memory module, for preserving the key for the user having had permission, i.e. ordered sequence;Processing module, for the ordered sequence according to the armed state, compared with the ordered sequence of memory module.The present embodiment makes the key input mode of user become quick, efficient, operating experience is good by the way that a string of dry character strings are replaced with the track of a visualization.
Description
Technical field
The present invention relates to smart machine field, more particularly to user anthority identifying method and equipment based on sliding trajectory.
Background technology
Password differentiates occurred for a long time as a kind of user right.Even so, it is widely used now
Smart lock still use a kind of mode that password differentiates as authority.
However, password is a string of uninteresting character strings, it is unfavorable for very much safety in short-term when password is set, and password setting is oversize
Too complicated and be often difficult to remember, especially current numerous systems require the password of certain complexity, hold such password
An often burden.
The content of the invention
In consideration of it, the present invention provides a kind of user anthority identifying method based on sliding trajectory, including:
User produces one group of ordered sequence in input module sliding trajectory, and equipment is orderly with preserving according to the ordered sequence
Ordered series of numbers compares, if comparative result is consistent, the ordered sequence is authenticated passing through;It is described if comparative result is inconsistent
Ordered sequence can not pass through authentication.
A kind of subscription authentication equipment based on sliding trajectory, including:
Input module, for being supplied to user in the input module sliding trajectory;
Acquisition module, for obtaining the ordered sequence of armed state caused by sliding trajectory;
Memory module, for preserving the key for the user having had permission, the key is ordered sequence;
Processing module, for the ordered sequence according to the armed state, compared with the ordered sequence of memory module.
The present embodiment makes that user's is close by the way that a string dry character strings are replaced with the track of a visualization
Key input mode becomes quick, efficient, and operating experience is good.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the flow chart of embodiments of the invention one.
Fig. 2 is the flow chart of embodiments of the invention two.
Fig. 3 is the irregular matrix of multiple sample collection points composition of the present invention.
Fig. 4 is the sliding trajectory explanation figure of the present invention.
Fig. 5 is the explanation figure of circular trace 1 of the present invention.
Fig. 6 is the explanation figure of circular trace 2 of the present invention.
Fig. 7 is the structural representation of the embodiment one of the equipment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
Password differentiates occurred for a long time as a kind of user right.Even so, it is widely used now
Smart lock still use a kind of mode that password differentiates as authority.
However, password is a string of uninteresting character strings, it is unfavorable for very much safety in short-term when password is set, and password setting is oversize
Too complicated and be often difficult to remember, especially current numerous systems require the password of certain complexity, hold such password
An often burden.
Remember a string of dry character strings with it, people can be usually transformed into by character string information daily to be easy to remember
Shape firmly or pattern, to strengthen memory.
Embodiment one
Fig. 1 is the flow chart of embodiments of the invention, and method and step includes:
Step 101, the sliding trajectory for obtaining input module armed state.
For example, the input module includes 1 sample collection points, and these sample collection points composition is irregular
Matrix, each sample collection point of internal matrix has the unique ID for identifying the sample collection point.The input module
It can be touch-screen, can be touch sensible key-press module, can be mechanical compression formula key-press module etc., those skilled in the art
The module of information input can be realized in any manner, and here is omitted.
Sliding trajectory is the burst of data that user generates in a series of sample collection points of input module touch-control, the data
Sequentially sequence forms one group of ordered sequence, and i.e. represent the user slides rail to the ordered sequence on input module
Mark.
For example, if Fig. 3 input modules are that 11 sample collection points form an irregular matrix, each sample
There is the ID of unique mark itself collection point, is a, b, c, d, e, f, g, h, i, j and k respectively.
Such as Fig. 4, user slides on the input module surface, and first sample collection point of touch-control is h, thereafter touch-control successively
K, d, e, f, k, j, i, h sample collection point, finally terminate in g sample collections point, then, input module collects this sliding trajectory
Caused ordered sequence hkdefkjihg.
It is worth noting that, the sliding trajectory of the present invention is different with sliding figure, in fact, sliding trajectory includes
Slide figure.For example, as shown in figure 5, sliding abcja generates circular trace 1, its figure is circle 1, as shown in fig. 6, sliding
Abcjabcja generates circular trace 2, and its figure is circle 2.It is obvious that the ordered sequence of circular trace 1 is abcja, it is circular
The ordered sequence of track 2 is abcjabcja, so circular trace 1 and circular trace 2 are two different tracks, but
On planar graph, circle 1 and circular 2 be as.
Step 102, the ordered sequence according to caused by the sliding trajectory, compared with the data of memory module.
The ordered sequence is exactly the key for representing the user, according to what is preserved on the ordered sequence and memory module
Ordered sequence compares, if comparative result is consistent, shows that the ordered sequence is authenticated by the user for sliding the track
It is authenticated passing through;If comparative result is inconsistent, show that the ordered sequence is not previously stored, it is impossible to by authenticating, i.e.,
The user for sliding the track can not pass through authentication.
Embodiment two
The ordered sequence preserved in memory module is mentioned in above-described embodiment, is, its flow increased by the user having permission
Such as Fig. 2:
Step 201, keeper start increase user function.
When keeper starts increase user function, input module begins preparing for gathering the track that user will slide.
Step 202, the sliding trajectory for obtaining input module armed state.
As described in detail, user produces ordered sequence, the ordered sequence in input module sliding trajectory
Represent the sliding trajectory.
Step 203, the ordered sequence according to caused by the sliding trajectory, the ordered sequence is stored in storage mould
Block.
User ordered sequence caused by sliding trajectory on input module, exactly represent the key of the user.If
After the ordered sequence is stored in memory module, indicate that the user successfully adds, hereafter the user slides phase
With track when, caused ordered sequence will be compared with the ordered sequence kept, it is clear that will authenticate logical
Cross.
Obviously, the present embodiment can be assigned by program and be stored in storage medium completely.
Fig. 7 is the structural representation of present device embodiment one, as shown in fig. 7, the equipment of the present embodiment can include:
Input module 701, acquisition module 702, processing module 703 and memory module 704, wherein, user slides in input module 701
Track and produce one group of ordered sequence, acquisition module 702 be used for obtain in armed state the ordered sequence;Store mould
Block 704 preserves the ordered sequence of increased user, that is, represents the key of the user;Processing module 703 has according to described
Ordinal series is compared with the ordered sequence that memory module 704 preserves, if comparative result is consistent, shows that the ordered sequence is authenticated
Pass through;If comparative result is inconsistent, show that the ordered sequence can not pass through authentication.
The equipment of the present embodiment can be the arbitrary equipment with touch-sensitive panel, such as smart lock, PC etc.;Can be machinery
The arbitrary equipment of push type button, such as smart lock, PC etc.;Can be mobile with the existing arbitrary equipment with screen display, such as PC
Terminal, PSP, MP4 etc..The equipment of the present embodiment, when user's sliding trajectory inputs key, it can experience quickly, efficiently,
Happy operating experience.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained
Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.
Claims (4)
- A kind of 1. user anthority identifying method based on sliding trajectory, it is characterised in that including:1 sample collection points form irregular matrix;Each sample collection point of internal matrix has the unique ID for identifying the sample collection point;One group of ordered sequence is produced by the sample collection point of the matrix;According to the ordered sequence, compared with the ordered sequence to prestore, if comparative result is consistent, the ordered sequence is reflected Power passes through;If comparative result is inconsistent, the ordered sequence can not pass through authentication.
- 2. the user anthority identifying method according to claim 1 based on sliding trajectory, it is characterised in that including:The irregular matrix, can form one-dimensional line segment, can be two dimension arbitrary shape or three-dimensional it is any Shape.
- 3. the user anthority identifying method based on sliding trajectory according to claim 1~2 any claim, its feature exist In, including:The ordered sequence to prestore, it can be increased by the operator having permission and be stored in storage medium;Or,It can be assigned by program and be stored in storage medium.
- A kind of 4. subscription authentication equipment based on sliding trajectory, it is characterised in that including:Input module, for being supplied to user in the input module sliding trajectory;Acquisition module, for obtaining the ordered sequence of armed state caused by sliding trajectory;Memory module, for preserving the key for the user having had permission, the key is ordered sequence;Processing module, for the ordered sequence according to the armed state, compared with the ordered sequence of memory module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710829859.7A CN107563161A (en) | 2017-09-15 | 2017-09-15 | A kind of user anthority identifying method and equipment based on sliding trajectory |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710829859.7A CN107563161A (en) | 2017-09-15 | 2017-09-15 | A kind of user anthority identifying method and equipment based on sliding trajectory |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107563161A true CN107563161A (en) | 2018-01-09 |
Family
ID=60980952
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710829859.7A Pending CN107563161A (en) | 2017-09-15 | 2017-09-15 | A kind of user anthority identifying method and equipment based on sliding trajectory |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107563161A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2458525A1 (en) * | 2010-11-29 | 2012-05-30 | Research In Motion Limited | Multiple-input device lock and unlock |
CN104461356A (en) * | 2014-11-17 | 2015-03-25 | 深圳市中兴移动通信有限公司 | Unlocking method, device and terminal |
CN104536686A (en) * | 2014-12-23 | 2015-04-22 | 北京元心科技有限公司 | Screen unlocking method and device |
CN105184141A (en) * | 2015-07-30 | 2015-12-23 | 广东欧珀移动通信有限公司 | Unlocking method and apparatus, and mobile terminal |
-
2017
- 2017-09-15 CN CN201710829859.7A patent/CN107563161A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2458525A1 (en) * | 2010-11-29 | 2012-05-30 | Research In Motion Limited | Multiple-input device lock and unlock |
CN104461356A (en) * | 2014-11-17 | 2015-03-25 | 深圳市中兴移动通信有限公司 | Unlocking method, device and terminal |
CN104536686A (en) * | 2014-12-23 | 2015-04-22 | 北京元心科技有限公司 | Screen unlocking method and device |
CN105184141A (en) * | 2015-07-30 | 2015-12-23 | 广东欧珀移动通信有限公司 | Unlocking method and apparatus, and mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20130229367A1 (en) | Dynamic Patterns for Mobile Device Authentication | |
CN104951687A (en) | Method and system of unlocking through fingerprint | |
CN104036177A (en) | Intelligent terminal fingerprint unlocking device and method | |
CN103366107A (en) | Method, device and mobile phone for protecting access permission of application program | |
CN102281539A (en) | Mobile terminal and application program login method thereof | |
US20160092669A1 (en) | Authentication processing device for performing authentication processing | |
CN109962908B (en) | Rights management method, device, equipment and storage medium based on token | |
CN109150509A (en) | A kind of equipment method for unlocking, device, terminal device and medium | |
CN104991716A (en) | Mobile terminal unlocking method and apparatus | |
CN103514388B (en) | Graphic password trajectory setting system | |
CN105549826A (en) | Mobile terminal and locking method of slide page thereof | |
CN105550627A (en) | Fingerprint verification method and apparatus | |
CN105094652A (en) | Touch screen unlocking method and device, electronic equipment, display and mobile terminal | |
CN105426729A (en) | Information processing method and electronic equipment | |
CN107563161A (en) | A kind of user anthority identifying method and equipment based on sliding trajectory | |
CN105656873A (en) | Access control method and device | |
CN105590044A (en) | Information authentication method and apparatus | |
CN108572779A (en) | A kind of combination gesture authentication method, system and mobile terminal | |
CN105138220B (en) | A kind of pattern unlocking method and device | |
CN107247558A (en) | A kind of terminal control method, device, computer installation and readable storage medium storing program for executing | |
CN105893805A (en) | Terminal display screen unlocking method and mobile terminal | |
CN105791529A (en) | Mobile terminal and control method thereof | |
CN104809385A (en) | Operation method of safety protection equipment, mobile terminal and safety protection equipment | |
CN104461266A (en) | Screen unlock method, screen unlock device and electronic equipment | |
CN109376516A (en) | More fingerprint typings and authentication method, device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180109 |