CN107644155B - verification mode setting method and terminal - Google Patents

verification mode setting method and terminal Download PDF

Info

Publication number
CN107644155B
CN107644155B CN201710790326.2A CN201710790326A CN107644155B CN 107644155 B CN107644155 B CN 107644155B CN 201710790326 A CN201710790326 A CN 201710790326A CN 107644155 B CN107644155 B CN 107644155B
Authority
CN
China
Prior art keywords
verification
user
verification mode
mode
biological characteristics
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710790326.2A
Other languages
Chinese (zh)
Other versions
CN107644155A (en
Inventor
任忠杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201710790326.2A priority Critical patent/CN107644155B/en
Publication of CN107644155A publication Critical patent/CN107644155A/en
Application granted granted Critical
Publication of CN107644155B publication Critical patent/CN107644155B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a method and a terminal for setting a verification mode, wherein the method for setting the verification mode comprises the following steps: acquiring first verification information input by a user, and verifying the first verification information in a first verification mode, wherein the first verification information corresponds to the first verification mode; when the first verification information passes verification, updating the times of passing the user verification in the first verification mode; and when the times reach a preset threshold value, setting the user as the user authenticated through a second authentication mode. According to the invention, when the number of times of successful user verification in the first verification mode reaches the preset threshold value, the user is set as the user which can be verified in the second verification mode, manual setting by the user is not needed, the operation convenience is improved, and the use experience of the user is improved.

Description

Verification mode setting method and terminal
Technical Field
the present invention relates to the field of communications technologies, and in particular, to a method and a terminal for setting a verification mode.
background
Due to the rapid development of mobile phones and the fact that the mobile phones are closely related to daily life, the information security of the mobile phones is a problem that mobile phone manufacturers cannot ignore. Currently, the methods for protecting user information include: various encryption means such as fingerprints, digital passwords, pattern passwords and the like are adopted, but the methods have the defects that the passwords are easy to leak and the safety is low, and in order to improve the safety of mobile phone information, a mode of using a unique mark of a user, namely a human face, as a mobile phone password is provided in the prior art.
The user only needs to input own photos when the mobile phone is used for the first time, and then the mobile phone is started to shoot through the camera at each time and is compared with the stored photos, so that whether the user has the right to use the mobile phone is judged. This function of course allows setting that a plurality of users have the right. However, the traditional way for adding users with unlocking permission is that every time a super-permission user is added, the head portrait needs to be recorded again, all recording processes need to be completed, the setting is successful, and the adding process is very inconvenient.
therefore, in the prior art, each time the authentication mode of one user is set, the user needs to operate all the processes again in person, so that the setting process is very complicated.
Disclosure of Invention
The embodiment of the invention provides a setting method of a verification mode and a terminal, and aims to solve the problem that the setting process of the verification mode in the prior art is complicated.
In a first aspect, an embodiment of the present invention provides a method for setting a verification mode, including:
Acquiring first verification information input by a user, and verifying the first verification information in a first verification mode, wherein the first verification information corresponds to the first verification mode;
When the first verification information passes verification, updating the times of passing the user verification in the first verification mode;
and when the times reach a preset threshold value, setting the user as the user authenticated through a second authentication mode.
In a second aspect, an embodiment of the present invention provides a terminal, including:
The first verification module is used for acquiring first verification information input by a user and verifying the first verification information in a first verification mode, wherein the first verification information corresponds to the first verification mode;
the number updating module is used for updating the number of times of passing the user verification in the first verification mode when the first verification information is verified;
And the verification setting module is used for setting the user as the user verified in the second verification mode when the times reach a preset threshold value.
In a third aspect, an embodiment of the present invention further provides a terminal, including a memory, a processor, and a setting program of a verification mode, which is stored in the memory and is executable on the processor; the processor implements the setting method of the verification mode as described above when executing the setting program of the verification mode.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, on which a setting program of a verification manner is stored, which, when executed by a processor, implements the steps in the setting method of the verification manner as described above.
the embodiment of the invention has the beneficial effects that:
according to the embodiment of the invention, when the number of times of successful user verification through the first verification mode reaches the preset threshold value, the user is set as the user which can be verified through the second verification mode, manual setting by the user is not needed, the operation convenience is improved, and the use experience of the user is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
Fig. 1 is a flowchart illustrating a setting method of a verification mode according to an embodiment of the present invention;
Fig. 2 is a flowchart illustrating a setting method of another authentication method according to an embodiment of the present invention;
fig. 3 is a block diagram of a terminal according to an embodiment of the present invention;
Fig. 4 shows a second block diagram of a terminal according to an embodiment of the present invention;
Fig. 5 is a block diagram illustrating a structure of another terminal according to an embodiment of the present invention;
Fig. 6 is a block diagram of another terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a flowchart of a setting method of an authentication manner according to an embodiment of the present invention is shown, where the terminal may include, for example, a mobile phone, a tablet computer, and the method may include the following steps:
Step 101: the method comprises the steps of obtaining first verification information input by a user, and verifying the first verification information through a first verification mode.
Wherein the first authentication information corresponds to the first authentication manner. The first authentication mode may be key password authentication, and the first authentication information is a key password input by the user.
Step 102: and when the first verification information passes verification, updating the times of passing the user verification in the first verification mode.
the embodiment of the invention judges whether the user needs to be set as the user which can be verified in the second verification mode by recording the times of passing the user verification in the first verification mode. That is, when the user passes the authentication in the first authentication manner in step 101, the number of times that the user passes the authentication in the first authentication manner is increased by one until the number of times that the user passes the authentication in the first authentication manner reaches a preset threshold, and step 103 is executed.
Step 103: and when the times reach a preset threshold value, setting the user as the user authenticated through a second authentication mode.
the first verification mode may be a key password verification mode, and the second verification mode may be a biometric-based verification mode, such as face verification, fingerprint verification, iris verification, and the like. For example, when the first authentication mode is key password authentication and the second authentication mode is face authentication, the owner will inform the user of the key password of the terminal to people very close to the user, so that the user can be a user with face authentication using authority if the user passes the key password authentication.
In the embodiment of the present invention, when the number of times that a certain user is authenticated by the first authentication method reaches a preset threshold, the user may be set as a user having the usage right of the second authentication method. Therefore, according to the embodiment of the invention, the user authority does not need to be manually set by the user, the user with the second verification mode use authority is intelligently set through an intelligent algorithm, and the setting process is simple and convenient.
in addition, through the above steps, after the user is set as the user authenticated by the second authentication method, the user may thereafter be authenticated only by the second authentication method, in which case, even if the user inputs the first authentication information, the user cannot be authenticated.
of course, after the user is set as the user authenticated by the second authentication method, the user may also be authenticated by using the first authentication method and the second authentication method, depending on which authentication method the authentication information of the user input terminal corresponds to. In this case, when the user inputs first authentication information corresponding to the first authentication method on the terminal, the user is authenticated by the first authentication method, and when the user inputs second authentication information corresponding to the second authentication method on the terminal, the user is authenticated by the second authentication method.
Therefore, when the number of times of successful user verification through the first verification mode reaches the preset threshold value, the user is set as the user which can be verified through the second verification mode, manual setting of the user is not needed, convenience of operation is improved, and use experience of the user is improved.
Referring to fig. 2, a flowchart of a setting method of another authentication method provided by an embodiment of the present invention is shown, where the terminal may include, for example, a mobile phone, a tablet computer, and the method may include the following steps:
Step 201: the method comprises the steps of obtaining first verification information input by a user, and verifying the first verification information through a first verification mode.
wherein the first authentication information corresponds to the first authentication manner. The first authentication mode may be key password authentication, and the first authentication information is a key password input by the user.
step 202: and when the first verification information passes verification, updating the times of passing the user verification in the first verification mode.
The embodiment of the invention judges whether the user needs to be set as the user which can be verified in the second verification mode by recording the times of passing the user verification in the first verification mode. That is, when the user passes the authentication in the first authentication manner in step 201, the number of times of the user passing the authentication in the first authentication manner is increased by one until the number of times of the user passing the authentication in the first authentication manner reaches a preset threshold, and step 203 is executed.
step 203: and when the times reach a preset threshold value, acquiring the biological characteristics of the user.
When the number of times that the user passes the first verification mode verification reaches a preset threshold value, the user can be endowed with the use authority of the second verification mode. In the embodiment of the present invention, the second authentication manner is specifically a biometric-based authentication manner. Therefore, when the number of times that the user is authenticated by the first authentication means reaches a preset threshold, the biometric characteristic of the user needs to be acquired. Further, the biological features comprise one or more of face images, fingerprint features and iris features.
Step 204: and storing the biological characteristics of the user in an information base of a second verification mode.
And the user to which the biological characteristics stored in the information base of the second verification mode belong is the user verified through the second verification mode. That is, when the biometric features of the user are stored in the information base of the second authentication means, it indicates that the user is set as a user authenticated by the second authentication means.
in addition, after the biometric feature of the user is stored in the information base of the second authentication method (i.e., after the user is set as a user authenticated by the second authentication method), the user can thereafter be authenticated only by the second authentication method, and in this case, even if the user inputs the first authentication information, the user cannot be authenticated.
of course, after storing the biometric features of the user in the information base of the second authentication manner (i.e. after the user is set as the user authenticated by the second authentication manner), the user may also be authenticated by using the first authentication manner and the second authentication manner, depending on which authentication manner the authentication information of the user input terminal corresponds to. In this case, when the user inputs first authentication information corresponding to the first authentication method on the terminal, the user is authenticated by the first authentication method, and when the user inputs second authentication information corresponding to the second authentication method on the terminal, the user is authenticated by the second authentication method.
For example, when the first authentication mode is key password authentication, the second unlocking mode is a biometric-based authentication mode, and the biometric characteristic is a face image, the owner will inform the user of the key password of the terminal to a person very close to the user, so that the user can be a user with face authentication permission if the user passes the key password authentication.
In addition, in the embodiment of the present invention, when the number of times that a certain user is authenticated by the first authentication method reaches a preset threshold, the user may be set as a user having a usage right of the second authentication method. Therefore, according to the embodiment of the invention, the user authority does not need to be manually set by the user, the user with the second verification mode use authority is intelligently set through an intelligent algorithm, and the setting process is simple and convenient.
Step 205: and acquiring the biological characteristics of a user, and judging whether the biological characteristics matched with the acquired biological characteristics exist in the information base of the second verification mode.
step 206: and if the biological characteristics matched with the acquired biological characteristics exist in the information base of the second verification mode, determining that the user to which the acquired biological characteristics belong passes the verification of the second verification mode.
Step 207: and if the biological characteristics matched with the acquired biological characteristics do not exist in the information base of the second verification mode, determining that the user to which the acquired biological characteristics belong does not pass the verification of the second verification mode.
After a certain user is given a right to use in the second authentication mode through steps 201 to 204, if the user inputs his/her biometric features into the terminal in the subsequent use process of the terminal, the terminal authenticates the user according to the methods of steps 205 to 207.
In the using process of the terminal, there are various scenarios that the user needs to be verified, for example, when the terminal is unlocked, the user needs to be verified. When the embodiment of the invention is applied to terminal unlocking, the first verification mode is key password verification, and the second verification mode is face verification, the specific implementation process is as follows:
when a user inputs a key password in a terminal and unlocks the terminal, the terminal judges whether the key password input by the user is consistent with a preset unlocking password or not, if so, the user passes verification and unlocks the terminal, and updates the times of successful unlocking by the user by using the key password, and when the times of successful unlocking by the user by using the key password reach a preset threshold value, the user is given the authority of utilizing a human face to unlock, namely, a human face image of the user, acquired by the user by using the terminal in the key password unlocking process, is stored in a human face unlocking image library.
When a user who is endowed with the face unlocking permission lifts the terminal and attempts unlocking, the camera of the terminal can automatically shoot the face image of the user, and therefore unlocking is conducted through the shot face image.
As can be seen from the above, in the embodiment of the present invention, when the first verification information input by the user is verified by the first verification method, the number of times that the user is verified by the first verification method is updated, and when the number of times reaches the preset threshold, the user is set as the user who is verified by the second verification method. Therefore, in the embodiment of the invention, when the number of times that a certain user successfully verifies through the first verification mode reaches the preset threshold value, the user is automatically set as the user which can be verified through the second verification mode, and the user does not need to manually re-operate all the setting processes once, so that the setting process is very convenient, and the problem that the setting process is very complicated because the user needs to manually re-operate all the setting processes once every time the verification mode of one user is set in the prior art is solved.
An embodiment of the present invention further provides a terminal, as shown in fig. 3, where the terminal 300 includes:
A first verification module 301, configured to obtain first verification information input by a user, and verify the first verification information in a first verification manner, where the first verification information corresponds to the first verification manner;
a number updating module 302, configured to update the number of times that the user passes the verification in the first verification manner when the first verification information passes the verification;
And the verification setting module 303 is configured to set the user as a user who performs verification in a second verification manner when the number of times reaches a preset threshold value.
Preferably, the second authentication mode is a biometric-based authentication mode; as shown in fig. 4, the verification setting module 303 includes:
A feature acquisition unit 3031 configured to acquire a biometric feature of the user;
A feature storage unit 3032 configured to store the biometric features of the user in an information base of a second authentication method;
And the user to which the biological characteristics stored in the information base of the second verification mode belong is the user verified through the second verification mode.
preferably, as shown in fig. 4, the terminal 300 further includes:
A second verification module 304, configured to obtain a biometric feature of a user, and determine whether a biometric feature matching the obtained biometric feature exists in the information base of the second verification method;
A first determining module 305, configured to determine that a user to which the obtained biometric feature belongs passes verification in the second verification manner when the biometric feature matching the obtained biometric feature exists in the information base in the second verification manner;
A second determining module 306, configured to determine that the user to which the obtained biometric feature belongs fails to pass the verification in the second verification manner when the biometric feature matching the obtained biometric feature does not exist in the information base in the second verification manner.
preferably, the biometric features include one or more of facial images, fingerprint features, and iris features.
As can be seen from the above, in the embodiment of the present invention, the first verification module 301 obtains the first verification information input by the user, and the first verification information is verified in the first verification manner, so that when the first verification information passes verification, the trigger number updating module 302 updates the number of times that the user passes verification in the first verification manner, and further when the number of times reaches the preset threshold, the trigger verification setting module 303 sets the user as the user who passes verification in the second verification manner. Therefore, in the embodiment of the invention, when the number of times that a certain user successfully verifies through the first verification mode reaches the preset threshold value, the user is automatically set as the user which can be verified through the second verification mode, and the user does not need to manually re-operate all the setting processes once, so that the setting process is very convenient, and the problem that the setting process is very complicated because the user needs to manually re-operate all the setting processes once every time the verification mode of one user is set in the prior art is solved.
The embodiment of the invention also provides a terminal, which comprises a memory, a processor and a setting program of a verification mode, wherein the setting program is stored on the memory and can run on the processor; the processor implements the setting method of the verification mode as described above when executing the setting program of the verification mode.
an embodiment of the present invention also provides a computer-readable storage medium on which a setting program of a verification manner is stored, which, when executed by a processor, implements the steps in the setting method of the verification manner as described above.
The embodiment of the invention also provides a terminal, which can be a mobile phone, a tablet computer, a Personal Digital Assistant (PDA), a vehicle-mounted computer or the like. Specifically, as shown in fig. 5, the terminal 500 includes a Radio Frequency (RF) circuit 510, a memory 520, an input unit 530, a display unit 540, a processor 560, an audio circuit 570, a Wi-fi (wireless fidelity) module 580, and a power supply 590.
the input unit 530 may be used to receive numeric or character information input by a user and generate signal inputs related to user settings and function control of the terminal 500, among other things. Specifically, in the embodiment of the present invention, the input unit 530 may include a touch panel 531. The touch panel 531, also called a touch screen, can collect touch operations of a user (for example, operations of the user on the touch panel 531 by using a finger, a stylus pen, or any other suitable object or accessory) thereon or nearby, and drive the corresponding connection device according to a preset program.
alternatively, the touch panel 531 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts it to touch point coordinates, sends it to the processor 560, and can receive and execute commands from the processor 560. In addition, the touch panel 531 may be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 531, the input unit 530 may further include other input devices 532, and the other input devices 532 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
Among other things, the display unit 540 may be used to display information input by the user or information provided to the user and various menu interfaces of the terminal 500. The display unit 540 may include a display panel 541, and optionally, the display panel 541 may be configured in the form of an LCD or an Organic Light-Emitting Diode (OLED), or the like.
It should be noted that the touch panel 531 may overlay the display panel 541 to form a touch display screen, and when the touch display screen detects a touch operation thereon or nearby, the touch display screen is transmitted to the processor 860 to determine the type of the touch event, and then the processor 560 provides a corresponding visual output on the touch display screen according to the type of the touch event.
The touch display screen comprises an application program interface display area and a common control display area. The arrangement modes of the application program interface display area and the common control display area are not limited, and can be an arrangement mode which can distinguish two display areas, such as vertical arrangement, left-right arrangement and the like. The application interface display area may be used to display an interface of an application. Each interface may contain at least one interface element such as an icon and/or widget desktop control for an application. The application interface display area may also be an empty interface that does not contain any content. The common control display area is used for displaying controls with high utilization rate, such as application icons like setting buttons, interface numbers, scroll bars, phone book icons and the like.
the processor 560 is a control center of the terminal 500, connects various parts of the entire cellular phone using various interfaces and lines, and performs various functions of the terminal 500 and processes data by operating or executing software programs and/or modules stored in the first memory 521 and calling data stored in the second memory 522, thereby integrally monitoring the terminal 500. Optionally, processor 560 may include one or more processing units.
In this embodiment of the present invention, the processor 560 may obtain first verification information input by a user, verify the first verification information through a first verification manner, and update the number of times that the user passes the verification of the first verification manner when the first verification information passes the verification, so as to set the user as the user who passes the verification through a second verification manner when the number of times reaches a preset threshold, where the first verification information corresponds to the first verification manner.
preferably, the second authentication mode is a biometric-based authentication mode; when the user is set as a user authenticated by the second authentication method, the processor 560 is specifically configured to:
acquiring a biological characteristic of the user;
Storing the biological characteristics of the user in an information base of a second verification mode;
And the user to which the biological characteristics stored in the information base of the second verification mode belong is the user verified through the second verification mode.
preferably, the processor 560, after storing the biometric characteristic of the user in the information base of the second authentication manner, is further configured to:
acquiring the biological characteristics of a user, and judging whether the biological characteristics matched with the acquired biological characteristics exist in the information base of the second verification mode;
if the biological characteristics matched with the acquired biological characteristics exist in the information base of the second verification mode, determining that the user to which the acquired biological characteristics belong passes the verification of the second verification mode;
And if the biological characteristics matched with the acquired biological characteristics do not exist in the information base of the second verification mode, determining that the user to which the acquired biological characteristics belong does not pass the verification of the second verification mode.
Preferably, the biometric features include one or more of facial images, fingerprint features, and iris features.
the terminal 500 can implement the processes implemented by the terminal in the foregoing embodiments, and in order to avoid repetition, the detailed description is omitted here.
in the terminal 500 of the embodiment of the present invention, when the first verification information input by the user is verified in the first verification manner, the number of times that the user is verified in the first verification manner is updated, and when the number of times reaches the preset threshold value, the user is set as a user who is verified in the second verification manner. Therefore, in the embodiment of the invention, when the number of times that a certain user successfully verifies through the first verification mode reaches the preset threshold value, the user is automatically set as the user which can be verified through the second verification mode, and the user does not need to manually re-operate all the setting processes once, so that the setting process is very convenient, and the problem that the setting process is very complicated because the user needs to manually re-operate all the setting processes once every time the verification mode of one user is set in the prior art is solved.
an embodiment of the present invention further provides a terminal, as shown in fig. 6, where the terminal 600 includes: at least one processor 601, memory 602, at least one network interface 604, other user interfaces 603. The various components in terminal 600 are coupled together by a bus system 605. It is understood that the bus system 605 is used to enable communications among the components. The bus system 605 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 605 in fig. 6.
the user interface 603 may include, among other things, a display, a keyboard, or a pointing device (e.g., a mouse, trackball, touch pad, or touch screen, among others.
It will be appreciated that the memory 602 in embodiments of the invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration, and not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), Enhanced Synchronous SDRAM (ESDRAM), Sync Link DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The memory 602 of the subject systems and methods is intended to comprise, without being limited to, these and any other suitable types of memory.
in some embodiments, memory 602 stores the following elements, executable modules or data structures, or a subset thereof, or an expanded set thereof: an operating system 6021 and application programs 6022.
The operating system 6021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application program 6022 includes various application programs such as a Media Player (Media Player), a Browser (Browser), and the like, and is used to implement various application services. A program implementing the method of an embodiment of the invention can be included in the application program 6022.
In the embodiment of the present invention, the program or the instruction stored in the memory 602 may be called, and specifically, may be a program or an instruction stored in the application program 6022.
In the embodiment of the present invention, the processor 601 may obtain first verification information input by a user, verify the first verification information by using a first verification method, and update the number of times that the user passes the verification of the first verification method when the first verification information passes the verification, so as to set the user as the user who passes the verification by using a second verification method when the number of times reaches a preset threshold, where the first verification information corresponds to the first verification method.
The method disclosed by the above-mentioned embodiment of the present invention can be applied to the processor 601, or implemented by the processor 601. The processor 601 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 601. The Processor 601 may be a general-purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 602, and the processor 601 reads the information in the memory 602 and completes the steps of the method in combination with the hardware thereof.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the processing units may be implemented in one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units configured to perform the functions of the present Application, or a combination thereof.
for a software implementation, the techniques of an embodiment of the invention may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions of the embodiments of the invention. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
Preferably, the second authentication mode is a biometric-based authentication mode; when the user is set as a user authenticated by the second authentication method, the processor 601 is specifically configured to:
Acquiring a biological characteristic of the user;
Storing the biological characteristics of the user in an information base of a second verification mode;
And the user to which the biological characteristics stored in the information base of the second verification mode belong is the user verified through the second verification mode.
Preferably, the processor 601, after storing the biometric characteristic of the user in the information base of the second authentication mode, is further configured to:
acquiring the biological characteristics of a user, and judging whether the biological characteristics matched with the acquired biological characteristics exist in the information base of the second verification mode;
if the biological characteristics matched with the acquired biological characteristics exist in the information base of the second verification mode, determining that the user to which the acquired biological characteristics belong passes the verification of the second verification mode;
And if the biological characteristics matched with the acquired biological characteristics do not exist in the information base of the second verification mode, determining that the user to which the acquired biological characteristics belong does not pass the verification of the second verification mode.
Preferably, the biometric features include one or more of facial images, fingerprint features, and iris features.
The terminal 600 can implement each process implemented by the terminal in the foregoing embodiments, and is not described here again to avoid repetition.
In the terminal 600 of the embodiment of the present invention, when the first verification information input by the user is verified in the first verification manner, the number of times that the user is verified in the first verification manner is updated, and when the number of times reaches the preset threshold value, the user is set as a user who is verified in the second verification manner. Therefore, in the embodiment of the invention, when the number of times that a certain user successfully verifies through the first verification mode reaches the preset threshold value, the user is automatically set as the user which can be verified through the second verification mode, and the user does not need to manually re-operate all the setting processes once, so that the setting process is very convenient, and the problem that the setting process is very complicated because the user needs to manually re-operate all the setting processes once every time the verification mode of one user is set in the prior art is solved.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
it is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
the above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (8)

1. a method for setting a verification mode is characterized by comprising the following steps:
Acquiring first verification information input by a user, and verifying the first verification information in a first verification mode, wherein the first verification information corresponds to the first verification mode;
when the first verification information passes verification, updating the times of passing the user verification in the first verification mode;
When the times reach a preset threshold value, setting the user as a user to be verified in a second verification mode;
The second verification mode is a verification mode based on biological characteristics; the step of setting the user as a user authenticated by a second authentication means includes:
Acquiring a biological characteristic of the user;
storing the biological characteristics of the user in an information base of a second verification mode;
The user to which the biological features stored in the information base of the second verification mode belong is a user verified through the second verification mode;
After the setting of the user as the user authenticated by the second authentication method, the method further includes:
When a user inputs first verification information corresponding to the first verification mode on a terminal, verifying the user by adopting the first verification mode; and when the user inputs second verification information corresponding to the second verification mode on the terminal, verifying the user by adopting the second verification mode.
2. the method of claim 1, wherein after the step of storing the biometric characteristic of the user in the information repository of the second authentication means, the method further comprises:
Acquiring the biological characteristics of a user, and judging whether the biological characteristics matched with the acquired biological characteristics exist in the information base of the second verification mode;
If the biological characteristics matched with the acquired biological characteristics exist in the information base of the second verification mode, determining that the user to which the acquired biological characteristics belong passes the verification of the second verification mode;
And if the biological characteristics matched with the acquired biological characteristics do not exist in the information base of the second verification mode, determining that the user to which the acquired biological characteristics belong does not pass the verification of the second verification mode.
3. The method of any one of claims 1 to 2, wherein the biometric features include one or more of facial images, fingerprint features, and iris features.
4. A terminal, comprising:
the first verification module is used for acquiring first verification information input by a user and verifying the first verification information in a first verification mode, wherein the first verification information corresponds to the first verification mode;
The number updating module is used for updating the number of times of passing the user verification in the first verification mode when the first verification information is verified;
The verification setting module is used for setting the user as the user verified in a second verification mode when the times reach a preset threshold value;
The second verification mode is a verification mode based on biological characteristics; the verification setting module includes:
A feature acquisition unit configured to acquire a biometric feature of the user;
A feature storage unit for storing the biometric feature of the user in an information base of a second authentication method;
The user to which the biological features stored in the information base of the second verification mode belong is a user verified through the second verification mode;
The verification setup module is further to:
when a user inputs first verification information corresponding to the first verification mode on a terminal, verifying the user by adopting the first verification mode; and when the user inputs second verification information corresponding to the second verification mode on the terminal, verifying the user by adopting the second verification mode.
5. the terminal of claim 4, further comprising:
The second verification module is used for acquiring the biological characteristics of a user and judging whether the biological characteristics matched with the acquired biological characteristics exist in the information base of the second verification mode;
the first determining module is used for determining that the user to which the acquired biological characteristics belong passes the verification of the second verification mode when the biological characteristics matched with the acquired biological characteristics exist in the information base of the second verification mode;
And the second determining module is used for determining that the user to which the acquired biological characteristics belong fails to pass the verification of the second verification mode when the biological characteristics matched with the acquired biological characteristics do not exist in the information base of the second verification mode.
6. A terminal according to any of claims 4 to 5, wherein the biometric features comprise one or more of facial images, fingerprint features, iris features.
7. A terminal comprises a memory, a processor and a setting program of a verification mode, wherein the setting program is stored on the memory and can run on the processor; characterized in that the processor implements the setting method of the authentication mode according to any one of claims 1 to 3 when executing the setting program of the authentication mode.
8. A computer-readable storage medium on which a setting program of a verification manner is stored, characterized in that the setting program of the verification manner realizes the steps in the setting method of the verification manner according to any one of claims 1 to 3 when executed by a processor.
CN201710790326.2A 2017-09-05 2017-09-05 verification mode setting method and terminal Active CN107644155B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710790326.2A CN107644155B (en) 2017-09-05 2017-09-05 verification mode setting method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710790326.2A CN107644155B (en) 2017-09-05 2017-09-05 verification mode setting method and terminal

Publications (2)

Publication Number Publication Date
CN107644155A CN107644155A (en) 2018-01-30
CN107644155B true CN107644155B (en) 2019-12-10

Family

ID=61111341

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710790326.2A Active CN107644155B (en) 2017-09-05 2017-09-05 verification mode setting method and terminal

Country Status (1)

Country Link
CN (1) CN107644155B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109344583B (en) * 2018-08-22 2020-10-23 创新先进技术有限公司 Threshold determination and body verification method and device, electronic equipment and storage medium

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010076996A (en) * 2000-01-29 2001-08-17 김덕우 Security method using a plurality of user access codes more than one
CN102841755B (en) * 2012-08-28 2017-07-07 广东欧珀移动通信有限公司 A kind of unlocking method and system of mobile communication terminal
CN103514416A (en) * 2013-10-15 2014-01-15 广东欧珀移动通信有限公司 Dynamic unlocking method and unlocking system for mobile terminal
CN104158665A (en) * 2014-08-25 2014-11-19 小米科技有限责任公司 Method and device of verification
CN104899492A (en) * 2015-05-29 2015-09-09 国家电网公司 Device capable of carrying out fingerprint identification login and replacing password of operating system in fixed time and use method
CN105389566B (en) * 2015-11-13 2018-09-11 广东欧珀移动通信有限公司 Fingerprint identification method, the update method of fingerprint template, device and mobile terminal
CN105893950B (en) * 2016-03-30 2019-04-26 浙江凯迪仕实业有限公司 A kind of adaptive fingerprint identification method and system based on redundancy incorrect order permutation algorithm
CN106021606B (en) * 2016-06-21 2017-11-07 广东欧珀移动通信有限公司 A kind of fingerprint template update method and terminal device
CN105975824A (en) * 2016-07-21 2016-09-28 深圳市金立通信设备有限公司 Method for switching screen unlocking modes and terminal

Also Published As

Publication number Publication date
CN107644155A (en) 2018-01-30

Similar Documents

Publication Publication Date Title
US10523670B2 (en) Devices, systems, and methods for security using magnetic field based identification
EP3514729B1 (en) Implementation of biometric authentication without explicit authentication request from the user
WO2018137448A1 (en) Method for fingerprint recognition of terminal, and mobile terminal
JP6397036B2 (en) Dynamic keyboard and touchscreen biometrics
US20120127179A1 (en) Method, apparatus and computer program product for user interface
US9443071B2 (en) Proximity based device security
TWI514182B (en) Electronic device including finger-operated input device based biometric matching and related methods
US20130007876A1 (en) System and method of providing biometric quick launch
KR20150046766A (en) Unlocking process mehtod, apparatus and device for terminal
CN107959789B (en) Image processing method and mobile terminal
TW201403372A (en) Electronic device including a finger sensor having a valid authentication threshold time period and related methods
EP3122018B1 (en) Mobile terminal and method of controlling the same
EP3699789A1 (en) Method and device for security verification and mobile terminal
CN107229396B (en) Mobile terminal application icon hiding method and mobile terminal
JP2016219869A (en) Information processing device, information processing device control method, and program
CN108475306B (en) User interface for mobile device
CN107480500B (en) Face verification method and mobile terminal
CN106445328B (en) Unlocking method of mobile terminal screen and mobile terminal
CN104008326B (en) Device and method for management terminal safety
CN107370758B (en) Login method and mobile terminal
JP2012133717A (en) Password input authentication device and portable terminal device using the same
CN107103224B (en) Unlocking method and mobile terminal
CN104318186A (en) Code switching method, equipment and terminal
WO2021088272A1 (en) Application protection method, control device, and readable storage medium
EP2634719B1 (en) System and method of providing biometric quick launch

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant