CN107749844A - Auth method and mobile terminal - Google Patents

Auth method and mobile terminal Download PDF

Info

Publication number
CN107749844A
CN107749844A CN201710957727.2A CN201710957727A CN107749844A CN 107749844 A CN107749844 A CN 107749844A CN 201710957727 A CN201710957727 A CN 201710957727A CN 107749844 A CN107749844 A CN 107749844A
Authority
CN
China
Prior art keywords
authentication
user
mobile terminal
information
class
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710957727.2A
Other languages
Chinese (zh)
Inventor
赵飞华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201710957727.2A priority Critical patent/CN107749844A/en
Publication of CN107749844A publication Critical patent/CN107749844A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

The purpose of the embodiment of the present invention is to provide a kind of auth method and mobile terminal, and wherein method includes:Obtain the authentication request of user;Safety detection is carried out to the application scenarios of the authentication request, obtains testing result;It is determined that the authentication mode to match with the testing result, and authentication is carried out to the user according to the authentication mode of determination.By the auth method and mobile terminal in the embodiment of the present invention, the problem of existing auth method flexibility is poor can solve the problem that.

Description

Auth method and mobile terminal
Technical field
The application is related to subscriber authentication field, more particularly to a kind of auth method and mobile terminal.
Background technology
With the development of Internet technology, user can realize by internet and more and more operate, such as purchase commodity, Handle on line certificate etc..User performs various operations by internet, greatly facilitates user's life, improves user Life convenience.
In the prior art, when user performs various operations, such as unlocks mobile terminal or network payment, generally use refers to Line or password authentification mode carry out authentication, inventor has found that existing authentication mode is more fixed, lead to The fingerprint or password identification that often simply user pre-sets, therefore existing authentication mode flexibility is poor.
The content of the invention
The purpose of the embodiment of the present invention is to provide a kind of auth method and mobile terminal, is tested with solving existing identity The problem of card method flexibility is poor.
In order to solve the above technical problems, what the embodiment of the present invention was realized in:
In a first aspect, the embodiments of the invention provide a kind of auth method, including:
Obtain the authentication request of user;
Safety detection is carried out to the application scenarios of the authentication request, obtains testing result;
It is determined that the authentication mode to match with the testing result, and according to the authentication mode pair of determination The user carries out authentication.
Second aspect, the embodiments of the invention provide a kind of mobile terminal, including:
Acquisition request module, for obtaining the authentication request of user;
Detection module, for carrying out safety detection to the application scenarios of the authentication request, obtain testing result;
Authentication module, for the authentication mode for determining to match with the testing result, and according to determination The authentication mode carries out authentication to the user.
The third aspect, the embodiments of the invention provide a kind of mobile terminal, including:Memory, processor and it is stored in institute The computer program that can be run on memory and on the processor is stated, when the computer program is by the computing device The step of realizing the auth method as described in above-mentioned first aspect.
Fourth aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage Computer program is stored with medium, the body as described in above-mentioned first aspect is realized when the computer program is executed by processor The step of part verification method.
By the auth method and mobile terminal in the present embodiment, the application scenarios of authentication request can be entered Row safety detection, and the authentication mode for determining to match with testing result is verified to user, therefore the present embodiment In auth method can flexibly determine authentication mode according to application scenarios, flexibility is high, existing so as to solve The problem of auth method flexibility is poor;Using the safety detection result of the application scenarios of authentication request as determination The foundation of authentication mode, it can more improve the rigorous of authentication to determine that authentication mode provides sufficient authority Property and reliability.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments described in application, for those of ordinary skill in the art, do not paying the premise of creative labor Under, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet for the auth method that the embodiment of the application one provides;
Fig. 2 is the schematic flow sheet for the auth method that another embodiment of the application provides;
Fig. 3 is the schematic flow sheet for the auth method that the another embodiment of the application provides;
Fig. 4 is the module composition schematic diagram for the mobile terminal that the embodiment of the application one provides;
Fig. 5 is the structural representation for the mobile terminal that the embodiment of the application one provides.
Embodiment
In order that those skilled in the art more fully understand the technical scheme in the application, below in conjunction with of the invention real The accompanying drawing in example is applied, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described implementation Example only some embodiments of the present application, rather than whole embodiments.It is common based on the embodiment in the application, this area The every other embodiment that technical staff is obtained under the premise of creative work is not made, it should all belong to the application protection Scope.
The thought of the embodiment of the present invention is, in user's requests verification identity, to the application scenarios of authentication request Safety detection is carried out, obtains testing result, it is determined that the authentication mode to match with the testing result, and according to determination Authentication mode carries out authentication to user, so as to flexibly determine authentication according to the application scenarios of authentication request Mode, solve the problems, such as that existing auth method flexibility is poor.
Based on above thought, the embodiments of the invention provide a kind of auth method, a kind of mobile terminal and a kind of meter Calculation machine readable storage medium storing program for executing, wherein, auth method is applied to mobile terminal, can be performed by mobile terminal, separately below It is described in detail.
Fig. 1 is the schematic flow sheet for the auth method that the embodiment of the application one provides, as shown in figure 1, this method bag Include following steps:
Step 102, the authentication request of user is obtained.
Such as user using mobile terminal carry out delivery operation during, mobile terminal display reminding information, to carry Showing user needs to verify its identity before paying, user click on " it is determined that " button to agree to verify its identity after, mobile terminal according to The operation generates authentication request, and obtains the authentication request.
Step 104, safety detection is carried out to the application scenarios of authentication request, obtains testing result.
Acquisition for mobile terminal carries out security to after the authentication request of user to the application scenarios of authentication request Detection, obtains testing result.Wherein, the application scenarios of authentication request are carried out safety detection can from the following aspect in One or more considerations:The security of the authentication environment of user, the security of mobile terminal operating system, mobile terminal The abnormal conditions of history authentication record, and the risk situation of checking scene corresponding to authentication request.Authentication Checking scene refers to application program corresponding to authentication request corresponding to request, what the risk situation of the checking scene referred to It is whether corresponding application program is related to financial transaction, and the risk situation for the financial transaction being related to.
Step 106, it is determined that the authentication mode to match with above-mentioned testing result, and according to the authentication side of determination Formula carries out authentication to user.
Such as in alternative a variety of authentication modes, it is determined that the authentication side to match with above-mentioned testing result Formula, and authentication is carried out to user according to the authentication mode of determination.
In the embodiment of the present invention, the authentication request of user is obtained, the application scenarios of authentication request are pacified Full property detection, obtains testing result, it is determined that the authentication mode to match with the testing result, and tested according to the identity of determination Card mode carries out authentication to user.By the auth method in the present embodiment, authentication request can be answered Safety detection is carried out with scene, and the authentication mode for determining to match with testing result is verified to user, therefore Auth method in the present embodiment can flexibly determine authentication mode according to application scenarios, and flexibility is high, so as to solve The problem of certainly existing auth method flexibility is poor;By the safety detection result of the application scenarios of authentication request As the foundation for determining authentication mode, it can more improve identity for determining that authentication mode provides sufficient authority and test The preciseness and reliability of card.
In above-mentioned steps 104, the authentication environment to user carries out one kind in safety detection, including in the following manner It is or a variety of:
(1) safe class of the authentication environment of user is determined;
(2) safe class of the operating system of mobile terminal is determined;
(3) exception level of the history authentication record of mobile terminal is determined;
(4) risk class of checking scene corresponding to authentication request is determined.
Specifically, in mode (1), the information collection function of mobile terminal can be utilized, obtains information and the user of user The information of residing environment, the information of user include the image information of user and/or the audio-frequency information of user, the ring residing for user The information in border includes one or more in following information:Residing for location information, user residing for current time information, user The audio-frequency information of environment residing for the image information of environment, user;Then, environment according to residing for the information of user and user Information, determine the safe class of the authentication environment of user.
In mode (1), using the information collection function of mobile terminal, the information of user, Ke Yiwei are obtained:Mobile terminal opens Dynamic front camera and/or preceding microphone are (because front camera and preceding microphone are towards user side, therefore before startup Put camera and/or preceding microphone), to obtain the audio-frequency information of the image information of user and/or user.Here it is possible to only The image information of user is obtained, the audio-frequency information of user is either only obtained or obtains the image information and audio-frequency information of user, The specific content that obtains can implement demand determination according to scheme.
With the information of the environment residing for user including residing for the location information residing for current time information, user, user Exemplified by the audio-frequency information of the image information of environment and the environment residing for user, in mode (1), the information gathering of mobile terminal is utilized Function, obtain the information of the environment residing for user, Ke Yiwei:The temporal information of mobile terminal is obtained, as current time information, Mobile terminal positions to self-position, starts rearmounted using positioning result as the location information residing for user, mobile terminal Camera and rear microphone, to obtain the image information of the environment residing for user and audio-frequency information.Wherein, positioning can be GPS (Global Positioning System, global positioning system) is positioned or AGPS (Assisted Global Positioning System, auxiliary global satellite positioning system) positioning.
In mode (1), the information of the environment according to residing for the information of user and user, the authentication environment of user is determined Safe class, Ke Yishi, identify user information and user residing for environment the unsafe factor that has of information, and according to The unsafe factor recognized, determine the safe class of the authentication environment of user.Residing for the information of user and user It in the information of environment, can be identified, for the possible influential factor of safety of user, can be classified as dangerous Factor.Unsafe factor includes but is not limited to:Current time is dangerous time (such as three or four points of morning) occurred frequently, the ground residing for user Point is dangerous place (such as waste and old factory, suburb) occurred frequently, and the image information of user includes the dangerous goods such as controlled knife, user Image information in mood, the image information of user such as the with one's eyes tight shut, facial pain of user include gaging somebody, seal mouth, wound etc. Information, in the audio-frequency information of user comprising threatening speech, threaten speech, cry, the environment residing for user includes masked, an ancient type of spoon The dangerous informations such as head, gun, rope, discarded building site, the environment residing for user such as include cry, threat, threaten, curse and beat at the sound Sound.Above-mentioned danger time occurred frequently and dangerous place occurred frequently can determine to obtain based on backstage big data, such as, statistics is each over the years It is the crime place of class criminal case and crime time, incident frequency is higher, place or location category higher than predetermined incident frequency Type, it is defined as dangerous place occurred frequently, incident frequency is higher, higher than the time of predetermined incident frequency, when being defined as dangerous occurred frequently Between.
In the present embodiment, unsafe factor possessed by the information of user and its residing environment and user can be set Corresponding relation between the safe class of authentication environment, and according to the corresponding relation, determine the authentication environment of user Safe class, such as, when there is some unsafe factors in the information of user and its residing environment, determine the identity of user The safe class of verification environment is lowest level.If in the information of user and its residing environment without it is any it is dangerous because Element, it is determined that the safe class of the authentication environment of user is highest level.
Citing, after the authentication request of user is got, starts the front camera of mobile terminal and preposition Mike Wind, the image information of user and the audio-frequency information of user are obtained, start the rear camera of mobile terminal and rear microphone, obtain The image information and audio-frequency information of the environment residing for family are taken, and the temporal information for obtaining mobile terminal is believed as current time Breath, mobile terminal positions to self-position, using positioning result as the location information residing for user;Identify the image of user Information, the audio-frequency information of user, the image information of environment residing for user, environment residing for user audio-frequency information, it is current when Between unsafe factor in information, the location information residing for user, obtain 3 points of morning, waste and old workshop, rope, masked and cry and shout Sound, then according to the corresponding relation between the safe class of predetermined unsafe factor and the authentication environment of user, it is determined that with The safe class of the authentication environment at family is lowest level.
Pass-through mode (1), the information of the environment residing for information and user based on user, it can all-sidedly and accurately determine to use The safe class of the authentication environment at family, so as to for determination authentication request application scenarios security provide accurately according to According to.
In aforesaid way (2), the operation system information of mobile terminal can be obtained, is calculated according to operating system integrity detection Method carries out integrity analysis to operation system information, according to integrity analysis result, determines the peace of the operating system of mobile terminal Congruent level.Wherein, integrity analysis, Ke Yiwei, root are carried out to operation system information according to operating system integrity detection algorithm Determine to lack item corresponding to operating system according to operating system integrity detection algorithm, wherein, missing item is broken including operating system The software that solution, operating system carry is replaced, the authentication module that operating system carries is replaced with and other are with operation The related project of integrality of uniting.
In a kind of mode, the algorithm of any one detection operating system integrality can be used, according to the behaviour of mobile terminal Make system information, determine missing item corresponding to the operating system of mobile terminal, the quantity of statistics missing item, and preset operating system Corresponding relation between the quantity of corresponding missing item and the safe class of operating system, so as to according to the corresponding relation and statistics Missing item quantity, determine the safe class of the operating system of mobile terminal, such as when the quantity of missing item is 0, operation system The safe class of system is highest level, and when being less than or equal to the first quantity more than 0, the safe class of operating system is intermediate level, When being less than or equal to the second quantity more than the first quantity, the safe class of operating system is lowest level.
In another way, the algorithm of any one detection operating system integrality can be used, according to mobile terminal Operation system information, missing item corresponding to the operating system of mobile terminal is determined, and it is pre- according to the significance level of each missing item The weight of each missing item of first setting, count weight that item is all lacked corresponding to the operating system of mobile terminal and, according to this Weight and and it is default missing weight and operating system safe class between corresponding relation, determine the operation of mobile terminal The safe class of system, for example, missing item weight and for 0 when, the safe class of operating system is highest level, is less than more than 0 During equal to the first value, the safe class of operating system is intermediate level, when being less than or equal to second value more than the first value, operating system Safe class be lowest level.
Pass-through mode (2), by the integrality of mobile terminal include determine matching authentication mode foundation factor it One, can it is determined that matching authentication mode when, it is contemplated that mobile terminal operating system it is imperfect, tested to user identity The potential risk brought is demonstrate,proved, improves the reliability of authentication.
In aforesaid way (3), the history authentication in distance of mobile terminal current time predetermined amount of time can be obtained Record, frequency and the result are verified according to corresponding to history authentication record, determines the history authentication of mobile terminal The exception level of record.Wherein, the result can be the ratio being proved to be successful.
In mode (3), predetermined amount of time can be the period set according to demand such as 5 days or 3 days, or two Hour, the period such as hour.Frequency and the result are verified according to corresponding to history authentication record, it is determined that mobile whole The exception level of the history authentication record at end, Ke Yiwei, according to the numerical values recited of checking frequency and the ratio being proved to be successful Numerical values recited, determine mobile terminal history authentication record exception level.
When identity is often verified in view of user, due to commonly using checking password or checking password, the checking of user into The ratio of work(should be larger, and during the less checking user identity of user, due to forgetting to verify the reason such as password, user's is proved to be successful Ratio can be preset with multiple checking frequency bands with relatively low, therefore in the present embodiment, and set in each checking frequency band, no It is as shown in table 1 below with exception level corresponding to the proportion being proved to be successful.
Table 1
Frequency and the numerical values recited of the result are verified according to corresponding to above-mentioned table 1 and history authentication record, just The exception level of the history authentication record of mobile terminal can be determined.It should be noted that above-mentioned table 1 is simply according to checking Frequency and the numerical values recited of the result determine one in the proof rule of the exception level institute foundation of history authentication record Kind, the limitation to proof rule is not indicated that, other can determine history body according to the numerical values recited of checking frequency and the result The proof rule of the exception level of part checking record is no longer illustrated here.
Pass-through mode (3), determine mobile terminal history authentication record exception level, can it is determined that matching During authentication mode, it is contemplated that potential risk corresponding to the history authentication record of mobile terminal so that authentication Cheng Gengwei precise and reliables.
In another embodiment, in mode (3), history authentication record can also be chosen from historical operation record The checking foundation of corresponding authentication every time, such as fingerprint, password, and whether the checking foundation for detecting each checking is consistent, If the checking of each checking is according to inconsistent, it is determined that the history authentication record that user performs for its mobile terminal Exception level is the superlative degree, so as to pretend to be user to carry out the situation of authentication in view of once someone, determines history body comprehensively The exception level of part checking record.
In aforesaid way (4), the risk class of checking scene corresponding to authentication request, Ke Yiwei are determined:Judge body Whether application program corresponding to part checking request is financial class application;If so, the financial amount being then related to based on financial class application, Determine the risk class of checking scene corresponding to authentication request.
Specifically, first determine whether application program corresponding to authentication request is financial class application, namely judge to need Whether the application program for verifying user identity is financial class application, if not (such as unlocking screen program), it is determined that identity is tested The risk class of checking scene is lowermost level corresponding to card request, if so, the financial amount being then related to according to the financial class application, Determine the risk class of checking scene corresponding to authentication request.Wherein, the financial amount that financial class application is related to can be User needs the financial amount having in the bank account of the financial amount or user paid or is to be based on user's reference The maximum financial amount of user, apply relevant financial amount with the financial class, can serve as what the financial class application was related to Financial amount.
The corresponding relation between financial amount and risk class can be preset, based on the corresponding relation, according to the financial class Using the financial amount being related to, the risk class of checking scene corresponding to authentication request is determined, such as, financial amount is the Between one financial amount and the second financial amount, risk class is determined as the superlative degree, financial amount is in the second financial amount and the Between three financial amounts, it is intergrade to determine risk class, and financial amount is less than the 3rd financial amount, determines risk class for most It is rudimentary.
Whether pass-through mode (4), application program corresponding to identity-based checking request are financial class application, determine that identity is tested The risk class of checking scene, can be distinguished to financial class scene and non-financial class scene, so as to be directed to corresponding to card request Different scenes implement the authentication mode to match, improve flexibility and the reliability of authentication.
In the embodiment of the present invention, the above (1) is included extremely to the application scenarios progress safety detection of authentication request One or more in (4) four kinds of modes, therefore, after the one or more in performing the above (1) to (4), it is necessary to according to To implementing result determine testing result, the execution knot obtained after the one or more that will can be performed in the above (1) to (4) Fruit, include the safe class of the authentication environment of user, the behaviour of mobile terminal collectively as testing result, namely testing result Make the safe class of system, the corresponding checking of exception level, authentication request that the history authentication of mobile terminal records One or more of risk class of scene.
In the embodiment of the present invention, the peace of safe class, the operating system of mobile terminal from the authentication environment of user Congruent level, mobile terminal history authentication record exception level, the risk of checking scene corresponding to authentication request Four aspects of grade determine the security of the application scenarios of authentication request, and Consideration is comprehensive, can accurately determine identity The security of the application scenarios of checking request, so as to the application scenarios for different authentication requests, implement what is matched Authentication mode, improve the preciseness and reliability of authentication.
In a kind of specific embodiment, after the authentication request of user is got by step 102, in step In 104, first according to mode (4) to verifying that the risk class of scene detects corresponding to authentication request, it is determined that testing After the risk class for demonstrate,proving scene, the one or more in aforesaid way (1) (2) (3) are selected according to the risk class of checking scene Perform, such as, it is determined that the risk class of checking scene is the superlative degree, then whole execution in aforesaid way (1) (2) (3) are selected, It is determined that the risk class of checking scene is intergrade, then two kinds of execution in aforesaid way (1) (2) (3) are selected, it is determined that checking scene Risk class be lowermost level, then select it is a kind of in aforesaid way (1) (2) (3) perform, so as to targetedly to authentication The application scenarios of request carry out safety detection, detection efficiency are improved, so as to improve authentication efficiency.
In above-mentioned steps 106, it is determined that the authentication mode to match with the testing result of step 104, and according to determination Authentication mode to user carry out authentication, be specially:According to the testing result of step 104, in authentication to be selected One or more authentication modes are chosen in mode, and the certificate parameter of the authentication mode of selection is set, according to setting Authentication mode afterwards, authentication is carried out to user.Wherein, authentication mode to be selected includes:Recognition of face, iris are known Not, fingerprint recognition and password identification, matching degree threshold value when certificate parameter includes being verified, or including data acquisition Precision and matching degree threshold value when being verified.
For recognition of face, iris recognition, fingerprint recognition and password identification, two important certificate parameters are respectively provided with: Accuracy of data acquisition and matching degree threshold value when being verified, in some need to gather the authentication mode of image, data Acquisition precision refers to data acquisition resolution ratio.Accuracy of data acquisition is higher, then data acquisition amount is bigger, the authentication degree of accuracy It is higher, but because data acquisition amount is big, therefore checking is time-consuming more, verifying speed is slower.Matching degree threshold when being verified Value is higher, then the authentication degree of accuracy is higher, but authentication percent of pass is also lower.
Above-mentioned recognition of face can be:The facial characteristics for obtaining user is matched with the facial characteristics to prestore, matching degree Determine to be identified by when reaching above-mentioned matching degree threshold value, the mode of above-mentioned iris recognition and fingerprint recognition and the mode of recognition of face It is similar, it is not repeated.
In the present embodiment, the authentication Stringency of user can be determined according to the testing result of step 104 first, so Afterwards according still further to the authentication Stringency of user, one or more authentication sides are chosen in authentication mode to be selected Formula, and the certificate parameter of the authentication mode of selection is set.
The testing result of step 104 includes safe class, the operating system of mobile terminal of the authentication environment of user Safe class, mobile terminal history authentication record exception level, checking scene corresponding to authentication request One or more of risk class, for ease of description, here by the safe class of the authentication environment of user, mobile terminal The safe class of operating system, the exception level of history authentication record of mobile terminal, corresponding to authentication request Verify that the risk class of scene, referred to as sub- result, namely the testing result of step 104 include at least one sub- result.
For the ease of determining the authentication Stringency of user according at least one sub- result, score determination can be preset Rule, score determine the score determination mode of each above-mentioned sub- result of Rule Expression, determine that rule is determined per height according to score As a result after score, the score of testing result is determined according to the score of every height result, is determined further according to the score of testing result Authentication Stringency.Wherein, score determines that rule can be as shown in table 1, from table 1, it can be seen that peace corresponding to sub- result Whole degree is higher, and score is lower.
Table 1
In the present embodiment, the score of testing result is equal to the score sum per height result, or, the score of testing result Equal to every height result score be multiplied by respective default weight after sum.Wherein, per the respective default weight of height result It can be set according to the significance level of every height result.
In the present embodiment, it can also preset corresponding between the score of testing result and the authentication Stringency of user Relation, as shown in table 2, the authentication Stringency of user can be determined according to the score of testing result by table 2.
Table 2
The score of testing result The authentication Stringency of user
(35,50] It is most strict
(15,35] Typically
[0,15] It is most loose
In the present embodiment, the authentication Stringency of user is directly proportional to the quantity of the authentication mode of selection, with Accuracy of data acquisition is directly proportional, and matching degree threshold value during to being verified is directly proportional.It is more than in authentication Stringency default In the case of degree, the authentication mode more than predetermined quantity can be chosen, and increases the number of the authentication mode of selection According to acquisition precision, and/or, matching degree threshold value when increase is verified, to ensure the reliability of authentication, conversely, in body In the case that part checking Stringency is less than or equal to predeterminable level, the authentication side less than or equal to predetermined quantity can be chosen Formula, and reduce the accuracy of data acquisition of the authentication mode of selection, and/or, reduce matching degree threshold value when being verified, with Ensure the speed and percent of pass of authentication.
The weight of every kind of authentication mode to be selected can be preset in the present embodiment, is more than in authentication Stringency pre- If in the case of degree, the great authentication mode in default weight of preoption, and increase the authentication side of selection The accuracy of data acquisition of formula, and/or, matching degree threshold value when increase is verified, it is less than or equal in authentication Stringency In the case of predeterminable level, prioritizing selection weight is less than or equal to the authentication mode of default weight, and reduces the identity of selection The accuracy of data acquisition of verification mode, and/or, reduce matching degree threshold value when being verified.Wherein, authentication mode to be selected Weight can be determined according to the checking reliability of authentication mode to be selected.
Above-mentioned every kind of authentication mode according to after setting, authentication is carried out to user, is specially:Successively according to setting The every kind of authentication mode postponed, authentication is carried out to user;After every kind of authentication mode is verified, it is determined that Subscriber authentication passes through.In every kind of authentication mode all by rear, determine subscriber authentication by can further carry The reliability of high authentication.
In the present embodiment, authentication mode is chosen according to the testing result of step 104, and the authentication of selection is set The certificate parameter of mode, can have stressing property carries out authentication to user, on the downside of the more strict scene of authentication The checking degree of accuracy is overweighted, verifying speed is laid particular emphasis under the more loose scene of authentication and is verified rate, so as to realize The authentication mode being adapted with different situations.
In another embodiment, it is contemplated that user is in the scene for being in extreme danger and such as being threatened, and carries out identity and tests Card may threaten to user's property or its personal safety, therefore in the present embodiment, however, it is determined that any of the above-described son knot Safe class corresponding to fruit is lowest level, then directly prompts the user with authentication failure, refuses to test for user's progress identity Card, to ensure the property safety of user.
Fig. 2 is the schematic flow sheet for the auth method that another embodiment of the application provides, and this method is by mobile terminal Such as mobile phone, computer, tablet personal computer perform.As shown in Fig. 2 this method comprises the following steps:
Step 202, the authentication request of user is obtained;
Step 204, according to the authentication request of user, the safe class of the authentication environment of user is determined;
Step 206, according to the authentication request of user, exception of history authentication record of mobile terminal etc. is determined Level;
Step 208, recorded according to the history authentication of the safe class of the authentication environment of user and mobile terminal Exception level, choose authentication mode of the fingerprint recognition as the user;
Step 210, fingerprint matching degree threshold value when reducing the accuracy of data acquisition of the fingerprint recognition of selection and being verified;
Step 212, according to the fingerprint recognition mode after adjustment, authentication is carried out to user.
By the flow shown in Fig. 2, it can choose and be tested with the history identity of the authentication environment of user and mobile terminal The authentication mode that card record matches, and the certificate parameter of authentication mode is accordingly adjusted, so as to more rigorous pair User carries out authentication, improves flexibility and the degree of reliability of authentication.
Fig. 3 is the schematic flow sheet for the auth method that the another embodiment of the application provides, and this method is by mobile terminal Such as mobile phone, computer, tablet personal computer perform, as shown in figure 3, this method comprises the following steps:
Step 302, being prompted the user with according to the payment of user request needs to carry out authentication, and asks the user whether same Meaning carries out authentication.
If agreeing to, step 304 is performed, otherwise, performs step 324.
Step 304, after user agrees to carry out authentication, authentication request is generated.
Step 306, according to the authentication request, the safe class of the authentication environment of user is determined.
Step 308, according to the authentication request, the safe class of the operating system of mobile terminal is determined.
Step 310, according to the authentication request, the payment amount of user is determined.
Step 312, according to the payment amount of user, determine to verify the risk class of scene corresponding to authentication request.
Step 314, according to the safe class of the authentication environment of user, the safe class of the operating system of mobile terminal And the risk class of scene is verified corresponding to authentication request, determine the authentication Stringency of user.
Step 316, according to the authentication Stringency of user, choose recognition of face and iris recognition is tested as identity Card mode, and improve the accuracy of data acquisition of recognition of face and iris recognition and matching degree threshold value when being verified.
Step 318, recognition of face is performed, and judges to identify whether to pass through.
If by performing step 320, otherwise, performing step 324.
Step 320, iris recognition is performed, and judges to identify whether to pass through.
If by performing step 322, otherwise, performing step 324.
Step 322, payment action is performed.
Step 324, user identity identification failure, refusal to pay are notified.
, can be when user be paid, with reference to safety of authentication environment of user etc. by the method in Fig. 3 The much informations such as level, the safe class of the operating system of mobile terminal, the payment amount of user, authentication side is determined for user Formula, and the certificate parameter of authentication mode is accordingly adjusted, so as to ensure the reliability of authentication, ensure the payment peace of user Entirely.
The auth method that corresponding above-described embodiment provides, the embodiment of the present invention additionally provide a kind of mobile terminal, Fig. 4 The module composition schematic diagram of the mobile terminal provided for the embodiment of the application one, as shown in figure 4, the mobile terminal includes:
Acquisition request module 41, for obtaining the authentication request of user;
Detection module 42, for carrying out safety detection to the application scenarios of the authentication request, obtain detection knot Fruit;
Authentication module 43, for the authentication mode for determining to match with the testing result, and according to determination The authentication mode to the user carry out authentication.
Alternatively, the detection module 42, including the one or more in following submodule:
First detection sub-module, the safe class of the authentication environment for determining the user;
Second detection sub-module, the safe class of the operating system for determining the mobile terminal;
3rd detection sub-module, the exception level that the history authentication for determining the mobile terminal records;
4th detection sub-module, for determining the risk class of checking scene corresponding to the authentication request.
Alternatively, first detection sub-module is specifically used for:
Obtain the information of the user, and the information of the environment residing for the user, according to the information of the user and The information of environment residing for the user, determine the safe class of the authentication environment of the user;
Wherein, the information of the user includes one or more in following information:It is the image information of the user, described The audio-frequency information of user;
The information of environment residing for the user includes one or more in following information:It is current time information, described The audio-frequency information of environment residing for the image information of the environment residing for location information, the user residing for user, the user.
Alternatively, second detection sub-module is specifically used for:
The operation system information of the mobile terminal is obtained, is to the operation according to operating system integrity detection algorithm Information of uniting carries out integrity analysis;
According to integrity analysis result, the safe class of the operating system of the mobile terminal is determined.
Alternatively, the 3rd detection sub-module is specifically used for:
The history authentication record of the mobile terminal is obtained, frequency is verified according to corresponding to history authentication record And the result, determine the exception level that the history authentication of the mobile terminal records.
Alternatively, the 4th detection sub-module is specifically used for:
Judge whether application program corresponding to the authentication request is financial class application;
If so, the financial amount being then related to based on the financial class application, determines to test corresponding to the authentication request Demonstrate,prove the risk class of scene.
Alternatively, the authentication module 43, is specifically used for:
According to the testing result, one or more authentication modes are chosen in authentication mode to be selected, and set Put the certificate parameter of the authentication mode of selection;
According to the authentication mode after setting, authentication is carried out to the user;
Wherein, the matching degree threshold value when certificate parameter includes being verified.
Mobile terminal in the embodiment of the present invention, safety detection can be carried out to the application scenarios of authentication request, And the authentication mode for determining to match with testing result is verified to user, therefore the mobile terminal energy in the present embodiment Enough that authentication mode is flexibly determined according to application scenarios, flexibility is high, so as to solve existing auth method flexibility The problem of poor;Using the safety detection result of the application scenarios of authentication request as determine authentication mode according to According to can more improve the preciseness and reliability of authentication to determine that authentication mode provide sufficient authority.
Fig. 5 is a kind of hardware architecture diagram for the mobile terminal for realizing each embodiment of the application, should as shown in Fig. 5 Mobile terminal 800 includes but is not limited to:Radio frequency unit 801, mixed-media network modules mixed-media 802, audio output unit 803, input block 804, Sensor 805, display unit 806, user input unit 807, interface unit 808, memory 809, processor 810, Yi Ji electricity The grade part of source 811.It will be understood by those skilled in the art that the mobile terminal structure shown in Fig. 5 is not formed to mobile terminal Restriction, mobile terminal can include than illustrating more or less parts, either combine some parts or different parts Arrangement.In embodiments of the present invention, mobile terminal include but is not limited to mobile phone, tablet personal computer, notebook computer, palm PC, Car-mounted terminal, wearable device and pedometer etc..
Wherein, the internal memory of memory 809 contains computer program, when the computer program is performed by processor 810, Neng Goushi Existing below scheme:
Obtain the authentication request of user;
Safety detection is carried out to the application scenarios of the authentication request, obtains testing result;
It is determined that the authentication mode to match with the testing result, and according to the authentication mode pair of determination The user carries out authentication.
Alternatively, when the computer program is performed by processor 810, the application scenarios of the authentication request are carried out One or more in safety detection, including in the following manner:
Determine the safe class of the authentication environment of the user;
Determine the safe class of the operating system of the mobile terminal;
Determine the exception level of the history authentication record of the mobile terminal;
Determine the risk class of checking scene corresponding to the authentication request.
Alternatively, when the computer program is performed by processor 810, the safety of the authentication environment of the user is determined Grade, including:
Obtain the information of the user, and the information of the environment residing for the user, according to the information of the user and The information of environment residing for the user, determine the safe class of the authentication environment of the user;
Wherein, the information of the user includes one or more in following information:It is the image information of the user, described The audio-frequency information of user;
The information of environment residing for the user includes one or more in following information:It is current time information, described The audio-frequency information of environment residing for the image information of the environment residing for location information, the user residing for user, the user.
Alternatively, when the computer program is performed by processor 810, the safety of the operating system of the mobile terminal is determined Grade, including:
The operation system information of the mobile terminal is obtained, is to the operation according to operating system integrity detection algorithm Information of uniting carries out integrity analysis;
According to integrity analysis result, the safe class of the operating system of the mobile terminal is determined.
Alternatively, when the computer program is performed by processor 810, the history authentication note of the mobile terminal is determined The exception level of record, including:
The history authentication record of the mobile terminal is obtained, frequency is verified according to corresponding to history authentication record And the result, determine the exception level that the history authentication of the mobile terminal records.
Alternatively, when the computer program is performed by processor 810, checking field corresponding to the authentication request is determined The risk class of scape, including:
Judge whether application program corresponding to the authentication request is financial class application;
If so, the financial amount being then related to based on the financial class application, determines to test corresponding to the authentication request Demonstrate,prove the risk class of scene.
Alternatively, when the computer program is performed by processor 810, it is determined that the identity to match with the testing result is tested Card mode, and authentication is carried out to the user according to the authentication mode of determination, including:
According to the testing result, one or more authentication modes are chosen in authentication mode to be selected, and set Put the certificate parameter of the authentication mode of selection;
According to the authentication mode after setting, authentication is carried out to the user;
Wherein, the matching degree threshold value when certificate parameter includes being verified.
Mobile terminal in the embodiment of the present invention, safety detection can be carried out to the application scenarios of authentication request, And the authentication mode for determining to match with testing result is verified to user, therefore the mobile terminal energy in the present embodiment Enough that authentication mode is flexibly determined according to application scenarios, flexibility is high, so as to solve existing auth method flexibility The problem of poor;Using the safety detection result of the application scenarios of authentication request as determine authentication mode according to According to can more improve the preciseness and reliability of authentication to determine that authentication mode provide sufficient authority.
It should be understood that in the embodiment of the present invention, radio frequency unit 801 can be used for receiving and sending messages or communication process in, signal Reception and transmission, specifically, by from base station downlink data receive after, handled to processor 810;In addition, will be up Data are sent to base station.Generally, radio frequency unit 801 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 801 can also by wireless communication system and network and other set Standby communication.
Mobile terminal has provided the user wireless broadband internet by mixed-media network modules mixed-media 802 and accessed, and such as helps user to receive Send e-mails, browse webpage and access streaming video etc..
Audio output unit 803 can be receiving by radio frequency unit 801 or mixed-media network modules mixed-media 802 or in memory 809 It is sound that the voice data of storage, which is converted into audio signal and exported,.Moreover, audio output unit 803 can also be provided and moved The audio output for the specific function correlation that dynamic terminal 800 performs is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 803 includes loudspeaker, buzzer and receiver etc..
Input block 804 is used to receive audio or video signal.Input block 804 can include graphics processor (Graphics Processing Unit, GPU) 8041 and microphone 8042, graphics processor 8041 in video to capturing mould The static images or the view data of video obtained in formula or image capture mode by image capture apparatus (such as camera) are carried out Processing.Picture frame after processing may be displayed on display unit 806.Picture frame after the processing of graphics processor 8041 can be with It is stored in memory 809 (or other storage mediums) or is transmitted via radio frequency unit 801 or mixed-media network modules mixed-media 802.Wheat Gram wind 8042 can receive sound, and can be voice data by such acoustic processing.Voice data after processing can be with The form output of mobile communication base station can be sent to via radio frequency unit 801 by being converted in the case of telephone calling model.
Mobile terminal 800 also includes at least one sensor 805, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 8061, and proximity transducer can close when mobile terminal 800 is moved in one's ear Display panel 8061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axles) size of acceleration, size and the direction of gravity are can detect that when static, available for identification mobile terminal posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Pass Sensor 805 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared ray sensor etc. are spent, will not be repeated here.
Display unit 806 is used for the information for showing the information inputted by user or being supplied to user.Display unit 806 can Including display panel 8061, liquid crystal display (Liquid Crystal Display, LCD), organic light-emitting diodes can be used Forms such as (Organic Light-Emitting Diode, OLED) is managed to configure display panel 8061.
User input unit 807 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal The key signals input that family is set and function control is relevant.Specifically, user input unit 807 include contact panel 8071 and Other input equipments 8072.Contact panel 8071, also referred to as touch-screen, collect touch operation of the user on or near it (for example user uses any suitable objects or annex such as finger, stylus on contact panel 8071 or in contact panel 8071 Neighbouring operation).Contact panel 8071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects the signal that touch operation is brought, and transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 810, receiving area Manage the order that device 810 is sent and performed.It is furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Type realizes contact panel 8071.Except contact panel 8071, user input unit 807 can also include other input equipments 8072.Specifically, other input equipments 8072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, action bars, will not be repeated here.
Further, contact panel 8071 can be covered on display panel 8061, when contact panel 8071 is detected at it On or near touch operation after, send processor 810 to determine the type of touch event, be followed by subsequent processing device 810 according to touch The type for touching event provides corresponding visual output on display panel 8061.Although in Figure 5, contact panel 8071 and display Panel 8061 is the part independent as two to realize the input of mobile terminal and output function, but in some embodiments In, can be integrated by contact panel 8071 and display panel 8061 and realize input and the output function of mobile terminal, it is specific this Place does not limit.
Interface unit 808 is the interface that external device (ED) is connected with mobile terminal 800.For example, external device (ED) can include Line or wireless head-band earphone port, external power source (or battery charger) port, wired or wireless FPDP, storage card end Mouth, the port for connecting the device with identification module, audio input/output (I/O) port, video i/o port, earphone Port etc..Interface unit 808 can be used for receiving the input (for example, data message, electric power etc.) from external device (ED) simultaneously And one or more elements that the input received is transferred in mobile terminal 800 or it can be used in mobile terminal 800 Data are transmitted between external device (ED).
Memory 809 can be used for storage software program and various data.Memory 809 can mainly include storing program area And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Voice data, phone directory etc.) etc..In addition, memory 809 can include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 810 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection Individual part, by running or performing the software program and/or module that are stored in memory 809, and call and be stored in storage Data in device 809, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place Reason device 810 may include one or more processing units;Preferably, processor 810 can integrate application processor and modulatedemodulate is mediated Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 810.
Mobile terminal 800 can also include the power supply 811 (such as battery) to all parts power supply, it is preferred that power supply 811 Can be logically contiguous by power-supply management system and processor 810, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
In addition, mobile terminal 800 includes some unshowned functional modules, will not be repeated here.
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including processor 810, memory 809, is stored in On memory 809 and the computer program that can be run on the processor 810, the computer program are performed by processor 110 Each process of the above-mentioned auth method embodiments of Shi Shixian, and identical technique effect can be reached, to avoid repeating, here Repeat no more.
Further, the embodiment of the present invention also provides a kind of computer-readable recording medium, computer-readable recording medium On be stored with computer program, the computer program realizes each of above-mentioned auth method embodiment when being executed by processor Process, and identical technique effect can be reached, to avoid repeating, repeat no more here.Wherein, described computer-readable storage Medium, such as read-only storage (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic disc or CD etc..
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, the technical scheme of the application is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal (can be mobile phone, computer, service Device, air conditioner, or network equipment etc.) perform each embodiment of the application described in method.
Embodiments herein is described above in conjunction with accompanying drawing, but the application be not limited to it is above-mentioned specific Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art Under the enlightenment of the application, in the case of the application objective and scope of the claimed protection is not departed from, it can also make a lot Form, belong within the protection of the application.

Claims (16)

  1. A kind of 1. auth method, applied to mobile terminal, it is characterised in that including:
    Obtain the authentication request of user;
    Safety detection is carried out to the application scenarios of the authentication request, obtains testing result;
    It is determined that the authentication mode to match with the testing result, and according to the authentication mode of determination to described User carries out authentication.
  2. 2. according to the method for claim 1, it is characterised in that safety is carried out to the application scenarios of the authentication request Property detection, including one or more in the following manner:
    Determine the safe class of the authentication environment of the user;
    Determine the safe class of the operating system of the mobile terminal;
    Determine the exception level of the history authentication record of the mobile terminal;
    Determine the risk class of checking scene corresponding to the authentication request.
  3. 3. according to the method for claim 2, it is characterised in that determine safety of the authentication environment of the user etc. Level, including:
    The information of the user, and the information of the environment residing for the user are obtained, according to the information of the user and described The information of environment residing for user, determine the safe class of the authentication environment of the user;
    Wherein, the information of the user includes one or more in following information:The image information of the user, the user Audio-frequency information;
    The information of environment residing for the user includes one or more in following information:Current time information, the user The audio-frequency information of environment residing for the image information of environment residing for residing location information, the user, the user.
  4. 4. according to the method for claim 2, it is characterised in that determine safety of the operating system of the mobile terminal etc. Level, including:
    The operation system information of the mobile terminal is obtained, the operating system is believed according to operating system integrity detection algorithm Breath carries out integrity analysis;
    According to integrity analysis result, the safe class of the operating system of the mobile terminal is determined.
  5. 5. according to the method for claim 2, it is characterised in that determine the history authentication record of the mobile terminal Exception level, including:
    The history authentication record of the mobile terminal is obtained, frequency is verified according to corresponding to history authentication record and is tested Result is demonstrate,proved, determines the exception level of the history authentication record of the mobile terminal.
  6. 6. according to the method for claim 2, it is characterised in that determine checking scene corresponding to the authentication request Risk class, including:
    Judge whether application program corresponding to the authentication request is financial class application;
    If so, the financial amount being then related to based on the financial class application, determines checking field corresponding to the authentication request The risk class of scape.
  7. 7. according to the method described in any one of claim 1 to 6, it is characterised in that it is determined that match with the testing result Authentication mode, and authentication is carried out to the user according to the authentication mode of determination, including:
    According to the testing result, choose one or more authentication modes, and choosing is set in authentication mode to be selected The certificate parameter of the authentication mode taken;
    According to the authentication mode after setting, authentication is carried out to the user;
    Wherein, the matching degree threshold value when certificate parameter includes being verified.
  8. A kind of 8. mobile terminal, it is characterised in that including:
    Acquisition request module, for obtaining the authentication request of user;
    Detection module, for carrying out safety detection to the application scenarios of the authentication request, obtain testing result;
    Authentication module, for the authentication mode for determining to match with the testing result, and according to determination Authentication mode carries out authentication to the user.
  9. 9. mobile terminal according to claim 8, it is characterised in that the detection module includes one in following submodule Kind is a variety of:
    First detection sub-module, the safe class of the authentication environment for determining the user;
    Second detection sub-module, the safe class of the operating system for determining the mobile terminal;
    3rd detection sub-module, the exception level that the history authentication for determining the mobile terminal records;
    4th detection sub-module, for determining the risk class of checking scene corresponding to the authentication request.
  10. 10. mobile terminal according to claim 9, it is characterised in that first detection sub-module is specifically used for:
    The information of the user, and the information of the environment residing for the user are obtained, according to the information of the user and described The information of environment residing for user, determine the safe class of the authentication environment of the user;
    Wherein, the information of the user includes one or more in following information:The image information of the user, the user Audio-frequency information;
    The information of environment residing for the user includes one or more in following information:Current time information, the user The audio-frequency information of environment residing for the image information of environment residing for residing location information, the user, the user.
  11. 11. mobile terminal according to claim 9, it is characterised in that second detection sub-module is specifically used for:
    The operation system information of the mobile terminal is obtained, the operating system is believed according to operating system integrity detection algorithm Breath carries out integrity analysis;
    According to integrity analysis result, the safe class of the operating system of the mobile terminal is determined.
  12. 12. mobile terminal according to claim 9, it is characterised in that the 3rd detection sub-module is specifically used for:
    The history authentication record of the mobile terminal is obtained, frequency is verified according to corresponding to history authentication record and is tested Result is demonstrate,proved, determines the exception level of the history authentication record of the mobile terminal.
  13. 13. mobile terminal according to claim 9, it is characterised in that the 4th detection sub-module is specifically used for:
    Judge whether application program corresponding to the authentication request is financial class application;
    If so, the financial amount being then related to based on the financial class application, determines checking field corresponding to the authentication request The risk class of scape.
  14. 14. according to the mobile terminal described in any one of claim 8 to 13, it is characterised in that the authentication module, specifically For:
    According to the testing result, choose one or more authentication modes, and choosing is set in authentication mode to be selected The certificate parameter of the authentication mode taken;
    According to the authentication mode after setting, authentication is carried out to the user;
    Wherein, the matching degree threshold value when certificate parameter includes being verified.
  15. A kind of 15. mobile terminal, it is characterised in that including:Memory, processor and it is stored on the memory and can be in institute The computer program run on processor is stated, the computer program is realized such as claim 1 to 7 during the computing device Any one of auth method the step of.
  16. 16. a kind of computer-readable recording medium, it is characterised in that be stored with computer on the computer-readable recording medium Program, the auth method as any one of claim 1 to 7 is realized when the computer program is executed by processor The step of.
CN201710957727.2A 2017-10-16 2017-10-16 Auth method and mobile terminal Pending CN107749844A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710957727.2A CN107749844A (en) 2017-10-16 2017-10-16 Auth method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710957727.2A CN107749844A (en) 2017-10-16 2017-10-16 Auth method and mobile terminal

Publications (1)

Publication Number Publication Date
CN107749844A true CN107749844A (en) 2018-03-02

Family

ID=61252879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710957727.2A Pending CN107749844A (en) 2017-10-16 2017-10-16 Auth method and mobile terminal

Country Status (1)

Country Link
CN (1) CN107749844A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108512986A (en) * 2018-04-03 2018-09-07 Oppo广东移动通信有限公司 Auth method, electronic device and computer readable storage medium
CN108718359A (en) * 2018-04-25 2018-10-30 维沃移动通信有限公司 A kind of safe verification method, device and mobile terminal
CN108875327A (en) * 2018-05-28 2018-11-23 阿里巴巴集团控股有限公司 One seed nucleus body method and apparatus
CN108985070A (en) * 2018-07-11 2018-12-11 阿里巴巴集团控股有限公司 Risk control method, risk control device, electronic equipment and storage medium
CN109033779A (en) * 2018-06-29 2018-12-18 努比亚技术有限公司 A kind of unlock authentication method, wearable device and computer readable storage medium
CN109166141A (en) * 2018-08-10 2019-01-08 Oppo广东移动通信有限公司 Dangerous based reminding method, device, storage medium and mobile terminal
CN109409044A (en) * 2018-09-19 2019-03-01 维沃移动通信有限公司 A kind of verifying interface display method and terminal
CN109446774A (en) * 2018-09-30 2019-03-08 山东知味行网络科技有限公司 A kind of identification application method and system
CN109918892A (en) * 2019-02-13 2019-06-21 平安科技(深圳)有限公司 Verification code generation method, device and storage medium, computer equipment
CN109981567A (en) * 2019-02-13 2019-07-05 平安科技(深圳)有限公司 Sending method, device, storage medium and the server of network authorization data
CN110009515A (en) * 2019-03-12 2019-07-12 中国平安财产保险股份有限公司 Document method of calibration, device, server and medium based on recognition of face
CN110032860A (en) * 2018-12-27 2019-07-19 阿里巴巴集团控股有限公司 Push, methods of exhibiting, device and the equipment of login mode
WO2019242400A1 (en) * 2018-06-19 2019-12-26 Oppo广东移动通信有限公司 Control method and apparatus for electronic device, and storage medium and electronic device
CN110705439A (en) * 2019-09-27 2020-01-17 支付宝(杭州)信息技术有限公司 Information processing method, device and equipment
CN110766842A (en) * 2019-10-28 2020-02-07 广州博衍智能科技有限公司 Passing equipment control method and device, machine readable medium and equipment
CN111541692A (en) * 2020-04-22 2020-08-14 支付宝(杭州)信息技术有限公司 Identity verification method, system, device and equipment
CN111538964A (en) * 2020-04-14 2020-08-14 支付宝(杭州)信息技术有限公司 Login mode pushing method, device and system and electronic equipment
CN112183167A (en) * 2019-07-04 2021-01-05 钉钉控股(开曼)有限公司 Attendance checking method, authentication method, living body detection method, device and equipment
CN112272195A (en) * 2020-12-25 2021-01-26 北京安泰伟奥信息技术有限公司 Dynamic detection authentication system and method thereof
CN114727294A (en) * 2022-05-19 2022-07-08 北京梦蓝杉科技有限公司 Identity recognition method and system for communication

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951321A (en) * 2008-10-23 2011-01-19 普天信息技术研究院有限公司 Device, system and method for realizing identity authentication
CN102685106A (en) * 2012-03-27 2012-09-19 北京百纳威尔科技有限公司 Safety verification method and equipment
CN104301117A (en) * 2014-10-22 2015-01-21 中国联合网络通信集团有限公司 Identity verification method and device
CN106302344A (en) * 2015-05-27 2017-01-04 腾讯科技(深圳)有限公司 Security sweep method and system
CN107172084A (en) * 2017-06-30 2017-09-15 广州三星通信技术研究有限公司 A kind of method and apparatus of authentication
CN107241336A (en) * 2017-06-19 2017-10-10 广州市百果园信息技术有限公司 Auth method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951321A (en) * 2008-10-23 2011-01-19 普天信息技术研究院有限公司 Device, system and method for realizing identity authentication
CN102685106A (en) * 2012-03-27 2012-09-19 北京百纳威尔科技有限公司 Safety verification method and equipment
CN104301117A (en) * 2014-10-22 2015-01-21 中国联合网络通信集团有限公司 Identity verification method and device
CN106302344A (en) * 2015-05-27 2017-01-04 腾讯科技(深圳)有限公司 Security sweep method and system
CN107241336A (en) * 2017-06-19 2017-10-10 广州市百果园信息技术有限公司 Auth method and device
CN107172084A (en) * 2017-06-30 2017-09-15 广州三星通信技术研究有限公司 A kind of method and apparatus of authentication

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108512986A (en) * 2018-04-03 2018-09-07 Oppo广东移动通信有限公司 Auth method, electronic device and computer readable storage medium
CN108718359A (en) * 2018-04-25 2018-10-30 维沃移动通信有限公司 A kind of safe verification method, device and mobile terminal
CN108875327A (en) * 2018-05-28 2018-11-23 阿里巴巴集团控股有限公司 One seed nucleus body method and apparatus
US11153311B2 (en) 2018-05-28 2021-10-19 Advanced New Technologies Co., Ltd. Identity verification method and apparatus
US10938812B2 (en) 2018-05-28 2021-03-02 Advanced New Technologies Co., Ltd. Identity verification method and apparatus
WO2019242400A1 (en) * 2018-06-19 2019-12-26 Oppo广东移动通信有限公司 Control method and apparatus for electronic device, and storage medium and electronic device
CN109033779A (en) * 2018-06-29 2018-12-18 努比亚技术有限公司 A kind of unlock authentication method, wearable device and computer readable storage medium
CN108985070A (en) * 2018-07-11 2018-12-11 阿里巴巴集团控股有限公司 Risk control method, risk control device, electronic equipment and storage medium
US11075941B2 (en) 2018-07-11 2021-07-27 Advanced New Technologies Co., Ltd. Risk control method, risk control apparatus, electronic device, and storage medium
CN108985070B (en) * 2018-07-11 2020-07-03 阿里巴巴集团控股有限公司 Risk control method, risk control device, electronic device, and storage medium
CN109166141A (en) * 2018-08-10 2019-01-08 Oppo广东移动通信有限公司 Dangerous based reminding method, device, storage medium and mobile terminal
CN109409044A (en) * 2018-09-19 2019-03-01 维沃移动通信有限公司 A kind of verifying interface display method and terminal
CN109446774A (en) * 2018-09-30 2019-03-08 山东知味行网络科技有限公司 A kind of identification application method and system
CN110032860A (en) * 2018-12-27 2019-07-19 阿里巴巴集团控股有限公司 Push, methods of exhibiting, device and the equipment of login mode
WO2020164274A1 (en) * 2019-02-13 2020-08-20 平安科技(深圳)有限公司 Network verification data sending method and apparatus, and storage medium and server
CN109918892B (en) * 2019-02-13 2023-11-21 平安科技(深圳)有限公司 Verification code generation method and device, storage medium and computer equipment
CN109918892A (en) * 2019-02-13 2019-06-21 平安科技(深圳)有限公司 Verification code generation method, device and storage medium, computer equipment
CN109981567A (en) * 2019-02-13 2019-07-05 平安科技(深圳)有限公司 Sending method, device, storage medium and the server of network authorization data
CN110009515A (en) * 2019-03-12 2019-07-12 中国平安财产保险股份有限公司 Document method of calibration, device, server and medium based on recognition of face
CN112183167A (en) * 2019-07-04 2021-01-05 钉钉控股(开曼)有限公司 Attendance checking method, authentication method, living body detection method, device and equipment
CN112183167B (en) * 2019-07-04 2023-09-22 钉钉控股(开曼)有限公司 Attendance checking method, authentication method, living body detection method, device and equipment
CN110705439A (en) * 2019-09-27 2020-01-17 支付宝(杭州)信息技术有限公司 Information processing method, device and equipment
CN110705439B (en) * 2019-09-27 2022-04-22 支付宝(杭州)信息技术有限公司 Information processing method, device and equipment
CN110766842A (en) * 2019-10-28 2020-02-07 广州博衍智能科技有限公司 Passing equipment control method and device, machine readable medium and equipment
CN111538964A (en) * 2020-04-14 2020-08-14 支付宝(杭州)信息技术有限公司 Login mode pushing method, device and system and electronic equipment
CN111538964B (en) * 2020-04-14 2022-08-09 支付宝(杭州)信息技术有限公司 Login mode pushing method, device and system and electronic equipment
CN111541692B (en) * 2020-04-22 2021-08-10 支付宝(杭州)信息技术有限公司 Identity verification method, system, device and equipment
CN111541692A (en) * 2020-04-22 2020-08-14 支付宝(杭州)信息技术有限公司 Identity verification method, system, device and equipment
CN112272195A (en) * 2020-12-25 2021-01-26 北京安泰伟奥信息技术有限公司 Dynamic detection authentication system and method thereof
CN112272195B (en) * 2020-12-25 2021-07-20 北京安泰伟奥信息技术有限公司 Dynamic detection authentication system and method thereof
CN114727294A (en) * 2022-05-19 2022-07-08 北京梦蓝杉科技有限公司 Identity recognition method and system for communication

Similar Documents

Publication Publication Date Title
CN107749844A (en) Auth method and mobile terminal
CN108491123A (en) A kind of adjusting application program image target method and mobile terminal
CN107832110A (en) A kind of information processing method and mobile terminal
CN107608514A (en) Information processing method and mobile terminal
CN108304105A (en) A kind of application interface starts method, mobile terminal
CN107808084A (en) A kind of touch operation method and mobile terminal
CN107679514A (en) A kind of face identification method and electronic equipment
CN107748848A (en) A kind of information processing method and mobile terminal
CN108010170A (en) A kind of control method and device of face recognition unlocking function
CN107884157A (en) A kind of method for detecting abnormality of diffractive-optical element, mobile terminal
CN109743503A (en) Reminding method and terminal
CN108833661A (en) A kind of display methods and mobile terminal of information
CN107835495A (en) A kind of message prompt method, device and mobile terminal
CN110149628A (en) A kind of information processing method and terminal device
CN108011887A (en) A kind of account management method and equipment
CN109726121A (en) A kind of identifying code acquisition methods and terminal device
CN108769410A (en) A kind of method for sending information and mobile terminal
CN109544172A (en) A kind of display methods and terminal device
CN109409044A (en) A kind of verifying interface display method and terminal
CN109918944A (en) A kind of information protecting method, device, mobile terminal and storage medium
CN108629280A (en) Face identification method and mobile terminal
CN107895108A (en) A kind of operation management method and mobile terminal
CN107809515A (en) A kind of display control method and mobile terminal
CN108182582A (en) A kind of method of payment, terminal and computer readable storage medium
CN109992939B (en) Login method and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180302

RJ01 Rejection of invention patent application after publication