CN108512986A - Auth method, electronic device and computer readable storage medium - Google Patents

Auth method, electronic device and computer readable storage medium Download PDF

Info

Publication number
CN108512986A
CN108512986A CN201810291122.9A CN201810291122A CN108512986A CN 108512986 A CN108512986 A CN 108512986A CN 201810291122 A CN201810291122 A CN 201810291122A CN 108512986 A CN108512986 A CN 108512986A
Authority
CN
China
Prior art keywords
authentication
matching degree
information
matching
condition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810291122.9A
Other languages
Chinese (zh)
Inventor
杨宗业
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810291122.9A priority Critical patent/CN108512986A/en
Publication of CN108512986A publication Critical patent/CN108512986A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)

Abstract

A kind of auth method of the embodiment of the present application offer, electronic device and computer readable storage medium, are related to field of communication technology, method therein includes:When triggering authentication task, obtains the corresponding multiple authentication modes of authentication scene and multiple refer to matching degree;Obtain multiple corresponding authentication informations of authentication mode;The matching degree between each authentication information and corresponding default authentication information is obtained respectively;Compare acquisition multiple matching degrees whether be all higher than multiple matching degrees it is corresponding refer to matching degree;If being all higher than, it is identified through authentication.Above-mentioned auth method, electronic device and computer readable storage medium are directed to different identity verification scene and take different authentication strategies, flexibility and the safe class of authentication can be improved.

Description

Auth method, electronic device and computer readable storage medium
Technical field
This application involves field of communication technology more particularly to a kind of auth method, electronic devices and computer-readable Storage medium.
Background technology
With the development of mobile terminal and network technology, the intelligent mobile terminals such as smart mobile phone, tablet computer, smartwatch Popularity rate it is higher and higher.The thing followed, people are also increasingly stronger for the demand of secret protection.The identity of mobile terminal is tested Card function is also used more and more widely.Make at present authentication mode with the most use be digital verification, pattern verification with And face verification etc..But these authentication modes are all single uses, are easy to be cracked, and flexibility is relatively low.
Invention content
A kind of auth method of the embodiment of the present application offer, electronic device and computer readable storage medium, can be used for Improve flexibility and the safe class of authentication.
On the one hand the embodiment of the present application provides a kind of auth method, including:When triggering authentication task, obtain The corresponding multiple authentication modes of authentication scene and it is multiple refer to matching degree;It is each to obtain multiple authentication modes Self-corresponding authentication information;Obtain respectively each authentication information and corresponding default authentication information it Between matching degree;Compare acquisition multiple matching degrees whether be all higher than it is corresponding it is described refer to matching degree;If being all higher than, It is identified through authentication.
On the one hand the embodiment of the present application also provides a kind of authentication means, including:Matching degree acquisition module, for when tactile When sending out authentication task, obtains the corresponding multiple authentication modes of authentication scene and multiple refer to matching degree;Verification Data obtaining module, for obtaining multiple corresponding authentication informations of authentication mode;Matching module is used for The matching degree between each authentication information and corresponding default authentication information is obtained respectively;Comparison module, Whether multiple matching degrees for comparing acquisition are all higher than corresponding described with reference to matching degree;Authentication module, if for more A matching degree be all higher than it is corresponding it is described refer to matching degree, then be identified through authentication.
On the one hand the embodiment of the present application also provides a kind of electronic device, including:Memory, processor and it is stored in described deposit On reservoir and the computer program that can run on the processor, which is characterized in that the processor executes the computer When program, above-mentioned auth method provided by the embodiments of the present application is realized.
On the one hand the embodiment of the present application also provides a kind of computer readable storage medium, be stored thereon with computer program, It is characterized in that, when the computer program is executed by processor, above-mentioned authentication side provided by the embodiments of the present application is realized Method.
The various embodiments described above, by when triggering authentication task, obtaining the corresponding multiple identity of authentication scene Verification mode and it is multiple refer to matching degree, obtain multiple corresponding authentication informations of authentication mode, then distinguish The matching degree between each authentication information and corresponding default authentication information is obtained, when multiple matching degrees of acquisition When being all higher than corresponding reference matching degree, it is identified through authentication, is adopted since different identity verification scene can be directed to Different authentication strategies is taken, therefore flexibility and the safe class of authentication can be improved.
Description of the drawings
Fig. 1 is the implementation process schematic diagram for the auth method that one embodiment of the application provides;
Fig. 2 is the implementation process schematic diagram for the auth method that another embodiment of the application provides;
Fig. 3 is the implementation process schematic diagram for the auth method that another embodiment of the application provides;
Fig. 4 is the structural schematic diagram for the electronic device that one embodiment of the application provides;
Fig. 5 is the structural schematic diagram for the electronic device that another embodiment of the application provides;
Fig. 6 is the hardware architecture diagram for the electronic device that one embodiment of the application provides.
Specific implementation mode
To enable present invention purpose, feature, advantage more apparent and understandable, below in conjunction with the application Attached drawing in embodiment, technical solutions in the embodiments of the present application are clearly and completely described, it is clear that described reality It is only some embodiments of the present application to apply example, and not all embodiments.Based on the embodiment in the application, people in the art The every other embodiment that member is obtained without making creative work, shall fall in the protection scope of this application.
Referring to Fig. 1, a kind of implementation process schematic diagram of the auth method provided for one embodiment of the application, can answer For the electronic device with multiple authentication modes, such as:Smart mobile phone, tablet computer, laptop computer, intelligent wearable device Equal intelligent mobile terminals or non-other terminals that can carry out data processing on the move, such as desktop computer.It is wherein intelligent Wearable device such as smartwatch, Intelligent bracelet, intelligent glasses etc..As shown in Figure 1, this method mainly includes the following steps that:
101, when triggering authentication task, corresponding multiple authentication modes of authentication scene and multiple are obtained With reference to matching degree;
Authentication scene can be, but not limited to include solution lock screen, unlock file or folder, virtual resource transfer, text Part transmission, file management and login service device etc. scene.The purpose of authentication is typically to authorize user to use some quilt The function of locking.Authentication mode can be, but not limited to:Fingerprint authentication, digital verification, pattern verification, iris verification, Voice print verification, the verification of ear line and face verification etc..
Be preset in electronic device multiple authentication scenes, multiple authentication modes and it is multiple with reference to matching degree it Between correspondence, which specifically can be by User Defined.Wherein, the item of authentication is identified through with reference to matching degree Part.It should be understood that be related to the scene of identity or proprietary information to the more demanding of secret protection, it is corresponding with reference to matching degree just Higher, corresponding authentication mode is more complicated.
102, multiple corresponding authentication informations of authentication mode are obtained;
Specifically, the prompt letter for prompting user to carry out authentication operation and authentication mode can be exported Breath, and according to the authentication sequence of prompt message prompt, multiple identity corresponding with current authentication scene are obtained successively The corresponding authentication information of verification mode.Alternatively, it is corresponding to obtain multiple authentication modes simultaneously Authentication information, such as:When user's finger pins screen and speaks, fingerprint identifier can be obtained simultaneously and is believed with voice print verification Breath.Alternatively, the corresponding authentication letter of multiple authentication modes can also be obtained according to the sequencing of user's operation Breath, such as:User first by finger press fingerprint obtain region, then first obtain fingerprint identifier, then, when detect user will When ear covers the loudspeaker of earphone, then ear line verification information is obtained by the loudspeaker of earphone.
103, the matching degree between multiple authentication informations and corresponding default authentication information is obtained respectively;
It should be understood that before carrying out authentication, need depending on the user's operation, to obtain each authentication mode Default authentication information simultaneously stores in an electronic.When triggering authentication task, multiple authentication modes are obtained Corresponding authentication information, and by multiple authentication informations respectively with corresponding default authentication information into Row matching, obtains the matching degree between multiple authentication informations and corresponding default authentication information, that is, similar Degree.
104, compare acquisition multiple matching degrees whether be all higher than it is corresponding refer to matching degree;
If 105, being all higher than, it is identified through authentication.
Multiple matching degrees of acquisition are compared with corresponding with reference to matching degree respectively, and judge to obtain multiple Matching degree whether be all higher than multiple matching degrees it is corresponding refer to matching degree, if be all higher than it is corresponding refer to matching degree, It is then identified through authentication, then executes and is proved to be successful rear corresponding subsequent operation with identity under current authentication scene, Lock screen is such as solved, the information etc. for confirming payment is sent to server.Wherein, can be with reference to the form of expression of matching degree Weight, such as:Assuming that authentication mode is respectively voice print verification mode and ear line verification mode, and in online payment scene, sound The reference matching degree of line verification mode can be 30%, and the reference matching degree of ear line verification mode can be 70%.In solution screen locking In curtain scene, the reference matching degree of voice print verification mode can be 70%, and the reference matching degree of ear line verification mode can be 30%.
Conversely, if multiple matching degrees are not all higher than, multiple matching degrees are corresponding to refer to matching degree, confirms and does not pass through Authentication does not execute and is proved to be successful rear corresponding subsequent operation with identity under current authentication scene.Further, may be used also The prompt message of output prompt authentication mistake.
Auth method provided in this embodiment, by when triggering authentication task, obtaining authentication scene Corresponding multiple authentication modes and it is multiple refer to matching degree, obtain multiple corresponding authentications of authentication mode Then information obtains the matching degree between each authentication information and corresponding default authentication information respectively, when obtaining When the multiple matching degrees taken are all higher than corresponding reference matching degree, it is identified through authentication, due to being directed to different bodies Part verification scene takes different authentication strategies, therefore flexibility and the safe class of authentication can be improved.
Referring to Fig. 2, a kind of implementation process schematic diagram of the auth method provided for one embodiment of the application, can answer For the electronic device with multiple authentication modes, such as:Smart mobile phone, tablet computer, laptop computer, intelligent wearable device Equal intelligent mobile terminals or non-other terminals that can carry out data processing on the move, such as desktop computer.It is wherein intelligent Wearable device such as smartwatch, Intelligent bracelet, intelligent glasses etc..As shown in Fig. 2, this method mainly includes the following steps that:
201, when triggering authentication task, corresponding multiple authentication modes of authentication scene and multiple are obtained With reference to matching degree;
Authentication scene can be, but not limited to include solution lock screen, unlock file or folder, virtual resource transfer, text Part transmission, file management and login service device etc. scene.The purpose of authentication is typically to authorize user to use some quilt The function of locking.Authentication mode can be, but not limited to:Fingerprint authentication, digital verification, pattern verification, iris verification, Voice print verification, the verification of ear line and face verification etc..
Be preset in electronic device multiple authentication scenes, multiple authentication modes and it is multiple with reference to matching degree it Between correspondence, which specifically can be by User Defined.Wherein, the item of authentication is identified through with reference to matching degree Part.It should be understood that be related to the scene of identity or proprietary information to the more demanding of secret protection, it is corresponding with reference to matching degree just Higher, corresponding authentication mode is more complicated.
202, the environmental information around obtaining, and analyze environmental information and whether meet the corresponding identity of authentication scene and test Card condition;
If 203, being unsatisfactory for authentication condition, adjust multiple with reference to matching degree;
It should be understood that since the environment residing for user is complex, it is possible to influence whether the accuracy of information matches, Therefore the environmental information of acquisition Current ambient is needed, and whether the environmental information for analyzing acquisition meets current authentication scene pair The authentication condition answered adjusts multiple with reference to matching degree if being unsatisfactory for the authentication condition.If conversely, the ring obtained Border information meets the authentication condition, then to reference matching degree without adjustment.Environmental information for example can be, but not limited to wrap It includes:Ambient noise, light intensity etc..
Optionally, adjust it is multiple with reference to matching degree specifically can be reduce multiple object matching degree with reference in matching degree, Improve multiple non-targeted matching degrees with reference in matching degree, object matching degree and the environmental information pair for being unsatisfactory for authentication condition It answers.For example, if ambient noise is more than default noise, it is corresponding with reference to matching degree to reduce voice print verification mode.
Further, it in the application other embodiments, obtains the environmental information of surrounding and whether analyzes environmental information Meet authentication condition, specifically may include:
Environmental information around obtaining, and whether the environmental information for analyzing acquisition meets the first authentication condition, if not Meet the first authentication condition, illustrates that the environment of surrounding cannot be satisfied authentication demand completely, then export third party's identity Verification mode prompt message obtains the corresponding third party's authentication information of third party's authentication mode, and works as third party's body When part verification information matches with the default authentication information of third party, it is identified through authentication.Wherein, third party's identity is tested Card information is different from the former corresponding multiple authentication modes of authentication scene, and third party's authentication mode is not by surrounding The influence of environment.It is verified for example, it is assumed that the former corresponding authentication mode of authentication scene is voice print verification mode and ear line Mode, then tiers e'tat verification mode can be fingerprint authentication mode, then when the ambient noise of acquisition is more than the first default noise When, confirm that the environmental information of acquisition is unsatisfactory for the first authentication condition, then changes and body is carried out using finger print identification verification mode Part verification.Optionally, third party's authentication mode can be by User Defined, or by electronic device according to being unsatisfactory for first The environmental information of authentication condition, other identity except the former corresponding multiple authentication modes of authentication scene are tested It is determined in card mode.
If the environment obtained meets the first authentication condition, whether the environmental information for analyzing acquisition meets the second identity Verification condition.If being unsatisfactory for the second authentication condition, illustrate that the environment of surrounding has an impact authentication, but be also unlikely to nothing Method completes authentication operation, then confirms that the environmental information of acquisition is unsatisfactory for authentication condition, then adjusts multiple references With degree.If meeting the second authentication condition, illustrate that the environment of surrounding, without influence, confirms that the environment of acquisition is believed to authentication Breath meets authentication condition, does not adjust multiple with reference to matching degree.
Like this, by analyzing influence of the ambient enviroment to authentication operation, each authentication mode pair is dynamically adjusted The reference matching degree answered can further increase flexibility and the accuracy of authentication.
204, multiple corresponding authentication informations of authentication mode are obtained;
Specifically, the prompt letter for prompting user to carry out authentication operation and authentication mode can be exported Breath, and according to the authentication sequence of prompt message prompt, multiple identity corresponding with current authentication scene are obtained successively The corresponding authentication information of verification mode.Alternatively, it is corresponding to obtain multiple authentication modes simultaneously Authentication information, such as:When user's finger pins screen and speaks, fingerprint identifier can be obtained simultaneously and is believed with voice print verification Breath.Alternatively, the corresponding authentication letter of multiple authentication modes can also be obtained according to the sequencing of user's operation Breath, such as:User first by finger press fingerprint obtain region, then first obtain fingerprint identifier, then, when detect user will When ear covers the loudspeaker of earphone, then ear line verification information is obtained by the loudspeaker of earphone.
205, the matching degree between each authentication information and corresponding default authentication information is obtained respectively;
It should be understood that before carrying out authentication, need depending on the user's operation, to obtain each authentication mode Default authentication information simultaneously stores in an electronic.When triggering authentication task, multiple authentication modes are obtained Corresponding authentication information, and by multiple authentication informations respectively with corresponding default authentication information into Row matching, obtains the matching degree between multiple authentication informations and corresponding default authentication information, that is, similar Degree.
206, matching degree is referred to based on multiple after adjustment, whether the multiple matching degrees for comparing acquisition be all higher than respective correspondence Reference matching degree;
If 207, being all higher than, it is identified through authentication;
Multiple matching degrees of acquisition are compared with the reference matching degree after corresponding adjustment respectively, and judge to obtain Whether the multiple matching degrees taken are all higher than the reference matching degree after the corresponding adjustment of multiple matching degrees, if be all higher than respectively it is right Reference matching degree after the adjustment answered, then be identified through authentication, then executes and is tested with identity under current authentication scene Corresponding subsequent operation after demonstrate,proving successfully such as solves lock screen, and the information etc. for confirming payment is sent to server.
Conversely, if multiple matching degrees are not all higher than, multiple matching degrees are corresponding to refer to matching degree, confirms and does not pass through Authentication does not execute and is proved to be successful rear corresponding subsequent operation with identity under current authentication scene.Further, may be used also The prompt message of output prompt authentication mistake.
If 208, meeting authentication condition, multiple corresponding authentication informations of authentication mode are obtained;
209, the matching degree between each authentication information and corresponding default authentication information is obtained respectively;
210, compare acquisition multiple matching degrees whether be all higher than it is corresponding refer to matching degree;
If 211, being all higher than, it is identified through authentication.
It should be understood that if the environmental information obtained meets authentication condition, it is each to obtain multiple authentication modes Self-corresponding authentication information is obtained respectively between each authentication information and corresponding default authentication information Matching degree, and the multiple matching degrees for comparing acquisition whether be all higher than it is corresponding it is unadjusted refer to matching degree, then when obtaining When the multiple matching degrees taken are all higher than corresponding unadjusted reference matching degree, it is identified through authentication.
It should be noted that obtaining and analyzing whether environmental information meets authentication condition, triggering body can be happened at After part validation task, compare acquisition multiple matching degrees whether be all higher than it is corresponding with reference to arbitrary before matching degree when It carves.
Optionally, in the application other embodiments, multiple authentication modes specifically include:Voice print verification mode and Ear line verification mode, environmental information include ambient noise, then whether monitoring of environmental noise is more than default noise, when monitoring environment When noise is more than default noise, it is corresponding with reference to matching degree to the first matching degree, raising ear line verification to reduce voice print verification mode Mode is corresponding to be more than default noise with reference to matching degree to the second matching degree, the first matching degree and the second matching degree and ambient noise Degree correspond to.Such as:When ambient noise is larger, influences the discrimination of vocal print, the reference matching degree of Application on Voiceprint Recognition is reduced, Improve the reference matching degree of ear line identification.Optionally, it can be weight with reference to matching degree, then it is corresponding to reduce voice print verification mode Degree with reference to matching degree is corresponding with the corresponding degree with reference to matching degree of ear line verification mode is improved, that is, voice print verification mode Reduce how much, ear line verification mode just improve how much.
Optionally, whether can be more than default noise by earphone horn monitoring of environmental noise.
Optionally, multiple corresponding authentication informations of authentication mode are obtained, including:It is obtained by earphone horn Ear line verification information is taken, voice print verification information is obtained by microphone.
Specifically, ear line verification information can be obtained using following audible signal formula by the loudspeaker of earphone.
R=s* (w0+Tw △+wa)+e+n
Wherein, r is the digital sample for the sense of hearing audio signal that earphone senses, and s is to be believed by the source audio that earphone plays Number digital sample, e is environmental noise, and n is electric noise, and w0 is the electric echo model of earphone under temperature T0, and w △ are and earphone The relevant temperature model of electrical noise pattern, wa are the acoustic noise model in space residing for earphone, and T is temperature.W0, w △ are earphones Intrinsic parameter, e and n are the intrinsic parts of system.Earphone is mainly to detect the spy of ear line by detecting the acoustical change of wa Acoustic feature variation in sign or ear.
It should be understood that before carrying out authentication, need first to play one section of sound to user, preferably specific frequency Ultrasonic wave, and the ear line characteristic information for obtaining by the loudspeaker of earphone user at this time be used as and presets ear line verification information and be stored in electricity In sub-device, in case follow-up authenticating phase uses.
Like this, it is used earphone horn as microphone, utilizes the acoustic feature in earphone horn monitoring ear.Earphone loudspeaker Radio reception simultaneously detects ear line feature, in conjunction with vocal print feature, can combine the accuracy rate and security level for improving bio-identification.
Auth method provided in this embodiment, by when triggering authentication task, obtaining authentication scene Corresponding multiple authentication modes and it is multiple refer to matching degree, and whether the environmental information for analyzing surrounding meets the authentication The corresponding authentication condition of scene adjusts if being unsatisfactory for the authentication condition with reference to matching degree, is tested if meeting the identity Card condition then carries out authentication, due to that can be directed to different environmental conditions and different bodies according to original with reference to matching degree Part verification scene takes different authentication strategy to carry out authentication, therefore the flexibility, accurate of authentication can be improved Property and safe class.
Referring to Fig. 3, a kind of implementation process schematic diagram of the auth method provided for one embodiment of the application, can answer For the electronic device with multiple authentication modes, such as:Smart mobile phone, tablet computer, laptop computer, intelligent wearable device Equal intelligent mobile terminals or non-other terminals that can carry out data processing on the move, such as desktop computer.It is wherein intelligent Wearable device such as smartwatch, Intelligent bracelet, intelligent glasses etc..As shown in figure 3, this method mainly includes the following steps that:
301, when triggering authentication task, corresponding multiple authentication modes of authentication scene and multiple are obtained With reference to matching degree;
302, the environmental information around obtaining, and analyze whether environmental information meets the corresponding identity of authentication scene Verification condition;
Step 301 and step 302 and the step 201 in embodiment illustrated in fig. 2 are identical as step 202, specifically refer to Step 201 and the related content in step 202 are stated, details are not described herein again.
If 303, being unsatisfactory for authentication condition, third party's authentication mode prompt message is exported;
If the environmental information obtained is unsatisfactory for authentication condition, third party's authentication mode prompt message is exported, The prompt message is for prompting user that will carry out authentication using third party's authentication mode.
304, the corresponding third party's authentication information of third party's authentication mode is obtained;
305, when third party's authentication information and third party, which preset authentication information, to match, it is identified through identity Verification;
Third party's authentication mode is different from the corresponding multiple authentications of the authentication scene obtained in step 301 Mode.Third party's authentication information that user is inputted based on third party's authentication mode prompt message is obtained, by acquisition Third party's authentication information is preset authentication information with third party and is matched, if the two matches, is identified through body Part verification.Otherwise, confirm and do not pass through authentication.
If 306, meeting the authentication condition, the corresponding authentication letter of multiple authentication modes is obtained Breath;
307, the matching degree between each authentication information and corresponding default authentication information is obtained respectively;
308, compare acquisition multiple matching degrees whether be all higher than it is corresponding refer to matching degree;
If 309, being all higher than, it is identified through authentication.
Step 306 is similar to step 105 to the step 102 in embodiment illustrated in fig. 1 to step 309, specifically refers to The related content in embodiment illustrated in fig. 1 is stated, details are not described herein again.
Auth method provided in this embodiment, by when triggering authentication task, obtaining authentication scene Corresponding multiple authentication modes and it is multiple refer to matching degree, and whether the environmental information for analyzing surrounding meets the authentication The corresponding authentication condition of scene carries out body if being unsatisfactory for the authentication condition in the way of third party's authentication Part verification, if meeting the authentication condition, carries out authentication, due to can needle in the way of multiple authentications of acquisition Different authentication strategies is taken to carry out authentication different environmental conditions and different authentication scenes, because The flexibility of authentication and safe class can be improved in this.
Referring to Fig. 4, the structural schematic diagram of the electronic device provided for one embodiment of the application.The electronic device can be used for Realize the auth method that above-mentioned embodiment illustrated in fig. 1 provides.As shown in figure 4, the electronic device includes mainly:Matching degree obtains Modulus block 401, verification information acquisition module 402, matching module 403, comparison module 404 and authentication module 405.
Matching degree acquisition module 401, for when triggering authentication task, it is corresponding multiple to obtain authentication scene Authentication mode and it is multiple refer to matching degree;
Verification information acquisition module 402, for obtaining multiple corresponding authentication informations of authentication mode;
Matching module 403, for obtaining the respectively authentication information and corresponding default authentication information respectively Between matching degree;
Whether comparison module 404, multiple matching degrees for comparing acquisition are all higher than corresponding this and refer to matching degree;
Authentication module 405 is identified through if being all higher than corresponding this for multiple matching degrees refers to matching degree Authentication.
It should be noted that in the embodiment of the exemplary electronic device of figure 4 above, the division of each function module is only to lift Example explanation, can be as needed in practical application, such as the convenient of realization of the configuration requirement or software of corresponding hardware considers, And complete above-mentioned function distribution by different function modules, i.e., the internal structure of electronic device is divided into different function moulds Block, to complete all or part of the functions described above.Moreover, in practical applications, the corresponding function in the present embodiment Module can also be executed corresponding software by corresponding hardware realization by corresponding hardware and be completed.This specification provides Each embodiment all can apply foregoing description principle, repeat no more below.
The detailed process of the respective function of each Implement of Function Module, refers to above-mentioned figure in electronic device provided in this embodiment Particular content described in 1 illustrated embodiment, details are not described herein again.
Electronic device provided in this embodiment is corresponded to by when triggering authentication task, obtaining authentication scene Multiple authentication modes and it is multiple refer to matching degree, obtain multiple authentication modes corresponding authentication letter Breath, then obtains the matching degree between each authentication information and corresponding default authentication information, works as acquisition respectively Multiple matching degrees be all higher than it is corresponding with reference to matching degree when, authentication is identified through, due to being directed to different identity Verification scene takes different authentication strategies, therefore flexibility and the safe class of authentication can be improved.
Referring to Fig. 5, the structural schematic diagram of the electronic device provided for another embodiment of the application.The electronic device is available In the auth method for realizing that above-mentioned Fig. 1 is provided to embodiment illustrated in fig. 3.Unlike embodiment illustrated in fig. 4, such as Fig. 5 It is shown, in electronic device provided in this embodiment:
Further, which further includes:
Analysis module 501 for the environmental information around obtaining, and analyzes whether the environmental information meets the authentication The corresponding authentication condition of scene;
Module 502 is adjusted, if being unsatisfactory for the authentication condition for the environmental information, adjusts multiple reference matchings Degree;
Comparison module 404, multiple this after being additionally operable to based on adjustment refer to matching degree, and comparing multiple matching degrees of acquisition is It is no be all higher than it is corresponding this refer to matching degree;
Adjustment module 502 reduces multiple references if being unsatisfactory for the authentication condition specifically for the environmental information Object matching degree in matching degree, improve it is multiple this with reference to the non-targeted matching degree in matching degree, the object matching degree with it is discontented The environmental information of the foot authentication condition corresponds to.
Further, multiple authentication modes include:Voice print verification mode and ear line verification mode, the environmental information Including ambient noise, then,
Analysis module 501, is additionally operable to whether monitoring of environmental noise is more than default noise;
Module 502 is adjusted, is additionally operable to, when monitoring that the ambient noise is more than default noise, reduce the voice print verification mode It is corresponding with reference to matching degree to the first matching degree, improve the ear line verification mode it is corresponding with reference to matching degree to the second matching degree, First matching degree and the second matching degree are corresponding more than the default degree of noise with the ambient noise;
Verification information acquisition module 402 is additionally operable to obtain ear line verification information by earphone horn, be obtained by microphone Voice print verification information;
Analysis module 501 is additionally operable to monitor whether the ambient noise is more than default noise by the earphone horn.
Further, which further includes:
Reminding module 503 exports third party's authentication if being unsatisfactory for the authentication condition for the environmental information Mode prompt message;
Verification information acquisition module 402 is additionally operable to obtain the corresponding third party's identity of third party's authentication mode and test Demonstrate,prove information;
Authentication module 405 is additionally operable to third party's authentication information and third party presetting authentication information progress Matching is identified through authentication when third party's authentication information presets authentication information with third party to match;
Verification information acquisition module 402 obtains multiple be somebody's turn to do if being additionally operable to the environmental information meets the authentication condition The corresponding authentication information of authentication mode.
Optionally, third party's authentication mode can be by User Defined, or by reminding module 503 according to being unsatisfactory for The environmental information of first authentication condition, other bodies except the former corresponding multiple authentication modes of authentication scene It is determined in part verification mode.
Further, analysis module 501 are additionally operable to analyze whether the environmental information meets the first authentication condition;
Reminding module 503 exports the third party if being additionally operable to the environmental information is unsatisfactory for the first authentication condition Authentication mode prompt message;
Analysis module 501 analyzes the environmental information if being additionally operable to the environmental information meets the first authentication condition Whether meet the second authentication condition, if the environmental information is unsatisfactory for the second authentication condition, confirms that the environment is believed Breath is unsatisfactory for the authentication condition.
The detailed process of the respective function of each Implement of Function Module, refers in authentication means provided in this embodiment The particular content described in Fig. 1 to Fig. 4 illustrated embodiment is stated, details are not described herein again.
Electronic device provided in this embodiment is corresponded to by when triggering authentication task, obtaining authentication scene Multiple authentication modes and it is multiple refer to matching degree, obtain multiple authentication modes corresponding authentication letter Breath, then obtains the matching degree between each authentication information and corresponding default authentication information, works as acquisition respectively Multiple matching degrees be all higher than it is corresponding with reference to matching degree when, authentication is identified through, due to being directed to different identity Verification scene takes different authentication strategies, therefore flexibility and the safe class of authentication can be improved.
Referring to Fig. 6, Fig. 6 is the hardware architecture diagram for the electronic device that one embodiment of the application provides.
Electronic device described in the present embodiment, including:
Memory 601, processor 602 and it is stored in the computer journey that can be run on memory 601 and on processor 602 Sequence when processor 602 executes the computer program, realizes earlier figures 1 to the authentication side described in embodiment illustrated in fig. 3 Method.
Further, which further includes:
At least one input equipment 603 and at least one output equipment 604.
Above-mentioned memory 601, processor 602, input equipment 603 and output equipment 604, are connected by bus 605.
Wherein, input equipment 603 concretely camera, touch panel, physical button or mouse etc..Output equipment 604 concretely display screens.
Memory 601 can be high random access memory body (RAM, Random Access Memory) memory, Can be non-labile memory (non-volatile memory), such as magnetic disk storage.Memory 601 is for storing one Group executable program code, processor 602 are coupled with memory 601.
Further, the embodiment of the present application also provides a kind of computer readable storage medium, the computer-readable storages Medium can be disposed in the electronic device in the various embodiments described above, which can be earlier figures 6 Memory in illustrated embodiment.It is stored with computer program on the computer readable storage medium, which is held by processor Realize earlier figures 1 to the auth method described in embodiment illustrated in fig. 3 when row.Further, which can store Jie Matter can also be that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), RAM, magnetic disc or CD etc. are each Kind can store the medium of program code.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the module, only Only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple module or components can be tied Another system is closed or is desirably integrated into, or some features can be ignored or not executed.Another point, it is shown or discussed Mutual coupling, direct-coupling or communication connection can be the INDIRECT COUPLING or logical by some interfaces, device or module Letter connection can be electrical, machinery or other forms.
The module illustrated as separating component may or may not be physically separated, aobvious as module The component shown may or may not be physical module, you can be located at a place, or may be distributed over multiple On network module.Some or all of module therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each function module in each embodiment of the application can be integrated in a processing module, it can also That modules physically exist alone, can also two or more modules be integrated in a module.Above-mentioned integrated mould The form that hardware had both may be used in block is realized, can also be realized in the form of software function module.
If the integrated module is realized in the form of software function module and sells or use as independent product When, it can be stored in a computer read/write memory medium.Based on this understanding, the technical solution of the application is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a readable storage medium storing program for executing, including some instructions are used so that a meter It calculates machine equipment (can be personal computer, server or the network equipment etc.) and executes each embodiment the method for the application All or part of step.And readable storage medium storing program for executing above-mentioned includes:USB flash disk, mobile hard disk, ROM, RAM, magnetic disc or CD etc. The various media that can store program code.
It should be noted that for each method embodiment above-mentioned, describe, therefore it is all expressed as a series of for simplicity Combination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence because According to the application, certain steps may be used other sequences or be carried out at the same time.Secondly, those skilled in the art should also know It knows, embodiment described in this description belongs to preferred embodiment, and involved action and module might not all be this Shens It please be necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiments.
It is retouching to auth method provided herein, electronic device and computer readable storage medium above It states, can in specific embodiments and applications according to the thought of the embodiment of the present application for those skilled in the art There is change place, to sum up, the contents of this specification should not be construed as limiting the present application.

Claims (14)

1. a kind of auth method, which is characterized in that the method includes:
When triggering authentication task, the corresponding multiple authentication modes of authentication scene and multiple reference matchings are obtained Degree;
Obtain multiple corresponding authentication informations of authentication mode;
The matching degree between each authentication information and corresponding default authentication information is obtained respectively;
Compare acquisition multiple matching degrees whether be all higher than it is corresponding it is described refer to matching degree;
If being all higher than, it is identified through authentication.
2. auth method as described in claim 1, which is characterized in that whether the multiple matching degrees relatively obtained are equal It is described with reference to before matching degree more than corresponding, further include:
Environmental information around obtaining, and analyze the environmental information and whether meet the corresponding identity of the authentication scene and test Card condition;
If being unsatisfactory for the authentication condition, adjust multiple described with reference to matching degree;
Then, whether the multiple matching degrees relatively obtained are all higher than corresponding described with reference to matching degree, including:
Based on after adjustment it is multiple it is described refer to matching degree, whether the multiple matching degrees for comparing acquisition be all higher than corresponding institute It states and refers to matching degree;
If meeting the authentication condition, executes the multiple corresponding identity of authentication mode of acquisition and test The step of demonstrate,proving information.
3. auth method as claimed in claim 2, which is characterized in that if described be unsatisfactory for the authentication condition, Then adjust it is multiple it is described refer to matching degree, including:
If being unsatisfactory for the authentication condition, multiple object matching degree with reference in matching degree are reduced, are improved multiple The non-targeted matching degree with reference in matching degree, the object matching degree and the environment for being unsatisfactory for the authentication condition are believed Breath corresponds to.
4. auth method as claimed in claim 3, which is characterized in that multiple authentication modes include:Vocal print Verification mode and ear line verification mode, the environmental information include ambient noise, then whether the analysis environmental information is full The corresponding authentication condition of the foot authentication scene;If being unsatisfactory for the authentication condition, reduce multiple described With reference to the object matching degree in matching degree, improve multiple non-targeted matching degrees with reference in matching degree, including:
Whether monitoring of environmental noise is more than default noise;
When monitoring that the ambient noise is more than default noise, the corresponding reference matching degree of the voice print verification mode is reduced extremely First matching degree, improve the ear line verification mode it is corresponding with reference to matching degree to the second matching degree, first matching degree and Second matching degree is corresponding more than the default degree of noise with the ambient noise.
5. auth method as claimed in claim 4, which is characterized in that the multiple authentication modes of acquisition are each Self-corresponding authentication information, including:
Ear line verification information is obtained by earphone horn, voice print verification information is obtained by microphone;
Whether the monitoring of environmental noise is more than default noise, including:
Monitor whether the ambient noise is more than default noise by the earphone horn.
6. auth method as described in claim 1, which is characterized in that the multiple authentication modes of acquisition are each Before self-corresponding authentication information, further include:
Environmental information around obtaining, and analyze the environmental information and whether meet the corresponding identity of the authentication scene and test Card condition;
If being unsatisfactory for the authentication condition, third party's authentication mode prompt message is exported;
Obtain the corresponding third party's authentication information of third party's authentication mode;
When third party's authentication information and the third party, which preset authentication information, to match, it is identified through identity Verification;
If meeting the authentication condition, executes the multiple corresponding identity of authentication mode of acquisition and test The step of demonstrate,proving information.
7. auth method as claimed in claim 2, which is characterized in that the environmental information around the acquisition, and analyze Whether the environmental information meets the corresponding authentication condition of the authentication scene, including:
Environmental information around obtaining, and analyze whether the environmental information meets the first authentication condition;
If being unsatisfactory for the first authentication condition, third party's authentication mode prompt message is exported, obtain described the The corresponding third party's authentication information of tripartite's authentication mode, and when third party's authentication information and third party are pre- If authentication information matches, it is identified through authentication;
If meeting the first authentication condition, analyze whether the environmental information meets the second authentication condition;
If being unsatisfactory for the second authentication condition, confirm that the environmental information is unsatisfactory for the authentication condition.
8. a kind of electronic device, which is characterized in that including:
Matching degree acquisition module is tested for when triggering authentication task, obtaining the corresponding multiple identity of authentication scene Card mode and it is multiple refer to matching degree;
Verification information acquisition module, for obtaining multiple corresponding authentication informations of authentication mode;
Matching module, for obtaining respectively between each authentication information and corresponding default authentication information Matching degree;
Whether comparison module, multiple matching degrees for comparing acquisition are all higher than corresponding described with reference to matching degree;
Authentication module, if for multiple matching degrees be all higher than it is corresponding it is described refer to matching degree, be identified through body Part verification.
9. electronic device as claimed in claim 8, which is characterized in that the electronic device further includes:
Analysis module for the environmental information around obtaining, and analyzes whether the environmental information meets the authentication field The corresponding authentication condition of scape;
Module is adjusted, if being unsatisfactory for the authentication condition for the environmental information, is adjusted multiple described with reference to matching Degree;
The comparison module, multiple described with reference to matching degree after being additionally operable to based on adjustment, comparing multiple matching degrees of acquisition is It is no be all higher than it is corresponding it is described refer to matching degree;
The adjustment module reduces multiple described if being unsatisfactory for the authentication condition specifically for the environmental information With reference to the object matching degree in matching degree, multiple non-targeted matching degrees with reference in matching degree, the object matching are improved It spends corresponding with the environmental information of authentication condition is unsatisfactory for.
10. electronic device as claimed in claim 9, which is characterized in that multiple authentication modes include:Voice print verification Mode and ear line verification mode, the environmental information include ambient noise, then,
The analysis module, is additionally operable to whether monitoring of environmental noise is more than default noise;
The adjustment module is additionally operable to, when monitoring that the ambient noise is more than default noise, reduce the voice print verification side Formula is corresponding with reference to matching degree to the first matching degree, and it is corresponding with reference to matching degree to the second matching to improve the ear line verification mode Degree, first matching degree and the second matching degree are corresponding more than the default degree of noise with the ambient noise;
The verification information acquisition module is additionally operable to obtain ear line verification information by earphone horn, sound is obtained by microphone Line verification information;
The analysis module is additionally operable to monitor whether the ambient noise is more than default noise by the earphone horn.
11. electronic device as claimed in claim 9, which is characterized in that the electronic device further includes:
Reminding module exports third party authentication side if being unsatisfactory for the authentication condition for the environmental information Formula prompt message;
The verification information acquisition module is additionally operable to obtain the corresponding third party's authentication of third party's authentication mode Information;
The authentication module, be additionally operable to by third party's authentication information and the third party preset authentication information into Row matching is identified through when third party's authentication information presets authentication information with the third party to match Authentication;
The verification information acquisition module obtains multiple if being additionally operable to the environmental information meets the authentication condition The corresponding authentication information of authentication mode.
12. electronic device as claimed in claim 10, which is characterized in that
The analysis module is additionally operable to analyze whether the environmental information meets the first authentication condition;
The reminding module exports described if being additionally operable to the environmental information is unsatisfactory for the first authentication condition Tripartite's authentication mode prompt message;
The analysis module analyzes the environment if being additionally operable to the environmental information meets the first authentication condition Whether information meets the second authentication condition, if the environmental information is unsatisfactory for the second authentication condition, confirms The environmental information is unsatisfactory for the authentication condition.
13. a kind of electronic device, including:It memory, processor and is stored on the memory and can be on the processor The computer program of operation, which is characterized in that when the processor executes the computer program, realize such as claim 1 to 7 In any one described in auth method.
14. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program When being executed by processor, the auth method as described in any one in claim 1 to 7 is realized.
CN201810291122.9A 2018-04-03 2018-04-03 Auth method, electronic device and computer readable storage medium Pending CN108512986A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810291122.9A CN108512986A (en) 2018-04-03 2018-04-03 Auth method, electronic device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810291122.9A CN108512986A (en) 2018-04-03 2018-04-03 Auth method, electronic device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN108512986A true CN108512986A (en) 2018-09-07

Family

ID=63380151

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810291122.9A Pending CN108512986A (en) 2018-04-03 2018-04-03 Auth method, electronic device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108512986A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409044A (en) * 2018-09-19 2019-03-01 维沃移动通信有限公司 A kind of verifying interface display method and terminal
CN109801633A (en) * 2019-01-30 2019-05-24 北京得意音通技术有限责任公司 Method for processing business, device, electronic equipment and storage medium
CN110096865A (en) * 2019-05-13 2019-08-06 北京三快在线科技有限公司 Issue the method, apparatus, equipment and storage medium of verification mode
CN111556394A (en) * 2020-04-24 2020-08-18 维沃移动通信有限公司 Earphone set
CN111695905A (en) * 2019-03-15 2020-09-22 阿里巴巴集团控股有限公司 Payment method, payment device, computing equipment and storage medium
WO2021213490A1 (en) * 2020-04-23 2021-10-28 华为技术有限公司 Identity verification method and apparatus and electronic device
WO2024109737A1 (en) * 2022-11-21 2024-05-30 中移(苏州)软件技术有限公司 Information verification method and apparatus, electronic device and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140064575A1 (en) * 2012-09-06 2014-03-06 Leonard Flom Iris Identification System and Method
CN105429969A (en) * 2015-11-09 2016-03-23 普天智能照明研究院有限公司 User identity verification method and equipment
CN106203019A (en) * 2016-07-21 2016-12-07 北京光年无限科技有限公司 A kind of user ID authentication method for robot and robot
CN106446802A (en) * 2016-09-07 2017-02-22 深圳市金立通信设备有限公司 Fingerprint identification method and terminal
CN106599875A (en) * 2016-12-23 2017-04-26 努比亚技术有限公司 Fingerprint identification device and method
CN107172084A (en) * 2017-06-30 2017-09-15 广州三星通信技术研究有限公司 A kind of method and apparatus of authentication
CN107463818A (en) * 2017-07-10 2017-12-12 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN107480488A (en) * 2017-07-18 2017-12-15 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN107749844A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 Auth method and mobile terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140064575A1 (en) * 2012-09-06 2014-03-06 Leonard Flom Iris Identification System and Method
CN105429969A (en) * 2015-11-09 2016-03-23 普天智能照明研究院有限公司 User identity verification method and equipment
CN106203019A (en) * 2016-07-21 2016-12-07 北京光年无限科技有限公司 A kind of user ID authentication method for robot and robot
CN106446802A (en) * 2016-09-07 2017-02-22 深圳市金立通信设备有限公司 Fingerprint identification method and terminal
CN106599875A (en) * 2016-12-23 2017-04-26 努比亚技术有限公司 Fingerprint identification device and method
CN107172084A (en) * 2017-06-30 2017-09-15 广州三星通信技术研究有限公司 A kind of method and apparatus of authentication
CN107463818A (en) * 2017-07-10 2017-12-12 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN107480488A (en) * 2017-07-18 2017-12-15 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN107749844A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 Auth method and mobile terminal

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409044A (en) * 2018-09-19 2019-03-01 维沃移动通信有限公司 A kind of verifying interface display method and terminal
CN109801633A (en) * 2019-01-30 2019-05-24 北京得意音通技术有限责任公司 Method for processing business, device, electronic equipment and storage medium
CN111695905A (en) * 2019-03-15 2020-09-22 阿里巴巴集团控股有限公司 Payment method, payment device, computing equipment and storage medium
CN111695905B (en) * 2019-03-15 2024-01-30 阿里巴巴集团控股有限公司 Payment method, device, computing equipment and storage medium
CN110096865A (en) * 2019-05-13 2019-08-06 北京三快在线科技有限公司 Issue the method, apparatus, equipment and storage medium of verification mode
CN110096865B (en) * 2019-05-13 2021-07-23 北京三快在线科技有限公司 Method, device and equipment for issuing verification mode and storage medium
WO2021213490A1 (en) * 2020-04-23 2021-10-28 华为技术有限公司 Identity verification method and apparatus and electronic device
CN113643707A (en) * 2020-04-23 2021-11-12 华为技术有限公司 Identity verification method and device and electronic equipment
CN111556394A (en) * 2020-04-24 2020-08-18 维沃移动通信有限公司 Earphone set
WO2024109737A1 (en) * 2022-11-21 2024-05-30 中移(苏州)软件技术有限公司 Information verification method and apparatus, electronic device and storage medium

Similar Documents

Publication Publication Date Title
CN108512986A (en) Auth method, electronic device and computer readable storage medium
US10042993B2 (en) Access control through multifactor authentication with multimodal biometrics
US11159868B2 (en) Electronic device for authenticating user by using audio signal and method thereof
CN111033501B (en) Secure authorization for access to private data in virtual reality
US11074466B2 (en) Anti-counterfeiting processing method and related products
EP3970039A1 (en) Identity verification and management system
CN105516104B (en) A kind of auth method and system of the dynamic password based on TEE
US20120110341A1 (en) Mobile Device Transaction Using Multi-Factor Authentication
CN105740682B (en) The personal identification method and system of a kind of computer system and its user
CN109684806A (en) Auth method, device, system and medium based on physiological characteristic information
US20100040293A1 (en) Kinematic Based Authentication
CN104156651A (en) Access control method and device for terminal
US20190130411A1 (en) Method and system for data processing
EP3494537A1 (en) Method to authenticate or identify a user based upon fingerprint scans
CN105868611A (en) Biological-information authentication method and device and mobile terminal
CN109254661B (en) Image display method, image display device, storage medium and electronic equipment
JP2023549934A (en) Method and apparatus for user recognition
CN113826135B (en) System, method and computer system for contactless authentication using voice recognition
CN108647510A (en) Application program access method and device
CN112215598A (en) Voice payment method and electronic equipment
WO2021244471A1 (en) Real-name authentication method and device
CN112989888A (en) Fingerprint anti-counterfeiting method and electronic equipment
CN108932415A (en) A kind of the authority acquiring method, apparatus and earphone of terminal device
CN110651268A (en) Method and electronic equipment for authenticating user
CN114581091A (en) Identity authentication method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180907