CN110321680B - Identity verification method and terminal equipment - Google Patents

Identity verification method and terminal equipment Download PDF

Info

Publication number
CN110321680B
CN110321680B CN201910560725.9A CN201910560725A CN110321680B CN 110321680 B CN110321680 B CN 110321680B CN 201910560725 A CN201910560725 A CN 201910560725A CN 110321680 B CN110321680 B CN 110321680B
Authority
CN
China
Prior art keywords
password
bending angle
screen bending
user
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910560725.9A
Other languages
Chinese (zh)
Other versions
CN110321680A (en
Inventor
郑国炳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910560725.9A priority Critical patent/CN110321680B/en
Publication of CN110321680A publication Critical patent/CN110321680A/en
Application granted granted Critical
Publication of CN110321680B publication Critical patent/CN110321680B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/0346Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor with detection of the device orientation or free movement in a 3D space, e.g. 3D mice, 6-DOF [six degrees of freedom] pointers using gyroscopes, accelerometers or tilt-sensors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons

Abstract

The invention discloses an identity authentication method and terminal equipment, wherein the method comprises the following steps: when an identity authentication request initiated by a user is received, acquiring the current screen bending angle of the terminal equipment; determining a reference password based on the screen bending angle and a pre-input original password; and if the reference password is detected to be matched with the password to be verified input by the user, the identity verification request is passed. Therefore, the screen bending angle is used as a basis for transforming the original password so as to hide the original password, and therefore the purpose of carrying out identity authentication on the user more safely can be achieved.

Description

Identity verification method and terminal equipment
Technical Field
The present invention relates to the field of terminals, and in particular, to an identity authentication method and a terminal device.
Background
Authentication means that the user identity is confirmed by a certain means, and the authentication can be divided into: shared key based authentication, biometric based authentication, and public key encryption algorithm based authentication.
Taking authentication based on a shared key as an example, the current authentication scheme generally determines the identity of a user by determining whether a password input by the user on a target user interface (a lock screen interface, a payment interface, etc.) of a terminal device is consistent with a password input in advance. However, in some public places, the password input by the user is easy to leak out due to peeping, and the security is not sufficient.
Therefore, a more secure authentication scheme is needed.
Disclosure of Invention
The embodiment of the invention aims to provide an identity authentication method and terminal equipment, which are used for ensuring the security of identity authentication.
In a first aspect, a method for identity verification is provided, the method including:
when an identity authentication request initiated by a user is received, acquiring the current screen bending angle of the terminal equipment;
determining a reference password based on the screen bending angle and a pre-input original password;
and if the reference password is detected to be matched with the password to be verified input by the user, the identity verification request is passed.
In a second aspect, a method of identity verification is provided, the method comprising:
when an identity authentication request initiated by a user is received, acquiring a screen bending angle of terminal equipment;
and if the screen bending angle is detected to be within a preset reference screen bending angle range and the acquired biological characteristics of the user are matched with the biological characteristics input in advance, the identity authentication request is passed.
In a third aspect, a terminal device is provided, which includes:
the terminal equipment comprises an acquisition module, a display module and a display module, wherein the acquisition module is used for acquiring the current screen bending angle of the terminal equipment when receiving an identity authentication request initiated by a user;
the determining module is used for determining a reference password based on the screen bending angle and a pre-input original password;
and the verification module is used for passing the identity verification request if the reference password is detected to be matched with the password to be verified input by the user.
In a fourth aspect, a terminal device is provided, which includes:
the terminal equipment comprises an acquisition module, a display module and a display module, wherein the acquisition module is used for acquiring the screen bending angle of the terminal equipment when receiving an identity authentication request initiated by a user;
and the verification module is used for passing the identity verification request if the screen bending angle is detected to be within a preset reference screen bending angle range and the acquired biological characteristics of the user are matched with the biological characteristics input in advance.
In a fifth aspect, a terminal device is provided, where the terminal device includes: a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method according to the first aspect.
In a sixth aspect, a terminal device is provided, which includes: a processor, a memory and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method according to the second aspect.
In a seventh aspect, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, realizes the steps of the method according to the first aspect.
In an eighth aspect, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, realizes the steps of the method according to the second aspect.
In the embodiment of the invention, the screen bending angle is used as the independent variable, the original password is used as the dependent variable, the original password is dynamically adjusted along with the change of the screen bending angle to obtain the reference password, and when the user inputs the password to be verified matched with the reference password on the password input interface, the user passes the authentication request of the user. Therefore, the leakage of the original password can be avoided, and the aim of carrying out the identity authentication of the user more safely can be fulfilled.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
fig. 1 is a schematic flow chart of an authentication method according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating a correspondence relationship between a screen bending angle range and a password transformation rule according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating a relationship between a screen bending angle range and a password transformation rule according to another embodiment of the present invention;
fig. 4 is a schematic flow chart of an authentication method according to another embodiment of the present invention;
FIG. 5 is a diagram illustrating a correspondence between a range of a bending angle of a screen and biometric identification according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a terminal device according to another embodiment of the present invention;
fig. 8 is a schematic structural diagram of a terminal device according to yet another embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow chart of an authentication method according to an embodiment of the present invention, and referring to fig. 1, the method may specifically include the following steps:
step 102: when an identity authentication request initiated by a user is received, acquiring the current screen bending angle of the terminal equipment;
the identity authentication request is used to authenticate identity information of a user, for example: a screen unlocking request, a payment request, an account login request and the like; the foldable screen of the terminal equipment can be a flexible screen or a foldable screen, and the foldable screen generally consists of two sub-screens and a rotating shaft magnetic chain for connecting the sub-screens.
It should be noted that, the step 102 may specifically be exemplified by:
example 1, a user clicks an "immediate payment" control on a certain payment interface of a terminal device, and the terminal device is triggered to calculate that a current screen bending angle of the terminal device is 45 ° through a gravity sensor inside a rotating shaft magnetic chain.
Example 2, the user drags the unlock icon upwards on the screen lock interface of the terminal device, and the terminal device is triggered to calculate that the current screen bending angle of the terminal device is 45 degrees through gravity induction components of the two sub-screens.
It can be seen that, in step 102, the screen bending angle can be accurately and conveniently acquired based on the existing hardware device of the terminal device, without adding any new software or hardware.
It should be noted that after step 102, the method further includes: a display step, wherein one implementation manner of the display step can be as follows:
and displaying the screen bending angle on a password input interface so that the user can determine the password to be verified which needs to be input.
Therefore, the screen bending angle is displayed on the password input interface, so that a user can more visually see the screen bending angle and input the password to be verified corresponding to the screen bending angle, the problem that the user inputs the password to be verified due to the fact that the user judges the screen bending angle wrongly is avoided, and the password to be verified can be input more accurately.
Step 104: determining a reference password based on the screen bending angle and a pre-input original password;
it should be noted that, one implementation of step 104 may be:
step S1: determining a target password transformation rule corresponding to the screen bending angle;
step S2: and based on the target password transformation rule, transforming the pre-input original password to obtain a reference password.
Based on the method, the pre-input original password is transformed through the target password transformation rule corresponding to the screen bending angle to obtain the reference password, and the reference password corresponding to the screen bending angle can be obtained more accurately and conveniently.
Further, one implementation manner of step S1 may be:
step S11: determining a screen bending angle range to which the screen bending angle belongs;
step S12: determining a password transformation rule corresponding to the screen bending angle range, and taking the password transformation rule as the target password transformation rule;
and the password transformation rules corresponding to different screen bending angle ranges are different.
The screen bending angle can be any one angle of 0-180 degrees; the screen bending angle range can be divided into 6, which are sequentially the 1 st screen bending angle range to the 6 th screen bending angle range ([0, 30), [30, 60), [60, 90), [90, 120), [120, 150), [150, 180 ]); the password transformation rule can be preset for transformation algorithm, the number of the original password needing to be transformed is different due to different screen bending angle ranges, the transformation algorithm in the original password can be preset for the transformation number, the transformation algorithm in the original password is different due to different screen bending angle ranges, and the number of the original password needing to be transformed and the transformation algorithm are different due to different screen bending angle ranges.
Based on this, the password transformation rule corresponding to the screen bending angle range to which the screen bending angle belongs is used as the target password transformation rule, and different password rule rules corresponding to each screen bending angle are not needed, so that the target password transformation rule can be determined more conveniently.
The password transformation rule is preset for a transformation algorithm, and when the number of digits to be transformed in the original password is different due to different screen bending angle ranges, one implementation manner of "transforming the pre-entered original password based on the target password transformation rule" in step S2 may be:
step S21: determining the digits to be transformed in the pre-input original password based on the target password transformation rule;
step S22: based on a preset transformation algorithm, carrying out transformation processing on the digit in the original password;
wherein the transformation process comprises: at least one of converting a digital value and converting a digital position; the digit can be one or more digits; when the digit is one digit, the digit can be in a forward corresponding relation with the screen bending angle range (the 1 st digit to the 6 th digit of the original password respectively correspond to the 1 st screen bending angle range to the 6 th screen bending range one by one), and can also be in a reverse corresponding relation with the screen bending angle range (the 1 st digit to the 6 th digit of the original password respectively correspond to the 6 th screen bending angle range to the 1 st screen bending range one by one).
Assuming that the transformation process is to transform a digital value, the digital value is one digit, the digital value and the screen folding angle have a positive correspondence, and the original password is '123456', the step S11, the step S12, the step S21 and the step S22 may be specifically exemplified by:
example 1: referring to fig. 2, when the screen bending angle is 25 °, determining a screen bending angle range to which the screen bending angle belongs to [0, 30 ]; determining [0, 30) that the corresponding target cipher transformation rule is: the 1 st bit (because [0, 30) is the 1 st screen folding angle range, the bit that needs to be transformed is the 1 st bit) of the original password is subjected to the transformation processing ((1+ 5)% 10 is 6) of the first preset transformation algorithm (which can be 5 is added and then 10 is divided, and the remainder is taken), that is, the 1 st bit of the original password is transformed from '1' to '6'.
In this example, a reference password of '623456' may be obtained.
Example 2: referring to fig. 2, when the screen bending angle is 160 °, determining that the screen bending angle range to which the screen bending angle belongs is [150, 180 ]; determining [150, 180] that the corresponding target cryptographic transformation rule is: the 6 th bit of the original password (the 6 th bit is the 6 th screen bending angle range because [150, 180] is the 6 th screen bending angle range), is subjected to the transformation processing ((6+ 5)% 10 is 1) of the first preset transformation algorithm (which can be 5 is added and then 10 is divided, and the remainder is taken), namely, the 6 th bit of the original password is transformed into '1' from '6'.
In this example, a reference password of '123451' may be obtained.
Assuming that the transformation process is to transform a numerical value of digits, the digits are 3 digits, the digits are in a positive correspondence with the screen folding angle, and the original password is '123456', the steps S11, S12, S21, and S22 may specifically be exemplified by:
example 1: when the screen bending angle is 25 degrees, determining the screen bending angle range to which the screen bending angle belongs to be [0, 30 ]; determining [0, 30) that the corresponding target cipher transformation rule is: the bits from 1 st to 3 rd (since [0, 30) of the original password are the 1 st screen folding angle range, the bits to be transformed may be 3 bits from the 1 st bit, that is, the 1 st to 3 rd bits, and are subjected to a first predetermined transformation algorithm ((1+ 5)% 10 ═ 6, (2+ 5)% 10 ═ 7, (3+ 5)% 10 ═ 8) by dividing by 10 and taking the remainder after adding 5), that is, the 1 st bit of the original password is transformed from '1' to '6', the 2 nd bit is transformed from '2' to '7', and the 3 rd bit is transformed from '3' to '8'.
In this example, a reference password of '678456' may be obtained.
Example 2: when the screen bending angle is 45 degrees, determining the screen bending angle range of the screen bending angle as [30, 60 ]; determining [30, 60) the corresponding target cryptographic transformation rule as: the 2 nd bit to the 4 th bit (due to [30, 60 ') of the original password are in the 2 nd screen folding angle range, so the bits to be transformed may be 3 bits from the 2 nd bit, that is, the 2 nd bit to the 4 th bit, and the bits to be transformed are subjected to the transformation processing of a first preset transformation algorithm ((2+ 5)% 10 ═ 7, (3+ 5)% 10 ═ 8, (4+ 5)% 10 ═ 9) which is to add 5 and divide by 10 and take the remainder), that is, the 2 nd bit of the original password is transformed from ' 1 ' to ' 7 ', the 3 rd bit is transformed from ' 3 ' to ' 8 ', and the 4 th bit is transformed from ' 4 ' to ' 9 '.
In this example, a reference password of '178956' may be obtained.
Assuming that the transformation process is to transform the position of a digit, which has a positive correspondence with the screen folding angle, and the original password is '123456', the steps S11, S12, S21, and S22 may be specifically exemplified by:
example 1: when the screen bending angle is 25 degrees, determining the screen bending angle range to which the screen bending angle belongs to be [0, 30 ]; determining [0, 30) that the corresponding target cipher transformation rule is: the original password is transformed by a second predetermined transformation algorithm (which may be a circular left shift) with 1 bit (since [0, 30 ] is the 1 st screen bending angle range, the number of bits to be shifted is 1 bit), i.e. the original password is transformed from '123456' to '234561'.
In this example, a reference password of '234561' may be obtained.
Example 2: when the screen bending angle is 45 degrees, determining the screen bending angle range of the screen bending angle as [30, 60 ]; determining [30, 60) the corresponding target cryptographic transformation rule as: the original password is transformed by a second predetermined transformation algorithm (which may be a round left shift) with 2 bits (since [30, 60 ] is the 2 nd screen bending angle range, the number of bits to be shifted is 2 bits), i.e. the original password is transformed from '123456' to '345612'.
In this example, a reference password of '345612' may be obtained.
Based on the method, when the conversion algorithm is fixed, the digit of the original password to be converted is adjusted according to the screen bending angle, so that the identity authentication of the user can be safer and more flexible.
The password transformation rule is preset for transforming digits, and when the transformation algorithm in the original password is different due to different screen bending angle ranges, another implementation manner of "transforming the pre-entered original password based on the target password transformation rule" in step S2 may be:
step S21': determining a transformation algorithm of the pre-entered original password based on the target password transformation rule;
step S22': and carrying out transformation processing on the value of the preset digit in the original password based on the transformation algorithm.
The predetermined number may be one or more bits.
Assuming that the preset digit is one digit and the original password is '123456', the steps S11, S12, S21 and S22 may be specifically exemplified as:
example 1: referring to fig. 3, when the screen bending angle is 25 °, determining a screen bending angle range to which the screen bending angle belongs to [0, 30 ]; determining [0, 30) that the corresponding target cipher transformation rule is: the preset digit (which may be the 1 st digit) of the original password is subjected to the transformation processing ((1+1 ═ 2) of adding 1 (since [30, 60) is the 1 st screen folding angle range), that is, the 1 st digit of the original password is transformed from '1' to '2'.
In this example, a reference password of '223456' may be obtained.
Example 2: referring to fig. 3, when the screen bending angle is 160 °, determining that the screen bending angle range to which the screen bending angle belongs is [150, 180 ]; determining [150, 180] that the corresponding target cryptographic transformation rule is: the preset digit (1 st digit) of the original password is subjected to conversion processing ((1+6 ═ 7) of adding 6([150, 180] is the 6 th screen bending angle range), that is, the 1 st digit of the original password is converted from '1' to '7'.
In this example, a reference password of '723456' may be obtained.
Assuming that the digits are 3 digits and the original password is '123456', the steps S11, S12, S21 and S22 may be specifically exemplified as follows:
example 1: when the screen bending angle is 25 degrees, determining the screen bending angle range to which the screen bending angle belongs to be [0, 30 ]; determining [0, 30) that the corresponding target cipher transformation rule is: the method includes performing transformation processing on preset digits (which may be 1 st, 2 nd and 3 rd digits) of an original password, which are added with 1 and then divided by 10 to obtain a remainder (since [0, 30) is a 1 st screen folding angle range, a transformation algorithm may be to add 1 and then divided by 10 to obtain a remainder) (1+1 is 2, 2+1 is 3, and 3+1 is 4), that is, the 1 st digit of the original password is transformed from '1' to '2', the 2 nd digit is transformed from '2' to '3', and the 3 rd digit is transformed from '3' to '4'.
In this example, a reference password of '234456' may be obtained.
Example 2: when the screen bending angle is 45 degrees, determining the screen bending angle range of the screen bending angle as [30, 60 ]; determining [30, 60) the corresponding target cryptographic transformation rule as: the transformation process (1+2 is 3, 2+2 is 4,3+2 is 5) of the preset digits (1 st digit, 2 nd digit and 3 rd digit) of the original password, wherein the preset digits (1 st digit, 2 nd digit and 3 rd digit) are added with 2 and then divided by 10 to obtain the remainder ([30, 60) which is the 2 nd screen folding angle range, so the transformation algorithm can be used for dividing the 2 nd digit by 10 to obtain the remainder), namely, the 1 st digit of the original password is transformed into 3 'from 1', the 2 nd digit is transformed into 4 'from 2', and the 3 rd digit is transformed into 5 'from 3'.
In this example, a reference password of '345456' may be obtained.
Based on the method, when the converted digit is fixed, the conversion algorithm of the original password to be converted is adjusted according to the screen bending angle, so that the identity authentication of the user is safer and more flexible.
When the password transformation rule is that the number of digits to be transformed in the original password and the transformation algorithm are different due to different screen bending angle ranges, another implementation manner of "transform the pre-entered original password based on the target password transformation rule" in step S2 may be:
step S21 ″: determining a transformation algorithm and a transformed digit of the pre-entered original password based on the target password transformation rule;
step S22 ″: and performing transformation processing on the value of the digit in the original password based on the transformation algorithm.
Wherein the number of bits may be one or more bits.
When the number is one and the original password is '123456', the steps S11, S12, S21, and S22 may specifically be as follows:
example 1: when the screen bending angle is 25 degrees, determining the screen bending angle range to which the screen bending angle belongs to be [0, 30 ]; determining [0, 30) that the corresponding target cipher transformation rule is: the 1 st bit (because [0, 30) is the 1 st screen folding angle range, the bit that needs to be transformed is the first bit) of the original password is subjected to the transformation processing of adding 1 and dividing by 10 to obtain the remainder (because [0, 30) is the 1 st screen folding angle range, the transformation algorithm can be the transformation processing of adding 1 and dividing by 10 to obtain the remainder ((1+ 1)% 10 is 2), that is, the 1 st bit of the original password is transformed from '1' to '2'.
In this example, a reference password of '223456' may be obtained.
Example 2: when the screen bending angle is 45 degrees, determining the screen bending angle range of the screen bending angle as [30, 60 ]; determining [30, 60) the corresponding target cryptographic transformation rule as: the 2 nd bit (because [30, 60) of the original password is the 2 nd screen folding angle range, the bit needing to be transformed is the 2 nd bit), the 2 nd bit is added with 2 and then divided by 10 to obtain the remainder (because [30, 60) is the 2 nd screen folding angle range, the transformation algorithm can be the 2 nd bit and then divided by 10 to obtain the remainder), namely the 2 nd bit of the original password is transformed from '2' to '4'.
In this example, a reference password of '143456' may be obtained.
Based on the method, the transformation algorithm and the transformed digit of the original password to be transformed are adjusted according to the screen bending angle, so that the identity authentication of the user can be safer and more flexible.
Step 106: and if the reference password is detected to be matched with the password to be verified input by the user, the identity verification request is passed.
In this embodiment, the screen bending angle is used as an independent variable, the original password is used as a dependent variable, and the original password is dynamically adjusted along with the change of the screen bending angle to obtain the reference password, so that when a user inputs a password to be verified matched with the reference password on the password input interface, the user passes through the authentication request of the user. Therefore, the leakage of the original password can be avoided, and the aim of carrying out the identity authentication of the user more safely can be fulfilled.
Fig. 4 is a schematic flow chart of an identity verification method according to another embodiment of the present invention, and referring to fig. 4, the method may specifically include the following steps:
step 402: when an identity authentication request initiated by a user is received, acquiring a screen bending angle of terminal equipment;
the identity authentication request is used to authenticate identity information of a user, for example: a screen unlocking request, a payment request, an account login request and the like; the foldable screen of the terminal equipment can be a flexible screen or a foldable screen, and the foldable screen generally consists of two sub-screens and a rotating shaft magnetic chain for connecting the sub-screens; the screen bending angle includes: receiving the screen bending angle when the identity authentication request is received, or receiving the maximum screen bending angle within a preset time range before the identity authentication request is received; the preset time range may be 5 seconds, 10 seconds, etc.
It should be noted that, assuming that the preset time range is 5 seconds, referring to fig. 5, the step 402 may specifically be exemplified as:
example 1, when a user presses a fingerprint identification area 501 on a certain payment interface of a terminal device, the terminal device is triggered to calculate that a screen bending angle of the terminal device when receiving an authentication request is 25 ° through a gravity sensor inside a rotating shaft magnetic chain.
Example 2, the user presses the fingerprint identification area on the back of the terminal device, and the terminal device is triggered to calculate the maximum screen bending angle of the terminal device to be 25 ° within 5 seconds before the terminal device receives the authentication request through the gravity induction components of the two sub-screens.
Based on this, through the diversified definition of the screen bending angle, the bending angle of the screen acquired at different moments is used as the screen bending angle, so that the identity authentication of the user is more flexible.
Step 404: and if the screen bending angle is detected to be within a preset reference screen bending angle range and the acquired biological characteristics of the user are matched with the biological characteristics input in advance, the identity authentication request is passed.
Wherein, the biological characteristics comprise physiological characteristics (such as fingerprints, facial images, irises, palmprints and the like) and behavior characteristics (such as gait, voice, handwriting and the like); the reference screen bending angle range may be 90 ° to 120 °, 80 ° to 110 °, 0 ° to 30 °, and the like.
It should be noted that, the step 404 may specifically be exemplified by:
example 1: the terminal equipment firstly detects whether the screen bending angle is within a preset reference screen bending angle range, and if not, the terminal equipment refuses the identity authentication request of the user; if so, acquiring the fingerprint of the user, and allowing the user to perform corresponding payment operation through the identity authentication request of the user when the fingerprint of the user is matched with the pre-input fingerprint.
Example 2: the terminal equipment collects the fingerprint of the user firstly, and determines whether the fingerprint of the user is matched with the fingerprint which is pre-input, if not, the terminal equipment refuses the authentication request of the user; if so, allowing the user to perform corresponding payment operation through the authentication request of the user when the screen bending angle is within the preset reference screen bending angle range.
Example 3: the terminal equipment firstly collects the fingerprint of the user, then determines whether the screen bending angle is within a preset reference screen bending angle range, and if not, rejects the authentication request of the user; and if so, allowing the user to perform corresponding payment operation through the identity authentication request of the user when the fingerprint of the user is matched with the pre-input fingerprint.
It should be noted that, assuming that the reference screen bending angle is 0 ° to 30 °, step 404 may specifically be exemplified by:
example 1: referring to fig. 5, when the folding angle of the screen is 25 °, since 25 ° is in the range of 0 ° to 30 °, when the fingerprint of the user and the pre-entered fingerprint match, the terminal device displays "OK" on the user interface to indicate that the authentication request of the user is passed.
Example 2: referring to fig. 5, when the bending angle of the screen is 160 °, since 160 ° is not in the range of 0 ° to 30 °, the terminal device displays "Error" on the user interface to indicate that the authentication request of the user is rejected.
It should be noted that the method further includes: an input step, which may be implemented in one way as follows:
and if the identity authentication request is not passed, prompting the user to input a text password so as to reinitiate the identity authentication request.
It should be noted that, assuming that a user presses a fingerprint identification area on a certain payment interface of the terminal device, the screen bending angle obtained by the terminal device is 70 °, and the reference screen bending angle range is 80 ° to 110 °, and step 204 may specifically be exemplified as:
since 70 ° is not in the range of 80 ° to 110 °, the terminal device rejects the authentication request initiated by the user through fingerprint authentication, and sends out a prompt message on the payment interface: "fingerprint authentication fails, please enter password"; the text password input by the user is the same as the reference password, and the terminal equipment allows the user to perform corresponding payment operation through the authentication request of the user and recovers the fingerprint authentication function.
Based on the method, when the identity authentication request does not pass, the user is prompted to input the text password, the biological feature identification and the password input can be combined, and the identity authentication can be more flexible and safer.
In this embodiment, the range of the screen bending angle when the authentication is performed using the biometric feature of the user is limited to reject the authentication performed using the biometric feature of the user when the authentication is not performed within the range of the screen bending angle, so that the authentication of the user can be performed more safely.
Fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present invention, and referring to fig. 6, the terminal device may specifically include: an obtaining module 602, a determining module 604, and a verifying module 606, wherein:
an obtaining module 602, configured to obtain a current screen bending angle of a terminal device when an identity authentication request initiated by a user is received;
a determining module 604, configured to determine a reference password based on the screen bending angle and a pre-entered original password;
and the verification module 606 is configured to pass the authentication request if it is detected that the reference password matches the password to be verified input by the user.
Optionally, the determining module 604 includes:
the determining unit is used for determining a target password transformation rule corresponding to the screen bending angle;
and based on the target password transformation rule, transforming the pre-input original password to obtain a reference password.
Optionally, the determining unit includes:
the determining subunit is used for determining the screen bending angle range to which the screen bending angle belongs;
determining a password transformation rule corresponding to the screen bending angle range, and taking the password transformation rule as the target password transformation rule;
and the password transformation rules corresponding to different screen bending angle ranges are different.
Optionally, the determining unit further includes:
the first transformation subunit is used for determining digits needing to be transformed in the pre-input original password based on the target password transformation rule;
based on a preset transformation algorithm, carrying out transformation processing on the digit in the original password;
wherein the transformation process comprises: at least one of converting a digital value and converting a digital position.
Optionally, the determining unit further includes:
the second transformation subunit is used for determining a transformation algorithm of the pre-input original password based on the target password transformation rule;
and carrying out transformation processing on the value of the preset digit in the original password based on the transformation algorithm.
Optionally, the terminal device further includes:
and the display module is used for displaying the screen bending angle on a password input interface so that the user can determine the password to be verified which needs to be input.
Therefore, in the embodiment, the screen bending angle is used as the independent variable, the original password is used as the dependent variable, and the original password is dynamically adjusted along with the change of the screen bending angle to obtain the reference password, so that when the user inputs the password to be verified matched with the reference password in the password input interface, the user passes the authentication request of the user. Therefore, the leakage of the original password can be avoided, and the aim of carrying out the identity authentication of the user more safely can be fulfilled.
The device provided by the embodiment of the present invention can implement each process implemented by the device in the method embodiments of fig. 1 to fig. 3, and is not described herein again to avoid repetition. Further, it should be noted that, among the respective components of the apparatus of the present invention, the components thereof are logically divided according to the functions to be realized, but the present invention is not limited thereto, and the respective components may be newly divided or combined as necessary.
Fig. 7 is a schematic structural diagram of a terminal device according to another embodiment of the present invention, and referring to fig. 7, the terminal device may specifically include: an acquisition module 702 and a verification module 704, wherein:
an obtaining module 702, configured to obtain a screen bending angle of a terminal device when receiving an identity authentication request initiated by a user;
the verification module 704 is configured to pass the authentication request if it is detected that the screen bending angle is within a preset reference screen bending angle range and the acquired biometric characteristic of the user matches a pre-entered biometric characteristic.
Optionally, the screen bending angle includes: the screen bending angle when the authentication request is received, or the maximum screen bending angle within a preset time range before the authentication request is received.
Optionally, the terminal device further includes: and the input module is used for prompting the user to input a text password to reinitiate the authentication request if the authentication request is not passed.
Therefore, in the embodiment, the range of the screen bending angle when the identity authentication is performed by using the biological characteristics of the user is limited, so that the identity authentication performed by using the biological characteristics of the user when the identity authentication is not performed in the range of the screen bending angle is rejected, and the identity authentication of the user can be performed more safely.
The device provided by the embodiment of the present invention can implement each process implemented by the device in the method embodiments of fig. 4 to fig. 5, and is not described herein again to avoid repetition. Further, it should be noted that, among the respective components of the apparatus of the present invention, the components thereof are logically divided according to the functions to be realized, but the present invention is not limited thereto, and the respective components may be newly divided or combined as necessary.
Figure 8 is a schematic diagram of a hardware configuration of a mobile terminal implementing various embodiments of the present invention,
the mobile terminal 800 includes, but is not limited to: a radio frequency unit 801, a network module 802, an audio output unit 803, an input unit 804, a sensor 805, a display unit 806, a user input unit 807, an interface unit 808, a memory 809, a processor 810, and a power supply 811. Those skilled in the art will appreciate that the mobile terminal architecture illustrated in fig. 8 is not intended to be limiting of mobile terminals, and that a mobile terminal may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the mobile terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 810 is configured to obtain a current screen bending angle of the terminal device when receiving an authentication request initiated by a user;
determining a reference password based on the screen bending angle and a pre-input original password;
and if the reference password is detected to be matched with the password to be verified input by the user, the identity verification request is passed.
The screen bending angle is used as an independent variable, the original password is used as a dependent variable, the original password is dynamically adjusted along with the change of the screen bending angle, and the reference password is obtained, so that when a user inputs a password to be verified matched with the reference password on a password input interface, the user passes through an identity verification request of the user. Therefore, the leakage of the original password can be avoided, and the aim of carrying out the identity authentication of the user more safely can be fulfilled.
The processor 810 is further configured to obtain a screen bending angle of the terminal device when receiving an authentication request initiated by a user;
and if the screen bending angle is detected to be within a preset reference screen bending angle range and the acquired biological characteristics of the user are matched with the biological characteristics input in advance, the identity authentication request is passed.
The range of the screen bending angle when the identity authentication is carried out by using the biological characteristics of the user is limited, so that the identity authentication carried out by using the biological characteristics of the user when the identity authentication is not carried out in the range of the screen bending angle is rejected, and the identity authentication of the user can be carried out more safely.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 801 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 810; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 801 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. Further, the radio frequency unit 801 can also communicate with a network and other devices through a wireless communication system.
The mobile terminal provides the user with wireless broadband internet access through the network module 802, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 803 may convert audio data received by the radio frequency unit 801 or the network module 802 or stored in the memory 809 into an audio signal and output as sound. Also, the audio output unit 803 may also provide audio output related to a specific function performed by the mobile terminal 800 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 803 includes a speaker, a buzzer, a receiver, and the like.
The input unit 804 is used for receiving an audio or video signal. The input Unit 804 may include a Graphics Processing Unit (GPU) 8041 and a microphone 8042, and the Graphics processor 8041 processes image data of a still picture or video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 806. The image frames processed by the graphics processor 8041 may be stored in the memory 809 (or other storage medium) or transmitted via the radio frequency unit 801 or the network module 802. The microphone 8042 can receive sound, and can process such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 801 in case of a phone call mode.
The mobile terminal 800 also includes at least one sensor 805, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 8061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 8061 and/or the backlight when the mobile terminal 800 moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of the mobile terminal (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 805 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 806 is used to display information input by the user or information provided to the user. The Display unit 806 may include a Display panel 8061, and the Display panel 8061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 807 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 807 includes a touch panel 8071 and other input devices 8072. The touch panel 8071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 8071 (e.g., operations by a user on or near the touch panel 8071 using a finger, a stylus, or any other suitable object or accessory). The touch panel 8071 may include two portions of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 810, receives a command from the processor 810, and executes the command. In addition, the touch panel 8071 can be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 8071, the user input unit 807 can include other input devices 8072. In particular, other input devices 8072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 8071 can be overlaid on the display panel 8061, and when the touch panel 8071 detects a touch operation on or near the touch panel 8071, the touch operation is transmitted to the processor 810 to determine the type of the touch event, and then the processor 810 provides a corresponding visual output on the display panel 8061 according to the type of the touch event. Although in fig. 8, the touch panel 8071 and the display panel 8061 are two independent components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 8071 and the display panel 8061 may be integrated to implement the input and output functions of the mobile terminal, which is not limited herein.
The interface unit 808 is an interface through which an external device is connected to the mobile terminal 800. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 808 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 800 or may be used to transmit data between the mobile terminal 800 and external devices.
The memory 809 may be used to store software programs as well as various data. The memory 809 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 809 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 810 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by running or executing software programs and/or modules stored in the memory 809 and calling data stored in the memory 809, thereby integrally monitoring the mobile terminal. Processor 810 may include one or more processing units; preferably, the processor 810 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 810.
The mobile terminal 800 may also include a power supply 811 (e.g., a battery) for powering the various components, and the power supply 811 may be logically coupled to the processor 810 via a power management system that may be used to manage charging, discharging, and power consumption.
In addition, the mobile terminal 800 includes some functional modules that are not shown, and thus, are not described in detail herein.
Preferably, an embodiment of the present invention further provides a terminal device, which includes a processor, a memory, and a computer program stored in the memory and capable of running on the processor, where the computer program, when executed by the processor, implements each process of the above-mentioned embodiment of the identity authentication method, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the embodiment of the identity verification method, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (5)

1. An identity authentication method is characterized in that the identity authentication method is applied to a terminal device with a foldable screen, and comprises the following steps:
when an identity authentication request initiated by a user is received, acquiring the current screen bending angle of the terminal equipment;
determining a reference password based on the screen bending angle and a pre-input original password;
if the reference password is detected to be matched with the password to be verified input by the user, the identity verification request is passed;
wherein, the determining a reference password based on the screen bending angle and the pre-entered original password comprises:
determining a target password transformation rule corresponding to the screen bending angle;
and based on the target password transformation rule, transforming the pre-input original password to obtain a reference password.
2. The method of claim 1, wherein the determining the target password transformation rule corresponding to the screen folding angle comprises:
determining a screen bending angle range to which the screen bending angle belongs;
determining a password transformation rule corresponding to the screen bending angle range, and taking the password transformation rule as the target password transformation rule;
and the password transformation rules corresponding to different screen bending angle ranges are different.
3. The method according to claim 1, wherein the transforming the pre-entered original password based on the target password transformation rule comprises:
determining the digits to be transformed in the pre-input original password based on the target password transformation rule;
based on a preset transformation algorithm, carrying out transformation processing on the digit in the original password;
wherein the transformation process comprises: at least one of converting a digital value and converting a digital position.
4. The method of claim 1, further comprising:
and displaying the screen bending angle on a password input interface so that the user can determine the password to be verified which needs to be input.
5. A terminal device, comprising:
the terminal equipment comprises an acquisition module, a display module and a display module, wherein the acquisition module is used for acquiring the current screen bending angle of the terminal equipment when receiving an identity authentication request initiated by a user;
the determining module is used for determining a reference password based on the screen bending angle and a pre-input original password;
the authentication module is used for passing the identity authentication request if the reference password is matched with the password to be authenticated input by the user;
the determining module is configured to determine a reference password based on the screen bending angle and a pre-entered original password, and includes:
the determining module is used for determining a target password transformation rule corresponding to the screen bending angle; and based on the target password transformation rule, transforming the pre-input original password to obtain a reference password.
CN201910560725.9A 2019-06-26 2019-06-26 Identity verification method and terminal equipment Active CN110321680B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910560725.9A CN110321680B (en) 2019-06-26 2019-06-26 Identity verification method and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910560725.9A CN110321680B (en) 2019-06-26 2019-06-26 Identity verification method and terminal equipment

Publications (2)

Publication Number Publication Date
CN110321680A CN110321680A (en) 2019-10-11
CN110321680B true CN110321680B (en) 2021-06-04

Family

ID=68120375

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910560725.9A Active CN110321680B (en) 2019-06-26 2019-06-26 Identity verification method and terminal equipment

Country Status (1)

Country Link
CN (1) CN110321680B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110879896B (en) * 2019-11-13 2022-06-03 维沃移动通信有限公司 Encryption and decryption method for folding screen terminal and electronic equipment

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6259789B1 (en) * 1997-12-12 2001-07-10 Safecourier Software, Inc. Computer implemented secret object key block cipher encryption and digital signature device and method
CN1281025C (en) * 2003-09-08 2006-10-18 赵忠华 Password variable identification verification technique
KR20100052789A (en) * 2008-11-11 2010-05-20 지적지주 유한회사 Web document creation system for auto change of plural passwords and method thereof
KR101887452B1 (en) * 2011-12-15 2018-08-10 엘지전자 주식회사 Apparatus for unlocking mobile terminal and method thereof
CN104766002B (en) * 2015-03-04 2017-03-08 努比亚技术有限公司 A kind of unlocking method and device
CN106096383A (en) * 2016-06-12 2016-11-09 捷开通讯(深圳)有限公司 Automatically mobile terminal and the method thereof of unlocking pin are changed
CN108268761B (en) * 2016-12-31 2020-03-24 中国移动通信集团北京有限公司 Password verification method and device
CN107704736A (en) * 2017-09-28 2018-02-16 广东欧珀移动通信有限公司 Unlocking method and a device, computer equipment, computer-readable recording medium
CN108881594A (en) * 2018-04-27 2018-11-23 努比亚技术有限公司 Safety identification control method, flexible screen terminal and computer readable storage medium
CN109886686B (en) * 2019-02-28 2023-03-10 努比亚技术有限公司 Secure payment method, device and computer readable storage medium

Also Published As

Publication number Publication date
CN110321680A (en) 2019-10-11

Similar Documents

Publication Publication Date Title
WO2018161743A1 (en) Fingerprint recognition method and related product
CN107682359B (en) Application registration method and mobile terminal
CN108985034B (en) Unlocking method and terminal equipment
CN108256308B (en) Face recognition unlocking control method and mobile terminal
CN110457888B (en) Verification code input method and device, electronic equipment and storage medium
CN109544172B (en) Display method and terminal equipment
CN107609363B (en) Unlocking method and mobile terminal
CN108491713B (en) Safety reminding method and electronic equipment
CN111125770A (en) Privacy protection method and electronic equipment
CN108156537B (en) Remote operation method of mobile terminal and mobile terminal
CN106447325B (en) NFC communication-based processing method and device and mobile terminal
CN108600492B (en) Screen unlocking method and terminal
CN110321680B (en) Identity verification method and terminal equipment
CN109446794B (en) Password input method and mobile terminal thereof
CN110225040B (en) Information processing method and terminal equipment
CN109753776B (en) Information processing method and device and mobile terminal
CN109451143B (en) Call method and mobile terminal
CN109547330B (en) Information sharing method and device
CN108108608B (en) Control method of mobile terminal and mobile terminal
CN108062465B (en) Unlocking method and mobile terminal
CN107491685B (en) Face recognition method and mobile terminal
CN111444491B (en) Information processing method and electronic equipment
CN109409068B (en) Operation execution method and terminal
CN109523270B (en) Information processing method and terminal equipment
CN110032861B (en) Password setting method and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant