CN111639322B - Application login method and device, electronic equipment and computer storage medium - Google Patents
Application login method and device, electronic equipment and computer storage medium Download PDFInfo
- Publication number
- CN111639322B CN111639322B CN202010553577.0A CN202010553577A CN111639322B CN 111639322 B CN111639322 B CN 111639322B CN 202010553577 A CN202010553577 A CN 202010553577A CN 111639322 B CN111639322 B CN 111639322B
- Authority
- CN
- China
- Prior art keywords
- password
- contacts
- current
- image
- contact point
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The application provides a login method and device of an application, electronic equipment and a computer storage medium, wherein the method comprises the following steps: receiving an application login request; determining an image corresponding to the user identifier in the application login request, and displaying the image on a login interface; acquiring coordinates of each current contact point clicked by a user on an image in sequence on the image and the clicking sequence of each current contact point; judging whether errors of the relative positions of every two current contacts and the relative positions of the two corresponding password contacts are in a preset range or not based on the coordinates of each current contact and the coordinates of the password contacts corresponding to each current contact; if the errors of the relative positions of every two current contacts and the relative positions of the two corresponding password contacts are in the preset range, determining that password verification is passed and authorizing login application, otherwise, determining that password verification fails. Therefore, the login method of the application is realized based on the image, and the user can memorize the password of the application more conveniently.
Description
Technical Field
The application relates to the technical field of password verification, and is characterized by relating to an application login method and device, electronic equipment and a computer storage medium.
Background
There are more applications offered to users today, but because different references are usually from different providers, users need to set different account numbers and passwords for multiple applications, and thus users need to memorize a large number of account numbers and passwords.
In order to avoid that a user forgets an account and a password of an application and cannot log in the application in time because of excessive numbers of the memorized account, each application today allows a mobile phone number to be used as the account of the application, so that the memory of the user is greatly reduced. However, for security, the passwords of the applications today still need to be additionally set by the user, and the set passwords must generally meet a certain complexity. For example, the set password needs to satisfy a certain number of characters and needs to be composed of a plurality of types of characters.
Since the number of characters is large and may be composed of a plurality of different types of characters, it is very inconvenient to memorize. Although some applications today are provided with the function of saving the current password, saving the current password is not only unsafe, but also requires the password to be entered when the user changes the device to log in the application, since the password is only saved in the current device. Therefore, a secure and easy-to-memorize password login method for logging in applications is urgently needed.
Disclosure of Invention
Based on the defects of the prior art, the application provides an application login method and device, electronic equipment and a computer storage medium, so as to solve the problem that passwords adopted by the existing login application are inconvenient to memorize.
In order to achieve the above object, the present application provides the following technical solutions:
the first aspect of the present application provides a login method for an application, including:
receiving an application login request; wherein the application login request includes a user identifier;
determining an image corresponding to the user identifier, and displaying the image on a login interface;
acquiring coordinates of each current contact point clicked by a user on the image in sequence on the image and the clicking sequence of each current contact point;
judging whether errors of the relative positions of every two current contacts and the corresponding relative positions of the two password contacts are in a preset range or not based on the coordinates of the current contacts and the coordinates of the password contacts corresponding to the current contacts; the password contact is a contact clicked when a password is set on the image; the current contact and the password contact which are the same in clicking sequence correspond to each other;
If the errors of the relative positions of every two current contacts and the relative positions of the corresponding two password contacts are judged to be within the preset range, determining that password verification is passed and authorizing login application;
if the error between the relative position of any two current contacts and the relative position of the corresponding two password contacts is not in the preset range, determining that password verification fails.
Optionally, in the above application login method, the determining whether the error between the relative position of each two current contacts and the relative position of the corresponding two password contacts is within a preset range based on the coordinates of each current contact and the coordinates of the password contacts corresponding to each current contact includes:
matching the coordinates of the password contacts corresponding to each current contact according to the clicking sequence of each current contact;
calculating the ratio of the difference value of the two current abscissas to the difference value of the ordinate to obtain the relative positions of the two current contacts, and calculating the ratio of the difference value of the abscissas to the difference value of the ordinate of the two password contacts corresponding to the two current contacts to obtain the relative positions of the two corresponding password contacts;
And calculating the difference value between the relative positions of the two current contacts and the corresponding relative positions of the two password contacts for each two current contacts respectively, and judging whether the difference value is in the preset range or not.
Optionally, in the above-mentioned logging method for application, after the determining that the errors between the relative positions of each two current contacts and the relative positions of the two corresponding password contacts are within the preset range, the method further includes:
judging whether the difference value between the slope from the current contact point to the coordinate origin and the slope from the password contact point corresponding to the current contact point to the coordinate origin is within a preset slope difference value range or not according to each current contact point; the slope from the contact point to the origin of coordinates is equal to the ratio of the ordinate to the abscissa of the contact point; when judging that the difference value between the slope of each current contact point to the coordinate origin and the slope of the corresponding password contact point to the coordinate origin is within a preset slope difference value range, executing the determination, verifying through the password and authorizing login application; and executing the password verification failure determination when judging that the difference value between the slope from the current contact point to the coordinate origin and the slope from the password contact point corresponding to the current contact point to the coordinate origin is not in the preset slope difference value range.
Optionally, in the above application login method, the method for setting a password on the image includes:
determining an image for setting a password;
displaying the image on a password setting interface;
acquiring coordinates of each password contact point clicked on the image in sequence on the image and the clicking sequence of each password contact point;
storing the image, the coordinates of each password contact and the clicking sequence of each password contact;
constructing a corresponding relation between the user identification of the user and the image; the user identification of the user is set by the user or generated according to a preset generation rule.
The second aspect of the present application provides a login device for an application, including:
the receiving unit is used for receiving an application login request; wherein the application login request includes a user identifier;
the image determining unit is used for determining an image corresponding to the user identifier and displaying the image on a login interface;
the first acquisition unit is used for acquiring coordinates of each current contact point clicked by a user on the image in sequence on the image and the clicking sequence of each current contact point;
The first verification unit is used for judging whether errors of the relative positions of every two current contacts and the relative positions of the two corresponding password contacts are within a preset range or not based on the coordinates of each current contact and the coordinates of the password contacts corresponding to each current contact; the password contact is a contact clicked when a password is set on the image; the current contact and the password contact which are the same in clicking sequence correspond to each other;
the first determining unit is used for determining that the password authentication is passed and authorizing the login application when the first verifying unit judges that the errors of the relative positions of every two current contacts and the relative positions of the corresponding two password contacts are all in a preset range;
and the second determining unit is used for determining that the password verification fails when the first verifying unit judges that the error between the relative positions of any two current contacts and the relative positions of the corresponding two password contacts is not in the preset range.
Optionally, in the login device of an application described above, the first verification unit includes:
the matching unit is used for matching the coordinates of the password contacts corresponding to each current contact according to the clicking sequence of each current contact;
The first calculating unit is used for calculating the ratio of the difference value of the two current abscissas to the difference value of the ordinate to obtain the relative positions of the two current contacts, and calculating the ratio of the difference value of the abscissas to the difference value of the ordinate of the two password contacts corresponding to the two current contacts to obtain the relative positions of the two corresponding password contacts;
the first judging unit is used for calculating the difference value between the relative positions of the two current contacts and the corresponding relative positions of the two password contacts for each two current contacts respectively, and judging whether the difference value is in the preset range or not.
Optionally, in the login device of the application, the login device further includes:
the second verification unit is used for judging whether the difference value between the slope from the current contact to the origin of coordinates and the slope from the password contact corresponding to the current contact to the origin of coordinates is within a preset slope difference value range or not according to each current contact after the first verification unit judges that the errors of the relative positions of each two current contacts and the relative positions of the corresponding two password contacts are within a preset range;
The slope from the contact point to the origin of coordinates is equal to the ratio of the ordinate to the abscissa of the contact point; when the second verification unit judges that the difference value between the slope of each current contact point to the coordinate origin point and the slope of the corresponding password contact point to the coordinate origin point is within a preset slope difference value range, the first determination unit executes the determination to pass password verification and authorizes login application; and when the second verification unit judges that the difference value between the slope from any one current contact point to the origin of coordinates and the slope from the password contact point corresponding to the current contact point to the origin of coordinates is not in a preset slope difference value range, the second determination unit executes the password verification failure.
Optionally, in the login device of the application described above, the login device further includes a password setting unit, where the password setting unit includes:
a third determination unit configured to determine an image for setting a password;
a display unit for displaying the image on a password setting interface;
the second acquisition unit is used for acquiring coordinates of each password contact point clicked on the image in sequence on the image and the clicking sequence of each password contact point;
The storage unit is used for storing the images, the coordinates of each password contact point and the clicking sequence of each password contact point;
the construction unit is used for constructing the corresponding relation between the user identification of the user and the image; the user identification of the user is set by the user or generated according to a preset generation rule.
A third aspect of the present application provides an electronic device, comprising:
one or more processors;
a memory having one or more programs stored thereon;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of logging applications as described in any of the preceding claims.
A fourth aspect of the present application provides a computer storage medium storing a program which, when executed, is adapted to carry out a login method for an application as described in any one of the above.
The application provides a login method of an application, when a user sets a password on an image, the coordinates and the clicking sequence of a password contact point clicked by the user on the image are obtained and recorded, and the image is stored in a background, so that the coordinates and the clicking sequence of the contact point clicked by the user on the image are used as login passwords, and the position on the image is more convenient for the user to memorize compared with a complex character string because the image has stronger identification. And when receiving the application login request, obtaining an image when the user sets the password according to the image corresponding to the user identification in the application login request, and displaying the image on a login interface. And then acquiring coordinates of each current contact point clicked by a user on the image in sequence and the clicking sequence of each current contact point, determining that password verification is passed and logging in the application if the errors of the relative positions of every two current contact points and the relative positions of the corresponding two password contact points are judged to be within a preset range based on the coordinates of each current contact point and the coordinates of the password contact points corresponding to each current contact point, and determining that the password verification fails if the loudness positions of any two current contact points are judged to be unequal to the relative positions of the corresponding two password contact points. Therefore, the security can be effectively ensured by verifying the corresponding relation between the relative positions of the current contacts and the corresponding password contacts, and the user can be ensured to realize login on devices with different resolutions or different screen sizes by verifying the relative positions.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present application, and that other drawings can be obtained according to the provided drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart of a method for setting a password on an image according to an embodiment of the present application;
fig. 2 is a schematic diagram of an interface for setting a password in a mobile phone terminal according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating a login method of an application according to another embodiment of the present application;
FIG. 4 is a schematic diagram of an interface for logging in an application at a tablet terminal according to another embodiment of the present application;
FIG. 5 is a schematic diagram illustrating a specific password authentication procedure according to another embodiment of the present application;
FIG. 6 is a schematic structural diagram of a login device according to another embodiment of the present application;
FIG. 7 is a schematic diagram of a first verification unit according to another embodiment of the present application;
fig. 8 is a schematic structural diagram of a password setting unit according to another embodiment of the present application;
Fig. 9 is a schematic structural diagram of an electronic device according to another embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In the present application, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The embodiment of the application provides an application login method, which realizes application login based on the coordinates and the clicking sequence of a touch point clicked by a user on an image. The password needs to be set before the application is logged in by clicking a contact on the image, i.e. the password needs to be set on the image. Therefore, an embodiment of the present application provides a method for setting a password on an image, as shown in fig. 1, including the following steps.
S101, determining an image for setting a password.
Alternatively, the image used for setting the password may be uploaded by the user, so that the probability that the images used for setting the password by different users appear the same may be relatively low, and thus the security of the password may be further improved. Specifically, when the image for setting the password is determined at this time, an image uploaded by the user is acquired, and the image uploaded by the user is determined as the image for setting the password. Of course, this is only one alternative, and a plurality of images may be configured in advance in the system, and the configured images may be provided to the user for selection, and the image selected by the user may be determined as the image for setting the password. This approach can effectively ensure the quality of the image used to set the password, and can also improve the security of the password to some extent, as long as the configured images are sufficiently numerous, as compared with the first approach.
S102, displaying the image on a password setting interface.
It should be noted that, in the embodiment of the present application, since password verification is performed through the relative positions of the contacts, theoretically, a user needs to click at least two contacts on an image, but since when the number of contacts set by setting the password is small, the probability that the relative positions of two contacts clicked at will are the same as the relative positions of two contacts set by setting the password is relatively large, so in the practical application process, the number of contacts set by the user is generally required to be greater than two. Thus, optionally, the user may be prompted on the password setup interface to click on more than a preset number of different positions. Wherein the pre-number is generally greater than 2, and the greater the pre-number, the greater the security of the password. And the user can be prompted that the clicked contacts are on different horizontal lines as much as possible, and the relative positions are different as much as possible, namely that the distances between the contacts are not the same as much as possible, so that the security of the password can be further improved.
S103, acquiring coordinates of each password contact point clicked on the image in sequence on the image and the clicking sequence of each password contact point.
Specifically, two-dimensional coordinates can be set for the image, when a user sequentially selects different positions on the image to click, contacts clicked by the user are synchronously used as password contacts, namely, the password contacts refer to contacts clicked on the image when the user sets a password, and then the coordinates and the clicking sequence of the password contacts are acquired and recorded.
It should be noted that, for the system background, the coordinates and the clicking sequence of the password contacts are recorded, and when the user is not required to memorize the coordinates of the password contacts, the user only needs to memorize the clicking positions and the clicking sequences of the images, and the images have higher identification degree, so that the user is very easy to memorize. For example, as shown in fig. 1, when a user sets a password on a mobile phone terminal, an image of a palm is selected for password setting, and the user sequentially clicks the finger tips of the ring finger, the index finger and the thumb of the palm in the image. Therefore, the user only needs to remember that the user clicks the finger tips of the ring finger, the index finger and the thumb of the palm in the image, and the detailed position of the image is easier to memorize relative to the abstract character string. For the background of the system, when the user clicks the finger tips of the ring finger, the index finger and the thumb of the palm in the image, the coordinates of the clicked contact points and the clicking sequence are recorded, namely, the coordinates (a 1, b 1) of the clicked first password contact point, the coordinates (a 2, b 2) of the clicked password contact point in the second order and the coordinates (a 3, b 3) of the clicked password contact point in the third order are recorded.
Optionally, in order to avoid that the position clicked by the user for the user is greatly different from the position actually clicked by the user, the user cannot log in the application later. After the user clicks the position on the image, a circle with the contact actually clicked by the user as the circle center and the preset length as the radius is displayed in the image so as to prompt the user of the position range actually clicked by the user. After the user clicks a position, the user can cancel and click again, and after the user confirms, the coordinates of the contact clicked by the user when clicking the position are recorded again.
S104, storing the image, the coordinates of each password contact point and the clicking sequence of each password contact point.
The image of the password set by the user, the coordinates of each password contact and the clicking sequence of each password contact can be stored as a combination, so that each data for verifying the password can be determined more quickly when the user logs in the application subsequently.
S105, constructing a corresponding relation between a user identifier of the user and the image, wherein the user identifier of the user is set by the user or is generated according to a preset generation rule.
Wherein the user identification of the user is unique, i.e. the user identifications of different users are different.
It should be noted that, because the user may log in the application on different terminals, in order to determine the image used when the user sets the password, the coordinates of each password contact and the clicking sequence of each password contact, the corresponding relationship between the user identifier of the user and the image is constructed, and then the corresponding image can be determined according to the user identifier.
Optionally, the user identifier may be an account of the user, and when the user sets the password, the user is generally required to set the account, or the account is configured for the user according to a preset generation rule, so that the account of the user can be directly used as the user identifier, and no additional user identifier is required to be set. Moreover, the user account applied nowadays is usually a collection number, which is also convenient for the user to memorize.
Of course, this is just one alternative, and the user identification of the user may be additionally configured. And along with the application of the biological recognition technologies such as voice recognition, fingerprint recognition and the like on various terminals, the user identification can also be the fingerprint characteristics or the biological characteristics of the user and the like. When a user logs in the application, the image used when the user sets the password can be determined according to the biological characteristics input by the user, and the user does not need to memorize the user identification.
Based on the password set on the image in the above embodiment, another embodiment of the present application provides a login method of an application, as shown in fig. 3, including:
s301, receiving an application login request, wherein the application login request comprises a user identifier.
Specifically, when the user opens the application, the user identifier input by the user is obtained, or the locally stored user identifier is obtained, or the user identifier of the user is determined according to the biological characteristics input by the user, the application login request is sent by using the user identifier, and the application login request is received by the corresponding background. Of course, the login request of the application may be sent when triggered by the user specification.
S302, determining an image corresponding to the user identifier, and displaying the image on a login interface.
Wherein the image is stored in the background when the user encrypts the image.
Specifically, the images for setting the password of each user stored in the database can be traversed, so that the images corresponding to the user identifications are found out, and the images are displayed on the login interface. At this time, the user needs to click on the image on the login interface according to the position and order of the clicked image when setting the password.
S303, acquiring coordinates of each current contact point clicked by a user on the image in sequence on the image and the clicking sequence of each current contact point.
The current contact point refers to a contact point clicked by a user on an image of a login interface.
Specifically, when the user clicks on the image on the login interface, the coordinates of each current contact clicked by the user and the clicking sequence are synchronously acquired. When the user determines that the password input is completed, step S304 is executed to start password authentication.
S304, judging whether errors of the relative positions of every two current contacts and the relative positions of the two corresponding password contacts are in a preset range or not based on the coordinates of each current contact and the coordinates of the password contacts corresponding to each current contact.
The password contacts are contacts clicked when passwords are set on the image, the current contacts with the same clicking sequence correspond to the password contacts, and the coordinates of the password contacts and the clicking sequence are acquired and recorded when the passwords are set on the image.
It should be noted that, since an application is usually logged in on a different device, the device for setting the password may be different from the device for logging in the application, and the coordinates corresponding to the same position on the image on the different device may be different. For example, referring also to fig. 2, the user sets a password on the mobile phone terminal, where the displayed image is relatively small, and when the user subsequently logs in on the tablet terminal, as shown in fig. 4, the displayed image is relatively large, so that the coordinates of the same position on the image at the time of logging in are different from the coordinates at the time of setting the password. However, the whole image on different devices is enlarged or reduced in the same ratio, so that the relative position between the contacts can be adopted to effectively ensure that the user can log in normally on different applications.
It should be further noted that, since the user memorizes the position on the image, not the coordinates of the password contact, and the user cannot be guaranteed to click on the password contact accurately, as long as the error between the relative position between the current contacts clicked by the user and the relative position between the corresponding password contacts is within the preset range, it is determined that the current contacts clicked by the user are correct.
Specifically, based on the coordinates of each two current contacts and the coordinates of the password contacts corresponding to each two current contacts, the relative positions of each two current contacts and the relative positions of each two password contacts are calculated, then the difference between the relative positions of each two current contacts and the relative positions of the password contacts corresponding to the two current contacts is calculated, and whether the obtained difference is in a preset range is judged. If it is determined that the errors between the relative positions of every two current contacts and the relative positions of the two corresponding password contacts are within the preset range, step S305 is executed; if it is determined that the relative positions of any two current contacts and the relative positions of the two corresponding password contacts are not within the preset range, step S306 is executed.
Optionally, in another embodiment of the present application, a specific implementation manner of step S304, as shown in fig. 5, includes:
S501, matching the coordinates of the password contacts corresponding to each current contact according to the clicking sequence of each current contact.
Specifically, the coordinates of each password contact and the clicking sequence recorded by the user when setting the password can be determined according to the determined image or according to the user identification, and then the coordinates of the password contact which are the same as the clicking sequence of the current contact are matched from the determined coordinates of each password contact for each current contact.
For example, referring also to fig. 2 and 4, fig. 4 is three current contacts that the user clicks on an image in sequence. The coordinates of the current contact point with the first click sequence are (x 1, y 1), the coordinates of the current contact point with the second click sequence are (x 2, y 2), and the coordinates of the current contact point with the third click sequence are (x 3, y 3). Fig. 2 shows three password contacts that are clicked sequentially on an image when a user sets a password. Wherein, the coordinates of the password contact point with the first click sequence are (a 1, b 1), the coordinates of the password contact point with the second click sequence are (a 2, b 2), and the coordinates of the password contact point with the third click sequence are (a 3, b 3). Thus, the current contact (x 1, y 1) corresponds to the code contact (a 1, b 1); the current contact (x 2, y 2) corresponds to the code contact (a 2, b 2); the current contact (x 2, y 2) corresponds to the code contact (a 2, b 2).
S502, respectively aiming at each two current contacts, calculating the ratio of the difference value of the two current abscissas to the difference value of the ordinate to obtain the relative positions of the two current contacts, and calculating the ratio of the difference value of the abscissas to the difference value of the ordinate of the two password contacts corresponding to the two current contacts to obtain the relative positions of the two corresponding password contacts.
S503, respectively aiming at each two current contacts, calculating the difference value between the relative positions of the two current contacts and the relative positions of the two corresponding password contacts, and judging whether the difference value is in a preset range.
Optionally, in another embodiment of the present application, after executing step S304 to determine that the errors between the relative positions of each two current contacts and the relative positions of the two corresponding password contacts are within the preset range, the method may further include:
and judging whether the difference value between the slope from the current contact point to the coordinate origin and the slope from the password contact point corresponding to the current contact point to the coordinate origin is within a preset slope difference value range or not according to each current contact point.
Wherein, since the abscissa and the ordinate of the origin are both zero, the slope of the touch point to the origin of coordinates is equal to the ratio of the ordinate to the abscissa of the touch point. In order to verify based on the slope, it is necessary to ensure that the positions of the origins set when the images are displayed on different devices are the same, and the point of the lowermost corner of the image is usually set as the origin.
Because the password verification is carried out by adopting the relative positions among the contacts, other users possibly click other contacts and the positions of the contacts clicked when setting the password are different, but the relative positions among the contacts and the relative positions among the password contacts are in a preset range, so that the password of the user is deciphered. Therefore, in order to enhance the security of the password, besides increasing the number of password contacts, the slope from the current contact to the origin of coordinates and the slope from the corresponding password contact to the origin can be further adopted for verification, so that the security is improved.
In the embodiment of the present application, step S305 is executed only when it is further determined that the difference between the slope from each current contact point to the origin of coordinates and the slope from the password contact point corresponding to the current contact point to the origin of coordinates is within the preset slope difference range. If the further judgment is performed, it is judged that the difference between the slope from any one current contact point to the origin of coordinates and the slope from the password contact point corresponding to the current contact point to the origin of coordinates is not within the preset slope difference range, and step S306 is performed.
It should be noted that, since the password verification based on the slope of the contact and the verification password based on the relative position between the contacts are independent of each other, the password verification based on the slope of the contact is not limited to be performed only after the error between the relative position of each two current contacts and the relative positions of the two corresponding password contacts is determined to be within the preset range in step S304. But also executing step S305 when it is determined that the errors between the relative positions of each two current contacts and the relative positions of the two corresponding password contacts are within the preset range, and it is determined that the differences between the slope of each current contact to the origin of coordinates and the slope of the corresponding password contact of each current contact to the origin of coordinates are within the preset slope difference range, otherwise executing step S306.
S305, determining that the login application is authenticated and authorized through the password.
S306, determining that the password verification fails.
Optionally, after determining that the password authentication fails, authentication failure information may be prompted to the user.
According to the login method for the application, provided by the embodiment of the application, the coordinates and the clicking sequence of the contacts on the image are used as passwords, and the position on the image is more convenient for a user to memorize compared with a complex character string because the image has stronger identification. And whether the password is correct or not is verified through the corresponding relation between the relative positions of the current contacts and the corresponding password contacts, so that the security can be effectively ensured as well, and the user can be ensured to realize login on equipment with different resolutions or different screen sizes through verification of the relative positions.
Another embodiment of the present application provides a login device for an application, as shown in fig. 6, including the following units:
a receiving unit 601, configured to receive an application login request.
Wherein the application login request includes a user identification.
The image determining unit 602 is configured to determine an image corresponding to the user identifier, and display the image on the login interface.
Wherein the image is stored in the background when the user passwords on the image.
A first obtaining unit 603, configured to obtain coordinates of each current contact point sequentially clicked by the user on the image and a clicking sequence of each current contact point.
The first verification unit 604 is configured to determine whether an error between a relative position of each two current contacts and a relative position of the corresponding two password contacts is within a preset range based on the coordinates of each current contact and the coordinates of the password contacts corresponding to each current contact.
The password contact is a contact clicked when a password is set on the image; the current contact points with the same clicking sequence correspond to the password contact points; the coordinates and clicking sequence of the password contact are obtained and recorded when the password is set on the image;
a first determining unit 605, configured to determine that the password authentication is passed and authorize the login application when the first authenticating unit determines that the errors between the relative positions of each two current contacts and the relative positions of the two corresponding password contacts are all within a preset range;
and a second determining unit 606, configured to determine that the password authentication fails when the first authenticating unit determines that the error between the relative positions of any two current contacts and the relative positions of the two corresponding password contacts is not within the preset range.
Optionally, in the login device for an application provided in another embodiment of the present application, as shown in fig. 7, the first verification unit 604 includes:
and the matching unit 701 is configured to match coordinates of the password contact corresponding to each current contact according to the clicking sequence of each current contact.
The first calculating unit 702 is configured to calculate, for each two current contacts, a ratio of a difference value of two current abscissas to a difference value of two abscissas to obtain a relative position of the two current contacts, and calculate a ratio of a difference value of two abscissas to a difference value of two abscissas of two password contacts corresponding to the two current contacts to obtain a relative position of the two corresponding password contacts.
The first determining unit 703 is configured to calculate, for each two current contacts, a difference between a relative position of the two current contacts and a relative position of the two corresponding password contacts, and determine whether the difference is within a preset range.
Optionally, in the login device for an application provided in another embodiment of the present application, the login device further includes:
the second verification unit is configured to determine, for each current contact, whether a difference between a slope from the current contact to the origin of coordinates and a slope from the corresponding password contact to the origin of coordinates is within a preset slope difference range after the first verification unit 604 determines that the relative positions of each two current contacts and the relative positions of the two corresponding password contacts are both within the preset range;
The slope from the contact point to the origin of coordinates is equal to the ratio of the ordinate to the abscissa of the contact point; when the second verification unit judges that the difference value between the slope of each current contact point to the origin of coordinates and the slope of the corresponding password contact point to the origin of coordinates is within the preset slope difference value range, the first determination unit 605 determines that the password verification is passed and authorizes the login application; when the second verification unit determines that there is any difference between the slope of the current contact point to the origin of coordinates and the slope of the password contact point corresponding to the current contact point to the origin of coordinates is not within the preset slope difference range, the second determination unit 606 determines that password verification fails.
Optionally, the login device of the application provided in another embodiment of the present application further includes a password setting unit. As shown in fig. 8, the password setting unit includes:
a third determining unit 801 for determining an image for setting a password.
And a display unit 802 for displaying the image on the password setting interface.
A second obtaining unit 803 is configured to obtain coordinates of each of the cipher contacts clicked on the image in sequence on the image and a clicking order of each of the cipher contacts.
A storage unit 804, configured to store the image, the coordinates of each of the password contacts, and the clicking order of each of the password contacts.
A construction unit 805, configured to construct a correspondence between a user identifier of a user and an image; the user identification of the user is set by the user or generated according to a preset generation rule.
It should be noted that, the specific working process of each unit provided in the above embodiment may correspondingly refer to the specific implementation process of the steps in the above method embodiment, which is not described herein again.
Another embodiment of the present application provides an electronic device, as shown in fig. 9, including:
one or more processors 901 and a memory 902.
The memory 902 stores one or more programs, which when executed by one or more processors, cause the one or more processors to implement a login method for an application as provided in any one of the method embodiments described above.
Another embodiment of the present application provides a computer storage medium storing a program for implementing a login method for an application as provided in any one of the method embodiments described above when the program is executed.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative elements and steps are described above generally in terms of functionality in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (8)
1. A method for logging in an application, comprising:
receiving an application login request; wherein the application login request includes a user identifier;
determining an image corresponding to the user identifier, and displaying the image on a login interface;
acquiring coordinates of each current contact point clicked by a user on the image in sequence on the image and the clicking sequence of each current contact point;
matching the coordinates of the password contacts corresponding to each current contact according to the clicking sequence of each current contact; the corresponding password contact is a contact clicked when a password is set on the image; the current contact and the password contact which are the same in clicking sequence correspond to each other;
Calculating the ratio of the difference value of the two current abscissas to the difference value of the ordinate to obtain the relative positions of the two current contacts, and calculating the ratio of the difference value of the abscissas to the difference value of the ordinate of the two password contacts corresponding to the two current contacts to obtain the relative positions of the two corresponding password contacts;
judging whether errors of the relative positions of every two current contacts and the relative positions of the corresponding two password contacts are within a preset range or not;
if the errors of the relative positions of every two current contacts and the relative positions of the corresponding two password contacts are judged to be within the preset range, determining that password verification is passed and authorizing login application;
if the error between the relative position of any two current contacts and the relative position of the corresponding two password contacts is not in the preset range, determining that password verification fails.
2. The method according to claim 1, wherein after the determining that the errors between the relative positions of each two current contacts and the relative positions of the corresponding two password contacts are within the preset range, further comprises:
Judging whether the difference value between the slope from the current contact point to the coordinate origin and the slope from the password contact point corresponding to the current contact point to the coordinate origin is within a preset slope difference value range or not according to each current contact point; the slope from the contact point to the origin of coordinates is equal to the ratio of the ordinate to the abscissa of the contact point; when judging that the difference value between the slope of each current contact point to the coordinate origin and the slope of the corresponding password contact point to the coordinate origin is within a preset slope difference value range, executing the determination, verifying through the password and authorizing login application; and executing the password verification failure determination when judging that the difference value between the slope from the current contact point to the coordinate origin and the slope from the password contact point corresponding to the current contact point to the coordinate origin is not in the preset slope difference value range.
3. The method of claim 1, wherein the manner in which the password is set on the image comprises:
determining an image for setting a password;
displaying the image on a password setting interface;
acquiring coordinates of each password contact point clicked on the image in sequence on the image and the clicking sequence of each password contact point;
Storing the image, the coordinates of each password contact and the clicking sequence of each password contact;
constructing a corresponding relation between the user identification of the user and the image; the user identification of the user is set by the user or generated according to a preset generation rule.
4. A login device for an application, comprising:
the receiving unit is used for receiving an application login request; wherein the application login request includes a user identifier;
the image determining unit is used for determining an image corresponding to the user identifier and displaying the image on a login interface;
the first acquisition unit is used for acquiring coordinates of each current contact point clicked by a user on the image in sequence on the image and the clicking sequence of each current contact point;
the first verification unit is used for judging whether errors of the relative positions of every two current contacts and the relative positions of the two corresponding password contacts are within a preset range or not based on the coordinates of each current contact and the coordinates of the password contacts corresponding to each current contact; the password contact is a contact clicked when a password is set on the image; the current contact and the password contact which are the same in clicking sequence correspond to each other; the relative positions of the two current contacts are determined based on a horizontal coordinate difference value and a vertical coordinate difference value between the two current contacts; the relative positions of the two password contacts are determined based on a horizontal coordinate difference value and a vertical coordinate difference value between the two password positions;
The first determining unit is used for determining that the password authentication is passed and authorizing the login application when the first verifying unit judges that the errors of the relative positions of every two current contacts and the relative positions of the corresponding two password contacts are all in a preset range;
the second determining unit is used for determining that the password verification fails when the first verifying unit judges that the error between the relative positions of any two current contacts and the relative positions of the corresponding two password contacts is not in a preset range;
wherein the first verification unit includes:
the matching unit is used for matching the coordinates of the password contacts corresponding to each current contact according to the clicking sequence of each current contact;
the first calculating unit is used for calculating the ratio of the difference value of the two current abscissas to the difference value of the ordinate to obtain the relative positions of the two current contacts, and calculating the ratio of the difference value of the abscissas to the difference value of the ordinate of the two password contacts corresponding to the two current contacts to obtain the relative positions of the two corresponding password contacts;
the first judging unit is used for calculating the difference value between the relative positions of the two current contacts and the corresponding relative positions of the two password contacts for each two current contacts respectively, and judging whether the difference value is in the preset range or not.
5. The apparatus as recited in claim 4, further comprising:
the second verification unit is used for judging whether the difference value between the slope from the current contact to the origin of coordinates and the slope from the password contact corresponding to the current contact to the origin of coordinates is within a preset slope difference value range or not according to each current contact after the first verification unit judges that the errors of the relative positions of each two current contacts and the relative positions of the corresponding two password contacts are within a preset range;
the slope from the contact point to the origin of coordinates is equal to the ratio of the ordinate to the abscissa of the contact point; when the second verification unit judges that the difference value between the slope of each current contact point to the coordinate origin point and the slope of the corresponding password contact point to the coordinate origin point is within a preset slope difference value range, the first determination unit executes the determination to pass password verification and authorizes login application; and when the second verification unit judges that the difference value between the slope from any one current contact point to the origin of coordinates and the slope from the password contact point corresponding to the current contact point to the origin of coordinates is not in a preset slope difference value range, the second determination unit executes the password verification failure.
6. The apparatus of claim 4, further comprising a password setting unit, the password setting unit comprising:
a third determination unit configured to determine an image for setting a password;
a display unit for displaying the image on a password setting interface;
the second acquisition unit is used for acquiring coordinates of each password contact point clicked on the image in sequence on the image and the clicking sequence of each password contact point;
the storage unit is used for storing the images, the coordinates of each password contact point and the clicking sequence of each password contact point;
the construction unit is used for constructing the corresponding relation between the user identification of the user and the image; the user identification of the user is set by the user or generated according to a preset generation rule.
7. An electronic device, comprising:
one or more processors;
a memory having one or more programs stored thereon;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of logging applications of any of claims 1 to 3.
8. A computer storage medium storing a program which, when executed, is adapted to carry out a login method for an application according to any one of claims 1 to 3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010553577.0A CN111639322B (en) | 2020-06-17 | 2020-06-17 | Application login method and device, electronic equipment and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010553577.0A CN111639322B (en) | 2020-06-17 | 2020-06-17 | Application login method and device, electronic equipment and computer storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111639322A CN111639322A (en) | 2020-09-08 |
CN111639322B true CN111639322B (en) | 2023-09-29 |
Family
ID=72328960
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010553577.0A Active CN111639322B (en) | 2020-06-17 | 2020-06-17 | Application login method and device, electronic equipment and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111639322B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115589285B (en) * | 2022-09-15 | 2024-07-23 | 中国电信股份有限公司 | Encryption method of user information and decryption method of user information |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20080044716A (en) * | 2006-11-17 | 2008-05-21 | 한국전자통신연구원 | Log-in apparatus of mobile terminal using graphic password and method thereof |
CN101645121A (en) * | 2008-08-06 | 2010-02-10 | 深圳富泰宏精密工业有限公司 | System and method for setting password protection by utilizing picture |
TW201009772A (en) * | 2008-08-29 | 2010-03-01 | Chi Mei Comm Systems Inc | System and method for setting passwords by using images |
CN103116718A (en) * | 2013-03-06 | 2013-05-22 | 无锡德飞科技有限公司 | Password setting and verification method based on spatial position code log-in computer system |
KR20190033377A (en) * | 2017-09-21 | 2019-03-29 | 주식회사 프로젝트사공구 | Method and computer program for user authentication using image touch password |
CN110730152A (en) * | 2018-07-16 | 2020-01-24 | 杭州海康威视数字技术股份有限公司 | Login verification method and device and electronic equipment |
-
2020
- 2020-06-17 CN CN202010553577.0A patent/CN111639322B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20080044716A (en) * | 2006-11-17 | 2008-05-21 | 한국전자통신연구원 | Log-in apparatus of mobile terminal using graphic password and method thereof |
CN101645121A (en) * | 2008-08-06 | 2010-02-10 | 深圳富泰宏精密工业有限公司 | System and method for setting password protection by utilizing picture |
TW201009772A (en) * | 2008-08-29 | 2010-03-01 | Chi Mei Comm Systems Inc | System and method for setting passwords by using images |
CN103116718A (en) * | 2013-03-06 | 2013-05-22 | 无锡德飞科技有限公司 | Password setting and verification method based on spatial position code log-in computer system |
KR20190033377A (en) * | 2017-09-21 | 2019-03-29 | 주식회사 프로젝트사공구 | Method and computer program for user authentication using image touch password |
CN110730152A (en) * | 2018-07-16 | 2020-01-24 | 杭州海康威视数字技术股份有限公司 | Login verification method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN111639322A (en) | 2020-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11847199B2 (en) | Remote usage of locally stored biometric authentication data | |
US8004491B2 (en) | System for and methods of storing and comparing computer generated continuous vector lines through a non-secure or a secure communication channel | |
CN103200011B (en) | A kind of cipher authentication method and device | |
US9667609B2 (en) | Application security system and method | |
RU2589397C2 (en) | Authentication graphic gestures | |
US11811754B2 (en) | Authenticating devices via tokens and verification computing devices | |
EP3343831A1 (en) | Identity authentication method and apparatus | |
EP1868131A1 (en) | Method and system for secure user authentication | |
US10735398B1 (en) | Rolling code authentication techniques | |
TR201810890T4 (en) | A method and system that protects against identity theft or copy abuse. | |
WO2013143343A1 (en) | Account login method, apparatus and system, and network server | |
KR20160003796A (en) | User authentication | |
US20170019786A1 (en) | Method and apparatus for information verification | |
CN111241517A (en) | Method and device for constructing biological characteristic verification question-answer library | |
CN107465701B (en) | Method and device for inputting password into interface at dynamic position | |
CN111143812B (en) | Login authentication method based on graphics | |
JP2005149388A (en) | Password authentication apparatus, program for the same, and recording medium | |
CN107580002B (en) | Double-factor authentication security manager login system and method | |
CN111639322B (en) | Application login method and device, electronic equipment and computer storage medium | |
US10581832B1 (en) | Authentication / authorization without a password | |
JP2006155547A (en) | Individual authentication system, terminal device and server | |
US11238149B2 (en) | Computerized user authentication method that utilizes the Cartesian coordinate system to verify a user's identity | |
CN110765431B (en) | Multi-user fingerprint or password login method and management system thereof | |
CN107301547B (en) | Method, device and system for sliding password input in network payment | |
KR101420160B1 (en) | Variable password generation method and internet authentication system using the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |