CN112417429A - Security verification method and device, electronic equipment and storage medium - Google Patents

Security verification method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112417429A
CN112417429A CN202011348819.9A CN202011348819A CN112417429A CN 112417429 A CN112417429 A CN 112417429A CN 202011348819 A CN202011348819 A CN 202011348819A CN 112417429 A CN112417429 A CN 112417429A
Authority
CN
China
Prior art keywords
user
preset
electronic equipment
unlocking information
unlocking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011348819.9A
Other languages
Chinese (zh)
Inventor
黄燕萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202011348819.9A priority Critical patent/CN112417429A/en
Publication of CN112417429A publication Critical patent/CN112417429A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Abstract

The application discloses a security verification method, a security verification device, electronic equipment and a storage medium, and belongs to the technical field of electronic equipment. The method comprises the following steps: receiving N pieces of first unlocking information input by a user; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment; determining the number of first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M; under the condition that the matching number M is not less than the first preset number, performing identity authentication on the user; if the user passes the identity authentication, unlocking the electronic equipment; and if the user does not pass the identity authentication, locking the electronic equipment. Therefore, the identity authentication is carried out on the user when the matching quantity of the first unlocking information input by the user is not less than the first preset quantity, the mode of the safety verification of the electronic equipment is enriched, the mode of the safety verification is more flexible, unnecessary forced locking of the electronic equipment can be avoided, and the normal use of the user on the electronic equipment is ensured.

Description

Security verification method and device, electronic equipment and storage medium
Technical Field
The invention belongs to the technical field of communication, and particularly relates to a security verification method and device, electronic equipment and a storage medium.
Background
Currently, electronic devices are widely used in daily work and life of users. In the prior art, in order to improve the safety of the electronic device, manufacturers often set a safety protection mechanism for forcibly locking the electronic device after the electronic device has a password error for multiple times.
However, the forced locking manner in the prior art is not flexible enough, the verification manner is single, in the scenario that the user forgets the password and tries to unlock the electronic device for multiple times or the acquaintance and the child try to unlock the electronic device, the electronic device is forced to be locked after multiple trial and error, and the unnecessary forced locking of the electronic device affects the normal use of the electronic device by the user.
Disclosure of Invention
The embodiment of the application aims to provide a security verification method, a security verification device, electronic equipment and a storage medium, and can solve the technical problems that in the prior art, the security verification mode of the electronic equipment is not flexible and single enough, and the normal use of a user is influenced by unnecessary forced locking of the electronic equipment.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides a security verification method, where the method includes:
receiving N pieces of first unlocking information input by a user; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment;
determining the number of first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M;
under the condition that the matching number M is not less than a first preset number, performing identity authentication on the user;
if the user passes the identity authentication, unlocking the electronic equipment;
and if the user does not pass the identity authentication, locking the electronic equipment.
In a second aspect, an embodiment of the present application provides a security verification apparatus, including:
the receiving module is used for receiving N pieces of first unlocking information input by a user; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment;
the determining module is used for determining the number of the first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M;
the authentication module is used for performing identity authentication on the user under the condition that the matching number M is not less than a first preset number;
the unlocking module is used for unlocking the electronic equipment if the user passes the identity authentication;
and the locking module is used for locking the electronic equipment if the user does not pass the identity authentication.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a processor, a memory, and a program or an instruction stored on the memory and executable on the processor, and when executed by the processor, the program or the instruction implements the steps of the security verification method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the security authentication method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the security verification method according to the first aspect.
In the embodiment of the application, N pieces of first unlocking information input by a user are received; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment; determining the number of first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M; under the condition that the matching number M is not less than the first preset number, performing identity authentication on the user; if the user passes the identity authentication, unlocking the electronic equipment; and if the user does not pass the identity authentication, locking the electronic equipment. Therefore, in the embodiment of the application, the identity authentication is performed on the user when the matching quantity of the first unlocking information input by the user is not less than the first preset quantity, so that the safety verification mode of the electronic equipment is enriched, the safety verification mode is more flexible, unnecessary forced locking of the electronic equipment can be avoided, and the normal use of the user on the electronic equipment is ensured.
Drawings
FIG. 1 is a flow chart illustrating the steps of a security authentication method according to an embodiment of the present application;
FIG. 2 is a flow chart illustrating steps of another security authentication method according to an embodiment of the present application;
FIG. 3 is a schematic diagram illustrating face recognition according to an embodiment of the present application;
FIG. 4 is a schematic diagram illustrating fingerprint recognition according to an embodiment of the present application;
FIG. 5 is a schematic diagram illustrating speech recognition according to an embodiment of the present application;
FIG. 6 is a flow chart illustrating a security verification method according to an embodiment of the present application;
fig. 7 is a block diagram showing a configuration of a security authentication apparatus according to an embodiment of the present application;
fig. 8 is a block diagram showing a structure of an electronic device according to an embodiment of the present application;
fig. 9 is a schematic diagram illustrating a hardware structure of an electronic device implementing various embodiments of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
A security verification method, a security verification device, an electronic apparatus, and a storage medium according to embodiments of the present application are described in detail below with reference to the accompanying drawings.
Referring to fig. 1, a flowchart illustrating steps of a security verification method according to an embodiment of the present application is shown, where the method may specifically include:
step 101, receiving N pieces of first unlocking information input by a user; and the N pieces of first unlocking information are not matched with the current verification information preset in the electronic equipment.
In this embodiment of the application, the first unlocking information may be unlocking information input by a user attempting to unlock the electronic device. The type of the unlocking information may specifically be a digital password, a touch track, an unlocking graph, and the like, and the specific type of the unlocking information is not limited in the embodiment of the present application. The electronic device can be a smart phone, a notebook, a tablet computer, a vehicle-mounted computer and the like. The current verification information may be currently set verification information in the electronic device, and the user may directly unlock the electronic device after inputting the current verification information.
In this step, the scenario in which the N pieces of first unlocking information are input to attempt to unlock the electronic device may be that the user forgets a password to attempt to unlock the electronic device, or an acquaintance or a child attempts to unlock the electronic device, or a stranger attempts to unlock the electronic device, or other scenarios in which the user attempts to unlock the electronic device, which is not limited in the embodiment of the present application. After receiving the N pieces of first unlocking information input by the user, the electronic device may perform a subsequent security verification process according to the N pieces of first unlocking information when the N pieces of first unlocking information are not matched with the current verification information.
And 102, determining the number of the first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M.
In this embodiment, the historical verification information may be verification information that the electronic device has used historically, such as an unlocking password or an unlocking pattern that the electronic device has used once. The matching number M may refer to the number of the N pieces of first unlocking information that match the historical authentication information. Matching may refer to complete identity, or may refer to similarity exceeding 80% or 90%, and the like, and may be specifically selected according to actual needs of a user, which is not limited in this embodiment of the present application.
In this step, when the matching number is determined, the N pieces of first unlocking information may be compared with the historical verification information to obtain a matching number M, and subsequently, whether to perform identity authentication is determined according to the matching number M.
And 103, performing identity authentication on the user under the condition that the matching number M is not less than a first preset number.
In this embodiment of the application, the first preset number may be a preset critical value of the matching number, and when the first preset number is equal to or greater than the first preset number, the identity authentication function of the electronic device may be triggered. The specific numerical value of the first preset number may be 4, 5, 6, and the like, and may be flexibly set according to the actual requirement of the user.
It is to be understood that, in an alternative embodiment of the present application, the first preset number may be related to the historical verification information, for example, if the first unlocking information is unlocking by inputting a password, a different first preset number may be determined according to a time length from the current time length in the password used historically, where the password input in the first unlocking information is the historical password. If the password of the first unlocking information is the last unlocking password, the first preset number may be smaller, and if the password of the first unlocking information is the unlocking password used 5 times before, the first preset number may be larger.
The identity authentication may be biometric identification verification of the user, specifically fingerprint verification, face verification, voice verification, iris verification, and the like, which is not limited in the embodiments of the present application.
In this step, after receiving N pieces of first unlocking information input by the user, the electronic device may compare the N pieces of first unlocking information with the historical verification information to determine a matching number M, and when the matching number M is equal to or greater than a first preset number, the electronic device may determine that the user attempting to unlock at present is the user of the electronic device or an acquaintance, may start authentication, and verifies the identity of the user. Therefore, the flexibility of the electronic equipment safety verification can be improved, and when a user or an acquaintance forgets a password and tries to unlock, the electronic equipment can be prevented from being locked forcibly based on identity authentication.
And step 104, if the user passes the identity authentication, unlocking the electronic equipment.
In the embodiment of the application, when the matching number M is not less than the first preset number, the electronic device starts identity authentication, and when the user passes the identity authentication, the user specifically may succeed in face image recognition, succeed in fingerprint verification, succeed in voice verification, and the like.
And 105, if the user does not pass the identity authentication, locking the electronic equipment.
In the embodiment of the application, after the electronic device starts the identity authentication function, if the user trying to unlock fails to pass the identity authentication, the electronic device may be forcibly locked at this time. In the forced locking state, the user cannot perform input operation of the first unlocking information and cannot unlock the electronic device.
To sum up, in the security verification method provided in the embodiment of the present application, N pieces of first unlocking information input by a user are received; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment; determining the number of first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M; under the condition that the matching number M is not less than the first preset number, performing identity authentication on the user; if the user passes the identity authentication, unlocking the electronic equipment; and if the user does not pass the identity authentication, locking the electronic equipment. Therefore, in the embodiment of the application, the identity authentication is performed on the user when the matching quantity of the first unlocking information input by the user is not less than the first preset quantity, so that the safety verification mode of the electronic equipment is enriched, the safety verification mode is more flexible, unnecessary forced locking of the electronic equipment can be avoided, and the normal use of the user on the electronic equipment is ensured.
Referring to fig. 2, a flowchart illustrating steps of another security authentication method according to an embodiment of the present application is shown. The method specifically comprises the following steps:
step 201, receiving N pieces of first unlocking information input by a user; and the N pieces of first unlocking information are not matched with the current verification information preset in the electronic equipment.
Specifically, the implementation manner of this step may refer to step 101 described above, and details of this embodiment are not described herein.
Step 202, determining the number of the first unlocking information matched with the historical verification information in the N pieces of first unlocking information, and obtaining the matching number M.
Optionally, in this embodiment of the application, the first unlocking information includes at least one of a password and an unlocking graph.
In the embodiment of the present application, the password may refer to a digital password for unlocking. The unlocking graph can refer to a graph for unlocking, for example, a graph formed by connecting lines of a nine-square grid and the like.
Alternatively, step 202 may include the following steps (1) to (2):
and (1) determining a matching result of the first unlocking information and the historical verification information for the first unlocking information received each time.
In this embodiment of the application, the matching result may refer to a matching condition between each of the N pieces of first unlocking information and the historical verification information, and specifically may include a matching result representing that the first unlocking information and the historical verification information are matched and a matching result representing that the first unlocking information and the historical verification information are not matched. When the matching result is determined, each piece of unlocking information may be directly compared with the historical verification information, and the matching condition of each piece of first unlocking information is determined.
For example, the first unlocking information input by the user may be a digital password, and in this step, each group of digital passwords input by the user may be compared with the historical unlocking digital passwords in the historical verification information, and whether the groups of digital passwords are matched with the historical unlocking digital passwords is determined, so as to obtain a matching result.
Optionally, in this embodiment of the present application, step (1) may include the following steps a to C:
and step A, determining the similarity between the first unlocking information and the historical verification information.
In this embodiment of the application, the similarity may refer to a similarity between the first unlocking information and the historical verification information. Specifically, during the determination, for each piece of first unlocking information, the first unlocking information may be compared with each piece of historical verification information, the similarity between the first unlocking information and each piece of historical verification information is determined, and the maximum value of the similarity between the first unlocking information and each piece of historical verification information is selected as the similarity between the first unlocking information and the historical verification information.
And B, under the condition that the similarity is larger than a preset similarity threshold, generating a matching result representing that the first unlocking information is matched with the historical verification information.
In this embodiment of the application, the preset similarity threshold may refer to a preset threshold of similarity, and may specifically be 90%, 95%, and the like. When the similarity is greater than the preset similarity threshold, it may be determined that the first unlocking information matches the historical verification information, and at this time, a matching result representing that the first unlocking information matches the historical verification information may be generated.
And C, under the condition that the similarity is not larger than a preset similarity threshold, generating a matching result representing that the first unlocking information is not matched with the historical verification information.
In this embodiment of the application, if the similarity is not greater than the preset similarity threshold, it may be determined that the first unlocking information is not matched with the historical verification information, and at this time, a matching result representing that the first unlocking information is not matched with the historical verification information may be generated.
In the embodiment of the application, the electronic equipment determines the similarity between the first unlocking information and the historical verification information; under the condition that the similarity is larger than a preset similarity threshold, generating a matching result representing that the first unlocking information is matched with the historical verification information; and under the condition that the similarity is not greater than a preset similarity threshold, generating a matching result representing that the first unlocking information is not matched with the historical verification information. Therefore, whether the first unlocking information is matched with the historical verification information or not is judged through calculating the similarity, so that the calculation process is more accurate, and the calculation accuracy can be improved.
And (2) determining the matching number M in the matching result.
In this embodiment of the application, the matching result may include a matching result representing that the first unlocking information matches the historical verification information, or may include a matching result representing that the first unlocking information does not match the historical verification information, and the electronic device may count the number of matching results representing that the first unlocking information matches the historical verification information, as the matching number M. For example, the electronic device may record a matching result of the first unlocking information and the historical verification information as an identification bit 1, record a matching result of the first unlocking information and the historical verification information as an identification bit 0, and then directly count the number of the identification bits 1 as the matching number M.
In this step, the electronic device may also adopt a mode in which the first unlocking information is matched one by one, the electronic device may set an initial value of the matching number M to 0, then compare each piece of the first unlocking information with the historical verification information, respectively, to obtain a matching result, if the matching result is that there is historical verification information matched with the first unlocking information, add 1 to the matching number M, and if not, the matching number is unchanged; and then the electronic equipment compares the next first unlocking information with the historical verification information to obtain a matching result, and executes the process of judging whether to increase the matching number based on the matching result again. Therefore, the electronic device can complete the matching process of the N pieces of first unlocking information and the historical verification information, and obtain the matching number M in the N pieces of first unlocking information.
It should be noted that other indexes may be used in the embodiment of the present application to determine whether to trigger the identity authentication. For example, the ratio of the number of matches, that is, the ratio of the first unlocking information in which there is matching historical verification information to the total number N of the first unlocking information may be used. For example, the number N of the first unlocking information input by the user is 6, and if there are 4 times of matching historical authentication information, the matching ratio is 67%.
In the embodiment of the application, for the received first unlocking information each time, the matching result of the first unlocking information and the historical verification information is determined; and determining the number M of matches in the matching result. Therefore, the electronic equipment can determine the matching number M based on the matching condition of the first unlocking information and the historical verification information, and the accuracy of determining the matching number is improved.
Optionally, in this embodiment of the application, the number N of the first unlocking information is less than or equal to the preset total input times.
In this embodiment of the application, the preset total input times may be a total number of times that the user may attempt to input the first unlocking information. And after the input times of the first unlocking information reach the first preset number threshold value and the first unlocking information still fails to pass the verification, the electronic equipment is forcibly locked. The first preset number threshold may be 5 times, 6 times, 8 times or more, and may be specifically set according to an actual requirement of a user, or may be a factory default value of the electronic device, which is not limited in this embodiment of the application. The number N of the first unlocking information may be smaller than or equal to the preset total input times.
For example, the electronic device may set the preset total number of inputs to 6 times, that is, the total number of times that the user can attempt to input the first unlocking information to 6 times, and the first preset number for determining whether to start the authentication may be set to 4 times. The electronic device may set an initial value of the matching number M to 0, and after receiving first unlocking information input by a user, add 1 to the matching number M if there is history verification information matching the first unlocking information. Within the preset total input times, for example, the user inputs 4 times, 5 times or 6 times, and if the matching number M reaches the first preset number, that is, 4 times, the electronic device determines that the matching degree of the first unlocking information input by the user and the historical verification information meets the preset condition, starts an identity authentication function, and verifies the identity of the user. It should be noted that, when the number N of the first unlocking information does not reach the preset total input times, if the identity authentication fails, the user may continue to input the first unlocking information until the number N of the first unlocking information reaches the preset total input times.
It should be noted that, specifically, when the matching number is calculated in the embodiment of the present application, the electronic device may calculate once after receiving the first unlocking information once, or perform comparison calculation after the number of user inputs reaches the preset total number of inputs, which is not limited in the embodiment of the present application.
In the embodiment of the application, before the user does not complete the preset total input times, the electronic device may determine the matching number M based on the matching condition of the first unlocking information and the historical verification information, and may trigger the identity authentication when the matching number M reaches the first preset number. Therefore, the user does not need to wait for the completion of the total input times, the safety verification operation of the user is simplified to a certain extent, and the safety verification mode of the electronic equipment is more flexible.
And 203, performing identity authentication on the user under the condition that the matching number M is not less than a first preset number.
Optionally, in this embodiment of the present application, step 203 may include the following steps (3) to (4):
step (3), collecting the face image of the user; or, collecting the fingerprint of the user; or, collecting the voice of the user.
In the embodiment of the application, after the electronic device starts the identity authentication function, the user can be verified by any one of face recognition, fingerprint recognition and voice recognition. When the face recognition is adopted, the electronic equipment can automatically start the camera to collect the face image of the user, and then whether the similarity between the face image and the preset face image is greater than a first preset threshold value or not is determined through image recognition technologies such as image feature extraction and image contrast. The first preset threshold may be a critical value of the corresponding similarity when the face recognition is successful, and may be, for example, 95%, 98%, or the like.
Exemplarily, fig. 3 shows a schematic diagram of face recognition according to an embodiment of the present application. As shown in fig. 3, the electronic apparatus is provided with a camera 301. The display screen of the electronic equipment displays the text prompt information of 'identity authentication, namely starting the camera'. Meanwhile, the electronic equipment displays an image acquisition area 302, and a user can adjust the body position, so that the image acquisition area 302 corresponds to the human face area of the user, and the electronic equipment can conveniently acquire the human face image.
When fingerprint identification is adopted, the electronic equipment can call the fingerprint identification module, and the user is prompted to press the finger to the fingerprint identification module of the electronic equipment so as to collect the fingerprint of the user, then based on the fingerprint identification technology, the electronic equipment compares the fingerprint of the user with the preset fingerprint, and whether the similarity of the fingerprint of the user and the preset fingerprint is greater than a second preset threshold value or not is judged. The second preset threshold may be a threshold of the corresponding similarity when the fingerprint identification is successful.
Illustratively, fig. 4 shows a schematic diagram of fingerprint identification according to an embodiment of the present application. As shown in fig. 4, the electronic device displays a text prompt message "authentication, please press a fingerprint identification button with a finger" on the display screen, and displays a fingerprint identification button 401. The electronic device collects the fingerprint of the user through the fingerprint identification button 401 and performs subsequent comparison and verification.
When the voice recognition is adopted, the electronic equipment can start a microphone to collect the voice of the user, then the voice of the user is compared with the preset voice through voice recognition technologies such as voiceprint feature extraction and voiceprint comparison, and whether the similarity between the voice of the user and the preset voice is larger than a third preset threshold value is determined. The third preset threshold may refer to a threshold of the corresponding similarity when the voice recognition is successful.
Illustratively, fig. 5 shows a schematic diagram of speech recognition according to an embodiment of the present application. As shown in fig. 5, the electronic device displays a text prompt message of "authentication, please speak the following sentence" in the display screen, and displays a content prompt box 501 of "jovi hello". And then the electronic equipment can collect the voice of the user reading the sentence, compare the voice of the user with the preset voice and determine the similarity of the voice of the user and the preset voice.
And (4) determining that the user passes the identity authentication under the condition that the similarity of the face image is greater than a first preset threshold, the similarity of the fingerprint is greater than a second preset threshold or the similarity of the voice is greater than a third preset threshold.
In the embodiment of the application, for three modes of face image recognition, fingerprint recognition and voice recognition, the electronic equipment can also set that the user is determined to pass the identity authentication after one verification mode passes, so that the steps of the identity authentication of the user can be simplified, and the efficiency of the identity authentication is improved. Of course, the electronic device may also set that the user can be determined to pass the identity authentication after all three verification modes pass, so that the comprehensiveness of the identity authentication can be ensured, and the use safety of the electronic device can be ensured.
In the embodiment of the application, the electronic equipment carries out identity verification on the user through any one of face image recognition, fingerprint recognition and voice recognition, and acquires a face image of the user or a fingerprint of the user; and determining that the user passes the identity authentication under the conditions that the similarity of the face image is greater than a first preset threshold, the similarity of the fingerprint is greater than a second preset threshold or the similarity of the voice is greater than a third preset threshold. Therefore, the electronic equipment performs identity authentication on the user through various optional modes, the flexibility of identity authentication can be improved, and the use safety of the electronic equipment is ensured.
And 204, if the user passes the identity authentication, unlocking the electronic equipment.
Specifically, the implementation manner of this step may refer to the foregoing step 104, and details of this embodiment are not described herein.
Step 205, if the user fails the identity authentication, and if the matching number M is lower than a second preset number, locking the electronic device at a first preset time.
In this embodiment of the application, the second preset number may refer to a critical value of the matching number, and may be 3, 4, 5, and the like, and may be flexibly set according to actual needs of a user. The first preset time may refer to a forced locking duration of the electronic device, and the first preset time may refer to a longer time, specifically, 15 minutes, 20 minutes, and the like, which is not limited in this embodiment of the application.
In this step, the time for the electronic device to forcibly lock may be determined according to the matching number. When a user tries to unlock the electronic equipment, if the matching number M is smaller than the second preset number, the matching degree of the N pieces of first unlocking information input by the user and the historical verification information is low, the probability that the user trying to unlock the electronic equipment is a stranger is high, and the electronic equipment can increase the forced locking time so as to ensure the safety of the electronic equipment and protect personal information of a user of the electronic equipment.
Step 206, if the user fails to pass the identity authentication, and if the matching number M is higher than a second preset number, locking the electronic device at a second preset time; wherein the first preset time is longer than the second preset time.
In this embodiment of the application, the second preset time may refer to a locking duration of the electronic device, and the second preset time may refer to a shorter time, specifically, 3 minutes, 5 minutes, and the like, which is not limited in this embodiment of the application.
In this step, when the user attempts to unlock the electronic device, if the matching number M is greater than the second preset number, it indicates that the degree of matching between the N pieces of first unlocking information input by the user and the historical verification information is high, and indicates that the probability that the user attempting to unlock is acquaintance or the user of the electronic device is high at this time, and the electronic device may shorten the locking time, so that the waiting time of the user may be reduced.
In the embodiment of the application, the electronic equipment is locked in first preset time under the condition that the matching number M is lower than a second preset number; locking the electronic equipment at a second preset time under the condition that the matching number M is higher than a second preset number; the first preset time is greater than the second preset time. Therefore, the electronic equipment determines the locking time of the electronic equipment based on the matching number, reduces the locking time when the matching number is high, can reduce the waiting time of a user, and ensures the normal use of the user while improving the safety.
Exemplarily, fig. 6 shows a flow chart of a security verification method according to an embodiment of the present application. As shown in fig. 6, after receiving N pieces of first unlocking information input by the user, if the first unlocking information matches the current verification information, the electronic device is successfully unlocked. And if the first unlocking information is not matched with the current verification information, determining the matching number M of the N pieces of first unlocking information and the historical verification information. When the matching number M is not less than the first preset number, starting identity authentication; and when the matching number M is smaller than the first preset number, locking the electronic equipment. When the identity authentication is carried out, after the face image of the user is successfully identified, the electronic equipment is directly unlocked without carrying out subsequent fingerprint identification and voice identification; under the condition that the face image identification is not passed, fingerprint identification is carried out on the user, after the fingerprint identification is passed, the subsequent voice identification step is not executed, and the electronic equipment is directly unlocked; and under the condition that the fingerprint identification is not passed, carrying out voice identification on the user, unlocking the electronic equipment after the voice identification is passed, and locking the electronic equipment if the voice identification is still not passed, namely, all three identity authentication modes are not passed. And the locking duration is determined according to the matching number M of the N pieces of first unlocking information and the historical verification information.
To sum up, the security verification method provided by the embodiment of the application receives N pieces of first unlocking information input by a user; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment; determining the number of first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M; under the condition that the matching number M is not less than the first preset number, performing identity authentication on the user; if the user passes the identity authentication, unlocking the electronic equipment; if the user does not pass the identity authentication and the matching number M is lower than a second preset number, locking the electronic equipment at a first preset time; if the user does not pass the identity authentication and the matching number M is higher than a second preset number, locking the electronic equipment at a second preset time; the first preset time is greater than the second preset time. In this way, in the embodiment of the application, the identity authentication is performed on the user when the matching number of the first unlocking information input by the user is not less than the first preset number, so that the security verification mode of the electronic equipment is enriched, the security verification mode is more flexible, unnecessary forced locking of the electronic equipment can be avoided, and the normal use of the electronic equipment by the user is ensured; and subsequently, the locking duration of the electronic equipment is determined according to the matching number, and the locking time is correspondingly reduced when the matching degree is high, so that the waiting time of a user can be reduced, the safety is improved, and the normal use of the user is ensured.
It should be noted that, in the security authentication method provided in the embodiment of the present application, the execution subject may be a security authentication apparatus, or a control module in the security authentication apparatus for executing loading of the security authentication method. In the embodiment of the present application, a security verification method executed by a security verification apparatus is taken as an example to describe the security verification apparatus provided in the embodiment of the present application.
Referring to fig. 7, a block diagram of a security authentication apparatus according to an embodiment of the present application is shown, and in particular, the security authentication apparatus 70 may include the following modules:
a receiving module 701, configured to receive N pieces of first unlocking information input by a user; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment;
a determining module 702, configured to determine the number of first unlocking information, which is matched with the historical verification information, in the N pieces of first unlocking information, to obtain a matching number M;
an authentication module 703, configured to perform identity authentication on the user when the matching number M is not less than a first preset number;
an unlocking module 704, configured to unlock the electronic device if the user passes the identity authentication;
a locking module 705, configured to lock the electronic device if the user fails the identity authentication.
Optionally, the first unlocking information includes at least one of a password and an unlocking graph; the determining module 702 includes:
the first determining submodule is used for determining a matching result of the first unlocking information and the historical verification information for the first unlocking information received each time; and the second determining submodule is used for determining the matching number M in the matching result.
Optionally, the locking module 705 is specifically configured to:
locking the electronic equipment at a first preset time under the condition that the matching number M is lower than a second preset number; locking the electronic equipment at a second preset time under the condition that the matching number M is higher than a second preset number; wherein the first preset time is longer than the second preset time.
Optionally, the authentication module 703 is specifically configured to:
acquiring a face image of the user; or, collecting the fingerprint of the user; or, collecting the voice of the user;
and determining that the user passes the identity authentication under the condition that the similarity of the face image is greater than a first preset threshold, the similarity of the fingerprint is greater than a second preset threshold or the similarity of the voice is greater than a third preset threshold.
Optionally, the first determining submodule is specifically configured to:
determining the similarity between the first unlocking information and the historical verification information;
under the condition that the similarity is larger than a preset similarity threshold, generating a matching result representing that the first unlocking information is matched with the historical verification information;
and under the condition that the similarity is not greater than a preset similarity threshold, generating a matching result representing that the first unlocking information is not matched with the historical verification information.
To sum up, the security verification apparatus provided in the embodiment of the present application receives N pieces of first unlocking information input by a user; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment; determining the number of first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M; under the condition that the matching number M is not less than the first preset number, performing identity authentication on the user; if the user passes the identity authentication, unlocking the electronic equipment; and if the user does not pass the identity authentication, locking the electronic equipment. Therefore, in the embodiment of the application, the identity authentication is performed on the user when the matching quantity of the first unlocking information input by the user is not less than the first preset quantity, so that the safety verification mode of the electronic equipment is enriched, the safety verification mode is more flexible, unnecessary forced locking of the electronic equipment can be avoided, and the normal use of the user on the electronic equipment is ensured.
The security verification device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The security authentication device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The security verification device provided in the embodiment of the present application can implement each process implemented by the method embodiments of fig. 1 to fig. 6, and is not described here again to avoid repetition.
Optionally, as shown in fig. 8, an electronic device 80 is further provided in this embodiment of the present application, and includes a processor 801, a memory 802, and a program or an instruction stored in the memory 802 and capable of running on the processor 801, where the program or the instruction is executed by the processor 801 to implement each process of the foregoing embodiment of the security verification method, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
It should be noted that the electronic devices in the embodiments of the present application include the mobile electronic devices and the non-mobile electronic devices described above.
Referring to fig. 9, a hardware structure diagram of an electronic device implementing various embodiments of the present application is shown.
The electronic device 90 includes, but is not limited to: a radio frequency unit 901, a network module 902, an audio output unit 903, an input unit 904, a sensor 905, a display unit 906, a user input unit 907, an interface unit 908, a memory 909, and a processor 910.
Those skilled in the art will appreciate that the electronic device 90 may further include a power source (e.g., a battery) for supplying power to various components, and the power source may be logically connected to the processor 910 through a power management system, so as to manage charging, discharging, and power consumption management functions through the power management system. The electronic device structure shown in fig. 9 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is not repeated here.
The user input unit 907 is configured to receive N pieces of first unlocking information input by a user; and the N pieces of first unlocking information are not matched with the current verification information preset in the electronic equipment.
The processor 910 is configured to determine the number of the first unlocking information matched with the historical verification information in the N pieces of first unlocking information, so as to obtain a matching number M.
A processor 910, configured to perform identity authentication on the user if the matching number M is not less than a first preset number.
A processor 910, configured to unlock the electronic device if the user passes the identity authentication.
A processor 910, configured to lock the electronic device if the user fails the identity authentication.
In the embodiment of the application, the electronic device can receive N pieces of first unlocking information input by a user; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment; determining the number of first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M; under the condition that the matching number M is not less than the first preset number, performing identity authentication on the user; if the user passes the identity authentication, unlocking the electronic equipment; and if the user does not pass the identity authentication, locking the electronic equipment. Therefore, in the embodiment of the application, the identity authentication is performed on the user when the matching quantity of the first unlocking information input by the user is not less than the first preset quantity, so that the safety verification mode of the electronic equipment is enriched, the safety verification mode is more flexible, unnecessary forced locking of the electronic equipment can be avoided, and the normal use of the user on the electronic equipment is ensured.
It should be understood that, in the embodiment of the present application, the input Unit 904 may include a Graphics Processing Unit (GPU) 9041 and a microphone 9042, and the Graphics Processing Unit 9041 processes image data of a still picture or a video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 906 may include a display panel 9061, and the display panel 9061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 907 includes a touch panel 9071 and other input devices 9072. A touch panel 9071 also referred to as a touch screen. The touch panel 9071 may include two parts, a touch detection device and a touch controller. Other input devices 9072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. Memory 909 can be used to store software programs as well as various data including, but not limited to, application programs and operating systems. The processor 910 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It is to be appreciated that the modem processor described above may not be integrated into processor 910.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the process of the embodiment of the security verification method is implemented, and the same technical effect can be achieved, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement each process of the above-mentioned security verification method embodiment, and can achieve the same technical effect, and is not described here again to avoid repetition.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A security authentication method, comprising:
receiving N pieces of first unlocking information input by a user; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment;
determining the number of first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M;
under the condition that the matching number M is not less than a first preset number, performing identity authentication on the user;
if the user passes the identity authentication, unlocking the electronic equipment;
and if the user does not pass the identity authentication, locking the electronic equipment.
2. The method of claim 1, wherein the first unlocking information comprises at least one of a password and an unlocking graph;
the determining the number of the first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M includes:
determining a matching result of the first unlocking information and the historical verification information for the first unlocking information received each time;
and determining the number M of matches in the matching result.
3. The method of claim 1 or 2, wherein locking the electronic device if the user fails the identity authentication comprises:
locking the electronic equipment at a first preset time under the condition that the matching number M is lower than a second preset number;
locking the electronic equipment at a second preset time under the condition that the matching number M is higher than a second preset number;
wherein the first preset time is longer than the second preset time.
4. The method of claim 1, wherein the authenticating the user comprises:
acquiring a face image of the user; or, collecting the fingerprint of the user; or, collecting the voice of the user;
and determining that the user passes the identity authentication under the condition that the similarity of the face image is greater than a first preset threshold, the similarity of the fingerprint is greater than a second preset threshold or the similarity of the voice is greater than a third preset threshold.
5. The method of claim 2, wherein determining the matching result of the first unlocking information and the historical verification information comprises:
determining the similarity between the first unlocking information and the historical verification information;
under the condition that the similarity is larger than a preset similarity threshold, generating a matching result representing that the first unlocking information is matched with the historical verification information;
and under the condition that the similarity is not greater than a preset similarity threshold, generating a matching result representing that the first unlocking information is not matched with the historical verification information.
6. A security authentication apparatus, comprising:
the receiving module is used for receiving N pieces of first unlocking information input by a user; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment;
the determining module is used for determining the number of the first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M;
the authentication module is used for performing identity authentication on the user under the condition that the matching number M is not less than a first preset number;
the unlocking module is used for unlocking the electronic equipment if the user passes the identity authentication;
and the locking module is used for locking the electronic equipment if the user does not pass the identity authentication.
7. The apparatus of claim 6, wherein the first unlocking information comprises at least one of a password and an unlocking graph;
the determining module includes:
the first determining submodule is used for determining a matching result of the first unlocking information and the historical verification information for the first unlocking information received each time;
and the second determining submodule is used for determining the matching number M in the matching result.
8. The device according to claim 6 or 7, wherein the locking module is specifically configured to:
locking the electronic equipment at a first preset time under the condition that the matching number M is lower than a second preset number;
locking the electronic equipment at a second preset time under the condition that the matching number M is higher than a second preset number;
wherein the first preset time is longer than the second preset time.
9. The apparatus according to claim 6, wherein the authentication module is specifically configured to:
acquiring a face image of the user; or, collecting the fingerprint of the user; or, collecting the voice of the user;
and determining that the user passes the identity authentication under the condition that the similarity of the face image is greater than a first preset threshold, the similarity of the fingerprint is greater than a second preset threshold or the similarity of the voice is greater than a third preset threshold.
10. The apparatus of claim 7, wherein the first determining submodule is configured to:
determining the similarity between the first unlocking information and the historical verification information;
under the condition that the similarity is larger than a preset similarity threshold, generating a matching result representing that the first unlocking information is matched with the historical verification information;
and under the condition that the similarity is not greater than a preset similarity threshold, generating a matching result representing that the first unlocking information is not matched with the historical verification information.
CN202011348819.9A 2020-11-26 2020-11-26 Security verification method and device, electronic equipment and storage medium Pending CN112417429A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011348819.9A CN112417429A (en) 2020-11-26 2020-11-26 Security verification method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011348819.9A CN112417429A (en) 2020-11-26 2020-11-26 Security verification method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112417429A true CN112417429A (en) 2021-02-26

Family

ID=74842556

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011348819.9A Pending CN112417429A (en) 2020-11-26 2020-11-26 Security verification method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112417429A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113313350A (en) * 2021-04-23 2021-08-27 武汉瑞安科技发展有限公司 Internet of things data acquisition, analysis and management system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113313350A (en) * 2021-04-23 2021-08-27 武汉瑞安科技发展有限公司 Internet of things data acquisition, analysis and management system

Similar Documents

Publication Publication Date Title
US11914693B2 (en) Fingerprint recognition method and apparatus, and touchscreen terminal
US9122913B2 (en) Method for logging a user in to a mobile device
US8121359B2 (en) Fingerprint identification system and method of an electronic device
CN106355141B (en) Portable electronic device and operation method thereof
EP3147768A1 (en) Screen interface unlocking method and screen interface unlocking device
CN108804006B (en) Unlocking method, device, equipment and storage medium for wearable equipment
US20180046848A1 (en) Method of recognizing fingerprints, apparatus and terminal devices
US20120117633A1 (en) Enhanced Security For Pervasive Devices Using A Weighting System
CN105678147B (en) Touch operation method and device
CN105929974B (en) A kind of Password Input management method and mobile terminal
CN108629174B (en) Method and device for checking character strings
US20140347161A1 (en) Authorizing system and method of portable electronic device
CN107145772B (en) Terminal equipment security control method and device and terminal equipment
CN104346546A (en) Electronic device and method for controlling electronic device via fingerprint identification
WO2021244531A1 (en) Payment method and apparatus based on facial recognition
CN110990811A (en) Identity authentication method and device
CN112417429A (en) Security verification method and device, electronic equipment and storage medium
KR101392113B1 (en) Fingerprint locking system
CN111641751B (en) Screen unlocking method and device of terminal equipment, terminal equipment and storage medium
CN112887922B (en) Message sending method and electronic equipment
CN114268453A (en) Power system unlocking method and device, computer equipment and storage medium
CN107507308B (en) Information matching method and device and intelligent door lock
CN112966249A (en) Multi-user account switching method and device, computer equipment and medium
CN109543431B (en) Application encryption method and device, electronic equipment and storage medium
CN107995213B (en) Short message sending control method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination