WO2017084288A1 - 身份验证方法及装置 - Google Patents

身份验证方法及装置 Download PDF

Info

Publication number
WO2017084288A1
WO2017084288A1 PCT/CN2016/083305 CN2016083305W WO2017084288A1 WO 2017084288 A1 WO2017084288 A1 WO 2017084288A1 CN 2016083305 W CN2016083305 W CN 2016083305W WO 2017084288 A1 WO2017084288 A1 WO 2017084288A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
information
touch screen
authentication information
verified
Prior art date
Application number
PCT/CN2016/083305
Other languages
English (en)
French (fr)
Inventor
杨霞
郝允允
张少愚
王亮
郭计伟
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2017084288A1 publication Critical patent/WO2017084288A1/zh
Priority to US15/817,014 priority Critical patent/US10657244B2/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present invention relates to the field of identity authentication, and in particular, to an identity verification method and apparatus.
  • the authentication refers to whether the current user is a legitimate user by checking whether the password, verification code, fingerprint and pre-set corresponding to the specified account are consistent.
  • the use of authentication is very extensive, such as mobile device boot verification, application account verification, mobile financial service verification, and the like.
  • the user can set a string of characters as a password in advance, and then input a string of characters when authentication is required. If the two input strings are consistent, it is determined that the current user is a legitimate user.
  • an embodiment of the present invention provides an identity verification method and apparatus.
  • the technical solution is as follows:
  • an authentication method comprising:
  • the user is determined to pass the identity verification.
  • an authentication device comprising:
  • At least one processor At least one processor
  • the device When configured, the device performs the following operations:
  • the user is determined to pass the identity verification.
  • the data makes it impossible for the criminals to use the leaked authentication information to pass the authentication even if the authentication information of the user account is leaked, thereby ensuring the security of the user's account.
  • FIG. 1 is a flowchart of an identity verification method according to an embodiment of the present invention.
  • FIG. 2 is a flowchart of an identity verification method according to another embodiment of the present invention.
  • FIG. 3 is an interaction diagram of an identity verification information setting according to an embodiment of the present invention.
  • FIG. 4 is an interaction verification diagram provided by an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of an identity verification apparatus according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of an identity verification apparatus according to another embodiment of the present invention.
  • FIG. 7 is a block diagram of a terminal according to an embodiment of the present invention.
  • the embodiment of the invention provides an identity verification method, which is suitable for use in a terminal, and is particularly suitable for a terminal configured with a Force touch touch sensing technology touch screen.
  • the authenticator The method can be applied to mobile device authentication and unlocking, mobile financial service payment, application account authentication and the like.
  • Force Touch technology is a brand-new touch sensing technology. With Force Touch technology, the terminal can obtain the pressing force data of the user pressing the touch screen, such as touch force, light pressure, heavy pressure, etc., and the terminal can record the pressing force data or A corresponding operation is performed based on the pressing force data.
  • a pressure sensor is disposed on each of the four corners of the touch screen pressed by the user.
  • the pressure sensor can detect the pressing force of the user, and the terminal feedbacks different tactile vibrations according to different pressing forces. Therefore, the Force Touch technology is used. At this time, only the user can feel the strength of the pressing, while others cannot know the strength of the user's pressing.
  • Applying Force Touch technology to the authentication obtaining the pressing force data of the touch screen when the user inputs the information to be verified, can give the verification information additional pressing strength information, thereby increasing the dimension of the verification information, making it difficult to leak and being illegal. Molecular cracking.
  • FIG. 1 is a flowchart of an identity verification method according to an exemplary embodiment. As shown in FIG. 1 , the identity verification method is used in a terminal, and includes the following steps.
  • the terminal acquires information to be verified for the specified account that is input by the user through the touch screen.
  • the terminal acquires the pressing strength data of the touch screen in the process of inputting the information to be verified by the user.
  • the terminal determines that the user passes the identity verification.
  • the identity verification method obtains the data to be verified by the user, and obtains the pressing strength data of the touch screen when the user inputs the information to be verified, and simultaneously uses the information to be verified and the pressing strength data.
  • the identity of the user is verified. Since the criminals cannot peek at the data of the stealing force, even if the verification information of the user account is leaked, the criminal cannot use the leaked verification information to pass the authentication, thereby ensuring the security of the user's account.
  • the information to be verified is password information, verification code information, or fingerprint information.
  • the foregoing identity verification method further includes:
  • the foregoing obtaining and storing the authentication information of the specified account that is input by the user through the touch screen and the pressing force data of the user in the process of inputting the authentication information include:
  • the pressing force data acquired in the process of inputting the authentication information at least twice is consistent, the authentication information input by the user and the pressing force data of the touch screen of the user in the process of inputting the authentication information are stored.
  • acquiring and storing the authentication information of the specified account input by the user through the touch screen and the pressing force data of the touch screen by the user in the process of inputting the authentication information include:
  • the authentication information input by the user and the pressing strength data of the touch screen on the terminal during the process of inputting the authentication information are sent to the designated server, so that the designated server stores.
  • the information to be verified includes a plurality of characters
  • the data of the pressing force on the touch screen in the process of acquiring the information to be verified by the user includes:
  • FIG. 2 is a flowchart of an identity verification method according to an exemplary embodiment. As shown in FIG. 2, the identity verification method is used in a terminal having a touch screen, and includes the following steps.
  • the terminal acquires the pressing strength data of the touch screen on the terminal during the process of inputting the authentication information by the user at least twice.
  • step 220 is performed.
  • the user In the process of setting the authentication information, the user needs to input authentication information for the specified account through the touch screen.
  • the actual input pressing force data and the pressing force data that you want to input may not be consistent, that is, the user may have a false input, once the user has entered the error in the authentication information setting process. In this case, the subsequent authentication fails. Therefore, in the process of setting the authentication information, the present invention acquires the pressing strength data of the touch screen on the terminal during the process of inputting the authentication information at least twice, so as to avoid the user error to the utmost extent. Input.
  • the foregoing authentication information may be a password, a verification code (such as a short message verification code or a graphic verification code or other form of verification code determined by a user's selected operation), or a fingerprint, etc., which is not specifically limited by the present invention;
  • the degree of pressing force of the user's finger on the touch screen is different.
  • the pressing force data of the touch screen on the terminal may be divided into touch force, light pressure, heavy pressure, etc., and different pressing force data may correspond to different pressing pressure segments, for example, for example, :
  • the pressing pressure is 10Pa-20Pa for touch force, 20Pa-30Pa for light pressure, and 30Pa-40Pa for heavy pressure.
  • the pressing force data is not limited to the above-mentioned touch force, light pressure and heavy pressure, and its division The finer the level, the better the security of the authentication, and the disclosure does not specifically limit this.
  • the authentication information such as the password or the verification code may include a plurality of characters, and the fingerprint authentication information may include fingerprints of the plurality of fingers.
  • the pressing force data on the touch screen on the terminal during the process of inputting the authentication information specifically refers to the user inputting each character. (or fingerprint) pressing force data on the touch screen, for example, taking the authentication information as the password as an example. If the password input by the user is “1234”, the corresponding pressing force data may be “light pressure, heavy pressure” , light pressure, heavy pressure.”
  • the present invention takes the process of setting a password in a mobile financial service as an example, and details the technical process of step 210, as shown in FIG.
  • the terminal After the terminal detects the triggering operation of the mobile financial service password setting option, or the terminal detects that the user first logs in to the mobile financial client, the terminal displays a password setting interface, and the password setting interface includes a voltage control password setting option, and the terminal detects the voltage control After the triggering operation of the password setting option, the password input interface is displayed.
  • the password input interface includes a password input box. After the terminal detects the trigger of the password input box, the terminal obtains the password input by the user and the user touches the screen during the password input process. Pressing the velocity data, and then the terminal displays the password input interface again. The interface still includes the password input box.
  • the terminal When the terminal detects the trigger of the password input box, the terminal obtains the password input by the user and the user touches the touch screen during the password input process. Press the velocity data, if the passwords obtained twice are consistent and press the velocity data Consistently, the above-mentioned pressing force data consistently means that the pressing force data error acquired by the terminal twice is within a preset threshold range, and the preset threshold value range may be determined by the technician or the user according to the sensitivity of the Force Touch touch screen, the user's usage habits, and the like. Setting, the present invention does not specifically limit this, the password setting is completed, and the terminal stores the password locally or in the designated server. If the passwords obtained twice are inconsistent or the pressing strength data is inconsistent, the terminal displays a password setting failure interface. And prompt the user to re-set the password.
  • the method may further include: the terminal displays a password setting success interface, and displays a password and pressing strength data input by the user on the password setting success interface, for example, the password setting.
  • the successful interface can display “1234” and “light pressure, heavy pressure, light pressure, heavy pressure”, which can deepen the user's memory of password and pressure data, and prevent users from misuse.
  • the user can also set a personalized pressing force model for the specified account.
  • the pressing force model refers to the authentication information set by the user and the pressing force data corresponding to each of the authentication information characters. After the terminal obtains the pressing force model, the terminal will The pressing force model is sent to the designated server for storage.
  • the authentication information and the pressing force data input by the user can be sent to the designated server.
  • the specified server compares the authentication information input by the user and the pressing strength data with the pressing strength model. If they are consistent, the server determines that the current user authentication is passed.
  • the setting process of the authentication information as the verification code, the fingerprint, and the like is similar to the setting process of the above password, and the present invention will not be repeated herein.
  • the user can obtain the pressing strength data of the touch screen on the terminal during the process of inputting the authentication information at least twice in the process of the authentication information setting process, and the terminal can also obtain the user only once.
  • the pressing force data of the touch screen on the terminal in the process of inputting the authentication information is not specifically limited in the present invention.
  • the terminal When the setting is completed, the terminal stores the authentication information input by the user and the pressing strength data of the touch screen on the terminal during the process of inputting the authentication information.
  • the terminal in order to ensure storage security, the terminal first encrypts the foregoing authentication information and the pressing strength data, and then stores the encrypted identity verification information and the pressing strength data.
  • the above encryption process can be The present invention is not specifically limited by using an encryption algorithm such as DES (Data Encryption Standard) or DSA (Digital Signature Algorithm).
  • the obtained pressing strength data may also be different. Accordingly, the authentication information of the different applications and the storage location of the pressing strength data may be different. Of course, for multiple applications on one terminal, the same pressing force data can also be used, so that the same pressing strength data can be used to verify it during the verification process.
  • step 220 may further include the content of step 220A or step 220B.
  • Step 220A Store the identity verification information input by the user and the pressing strength data of the touch screen on the terminal in the process of inputting the identity verification information by the user.
  • the terminal may be configured with a specified folder, a specified storage path, and the like for storing the above authentication information and pressing strength data.
  • the foregoing authentication information and the pressing strength data, or the pressing force model may also be stored in a designated server connected to the terminal by wire or wireless, so that when the user performs identity verification on different terminals, the corresponding terminal may By accessing the designated server to obtain the user's authentication information and pressing the strength data, the user can conveniently use different terminals for identity verification anytime and anywhere. Therefore, the above step 220A can also be replaced by step 220B.
  • Step 220B The terminal sends the authentication information input by the user and the pressing strength data of the touch screen on the terminal in the process of inputting the authentication information to the designated server, so that the designated server performs storage.
  • step 220B The following describes the specific technical process of step 220B.
  • the terminal sends an authentication information storage request to the designated server, where the authentication information storage request carries the user account, the authentication information, and the pressing strength data, and the designated server receives the authentication information storage request, and extracts the authentication information storage request from the identity verification information storage request.
  • the user account, the authentication information, and the pressing strength data, and then the designated server stores the extracted data in the verification information database, and uses the user account as the authentication information and the index information of the pressing strength data.
  • the foregoing authentication information storage request may also carry a user account and a pressing strength model, so that the designated server stores the user account and the pressing strength model.
  • the user account, the authentication information, and the pressing force are used.
  • the specified server may further encrypt the authentication information and the pressing strength data before being stored in the verification information database, or the terminal encrypts the authentication information and the pressing strength data before sending the authentication information storage request to the designated server.
  • the authentication information storage request carries the user account and the encrypted identity verification information and the pressing strength data.
  • the terminal acquires information to be verified for the specified account input by the user.
  • the terminal When the user needs to unlock the mobile device, log in to the application account, or perform mobile financial payment, etc., the terminal needs to obtain the information to be verified of the specified account input by the user for the terminal (or by the server) to perform identity verification.
  • the to-be-verified information may be password information, verification code information, or fingerprint information.
  • the terminal acquires the pressing strength data of the touch screen on the terminal in the process of inputting the information to be verified by the user.
  • the terminal also needs to obtain the pressing strength data of the touch screen on the terminal during the process of inputting the information to be verified by the user.
  • step 230 and step 240 in the present invention, taking the case of identity verification based on a password in a mobile financial service as an example.
  • the terminal Before the user performs the transaction such as transfer, payment, etc., the terminal needs to verify the identity of the current user to protect the security of the user. For example, when the terminal detects the transfer operation of the mobile financial client, the terminal displays The authentication interface includes a password-controlled password authentication option in the authentication interface. After the terminal detects the triggering operation of the voltage-controlled password authentication option, the pressure-controlled password authentication interface is displayed, and the pressure-controlled password authentication is performed.
  • the interface includes a password input box. When the terminal detects the trigger of the password input box, the terminal obtains the password input by the user and the pressing force data of the touch screen when the user inputs the password.
  • step 240 may include: each time a character input behavior is detected, the terminal acquires the pressing force data of the touch screen on the terminal of the character input behavior.
  • the terminal obtains the pressing force data when the user inputs each character. For example, if the information to be verified input by the user is “123456”, the pressing strength data acquired by the terminal may be “ Light pressure, light pressure, light pressure, heavy pressure, light pressure, light pressure.”
  • the terminal determines that the user passes the identity verification.
  • the preset pressing force data is the data of the pressing force of the user on the touch screen of the terminal when the authentication information is input, which is stored in the terminal or the designated server during the setting of the authentication information, that is, the designated account is stored in step 220. Pressing the strength data.
  • the terminal may acquire the information to be verified and the pressing force data re-entered by the user again. If the verification information and the pressing strength data input by the user within the preset number of times still cannot be authenticated, the terminal will lock the specified account, that is, the user is not allowed to perform authentication again for the specified account within the preset time range. .
  • the terminal may obtain a contact mode bound to the specified account, such as a mobile phone number, an instant communication account, etc., from an account database in which the specified account and contact information are stored. Then, the account abnormality notification is sent to the user by means of short message, instant communication or telephone, so that the user can find the security risk of the specified account in time, thereby modifying the identity verification information and the pressing strength data in time.
  • step 250 as shown in FIG. 4, and still takes the case of identity verification based on a password in a mobile financial service as an example.
  • the terminal After obtaining the to-be-verified information and the pressing strength data input by the user for the specified account, the terminal queries the terminal or the designated server for the identity verification information and the preset pressing strength data corresponding to the specified account by using the designated account as an index, and then The terminal compares the information to be verified input by the user with the authentication information obtained from the terminal or the designated server. If the comparison result is the same, the pressure data input by the user and the preset obtained from the terminal or the designated server are obtained. The strength data is pressed for comparison. If the comparison result is the same, the terminal determines that the current user is a legitimate user.
  • the execution entity that determines whether the user passes the authentication may be the designated server, and the specific technical process and the terminal are the execution subject. The technical process is similar, and the present invention will not be repeated here.
  • the identity verification method obtaineds the pressing strength data of the touch screen when the user inputs the information to be verified, and uses the information to be verified and the pressing strength data. At the same time, the identity of the user is verified. Since the criminals cannot peek into the data of the stealing force, even if the verification information of the user account is leaked, the criminal cannot use the leaked verification information to pass the authentication, thereby ensuring the security of the user's account.
  • FIG. 5 is a block diagram of an identity verification apparatus 500, according to an exemplary embodiment.
  • the device includes a first obtaining module 510, a second obtaining module 520, and a verifying module 530.
  • the first obtaining module 510 is configured to obtain information to be verified for a specified account that is input by the user through the touch screen.
  • the information to be verified is password information, verification code information or fingerprint information.
  • the second obtaining module 520 is configured to acquire the pressing force data of the touch screen in the process of inputting the information to be verified by the user.
  • the second obtaining module 520 is further configured to obtain a pressing force data of the character input behavior on the touch screen every time a character input behavior of the user is detected.
  • the verification module 530 is configured to determine that the to-be-verified information obtained by the first obtaining module 510 is verified and the pressing force data acquired by the second acquiring module 520 is consistent with the preset pressing strength data of the specified account. The user is authenticated.
  • another identity verification device 600 is further provided.
  • the device is based on the structure of the embodiment of FIG. 5 described above, and further includes a storage module 540 and a setting module 550.
  • the storage module 540 is configured to acquire and store the authentication information of the designated account input by the user through the touch screen, and the pressing force data of the touch screen of the user during the input of the authentication information, where the user inputs the authentication information.
  • the pressing force data of the touch screen is stored as the preset pressing force data.
  • the storage module 540 is configured to store, in the terminal, the authentication information input by the user and the pressing strength data of the touch screen on the terminal during the input of the authentication information.
  • the storage module 540 is further configured to send the authentication information input by the user and the pressing strength data of the touch screen on the terminal by the user in the process of inputting the authentication information to the designated server, so that the designated server stores the data.
  • the setting module 550 is configured to obtain the pressing force data of the touch screen of the user during at least two times of inputting the authentication information.
  • the setting module 550 is further configured to notify the storage module 540 to store the identity verification information input by the user, and when the pressing force data acquired in the process of inputting the authentication information at least twice is consistent. The user presses the velocity data on the touch screen during the input of the authentication information.
  • the identity verification device obtains the information to be verified by the user through the first acquiring module, and the second acquiring module acquires the pressing force data of the touch screen when the user inputs the information to be verified, and the verification module uses the The verification information and the pressing force data simultaneously verify the identity of the user. Since the criminals cannot peek into the stealing force data, even if the verification information of the user account is leaked, the criminal cannot use the leaked verification information to pass the authentication, thereby protecting the user. Account security.
  • the identity verification device provided by the foregoing embodiment is used to verify the identity of the user, only the division of the foregoing functional modules is illustrated. In actual applications, the function distribution may be completed by different functional modules as needed. The internal structure of the device is divided into different functional modules to perform all or part of the functions described above.
  • the identity verification device and the identity verification method embodiment provided by the foregoing embodiments are in the same concept, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.
  • the terminal 700 includes:
  • the terminal 700 may include an RF (Radio Frequency) circuit 710, a memory 720 including one or more computer readable storage media, an input unit 730, a display unit 740, a sensor 750, an audio circuit 760, and a WiFi (Wireless Fidelity, wireless).
  • the fidelity module 750 includes a processor 780 having one or more processing cores, and a power supply 790 and the like. It will be understood by those skilled in the art that the terminal structure shown in FIG. 7 does not constitute a limitation to the terminal, and may include more or less components than those illustrated, or a combination of certain components, or different component arrangements. among them:
  • the RF circuit 710 can be used for transmitting and receiving information or during a call, and receiving and transmitting the signal. Specifically, after receiving the downlink information of the base station, the downlink information is processed by one or more processors 780. In addition, the data related to the uplink is sent to the base station. .
  • the RF circuit 710 includes, but is not limited to, an antenna, at least one amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, an LNA (Low Noise Amplifier). , duplexer, etc.
  • RF circuitry 710 can also communicate with the network and other devices via wireless communication.
  • the wireless communication can use any communication standard or protocol, including but not limited to GSM (Global System of Mobile communication, full Ball mobile communication system), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long) Term Evolution, e-mail, SMS (Short Messaging Service), etc.
  • GSM Global System of Mobile communication, full Ball mobile communication system
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long
  • e-mail Short Messaging Service
  • the memory 720 can be used to store software programs and modules, and the processor 780 executes various functional applications and data processing by running software programs and modules stored in the memory 720.
  • the memory 720 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to The data created by the use of the terminal 700 (such as audio data, phone book, etc.) and the like.
  • memory 720 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, memory 720 can also include a memory controller to provide access to memory 720 by processor 780 and input unit 730.
  • the input unit 730 can be configured to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls.
  • input unit 730 can include touch-sensitive surface 731 as well as other input devices 732.
  • Touch-sensitive surface 731 also referred to as a touch display or trackpad, can collect touch operations on or near the user (eg, the user uses a finger, stylus, etc., any suitable object or accessory on touch-sensitive surface 731 or The operation near the touch-sensitive surface 731) and driving the corresponding connecting device according to a preset program.
  • the touch-sensitive surface 731 can include two portions of a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 780 is provided and can receive commands from the processor 780 and execute them.
  • the touch-sensitive surface 731 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 730 can also include other input devices 732.
  • other input devices 732 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • Display unit 740 can be used to display information entered by the user or information provided to the user and various graphical user interfaces of terminal 700, which can be constructed from graphics, text, icons, video, and any combination thereof.
  • the display unit 740 can include a display panel 741, optionally, can be employed
  • the display panel 741 is configured in the form of an LCD (Liquid Crystal Display) or an OLED (Organic Light-Emitting Diode).
  • the touch-sensitive surface 731 can cover the display panel 741, and when the touch-sensitive surface 731 detects a touch operation thereon or nearby, it is transmitted to the processor 780 to determine the type of touch event, and then the processor 780 according to the touch event The type provides a corresponding visual output on display panel 741.
  • touch-sensitive surface 731 and display panel 741 are implemented as two separate components to implement input and input functions, in some embodiments, touch-sensitive surface 731 can be integrated with display panel 741 for input. And output function.
  • Terminal 700 can also include at least one type of sensor 750, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 741 according to the brightness of the ambient light, and the proximity sensor may close the display panel 741 when the terminal 700 moves to the ear. / or backlight.
  • the gravity acceleration sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the terminal 700 can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, here Let me repeat.
  • An audio circuit 760, a speaker 761, and a microphone 762 can provide an audio interface between the user and the terminal 700.
  • the audio circuit 760 can transmit the converted electrical data of the received audio data to the speaker 761 for conversion to the sound signal output by the speaker 761; on the other hand, the microphone 762 converts the collected sound signal into an electrical signal by the audio circuit 760. After receiving, it is converted into audio data, and then processed by the audio data output processor 780, transmitted to the terminal, for example, via the RF circuit 710, or the audio data is output to the memory 720 for further processing.
  • the audio circuit 760 may also include an earbud jack to provide communication of the peripheral earphones with the terminal 700.
  • WiFi is a short-range wireless transmission technology
  • the terminal 700 can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 750, which provides wireless broadband Internet access for users.
  • FIG. 7 shows the WiFi module 750, it can be understood that it does not belong to the essential configuration of the terminal 700, and may be omitted as needed within the scope of not changing the essence of the invention.
  • Processor 780 is the control center of terminal 700, which connects various portions of the entire handset using various interfaces and lines, by running or executing software programs and/or modules stored in memory 720, and recalling data stored in memory 720, Perform various functions and processing data of the terminal 700, thereby The phone is monitored overall.
  • the processor 780 may include one or more processing cores; preferably, the processor 780 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 780.
  • the terminal 700 also includes a power source 790 (such as a battery) for powering various components.
  • the power source can be logically coupled to the processor 780 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • Power supply 790 may also include any one or more of a DC or AC power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
  • the terminal 700 may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the display unit of the terminal is a touch screen display
  • the terminal further includes a memory, and one or more programs, wherein one or more programs are stored in the memory and configured to be processed by one or more Execution.
  • the one or more programs include instructions for: acquiring information to be verified for a specified account input by the user through the touch screen; acquiring pressure data of pressing the touch screen during the input of the information to be verified by the user; When the information verification is passed and the pressing force data is consistent with the preset pressing strength data of the specified account, the user is determined to pass the identity verification.
  • a person skilled in the art may understand that all or part of the steps of implementing the above embodiments may be completed by hardware, or may be instructed by a program to execute related hardware, and the program may be stored in a computer readable storage medium.
  • the storage medium mentioned may be a read only memory, a magnetic disk or an optical disk or the like.

Abstract

本发明公开了一种身份验证方法及装置,属于身份验证领域。该方法包括:获取用户通过触摸屏输入的对指定账号的待验证信息;获取该用户输入待验证信息过程中对触摸屏的按压力度数据;当该待验证信息验证通过且该按压力度数据与该指定账号的预设按压力度数据一致时,确定该用户通过身份验证。本发明通过终端在获取用户输入的待验证信息的同时,获取用户输入待验证信息时对触摸屏的按压力度数据,并且利用待验证信息和按压力度数据同时对用户的身份进行验证,由于不法分子无法窥视窃取按压力度数据,使得即使用户账号的验证信息泄露,不法分子也无法利用泄露的验证信息通过身份验证,从而可以保障用户的账号安全。

Description

身份验证方法及装置
本申请要求于2015年11月17日提交中国专利局,申请号为201510797063.9,发明名称为“身份验证方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及身份认证领域,特别涉及一种身份验证方法及装置。
背景技术
身份验证指的是通过检验用户输入的与指定账户对应的密码、验证码、指纹和预先设置的是否一致,从而判断当前用户是否为合法用户。目前,身份验证的使用十分广泛,例如移动设备开机验证、应用账号验证、移动金融服务验证等。
用户可以预先设置一串字符作为密码,在需要进行认证时再输入一串字符,若两次输入的字符串一致,则判定当前用户为合法用户。
用户在输入字符串密码时,很容易被不法分子窥视窃取,不法分子只要使用窥视得来的字符串密码即可通过身份验证,因此安全性不高。
发明内容
为了解决上述问题,本发明实施例提供了一种身份验证方法及装置。所述技术方案如下:
一方面,提供了一种身份验证方法,所述方法包括:
获取用户通过触摸屏输入的对指定账号的待验证信息;
获取所述用户输入待验证信息过程中对触摸屏的按压力度数据;
当所述待验证信息验证通过且所述按压力度数据与所述指定账号的预设按压力度数据一致时,确定所述用户通过身份验证。
另一方面,提供了一种身份验证装置,所述装置包括:
至少一个处理器;和
存储器,其中所述存储器存储有程序指令,所述指令当由所述处理器执行 时,配置所述装置执行下述操作:
获取用户通过触摸屏输入的对指定账号的待验证信息;
获取所述用户输入待验证信息过程中对所述触摸屏的按压力度数据;
当所述待验证信息验证通过且所述按压力度数据与所述指定账号的预设按压力度数据一致时,确定所述用户通过身份验证。
本发明实施例提供的技术方案带来的有益效果是:
在获取用户输入的待验证信息的同时,获取用户输入待验证信息时对触摸屏的按压力度数据,并且利用待验证信息和按压力度数据同时对用户的身份进行验证,由于不法分子无法窥视窃取按压力度数据,使得即使用户账号的验证信息泄露,不法分子也无法利用泄露的验证信息通过身份验证,从而可以保障用户的账号安全。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明一实施例提供的一种身份验证方法流程图。
图2是本发明另一实施例提供的一种身份验证方法流程图。
图3是本发明实施例提供的一种身份验证信息设置交互图。
图4是本发明实施例提供的一种身份验证交互图。
图5是本发明一实施例提供的一种身份验证装置结构示意图。
图6是本发明另一实施例提供的一种身份验证装置结构示意图。
图7是本发明实施例提供的一种终端的框图。
具体实施方式
为使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明实施方式作进一步地详细描述。
本发明实施例提供了一种身份验证方法,适用于终端中,尤其适用于配置有Force touch(压力感应触控)触摸传感技术触摸屏的终端中。该身份验证方 法可以应用于移动设备认证解锁、移动金融服务支付、应用账号认证等领域。Force Touch技术是一项全新的触摸传感技术,通过Force Touch技术,终端可以获取用户按压触摸屏的按压力度数据,例如触摸力度、轻压力度、重压力度等,终端可以记录该按压力度数据或者根据该按压力度数据执行相应的操作。
在Force Touch技术中,用户按压的触摸屏的四个角上各自配置一个压力传感器,该压力传感器可以检测用户的按压力度,终端按照不同的按压力度反馈不同的触觉震动,因此,在使用Force Touch技术时,只有用户本人能感觉到按压的力度效果,而其他人则无法获知用户按压的力度。将Force Touch技术应用于身份验证中,获取用户输入待验证信息时对触摸屏的按压力度数据,可以给验证信息赋予额外的按压力度信息,从而增加了验证信息的维度,使其难以泄露和被不法分子破解。
图1是根据一示例性实施例示出的一种身份验证方法的流程图,如图1所示,该身份验证方法用于终端中,包括以下步骤。
110、终端获取用户通过触摸屏输入的对指定账号的待验证信息。
120、终端获取该用户输入待验证信息过程中对触摸屏的按压力度数据。
130、当该待验证信息验证通过且该按压力度数据与该指定账号的预设按压力度数据一致时,终端确定该用户通过身份验证。
综上所述,本实施例提供的身份验证方法,在获取用户输入的待验证信息的同时,获取用户输入待验证信息时对触摸屏的按压力度数据,并且利用待验证信息和按压力度数据同时对用户的身份进行验证,由于不法分子无法窥视窃取按压力度数据,使得即使用户账号的验证信息泄露,不法分子也无法利用泄露的验证信息通过身份验证,从而可以保障用户的账号安全。
在第一种可能的实施方式中,该待验证信息为密码信息、验证码信息或指纹信息。
在第二种可能的实施方式中,获取用户输入的待验证信息之前,上述身份验证方法还包括:
获取并存储用户通过触摸屏输入的对所述指定账号的身份验证信息以及该用户在输入身份验证信息过程中对该触摸屏的按压力度数据,其中所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据作为所述预设按压力度 数据存储。
在第三种可能的实施方式中,上述获取并存储用户通过触摸屏输入的对所述指定账号的身份验证信息以及所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据包括:
获取该用户在至少两次输入身份验证信息过程中对该触摸屏的按压力度数据;
当该至少两次输入身份验证信息过程中所获取到的按压力度数据一致时,存储用户输入的身份验证信息以及该用户在输入身份验证信息过程中对该触摸屏的按压力度数据。
在第四种可能的实施方式中,获取并存储用户通过触摸屏输入的对所述指定账号的身份验证信息以及所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据包括:
在该终端中存储用户输入的身份验证信息以及该用户在输入身份验证信息过程中对该终端上触摸屏的按压力度数据;
或者,
将用户输入的身份验证信息以及该用户在输入身份验证信息过程中对该终端上触摸屏的按压力度数据发送至指定服务器,以使该指定服务器进行存储。
在第五种可能的实施方式中,该待验证信息包括多个字符,该获取该用户输入待验证信息过程中对触摸屏的按压力度数据包括:
每检测到用户的一个字符输入行为,获取该字符输入行为对触摸屏的按压力度数据。
在第六种可能的实施方式中,判断用户输入的待验证信息与存储的身份验证信息是否一致,若一致,则确定所述待验证信息验证通过。
上述所有可选技术方案,可以采用任意结合形成本公开的可选实施例,在此不再一一赘述。
图2是根据一示例性实施例示出的一种身份验证方法的流程图,如图2所示,该身份验证方法用于具有触摸屏的终端中,包括以下步骤。
210、在身份验证信息设置过程中,终端获取用户在至少两次输入身份验证信息过程中对终端上触摸屏的按压力度数据。当该至少两次输入身份验证信息 过程中所获取到的按压力度数据一致时,执行步骤220。
在身份验证信息设置的过程中,用户需要通过触摸屏为指定账号输入身份验证信息。用户输入身份验证信息时,实际输入的按压力度数据和想要输入的按压力度数据可能并不一致,也即是用户可能出现误输入的情况,一旦用户在身份验证信息设置过程中出现了误输入的情况,就会导致后续身份验证失败,因此,本发明在身份验证信息设置过程中,获取用户在至少两次输入身份验证信息过程中对终端上触摸屏的按压力度数据,以最大限度地避免用户误输入。
其中,上述身份验证信息可以是密码、验证码(如短信验证码或通过用户的选中操作确定的图形验证码或其他形式的验证码等)或指纹等,本发明对此不做具体限定;根据用户手指在触摸屏上按压力度的程度不同,上述对终端上触摸屏的按压力度数据可以分为触摸力度、轻压力度、重压力度等,不同的按压力度数据可以对应不同的按压压强分段,例如:按压压强为10Pa-20Pa为触摸力度、20Pa-30Pa为轻压力度、30Pa-40Pa为重压力度,当然,按压力度数据并不仅限于上述的触摸力度、轻压力度和重压力度,其划分的等级越细致,身份验证的安全性越好,本公开对此也不做具体限定。
密码或验证码等身份验证信息可以包括多个字符,指纹身份验证信息可以包括多个手指的指纹,输入身份验证信息过程中对终端上触摸屏的按压力度数据具体指的是用户在输入每一个字符(或指纹)时对触摸屏的按压力度数据,例如:以身份验证信息为密码为例,若用户输入的密码为“1234”,则其对应的按压力度数据可以为“轻压力度、重压力度、轻压力度、重压力度”。
下面,本发明以移动金融服务中密码的设置过程为例,对步骤210的技术过程进行详细说明,如图3所示。
终端检测到移动金融服务密码设置选项的触发操作后,或终端检测到用户首次登陆移动金融客户端时,显示密码设置界面,该密码设置界面包括压控密码设置选项,终端检测到对该压控密码设置选项的触发操作后,显示密码输入界面,该密码输入界面包括密码输入框,终端检测到对该密码输入框的触发后,获取用户输入的密码以及用户在输入密码过程中对终端触摸屏的按压力度数据,而后终端再次显示密码输入界面,该界面仍然包括密码输入框,当终端检测到对该密码输入框的触发后,再次获取用户输入的密码以及用户在输入密码过程中对终端触摸屏的按压力度数据,若两次获取的密码一致且按压力度数据 一致,上述按压力度数据一致指的是终端两次获取的按压力度数据误差在预设阈值范围内,上述预设阈值范围可以根据Force Touch触摸屏的灵敏度、用户的使用习惯等由技术人员或用户自己设定,本发明对此不做具体限定,则密码设置完成,终端在本地或指定服务器中对密码进行存储,若两次获取的密码不一致或按压力度数据不一致,则终端显示密码设置失败界面,并提示用户重新进行密码设置。
在本发明的一个实施例中,在密码设置完成后,该方法还可以包括,终端显示密码设置成功界面,在该密码设置成功界面上显示用户输入的密码和按压力度数据,例如,该密码设置成功界面可显示“1234”和“轻压力度、重压力度、轻压力度、重压力度”,这样可以加深用户对密码和按压力度数据的记忆,防止用户误操作。
当然,用户也可以针对指定账号设置个性化的按压力度模型,该按压力度模型是指用户设置的身份验证信息及每一个身份验证信息字符对应的按压力度数据,终端获取该按压力度模型后,将该按压力度模型发送至指定服务器进行存储,当用户需要在其他Force Touch设备上针对上述指定账号进行身份验证时,即可将用户输入的身份验证信息和按压力度数据发送至该指定服务器,由该指定服务器比较用户输入的身份验证信息和按压力度数据与按压力度模型是否一致,若一致,则服务器确定当前用户身份验证通过。
需要说明的是,身份验证信息为验证码、指纹等的设置过程与上述密码的设置过程类似,在此本发明将不再一一赘述。
在本发明中,用户在身份验证信息设置过程中,可以如步骤210所述终端获取用户在至少两次输入身份验证信息过程中对终端上触摸屏的按压力度数据,终端也可以仅仅获取用户在一次输入身份验证信息过程中对终端上触摸屏的按压力度数据,对此本发明不做具体限定。
220、在身份验证信息设置过程中,存储用户输入的身份验证信息以及该用户在输入身份验证信息过程中对该终端上触摸屏的按压力度数据。
在设置完成时,终端将用户输入的身份验证信息以及该用户在输入身份验证信息过程中对该终端上触摸屏的按压力度数据进行存储。在本发明的一个实施例中,为了保证存储安全,终端首先将上述身份验证信息和按压力度数据进行加密,而后再存储加密后的身份验证信息和按压力度数据。上述加密过程可 以采用DES(Data Encryption Standard,数据加密标准)、DSA(Digital Signature Algorithm,数字签名算法)等加密算法,对此本发明不做具体限定。
需要说明的是,对于不同应用来说,由于其身份验证信息可以不同,所获取到的按压力度数据也可以不同,相应地,不同应用的身份验证信息以及按压力度数据的存储位置可以不同。当然,对于一个终端上多个应用,还可以具有相同的按压力度数据,以使得在其验证过程中,可以应用相同的按压力度数据对其进行验证。
在本发明的一个实施例中,步骤220还可以包括步骤220A或步骤220B的内容。
步骤220A、在该终端中存储用户输入的身份验证信息以及该用户在输入身份验证信息过程中对该终端上触摸屏的按压力度数据。
终端可以设置有指定文件夹、指定存储路径等,以供上述身份验证信息以及按压力度数据的存储。
当然,上述身份验证信息以及按压力度数据,或者上述按压力度模型,还可以存储于通过有线或无线与该终端连接的指定服务器中,这样用户在不同的终端进行身份验证时,相应的终端就可以通过访问该指定服务器获取用户的身份验证信息以及按压力度数据,从而方便用户随时随地利用不同的终端进行身份验证,因此,上述步骤220A也可以被步骤220B替代。
步骤220B、终端将用户输入的身份验证信息以及该用户在输入身份验证信息过程中对该终端上触摸屏的按压力度数据发送至指定服务器,以使该指定服务器进行存储。
下面本发明将对步骤220B的具体技术过程进行说明。
终端向指定服务器发送身份验证信息存储请求,该身份验证信息存储请求携带用户账号、身份验证信息以及按压力度数据,指定服务器接收该身份验证信息存储请求,并从该身份验证信息存储请求中提取出用户账号、身份验证信息以及按压力度数据,而后指定服务器将上述提取出的各项数据存储入验证信息数据库中,并以用户账号作为身份验证信息以及按压力度数据的索引信息。当然,上述身份验证信息存储请求中也可以携带用户账号和按压力度模型,以使该指定服务器对上述用户账号和按压力度模型进行存储。
在本发明的一个实施例中,在将用户账号、身份验证信息以及按压力度数 据存储入验证信息数据库之前,指定服务器还可以对该身份验证信息以及按压力度数据进行加密,或者,终端在向指定服务器发送身份验证信息存储请求之前,对身份验证信息以及按压力度数据进行加密,该身份验证信息存储请求携带用户账号及加密后的身份验证信息以及按压力度数据。
230、终端获取用户输入的对指定账号的待验证信息。
当用户需要对移动设备进行解锁、登录应用账号或者进行移动金融支付等需要身份验证的时候,终端需要获取用户输入的指定账号的待验证信息以供终端(或由服务器)进行身份验证。在本发明的一个实施例中,该待验证信息可以为密码信息、验证码信息或指纹信息。
240、终端获取该用户输入待验证信息过程中对终端上触摸屏的按压力度数据。
同时,在身份验证过程中,终端也需要获取用户输入上述待验证信息的过程中对终端上触摸屏的按压力度数据。
下面本发明将对步骤230和步骤240的技术过程进行说明,以移动金融服务中根据密码进行身份验证的情形为例。
在移动金融客户端中,用户在进行转账、付款等交易前,终端需要对当前用户的身份进行验证,以保护用户的财产安全,例如,当终端检测到移动金融客户端的转账操作时,即显示身份验证界面,在该身份验证界面中包含压控密码身份验证选项,当终端检测到对该压控密码身份验证选项的触发操作后,显示压控密码身份验证界面,所述压控密码身份验证界面包含密码输入框,当终端检测到对该密码输入框的触发后,获取用户输入的密码及用户输入密码时对触摸屏的按压力度数据。
在本发明的一个实施例中,步骤240可以包括:每检测到一个字符输入行为,终端获取该字符输入行为的对终端上触摸屏的按压力度数据。
也即是,若待验证信息包含六个字符,则终端获取用户输入每一个字符时的按压力度数据,例如,用户输入的待验证信息为“123456”,则终端获取的按压力度数据可以为“轻压力度、轻压力度、轻压力度、重压力度、轻压力度、轻压力度”。
250、当该待验证信息验证通过且该按压力度数据与该指定账号的预设按压力度数据一致时,终端确定该用户通过身份验证。
上述预设按压力度数据即为身份验证信息设置过程中,存储在终端或指定服务器上的,在输入验证信息时用户对终端触摸屏的按压力度数据,也即是在步骤220中为该指定账号存储的按压力度数据。
在本发明的一个实施例中,若该待验证信息验证不通过或该按压力度数据与该指定账号的预设按压力度数据不一致,则终端可以再次获取用户重新输入的待验证信息和按压力度数据,若用户在预设次数内输入的验证信息和按压力度数据仍然不能通过身份验证,则终端将锁定该指定账号,也即是不允许用户在预设时间范围内针对该指定账号再次进行身份验证。在本发明的一个实施例中,终端在锁定该指定账号之后,可以从存储有指定账号与联系方式的账号数据库中,获取与该指定账号绑定的联系方式,如手机号码、即时通信账号等,进而通过短信、即时通信或者电话的方式向用户发送账号异常通知,以使用户可以及时发现指定账号存在安全风险,从而及时修改身份验证信息和按压力度数据。
下面本发明将对步骤250的技术过程进行说明,如图4所示,仍然以移动金融服务中根据密码进行身份验证的情形为例。
终端在获取用户输入的对指定账号的待验证信息和按压力度数据之后,以该指定账号为索引,向终端或指定服务器查询并获取该指定账号对应的身份验证信息和预设按压力度数据,而后终端将用户输入的待验证信息和从终端或指定服务器中获取的身份验证信息进行对比,若对比结果为二者一致,则对用户输入的按压力度数据和从终端或指定服务器中获取的预设按压力度数据进行对比,若对比结果为二者一致,则终端确定当前用户为合法用户。
需要说明的是,若上述身份验证信息以及与其对应的预设按压力度数据存储于指定服务器中,则确定用户是否通过身份验证的执行主体可以为该指定服务器,具体技术过程与终端为执行主体的技术过程类似,在此本发明不再一一赘述。
综上所述,本实施例提供的身份验证方法,通过终端在获取用户输入的待验证信息的同时,获取用户输入待验证信息时对触摸屏的按压力度数据,并且利用待验证信息和按压力度数据同时对用户的身份进行验证,由于不法分子无法窥视窃取按压力度数据,使得即使用户账号的验证信息泄露,不法分子也无法利用泄露的验证信息通过身份验证,从而可以保障用户的账号安全。
图5是根据一示例性实施例示出的一种身份验证装置500框图。参照图5,该装置包括第一获取模块510、第二获取模块520、验证模块530。
该第一获取模块510,用于获取用户通过触摸屏输入的对指定账号的待验证信息。
在本发明的一个实施例中,该待验证信息为密码信息、验证码信息或指纹信息。
该第二获取模块520,用于获取该用户输入待验证信息过程中对触摸屏的按压力度数据。
在本发明的一个实施例中,第二获取模块520还用于每检测到用户的一个字符输入行为,获取该字符输入行为对触摸屏的按压力度数据。
该验证模块530,用于当该第一获取模块510获取的该待验证信息验证通过且该第二获取模块520获取的该按压力度数据与该指定账号的预设按压力度数据一致时,确定该用户通过身份验证。
参见图6,在本发明的另一个实施例中,还提供了另一种身份验证装置600,该装置基于上述图5的实施例结构,还包括存储模块540和设置模块550。
该存储模块540,用于获取并存储用户通过触摸屏输入的对指定账号的身份验证信息以及该用户在输入身份验证信息过程中对触摸屏的按压力度数据,其中所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据作为所述预设按压力度数据存储。
在本发明的一个实施例中,该存储模块540用于,在终端中存储用户输入的身份验证信息以及该用户在输入身份验证信息过程中对该终端上触摸屏的按压力度数据。
该存储模块540还用于,将用户输入的身份验证信息以及该用户在输入身份验证信息过程中对该终端上触摸屏的按压力度数据发送至指定服务器,以使该指定服务器进行存储。
该设置模块550,用于获取该用户在至少两次输入身份验证信息过程中对触摸屏的按压力度数据。
该设置模块550,还用于当该至少两次输入身份验证信息过程中所获取到的按压力度数据一致时,通知该存储模块540存储用户输入的身份验证信息以及 该用户在输入身份验证信息过程中对该触摸屏的按压力度数据。
综上所述,本实施例提供的身份验证装置,通过第一获取模块获取用户输入的待验证信息,第二获取模块获取用户输入待验证信息时对触摸屏的按压力度数据,并且验证模块利用待验证信息和按压力度数据同时对用户的身份进行验证,由于不法分子无法窥视窃取按压力度数据,使得即使用户账号的验证信息泄露,不法分子也无法利用泄露的验证信息通过身份验证,从而可以保障用户的账号安全。
需要说明的是:上述实施例提供的身份验证装置在验证用户身份时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的身份验证装置与身份验证方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
本实施例提供了一种终端,该终端可以用于执行上述各个实施例中提供的身份验证方法。参见图7,该终端700包括:
终端700可以包括RF(Radio Frequency,射频)电路710、包括有一个或一个以上计算机可读存储介质的存储器720、输入单元730、显示单元740、传感器750、音频电路760、WiFi(Wireless Fidelity,无线保真)模块750、包括有一个或者一个以上处理核心的处理器780、以及电源790等部件。本领域技术人员可以理解,图7中示出的终端结构并不构成对终端的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。其中:
RF电路710可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,交由一个或者一个以上处理器780处理;另外,将涉及上行的数据发送给基站。通常,RF电路710包括但不限于天线、至少一个放大器、调谐器、一个或多个振荡器、用户身份模块(SIM)卡、收发信机、耦合器、LNA(Low Noise Amplifier,低噪声放大器)、双工器等。此外,RF电路710还可以通过无线通信与网络和其他设备通信。所述无线通信可以使用任一通信标准或协议,包括但不限于GSM(Global System of Mobile communication,全 球移动通讯系统)、GPRS(General Packet Radio Service,通用分组无线服务)、CDMA(Code Division Multiple Access,码分多址)、WCDMA(Wideband Code Division Multiple Access,宽带码分多址)、LTE(Long Term Evolution,长期演进)、电子邮件、SMS(Short Messaging Service,短消息服务)等。
存储器720可用于存储软件程序以及模块,处理器780通过运行存储在存储器720的软件程序以及模块,从而执行各种功能应用以及数据处理。存储器720可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据终端700的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器720可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。相应地,存储器720还可以包括存储器控制器,以提供处理器780和输入单元730对存储器720的访问。
输入单元730可用于接收输入的数字或字符信息,以及产生与用户设置以及功能控制有关的键盘、鼠标、操作杆、光学或者轨迹球信号输入。具体地,输入单元730可包括触敏表面731以及其他输入设备732。触敏表面731,也称为触摸显示屏或者触控板,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触敏表面731上或在触敏表面731附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触敏表面731可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器780,并能接收处理器780发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触敏表面731。除了触敏表面731,输入单元730还可以包括其他输入设备732。具体地,其他输入设备732可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元740可用于显示由用户输入的信息或提供给用户的信息以及终端700的各种图形用户接口,这些图形用户接口可以由图形、文本、图标、视频和其任意组合来构成。显示单元740可包括显示面板741,可选的,可以采用 LCD(Liquid Crystal Display,液晶显示器)、OLED(Organic Light-Emitting Diode,有机发光二极管)等形式来配置显示面板741。进一步的,触敏表面731可覆盖显示面板741,当触敏表面731检测到在其上或附近的触摸操作后,传送给处理器780以确定触摸事件的类型,随后处理器780根据触摸事件的类型在显示面板741上提供相应的视觉输出。虽然在图7中,触敏表面731与显示面板741是作为两个独立的部件来实现输入和输入功能,但是在某些实施例中,可以将触敏表面731与显示面板741集成而实现输入和输出功能。
终端700还可包括至少一种传感器750,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板741的亮度,接近传感器可在终端700移动到耳边时,关闭显示面板741和/或背光。作为运动传感器的一种,重力加速度传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于终端700还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路760、扬声器761,传声器762可提供用户与终端700之间的音频接口。音频电路760可将接收到的音频数据转换后的电信号,传输到扬声器761,由扬声器761转换为声音信号输出;另一方面,传声器762将收集的声音信号转换为电信号,由音频电路760接收后转换为音频数据,再将音频数据输出处理器780处理后,经RF电路710以发送给比如另一终端,或者将音频数据输出至存储器720以便进一步处理。音频电路760还可能包括耳塞插孔,以提供外设耳机与终端700的通信。
WiFi属于短距离无线传输技术,终端700通过WiFi模块750可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图7示出了WiFi模块750,但是可以理解的是,其并不属于终端700的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。
处理器780是终端700的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器720内的软件程序和/或模块,以及调用存储在存储器720内的数据,执行终端700的各种功能和处理数据,从而对 手机进行整体监控。可选的,处理器780可包括一个或多个处理核心;优选的,处理器780可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器780中。
终端700还包括给各个部件供电的电源790(比如电池),优选的,电源可以通过电源管理系统与处理器780逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。电源790还可以包括一个或一个以上的直流或交流电源、再充电系统、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。
尽管未示出,终端700还可以包括摄像头、蓝牙模块等,在此不再赘述。具体在本实施例中,终端的显示单元是触摸屏显示器,终端还包括有存储器,以及一个或者一个以上的程序,其中一个或者一个以上程序存储于存储器中,且经配置以由一个或者一个以上处理器执行。所述一个或者一个以上程序包含用于执行以下操作的指令:获取用户通过触摸屏输入的对指定账号的待验证信息;获取该用户输入待验证信息过程中对触摸屏的按压力度数据;当该待验证信息验证通过且该按压力度数据与该指定账号的预设按压力度数据一致时,确定该用户通过身份验证。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上所述仅为本发明的较佳实施例,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (15)

  1. 一种身份验证方法,包括:
    获取用户通过触摸屏输入的对指定账号的待验证信息;
    获取所述用户输入待验证信息过程中对所述触摸屏的按压力度数据;
    当所述待验证信息验证通过且所述按压力度数据与所述指定账号的预设按压力度数据一致时,确定所述用户通过身份验证。
  2. 根据权利要求1所述的方法,其中,所述待验证信息为密码信息、验证码信息或指纹信息中的至少一项。
  3. 根据权利要求1所述的方法,还包括:
    获取并存储用户通过触摸屏输入的对所述指定账号的身份验证信息以及所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据,其中所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据作为所述预设按压力度数据存储。
  4. 根据权利要求3所述的方法,其中,获取并存储用户通过触摸屏输入的对所述指定账号的身份验证信息以及所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据包括:
    获取所述用户在至少两次输入身份验证信息过程中对所述触摸屏的按压力度数据;
    当所述至少两次输入身份验证信息过程中所获取到的按压力度数据一致时,存储用户输入的身份验证信息以及所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据。
  5. 根据权利要求3所述的方法,其中,获取并存储用户通过触摸屏输入的对所述指定账号的身份验证信息以及所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据包括:
    在终端中存储用户输入的身份验证信息以及所述用户在输入身份验证信息 过程中对所述触摸屏的按压力度数据,其中所述终端包括所述触摸屏;
    或者,
    将用户输入的身份验证信息以及所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据发送至指定服务器,以使所述指定服务器进行存储。
  6. 根据权利要求3所述的方法,还包括:判断用户输入的待验证信息与存储的身份验证信息是否一致,若一致,则确定所述待验证信息验证通过。
  7. 根据权利要求1所述的方法,其中,所述待验证信息包括多个字符,所述获取所述用户输入待验证信息过程中对所述触摸屏的按压力度数据包括:
    每检测到用户的一个字符输入行为,就获取所述字符输入行为对触摸屏的按压力度数据。
  8. 一种身份验证装置,包括:
    至少一个处理器;和
    存储器,其中所述存储器存储有程序指令,所述指令当由所述处理器执行时,配置所述装置执行下述操作:
    获取用户通过触摸屏输入的对指定账号的待验证信息;
    获取所述用户输入待验证信息过程中对所述触摸屏的按压力度数据;
    当所述待验证信息验证通过且所述按压力度数据与所述指定账号的预设按压力度数据一致时,确定所述用户通过身份验证。
  9. 根据权利要求8所述的装置,其中,所述待验证信息为密码信息、验证码信息或指纹信息中的至少一项。
  10. 根据权利要求8所述的装置,其中,所述指令当由所述处理器执行时,还配置所述装置执行下述操作:
    获取并存储用户通过触摸屏输入的对所述指定账号的身份验证信息以及所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据,其中所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据作为所述预设按压 力度数据存储。
  11. 根据权利要求10所述的装置,其中,获取并存储用户通过触摸屏输入的对所述指定账号的身份验证信息以及所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据包括:
    获取所述用户在至少两次输入身份验证信息过程中对所述触摸屏的按压力度数据;
    当所述至少两次输入身份验证信息过程中所获取到的按压力度数据一致时,存储用户输入的身份验证信息以及所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据。
  12. 根据权利要求10所述的装置,其中,获取并存储用户通过触摸屏输入的对所述指定账号的身份验证信息以及所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据包括:
    在终端中存储用户输入的身份验证信息以及所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据,其中所述终端包括所述触摸屏;或者
    将用户输入的身份验证信息以及所述用户在输入身份验证信息过程中对所述触摸屏的按压力度数据发送至指定服务器,以使所述指定服务器进行存储。
  13. 根据权利要求10所述的装置,其中,所述指令当由所述处理器执行时,还配置所述装置执行下述操作:
    判断用户输入的待验证信息与存储的身份验证信息是否一致,若一致,则确定所述待验证信息验证通过。
  14. 根据权利要求8所述的装置,其中,所述待验证信息包括多个字符,所述获取所述用户输入待验证信息过程中对所述触摸屏的按压力度数据包括:
    每检测到用户的一个字符输入行为,就获取所述字符输入行为对触摸屏的按压力度数据。
  15. 一种非暂态计算机可读存储介质,所述存储介质存储有程序指令,所 述指令当由计算装置的处理器执行时,配置所述装置执行根据权利要求1-8中任一项所述的方法。
PCT/CN2016/083305 2015-10-26 2016-05-25 身份验证方法及装置 WO2017084288A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/817,014 US10657244B2 (en) 2015-10-26 2017-11-17 Identity authentication method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510797063.9A CN105468952A (zh) 2015-11-17 2015-11-17 身份验证方法及装置
CN201510797063.9 2015-11-17

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/102368 Continuation-In-Part WO2017071498A1 (zh) 2015-10-26 2016-10-18 一种身份验证方法和装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/083105 Continuation-In-Part WO2017071192A1 (zh) 2015-10-26 2016-05-24 身份验证方法和装置

Publications (1)

Publication Number Publication Date
WO2017084288A1 true WO2017084288A1 (zh) 2017-05-26

Family

ID=55606641

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/083305 WO2017084288A1 (zh) 2015-10-26 2016-05-25 身份验证方法及装置

Country Status (2)

Country Link
CN (1) CN105468952A (zh)
WO (1) WO2017084288A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112764824A (zh) * 2019-10-21 2021-05-07 腾讯科技(深圳)有限公司 触发应用程序中身份验证的方法、装置、设备及存储介质
CN113596812A (zh) * 2021-07-02 2021-11-02 杭州天宽科技有限公司 基于安卓平台的一种apn自动配置和切换方法

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105468952A (zh) * 2015-11-17 2016-04-06 腾讯科技(深圳)有限公司 身份验证方法及装置
US10657244B2 (en) 2015-10-26 2020-05-19 Tencent Technology (Shenzhen) Company Limited Identity authentication method and apparatus
CN105912896A (zh) * 2016-04-12 2016-08-31 深圳市金立通信设备有限公司 一种应用切换的方法及终端
CN106529231A (zh) * 2016-10-18 2017-03-22 深圳市金立通信设备有限公司 一种用户触摸操作识别方法及终端
CN106453424A (zh) * 2016-12-09 2017-02-22 深圳市金立通信设备有限公司 一种身份验证的方法及终端
CN107016276B (zh) * 2017-03-20 2019-07-09 广东小天才科技有限公司 一种移动设备的屏幕解锁方法及移动设备
CN107679395B (zh) * 2017-07-24 2019-07-09 平安科技(深圳)有限公司 一种密码设置方法、装置及计算机可读存储介质
CN109214790B (zh) * 2018-01-10 2020-02-18 广州合利宝支付科技有限公司 第三方支付方法和装置
CN110298148A (zh) * 2019-05-21 2019-10-01 视联动力信息技术股份有限公司 一种登录验证的方法及装置
CN112446014A (zh) * 2019-08-30 2021-03-05 宏达国际电子股份有限公司 用户验证方法与移动装置
CN110751861B (zh) * 2019-11-28 2021-07-02 张丽丽 一种基于云平台的网络远程教育系统
CN111445365A (zh) * 2020-04-13 2020-07-24 申珊珊 一种在线远程教育系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102203794A (zh) * 2011-06-01 2011-09-28 华为终端有限公司 一种终端认证方法及装置
CN102982269A (zh) * 2012-10-25 2013-03-20 北京大学 基于生物计量特征的防偷窥密码认证方法及系统
CN103870744A (zh) * 2012-12-13 2014-06-18 联想(北京)有限公司 一种验证密码的方法及电子设备
CN103942477A (zh) * 2014-04-22 2014-07-23 南京大学 一种基于触屏压力感知的智能手机认证方法
CN104063642A (zh) * 2014-07-07 2014-09-24 西安电子科技大学 一种基于压力传感器的智能终端安全认证方法及装置
CN105468952A (zh) * 2015-11-17 2016-04-06 腾讯科技(深圳)有限公司 身份验证方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102203794A (zh) * 2011-06-01 2011-09-28 华为终端有限公司 一种终端认证方法及装置
CN102982269A (zh) * 2012-10-25 2013-03-20 北京大学 基于生物计量特征的防偷窥密码认证方法及系统
CN103870744A (zh) * 2012-12-13 2014-06-18 联想(北京)有限公司 一种验证密码的方法及电子设备
CN103942477A (zh) * 2014-04-22 2014-07-23 南京大学 一种基于触屏压力感知的智能手机认证方法
CN104063642A (zh) * 2014-07-07 2014-09-24 西安电子科技大学 一种基于压力传感器的智能终端安全认证方法及装置
CN105468952A (zh) * 2015-11-17 2016-04-06 腾讯科技(深圳)有限公司 身份验证方法及装置

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112764824A (zh) * 2019-10-21 2021-05-07 腾讯科技(深圳)有限公司 触发应用程序中身份验证的方法、装置、设备及存储介质
CN112764824B (zh) * 2019-10-21 2023-10-10 腾讯科技(深圳)有限公司 触发应用程序中身份验证的方法、装置、设备及存储介质
CN113596812A (zh) * 2021-07-02 2021-11-02 杭州天宽科技有限公司 基于安卓平台的一种apn自动配置和切换方法
CN113596812B (zh) * 2021-07-02 2023-06-02 杭州天宽科技有限公司 基于安卓平台的一种apn自动配置和切换方法

Also Published As

Publication number Publication date
CN105468952A (zh) 2016-04-06

Similar Documents

Publication Publication Date Title
WO2017084288A1 (zh) 身份验证方法及装置
JP6576555B2 (ja) サービス処理方法、デバイス及びシステム
WO2017118412A1 (zh) 一种更新密钥的方法、装置和系统
US11488234B2 (en) Method, apparatus, and system for processing order information
US20150294101A1 (en) Running applications, and authenticating users
WO2017041599A1 (zh) 业务处理方法及电子设备
WO2015101273A1 (zh) 一种安全验证方法、相关设备和系统
WO2017185711A1 (zh) 控制智能设备的方法、装置、系统和存储介质
US11405383B2 (en) Authorization credential migration method, terminal device, and service server
WO2018161743A1 (zh) 指纹识别方法及相关产品
WO2014108005A1 (en) Co-verification method, two-dimensional code generation method, and device and system therefor
WO2016078504A1 (zh) 身份鉴权方法和装置
CN108881103B (zh) 一种接入网络的方法及装置
CN109145552B (zh) 信息加密方法及终端设备
EP3699789A1 (en) Method and device for security verification and mobile terminal
US20160301530A1 (en) Sensitive operation verification method, apparatus, and system
CN106255102B (zh) 一种终端设备的鉴定方法及相关设备
CN110457888B (zh) 一种验证码输入方法、装置、电子设备及存储介质
WO2014000652A1 (zh) 浏览器插件安装方法、装置及终端
WO2018108123A1 (zh) 身份验证方法、装置与系统
CN107609363B (zh) 一种解锁方法及移动终端
CN108475304A (zh) 一种关联应用程序和生物特征的方法、装置以及移动终端
WO2019007371A1 (zh) 一种防止信息被盗的方法、存储设备及移动终端
WO2016192511A1 (zh) 远程删除信息的方法和装置
WO2018108062A1 (zh) 身份验证方法、装置及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16865469

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 04/10/2018)

122 Ep: pct application non-entry in european phase

Ref document number: 16865469

Country of ref document: EP

Kind code of ref document: A1