WO2017190577A1 - 一种认证、用于认证的信息生成方法及装置 - Google Patents

一种认证、用于认证的信息生成方法及装置 Download PDF

Info

Publication number
WO2017190577A1
WO2017190577A1 PCT/CN2017/079862 CN2017079862W WO2017190577A1 WO 2017190577 A1 WO2017190577 A1 WO 2017190577A1 CN 2017079862 W CN2017079862 W CN 2017079862W WO 2017190577 A1 WO2017190577 A1 WO 2017190577A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
picture
feature
information
interaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2017/079862
Other languages
English (en)
French (fr)
Inventor
孙小凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to MYPI2018001825A priority Critical patent/MY192160A/en
Priority to KR1020187032616A priority patent/KR20190005870A/ko
Priority to JP2018558116A priority patent/JP7046006B2/ja
Priority to SG11201808945UA priority patent/SG11201808945UA/en
Priority to EP17792404.0A priority patent/EP3454244B1/en
Publication of WO2017190577A1 publication Critical patent/WO2017190577A1/zh
Priority to US16/176,766 priority patent/US11416598B2/en
Priority to PH12018502324A priority patent/PH12018502324A1/en
Anticipated expiration legal-status Critical
Priority to US16/721,663 priority patent/US11392680B2/en
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/68Gesture-dependent or behaviour-dependent
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present application relates to the field of information security technologies, and in particular, to an authentication, information generation method and apparatus for authentication.
  • the first user may preset standard information (such as a password, etc.) for authentication. After setting the standard information, the terminal may perform any on the terminal according to the standard information.
  • the user performing the specific operation (referred to as: the second user) performs authentication. If the second user can correctly input the standard information, the terminal can authenticate the second user as the first user. Otherwise, the terminal can determine that the second user is not the first user. A user, but an attacker who wants to impersonate the first user, can then refuse the second user to perform the specific operation, thereby improving the information security of the first user at the terminal.
  • the specific operation may be: a screen unlocking operation, a login operation, a personal information modification operation, a payment operation, and the like.
  • the standard information may be a gesture password, in which case the authentication may be based on the gesture password.
  • the gesture password input interface provided by the operating system or application on the terminal, and the nine key node areas are distributed according to the form of the nine-square grid, as shown in the gesture password input interface in FIG.
  • the first user can set the gesture password by setting a two-dimensional trajectory connecting at least two key node areas.
  • the second user needs to pass the In the gesture password input interface, the key node area is connected to reproduce the gesture corresponding to the gesture password to pass the authentication.
  • the gesture and password input interface adopted in the prior art is single, and the attacker is generally familiar with the gesture password input interface, which will reduce the attacker's peek and memory first.
  • the embodiment of the present invention provides an authentication method and device, which are used to solve the problem that the gesture password input interface used in the prior art is single, resulting in low authentication reliability.
  • the embodiment of the present application provides a method and an apparatus for generating information for authentication.
  • a display module displaying a picture pre-designated by the first user
  • a detecting module detecting an interaction operation of the second user with respect to the picture
  • a generating module configured to generate interaction operation information of the second user according to the detected interaction operation of the second user
  • the authentication module is configured to match whether the second user is the first user by matching the interaction information of the second user with the standard information, where the standard information is according to the first user for the picture. Generated by interaction.
  • Obtaining a module acquiring a picture specified by the first user
  • a detecting module detecting an interaction operation of the first user with the one or more feature regions
  • a generating module configured to generate, according to the detected interaction operation of the first user, standard information for authenticating whether the second user is the first user.
  • the first user-specified picture can be used as the first user-defined gesture password input interface
  • the interaction operation can include a gesture, thereby achieving
  • the diversification of the gesture password input interface because the location of the feature area of the gesture password input interface corresponding to different pictures is generally different, the location of the feature area of the gesture password input interface corresponding to the picture specified by the first user and the gesture password in the prior art
  • the location of the feature area of the input interface is generally different. Therefore, the attacker may not be familiar with the gesture password input interface corresponding to the picture, which may increase the difficulty for the attacker to peek and memorize the gesture password input by the first user, and/or increase the attacker.
  • the difficulty of cracking the gesture password set by the first user is solved in an exhaustive manner, thereby improving the reliability of the authentication. Therefore, the present application can solve the problems in the prior art in part or in whole.
  • FIG. 1 is a schematic diagram of a gesture password input interface in the prior art
  • FIG. 2 is a schematic flowchart of an authentication method provided by an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of generating standard information in FIG. 2 according to an embodiment of the present disclosure
  • FIG. 4 is two examples of a specific picture provided by an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a feature area determined and marked in a specific picture according to an embodiment of the present application.
  • FIG. 6 is a schematic diagram of a specific picture of the case where the feature area is marked or not according to an embodiment of the present application
  • FIG. 7 is a schematic flowchart of a method for generating information for authentication according to an embodiment of the present application.
  • FIG. 8 is a schematic flowchart of a process for generating standard information in an actual application scenario according to an embodiment of the present disclosure
  • FIG. 9 is a schematic diagram of another standard information input interface used in the prior art.
  • FIG. 10 is a schematic structural diagram of an authentication apparatus according to an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of an information generating apparatus for authentication according to an embodiment of the present application.
  • the solution of the present application can be used for authentication, for example, for authenticating a second user when a second user (ie, a user to be authenticated) performs a specific operation.
  • the specific operation may be: a screen unlocking operation, a login operation, a personal information modification operation, a payment operation, and the like.
  • the solution of the present application can partially or completely solve the problems in the prior art, and the following describes the solution of the present application. Bright.
  • FIG. 2 is a schematic flowchart of an authentication method according to an embodiment of the present disclosure, where an execution subject of the process may be an authentication related device.
  • the device includes, but is not limited to, a mobile phone, a tablet computer, a smart watch, a car mobile station, a personal computer, etc., a large and medium-sized computer, a computer cluster, and the like.
  • the executive body does not constitute a limitation on the present application.
  • the process in Figure 2 can include the following steps:
  • S201 Display a picture specified by the first user in advance.
  • the “picture specified in advance by the first user” in step S201 may be referred to as a specific picture.
  • the standard information for the authentication may be generated based on the operation of the first user in advance. Further, the flow in FIG. 2 is based on the standard information, and the second User authenticated.
  • the second user may be the first user; the second user may also be other users than the first user, for example, an attacker who wants to impersonate the first user. Through the flow in FIG. 2, it can be authenticated whether the second user is the first user.
  • the standard information may be generated based on the specific picture, and the specific picture is specified by the first user.
  • the first user may designate a certain image pre-saved locally or in the cloud as a specific image, or may newly acquire a certain image by a specific route as a specific image, for example, for an execution subject having a camera, A photo is specified as a specific image, and so on.
  • step S102 the interaction operation of the second user with any area on the picture may be detected, or only the interaction operation of the second user with one or more feature areas on the picture may be detected.
  • S203 Generate interaction operation information of the second user according to the detected interaction operation of the second user.
  • the interaction operation may be one or more of operations such as clicking, sliding, pressing, etc.
  • the interaction operation information may reflect the corresponding interaction operation content.
  • the enumerated operations are only examples of interaction operations, and the interaction operations may be other operations than these operations.
  • operations such as clicking, sliding, pressing, and the like may be further subdivided to describe the interactive operation content with more specific features (the interaction content is more specific), for example, according to the click strength, Clicking on the contact time, clicks, click frequency and other features to further subdivide the click operation, the sliding operation can be further subdivided according to the characteristics of the sliding track, the sliding contact time, the sliding contact force, the sliding distance, etc., according to the pressing time and pressing Features such as velocity are further subdivided by the pressing operation.
  • the specific degree of the interactive operation content is not limited in this application. Generally, when the specific content of the interactive operation content is higher, the corresponding interactive operation information may be more detailed, and the authentication based on the interaction operation information is strict. The degree can also be higher, and the specific degree of the interactive operation content can be defined in advance according to actual needs.
  • the interaction is a click operation.
  • the specific degree of the definition is low, only the number of clicks may be detected, and the click strength, the click contact time, and the like may be detected; when the specific degree of the definition is high, the click count and the click strength may be detected. , click contact time, etc.
  • the interaction is a sliding operation.
  • the specific degree of the definition is low, only the sliding track can be detected, and the sliding contact time, the sliding contact force, and the like can be detected; when the specific degree of the definition is high, both the sliding track and the sliding can be detected. Contact time, sliding contact strength, etc.
  • S204 Authenticate whether the second user is the first user by matching the interaction information of the second user with the standard information, where the standard information is based on the interaction of the first user with the picture. The operation is generated.
  • the picture on which the standard standard information is generated may be generated (that is, the The specific picture is displayed (corresponding to step S201), and the second user needs to reproduce the interactive operation corresponding to the standard information for the displayed specific picture, so that the authentication can be passed (corresponding to steps S202 to S204).
  • the interaction operation corresponding to the standard information is: an interaction operation of the first user for the picture based on the generated standard information.
  • a specific picture may be used as the first user-defined gesture password input interface.
  • the interaction operation of the first user for one or more feature areas on a specific picture may be regarded as a gesture, and the set standard information. It can be regarded as a gesture password.
  • a specific picture is displayed, and the second user needs to perform an interaction operation for one or more feature areas on the specific picture to reproduce the gesture of the first user before passing the authentication.
  • the interaction information of the second user may reflect the interaction content of the second user for the specific picture
  • the standard information may reflect the interaction content of the first user for the specific picture. Therefore, by matching the interaction information of the second user with the standard information, it can be determined or estimated whether the second user reproduces the operation of the first user, and thus can be used as the authentication basis to authenticate whether the second user is the first user.
  • the specific detection manner used for detecting the interaction operation of the second user is generally the same as or similar to the specific detection method used to detect the interaction operation of the first user when generating standard information (otherwise, it may be inconvenient to The interaction information of the second user is matched with the standard information, because the interoperability information of the second user may be inferior to the standard information at this time, so that the interaction information and standard information of the second user are facilitated.
  • the matching can also improve the reliability of the authentication method in which the present application performs authentication based on the matching of the interactive operation information.
  • the picture specified by the first user may be used as the first user-defined gesture password input interface, and the interaction operation may include a gesture, so that the gesture can be implemented.
  • Diversification of the code input interface because the location of the feature area of the gesture password input interface corresponding to different pictures is generally different, the position of the feature area of the gesture password input interface corresponding to the picture specified by the first user and the gesture password input in the prior art The location of the feature area of the interface is generally different. Therefore, the attacker may not be familiar with the gesture password input interface corresponding to the picture, which may increase the difficulty for the attacker to peek and memorize the gesture password input by the first user, and/or increase the attacker.
  • the exhaustive way to crack the difficulty of the gesture password set by the first user can further improve the reliability of the authentication. Therefore, the present application can solve the problems in the prior art in part or in whole.
  • the above method has more advantages than the prior art.
  • the corresponding operation types of the gestures in the prior art are also relatively small, and the degree of specificity is also low.
  • the corresponding generated gesture information is generally limited to describing the sliding track, and does not describe such as More feature information such as sliding time, sliding contact time, and sliding contact force.
  • the interaction operations described in the present application may include more types of operations (eg, click operations, push operations, etc.), and for various operations included.
  • the specificity of the interactive operation content generated by the corresponding operations may be customized, so that the generated interactive operation information (compared to the gesture information in the prior art) may be more detailed, thereby improving the strictness of the authentication. Thereby improving the information security of the first user.
  • the single gesture password input interface in the prior art can be used, but the favorite picture can be freely selected to generate a corresponding customized gesture password input interface, and the customization can be performed. Better, it is beneficial to improve the user experience.
  • execution bodies of the steps of the flow in FIG. 2 may all be the same device, or the steps may also be performed by different devices.
  • the execution body of step 201 may be device 1
  • the execution body of steps 202-204 may be device 2
  • the execution body of steps 201-203 may be device 1
  • the execution body of step 204 may be device 2; Wait.
  • the embodiment of the present application further provides some specific implementation manners of the authentication method, and an extended solution, which will be described below.
  • the standard information in FIG. 2 may be generated according to the interaction operation of the first user for the picture.
  • the following describes the process of generating the standard information in FIG. 2 .
  • Figure 3 For explanation, as shown in Figure 3.
  • FIG. 3 is a schematic diagram of a process for generating standard information in FIG. 2 according to an embodiment of the present disclosure.
  • the execution body of the process in FIG. 3 and the execution body of the process in FIG. 2 may be the same device, or may be different devices.
  • the process in Figure 3 can include the following steps:
  • S301 Acquire the picture (that is, a specific picture) specified by the first user.
  • information about the content, format, and the like of a specific picture is not limited.
  • the embodiment of the present application provides two examples of a specific picture, as shown in FIG.
  • FIG. 4 is two examples of a specific picture provided by the present application, which are a picture of a dog on the left side in FIG. 4 and a picture of a cat on the right side in FIG. 4, respectively.
  • a specific picture provided by the present application, which are a picture of a dog on the left side in FIG. 4 and a picture of a cat on the right side in FIG. 4, respectively.
  • the following embodiments are also explained based on the specific picture example in FIG.
  • S302 Display the picture, and determine one or more feature areas on the picture.
  • feature detection may be performed on a specific picture based on a specific image feature area detection algorithm to determine the one or more feature areas on a specific picture, where the feature area may be performed by The subject specifies it or is specified by the first user.
  • This way of determining the feature area has the advantage of reducing the user's operation and intervention and increasing the automation of the solution of the present application.
  • the image feature region detection algorithm is not limited in this application. Several algorithms are listed as examples.
  • the image feature region detection algorithm may be: Scale-invariant feature transform (SIFT) algorithm, SURF algorithm. , FAST algorithm, ORB algorithm, Harris algorithm, BRISK algorithm, etc. Due to different image feature area detection The features of interest in the law may be different. Therefore, the feature regions detectable by different image feature region detection algorithms may also be different.
  • the SURF algorithm can generally detect a circular area in a specific picture.
  • Harris algorithm can generally detect an angular area in a specific picture as a feature area, and the like.
  • one or more image feature region detection algorithms may be selected according to actual needs as the specific image feature region detection algorithm.
  • the number of feature regions that can be determined may also be different. When there are too many feature regions (for example, a dozen or even dozens of feature regions are determined on a specific picture) It may not be conducive to subsequent operations. When the feature area is too small (for example, only one or two feature areas are determined on a particular picture), the degree of strictness of the authentication may not be as expected. For such a problem, it may be allowed to define the number of determined feature regions or the number of feature regions for authentication, for example, the first user may be allowed to limit the number of feature regions determined on each particular picture. For 9 or other numbers, if the number exceeds the limit, a part may be removed. If the limit is not reached, a part may be added, so that the feature area is neither too much nor too small.
  • the feature region may not be determined based on the specific image feature region detection algorithm, but the first user may directly designate one or more regions on the specific image as the feature region.
  • the advantage of this way of determining the feature area is that the first user has strong controllability to the feature area, and since the feature area is specified by the first user, it is also convenient for the first user to memorize the feature area.
  • determining one or more feature areas on the picture may include: performing feature detection on the picture, The feature detecting, determining the one or more feature regions on the particular picture; and/or determining one or more regions specified by the first user on the particular picture as the feature region.
  • the determined feature may also be marked on the displayed specific picture. region.
  • the labeling may be performed in a manner of text and/or graphics and/or color, etc., which may be used to indicate that its corresponding area is a feature area.
  • the embodiment of the present application provides a schematic diagram of a feature area determined and marked in a specific picture, as shown in FIG. 5 , specifically taking a specific picture in FIG. 4 as an example.
  • each feature area determined in a specific picture is respectively marked with a circular figure, wherein five characteristic areas are indicated in a specific picture on the left side in FIG. 5, and the specific part on the right side in FIG. Three feature areas are indicated in the picture.
  • S303 Detect an interaction operation of the first user for the one or more feature areas.
  • S304 Generate the standard information according to the detected interaction operation of the first user.
  • the execution of the authentication process may be triggered when the preset condition is met.
  • the setting in order to adjust the strictness of the authentication, before the authentication (for example, before performing step S101), the setting may be performed for the one or more feature areas, where the setting is used to determine whether: The one or more feature areas are marked on the pre-designated picture of the first user.
  • the second user can directly know the feature area on the specific picture by using the identifier, which is beneficial for the second user to reproduce the first user for the feature area. Interoperability, in which case the degree of rigor of authentication is relatively low.
  • the second user cannot directly know the feature area on the specific picture. If the second user is not the first user, the second user is difficult to determine the specific picture. The feature area on the top, and then it is difficult to reproduce the interaction operation for the feature area. The strictness of the authentication is relatively high, and the information of the first user can be improved. safety.
  • the embodiment of the present application provides a specific picture diagram of the case where the feature area is marked or not, as shown in FIG. 6 , specifically, the specific picture on the left side in FIG. 4 is taken as an example.
  • the left side in FIG. 6 is a schematic diagram of a specific picture indicated by the feature area, and the right side in FIG. 6 is a specific picture diagram not marked on the feature area.
  • the interaction operation information may reflect the corresponding interaction operation content, and the specific manners for implementing the reflection may be various. The following two specific manners are listed as examples.
  • the order of operations for each feature region on a particular picture may be part of the interactive content.
  • the interworking information may only reflect this portion of the corresponding interworking content.
  • corresponding identification information may also be generated for each feature region, and the identification information may be used on a specific image.
  • the feature area corresponding to the identification information is uniquely determined.
  • the identification information may be coordinate information of the corresponding feature area, or may be a character or a character string of a number, a letter, or the like that uniquely associates with the coordinate information of the corresponding feature area, and the like.
  • the generating the standard information according to the detected interaction operation of the first user may include: determining, according to the detected interaction operation of the first user, An operation sequence of the first user for the one or more feature regions; generating, according to the operation sequence and the identification information corresponding to the one or more feature regions, a feature region identification information sequence for indicating the operation sequence, As the standard information.
  • the identification information corresponding to the three feature regions is generated, which are numbers "1", “2", and "3", respectively.
  • the user's interaction operation for the three feature areas is: performing a click operation on the three feature areas in sequence.
  • the operation sequence of the first user for the three feature areas is from front to back: the first feature area, the second Feature area, third feature area.
  • the operation sequence is expressed by the identification information of the feature area, that is, the feature area identification information sequence "1, 2, 3” or "123” is generated as standard information.
  • “1, 2, 3” and “123” in this example are examples of the feature region identification information sequence, and are not limited. In practical applications, the feature region identification information sequence may also be other than the digital sequence. Formal representation, which can indicate the order of operation of the first user for each feature area.
  • the first specific manner may also be adopted to generate interaction information of the second user.
  • step 103 generating the interaction operation information of the second user according to the detected interaction operation of the second user, which may include: determining, according to the detected interaction operation of the second user, The interaction operation of the second user includes an operation sequence of the second user for the one or more feature regions when the second user interacts with the one or more feature regions; according to the operation sequence
  • the identification information corresponding to the one or more feature areas generates a sequence of feature area identification information indicating the operation sequence as the interaction operation information of the second user.
  • the interactive operation information can reflect more specific interactive operation content in addition to the above-mentioned operation sequence.
  • the interactive operation is a sliding operation
  • the sliding contact strength can also be reflected.
  • the generating the standard information according to the detected interaction operation of the first user may include: determining, according to the detected interaction operation of the first user, An operational sequence of the first user for the one or more feature regions, and an operational feature representation value of the one or more feature regions, the operational feature representation value being used to characterize: the first user for the operation An operation feature when the feature region corresponding to the feature representation value performs the interaction operation; according to the operation sequence, the identifier information corresponding to the one or more feature regions, and the operation feature representation value of the one or more feature regions Generating feature region identification information and operation specificity for indicating the operation sequence and the operation feature The sequence of characterization values is used as the standard information.
  • the identification information corresponding to the three feature regions is generated, which are numbers “1", “2", and "3", respectively.
  • the user's interaction operation for the three feature regions is: sliding from the first feature region to the second feature region, and then sliding from the second feature region to the third feature region.
  • the first user's operation sequence for the three feature regions is from the front to the back: the first feature region, the second feature region, and the third feature region.
  • the operating feature is the sliding contact force, and the sliding contact force is divided into "A" file and "B” file according to the magnitude of the force, that is, the operation feature representation value may be "A" or "B".
  • the feature area identification information and the operation characteristic representation value sequence can be generated as standard information.
  • “1, A, 2, B, 3” and “1A2B3” in this example are examples of the feature region identification information and the operation feature representation value sequence, and are not limited.
  • the feature region identifier information The sequence of operational feature characterization values may also be represented in other forms than the sequence of alphanumeric characters, and may indicate the operational sequence and operational characteristics of the first user for each feature region.
  • the second specific manner may also be used to generate the interaction information of the second user. I will not repeat them here.
  • the first user may be allowed to perform a re-confirmation operation on the generated standard information (referred to as: standard information secondary confirmation).
  • standard information secondary confirmation a re-confirmation operation on the generated standard information
  • the standard information can be regenerated once, and the standard information generated twice before and after is compared. If the comparison result is the same, it is determined that the generated standard information can be used for authentication.
  • the information generation method can generate standard information by executing the information generation method, and the flow of the information generation method is as shown in FIG. 7.
  • the flow in Figure 7 can include the following steps:
  • S701 Acquire a picture specified by the first user.
  • S702 Display the picture, and determine one or more feature areas on the picture.
  • S703 Detect an interaction operation of the first user for the one or more feature regions.
  • S704 Generate standard information according to the detected interaction operation of the first user, to be used to authenticate whether the second user is the first user.
  • determining one or more feature regions on the image may specifically include: performing feature detection on the image, and determining, by using the feature detection, on the specific image. And the one or more feature regions; and/or determining one or more regions specified by the first user on the specific image as the feature regions.
  • the embodiment of the present application further provides a detailed flow diagram of generating standard information in an actual application scenario, as shown in FIG. 8 .
  • the foregoing interaction operation is a click operation.
  • the flow in Figure 8 can include the following steps:
  • S801 Receive a customized picture uploaded by the first user.
  • S802 Determine a picture feature detection algorithm specified by the first user, and determine, according to the picture feature detection algorithm, a plurality of feature areas on the received picture.
  • S803 Display the picture, mark the feature area, and generate corresponding identification information for the feature area.
  • S804 Detect a click operation performed by the first user on the feature area.
  • S805 Generate, according to the identification information of the feature area, and the detected click order of the first user click feature area, a feature area identification information sequence for indicating the click order, as Standard information.
  • S806 Receive a second confirmation of the standard information by the first user.
  • S807 According to the instruction of the first user, set whether to mark the feature area on the displayed picture based on the standard information authentication.
  • the second user may be determined or estimated to reproduce the interaction of the first user. operating.
  • the method may include: The interaction information of the second user is matched with the standard information, and it is determined whether the interaction information of the second user is the same as the standard information; if yes, the second user is authenticated as the first user; Otherwise, the second user may not be authenticated as the first user.
  • the standard information and the interaction information of the second user are not necessarily required to authenticate the second user as the first user, but the interaction between the standard information and the second user may be The operation information is matched, and it is determined whether the interaction operation of the second user is the same as or similar to the interaction operation of the first user, and the authentication is performed based on the determination result.
  • the method may include: The interaction information of the second user is matched with the standard information, and it is determined whether the interaction operation corresponding to the interaction operation information of the second user is the same as the interaction operation corresponding to the standard information, and if so, the second authentication is performed.
  • the user is the first user; or, by matching the interaction operation information of the second user with the standard information, determining that the interaction operation corresponding to the interaction operation information of the second user corresponds to the standard information Whether the degree of similarity of the interaction is not less than a predetermined similarity threshold, and if so, the second user is authenticated as the first user; otherwise, the second user may not be authenticated as the first user.
  • the interaction operation for the picture may include: a click operation performed in one or more feature areas on the picture; and/or when there are multiple features on the picture A sliding operation for sliding from one feature area to another.
  • a pressing operation performed in one or more feature areas on the specific picture, and the like may be included.
  • FIG. 9 is a schematic diagram of a password input interface used in the other prior art.
  • the password is a preset sequence of numbers, and the second user needs to input the password by clicking on each digit area in the password input interface to pass the authentication.
  • the password input interface in Figure 9 is single, and the attacker is generally familiar with the password input interface, which may result in lower authentication reliability.
  • the first user can customize the password input interface by using the solution of the present application, and the password can be the standard information mentioned above, thereby realizing the customizable password input interface.
  • the attacker may not be familiar with the first user-defined password input interface, it may increase the difficulty for the attacker to peek and remember the password entered by the first user, and/or increase the attacker to crack the first in an exhaustive manner.
  • the difficulty of the password set by the user can further improve the reliability of the authentication. Therefore, the present application may also solve the problem of the other prior art in part or in whole.
  • the embodiment of the present application further provides a corresponding authentication device and an information generating device for authentication, as shown in FIG. 10 and FIG. 11 . Show.
  • FIG. 10 is a schematic structural diagram of an authentication apparatus according to an embodiment of the present disclosure, including:
  • the display module 1001 displays a picture specified by the first user in advance
  • the detecting module 1002 is configured to detect an interaction operation of the second user with respect to the picture
  • the generating module 1003 is configured to generate interaction operation information of the second user according to the detected interaction operation of the second user.
  • the authentication module 1004 by matching the interaction information of the second user with the standard information, to authenticate whether the second user is the first user, and the standard information is according to the first user for the picture. The interaction is generated.
  • the device further includes:
  • the standard information module 1005 generates the standard information according to the interaction operation of the first user with the picture according to the following manner:
  • the standard information module 1005 performs feature detection on the image, and the feature detection determines the one or more feature regions on the specific image; and/or,
  • the standard information module 1005 is configured to set the one or more feature areas before the display module 1001 displays the picture specified by the first user, where the setting is used to determine whether the first one is displayed.
  • the one or more feature areas are marked on a picture designated by the user in advance.
  • the standard information module 1005 after determining the one or more feature areas on the picture, generating corresponding identification information for each of the feature areas; according to the detected interaction of the first user Determining an operation sequence of the first user for the one or more feature regions; and according to the operation sequence and the identification information corresponding to the one or more feature regions, Generating a feature area identification information sequence for indicating the operation sequence as the standard information;
  • the authentication module 1004 determines whether the interaction information of the second user is the same as the standard information by matching the interaction information of the second user with the standard information; if yes, authenticating the The second user is the first user.
  • the authentication module 1004 determines, by matching the interaction operation information of the second user with the standard information, whether the interaction operation corresponding to the interaction operation information of the second user is the same as the interaction operation corresponding to the standard information. If yes, the second user is authenticated as the first user; or, by matching the interaction information of the second user with the standard information, determining interaction information of the second user Whether the degree of similarity of the interaction operation corresponding to the standard information is not less than a predetermined similarity threshold, and if so, authenticating the second user as the first user.
  • the interaction operation for the picture includes:
  • the device in Figure 10 can be specifically located on a device associated with authentication.
  • FIG. 11 is a schematic structural diagram of an information generating apparatus for authentication according to an embodiment of the present disclosure, including:
  • the obtaining module 1101 is configured to obtain a picture specified by the first user
  • Display determination module 1102 displaying the picture, and determining one or more feature areas on the picture;
  • the detecting module 1103 is configured to detect an interaction operation of the first user with the one or more feature regions;
  • the generating module 1104 is configured to generate, according to the detected interaction operation of the first user, standard information for authenticating whether the second user is the first user.
  • the display determining module 1102 performs feature detection on the image, and the feature detection determines the one or more feature regions on the specific image; and/or determines the first user One or more areas specified on the specific picture as the feature area.
  • the device in Figure 11 can be specifically located on a device associated with authentication.
  • the device provided by the present application is in one-to-one correspondence with the method provided by the present application. Therefore, the device also has similar beneficial technical effects as the method, since the beneficial technical effects of the method have been described in detail above. Therefore, the beneficial technical effects of the device will not be described again here.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, read only A compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, magnetic tape cartridge, magnetic tape storage or other magnetic storage device or any other non-transportable medium that can be used to store computing devices Access to information.
  • computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Animal Behavior & Ethology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)
  • Collating Specific Patterns (AREA)

Abstract

一种认证、用于认证的信息生成方法及装置,用以解决现有技术中采用的手势密码输入界面单一,导致认证可靠性较低的问题。该认证方法包括:显示第一用户预先指定的图片(S201);检测第二用户针对所述图片的交互操作(S202);根据检测到的所述第二用户的交互操作,生成所述第二用户的交互操作信息(S203);通过将所述第二用户的交互操作信息与标准信息进行匹配,认证所述第二用户是否为所述第一用户,所述标准信息是根据所述第一用户针对所述图片的交互操作生成的(S204)。

Description

一种认证、用于认证的信息生成方法及装置 技术领域
本申请涉及信息安全技术领域,尤其涉及一种认证、用于认证的信息生成方法及装置。
背景技术
随着信息技术迅速发展,信息安全也越来越受到用户的重视。认证是为保证信息安全所常用的一种手段。
以第一用户的终端执行认证为例,第一用户可以预先设定用于认证的标准信息(比如密码等),在设定标准信息后,该终端可以根据标准信息,对任何在该终端上进行特定操作的用户(称为:第二用户)进行认证,若第二用户能正确输入标准信息,则该终端可以认证第二用户为第一用户,否则,该终端可以判定第二用户并非第一用户,而是想假冒第一用户的攻击者,进而可以拒绝第二用户进行该特定操作,从而可以提高第一用户在该终端的信息安全性。其中,该特定操作可以是:屏幕解锁操作、登录操作、个人信息修改操作、支付操作等。
在现有技术中,标准信息可以是手势密码,在这种情况下,可以基于手势密码进行认证。具体地,终端上的操作系统或应用提供的手势密码输入界面上有9个关键节点区域,9个关键节点区域按照九宫格的形式分布的,如图1中的手势密码输入界面所示。第一用户可以通过设定一个连接至少两个关键节点区域的二维轨迹,来实现对手势密码的设定,设定手势密码后,在对第二用户进行认证时,第二用户需要通过在手势密码输入界面中,连接关键节点区域以重现该手势密码对应的手势,才能通过该认证。
但是,现有技术中采用的手势密码输入界面单一,对于攻击者而言,一般都很熟悉这种手势密码输入界面,这将会降低攻击者偷看及记忆第一 用户输入的手势密码的难度,和/或降低攻击者以穷举方式破解第一用户设定的手势密码的难度,进而导致认证可靠性较低。
发明内容
本申请实施例提供一种认证方法及装置,用以解决现有技术中采用的手势密码输入界面单一,导致认证可靠性较低的问题。
本申请实施例提供一种用于认证的信息生成方法及装置。
本申请实施例采用下述技术方案:
本申请实施例提供的一种认证方法,包括:
显示第一用户预先指定的图片;
检测第二用户针对所述图片的交互操作;
根据检测到的所述第二用户的交互操作,生成所述第二用户的交互操作信息;
通过将所述第二用户的交互操作信息与标准信息进行匹配,认证所述第二用户是否为所述第一用户,所述标准信息是根据所述第一用户针对所述图片的交互操作生成的。
本申请实施例提供的一种认证装置,包括:
显示模块,显示第一用户预先指定的图片;
检测模块,检测第二用户针对所述图片的交互操作;
生成模块,根据检测到的所述第二用户的交互操作,生成所述第二用户的交互操作信息;
认证模块,通过将所述第二用户的交互操作信息与标准信息进行匹配,认证所述第二用户是否为所述第一用户,所述标准信息是根据所述第一用户针对所述图片的交互操作生成的。
本申请实施例提供的一种用于认证的信息生成方法,包括:
获取所述第一用户指定的图片;
显示所述图片,以及在所述图片上确定一个或多个特征区域;
检测所述第一用户针对所述一个或多个特征区域的交互操作;
根据检测到的所述第一用户的交互操作,生成标准信息,以用于认证第二用户是否为所述第一用户。
本申请实施例提供的一种用于认证的信息生成装置,包括:
获取模块,获取所述第一用户指定的图片;
显示确定模块,显示所述图片,以及在所述图片上确定一个或多个特征区域;
检测模块,检测所述第一用户针对所述一个或多个特征区域的交互操作;
生成模块,根据检测到的所述第一用户的交互操作,生成标准信息,以用于认证第二用户是否为所述第一用户。
本申请实施例采用的上述至少一个技术方案能够达到以下有益效果:可以将第一用户指定的图片,作为第一用户自定义的手势密码输入界面,所述的交互操作可以包括手势,从而可以实现手势密码输入界面的多样化,由于不同图片对应的手势密码输入界面的特征区域的位置一般不同,第一用户指定的图片对应的手势密码输入界面的特征区域的位置与现有技术中的手势密码输入界面的特征区域的位置一般也不同,因此,攻击者未必熟悉该图片对应的手势密码输入界面,可以增加攻击者偷看及记忆第一用户输入的手势密码的难度,和/或增加攻击者以穷举方式破解第一用户设定的手势密码的难度,进而可以提高认证可靠性。因此,本申请可以部分或全部地解决现有技术中的问题。
附图说明
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申 请的不当限定。在附图中:
图1为现有技术中的手势密码输入界面示意图;
图2为本申请实施例提供的认证方法的流程示意图;
图3为本申请实施例提供的图2中的标准信息的生成流程示意图;
图4为本申请实施例提供的特定图片的两个示例;
图5为本申请实施例提供的在特定图片中确定以及标示的特征区域示意图;
图6为本申请实施例提供的对特征区域标示与否这两种情况的特定图片示意图;
图7为本申请实施例提供的用于认证的信息生成方法的流程示意图;
图8为本申请实施例提供的一种实际应用场景下,生成标准信息的详细流程示意图;
图9为另一种现有技术中使用的标准信息输入界面示意图;
图10为本申请实施例提供的认证装置结构示意图;
图11为本申请实施例提供的用于认证的信息生成装置结构示意图。
具体实施方式
为使本申请的目的、技术方案和优点更加清楚,下面将结合本申请具体实施例及相应的附图对本申请技术方案进行清楚、完整地描述。显然,所描述的实施例仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请的方案可以用于认证,比如,用于在第二用户(也即,待认证用户)进行特定操作时,对第二用户进行认证等。所述特定操作可以是:屏幕解锁操作、登录操作、个人信息修改操作、支付操作等。本申请的方案可以部分或全部地解决现有技术中的问题,下面对本申请的方案进行说 明。
图2为本申请实施例提供的认证方法的流程示意图,该流程的执行主体可以是认证相关的设备。所述设备包括但不限于:手机、平板电脑、智能手表、车载移动台、个人计算机等、大中型计算机、计算机集群等。执行主体并不构成对本申请的限定。
图2中的流程可以包括以下步骤:
S201:显示第一用户预先指定的图片。
为了便于描述,以下可以将步骤S201中的“第一用户预先指定的图片”称为:特定图片。
在本申请实施例中,在图2中的流程执行之前,可以预先基于第一用户的操作,生成用于所述认证的标准信息,进而,图2中的流程是根据标准信息,对第二用户进行认证的。在实际应用中,第二用户可能是第一用户;第二用户也可能是第一用户以外的其他用户,比如,想要假冒第一用户的攻击者。通过图2中的流程,可以认证第二用户是否为第一用户。
在本申请实施例中,标准信息可以是基于所述特定图片生成的,特定图片是由第一用户指定的。比如,第一用户可以将预先保存在本地或云端的某张图片指定为特定图片,也可以将通过特定途径新获取到某张图片指定为特定图片,比如,对于具有摄像头的执行主体,可以拍一张照片指定为特定图片,等等。
S202:检测第二用户针对所述图片的交互操作。
在本申请实施例中,在步骤S102中,可以检测第二用户针对所述图片上任意区域的交互操作,也可以只检测第二用户针对所述图片上一个或多个特征区域的交互操作。
S203:根据检测到的所述第二用户的交互操作,生成所述第二用户的交互操作信息。
在本申请实施例中,交互操作可以是诸如点击、滑动、按压等操作中的一种或多种,交互操作信息可以反映其对应的交互操作内容。
需要说明的是,列举的这些操作只是交互操作的示例,交互操作也可以是除了这些操作以外的其他操作。进一步地,还可以对点击、滑动、按压等操作进一步地细分,以便于用更具体的特征对交互操作内容进行描述(则交互操作内容的具体程度更高),比如,可以根据点击力度、点击接触时间、点击次数、点击频率等特征对点击操作进一步地细分,可以根据滑动轨迹、滑动接触时间、滑动接触力度、滑动距离等特征对滑动操作进一步地细分,可以根据按压时间、按压力度等特征对按压操作进一步地细分。
本申请对交互操作内容的具体程度并不做限定,一般地,当交互操作内容的具体程度越高时,对应生成的交互操作信息也可以越详细,则基于这些交互操作信息进行的认证的严格程度也可以越高,可以根据实际需求,对预先对交互操作内容的具体程度进行定义。
例如,若交互操作为点击操作。当定义的所述具体程度较低时,则可以只检测点击次数,而不检测点击力度、点击接触时间等;当定义的所述具体程度较高时,可以既检测点击次数,又检测点击力度、点击接触时间等。
又例如,若交互操作为滑动操作。当定义的所述具体程度较低时,则可以只检测滑动轨迹,而不检测滑动接触时间、滑动接触力度等;当定义的所述具体程度较高时,可以既检测滑动轨迹、又检测滑动接触时间、滑动接触力度等。
S204:通过将所述第二用户的交互操作信息与标准信息进行匹配,认证所述第二用户是否为所述第一用户,所述标准信息是根据所述第一用户针对所述图片的交互操作生成的。
在本申请实施例中,如前所述,在预先生成用于认证的标准信息后,在要对第二用户进行认证时,可以将生成标准标准信息时所基于的图片(也即,所述特定图片)显示(对应于步骤S201),第二用户需要针对显示的特定图片重现标准信息对应的交互操作,才能够通过认证(对应于步骤S202~S204)。其中,标准信息对应的交互操作为:生成的标准信息所基于的、第一用户针对所述图片的交互操作。
例如,可以将特定图片作为第一用户自定义的手势密码输入界面,在这种情况下,第一用户针对特定图片上一个或多个特征区域的交互操作可以视为手势,设定的标准信息可以视为手势密码,则进行认证时,将特定图片显示,第二用户需要通过针对特定图片上一个或多个特征区域进行交互操作,以重现第一用户的手势,才能够通过认证。
在本申请实施例中,根据前面的说明可知,第二用户的交互操作信息可以反映第二用户针对特定图片的交互操作内容,标准信息可以反映第一用户针对特定图片的交互操作内容。因此,通过将第二用户的交互操作信息与标准信息进行匹配,可以确定或推定第二用户是否重现了第一用户的操作,进而可以以此为认证依据,认证第二用户是否为第一用户。
需要说明的是,检测第二用户的交互操作所采用的具体检测方式,与生成标准信息时检测第一用户的交互操作所采用的具体检测方式一般是相同或相似的(否则,可能不便于对第二用户的交互操作信息与标准信息进行匹配,因为,此时第二用户的交互操作信息与标准信息的可比性可能较差),如此,便于对第二用户的交互操作信息与标准信息进行匹配,也可以提高本申请基于交互操作信息匹配进行认证的这种认证方式的可靠性。
通过上述方法,可以将第一用户指定的图片,作为第一用户自定义的手势密码输入界面,所述的交互操作可以包括手势,从而可以实现手势密 码输入界面的多样化,由于不同图片对应的手势密码输入界面的特征区域的位置一般不同,第一用户指定的图片对应的手势密码输入界面的特征区域的位置与现有技术中的手势密码输入界面的特征区域的位置一般也不同,因此,攻击者未必熟悉该图片对应的手势密码输入界面,可以增加攻击者偷看及记忆第一用户输入的手势密码的难度,和/或增加攻击者以穷举方式破解第一用户设定的手势密码的难度,进而可以提高认证可靠性。因此,本申请可以部分或全部地解决现有技术中的问题。
不仅如此,上述方法相比于现有技术还有更多的优点。具体地,现有技术中的手势的对应的操作种类也比较少,具体程度也较低,一般只包括滑动操作,对应生成的手势信息一般也仅限于对滑动轨迹进行描述,而不会描述诸如滑动时间、滑动接触时间、滑动接触力度等更多的特征信息。而本申请中所述的交互操作除了可以包括现有技术中的手势(滑动操作)以外,还可以包括更多的操作种类(比如,点击操作、按压操作等),而且对于包括的各种操作种类,还可以自定义通过这些操作对应生成的交互操作内容的具体程度,以使得生成的交互操作信息(相比于现有技术中的手势信息)可以更加详细,从而可以提高认证的严格程度,进而提高第一用户的信息安全性。
另外,对于用户而言,通过上述方法,可以不使用现有技术中单一的手势密码输入界面,而是可以自由地选择自己喜欢的图片,以生成相应自定义的手势密码输入界面,可定制性较好,有利于提高用户体验。
需要说明的是,图2中的流程的各步骤的执行主体均可以是同一设备,或者,所述各步骤也由不同设备作为执行主体。比如,步骤201的执行主体可以为设备1,步骤202~204的执行主体可以为设备2;又比如,步骤201~203的执行主体可以为设备1,步骤204的执行主体可以为设备2;等等。
基于上述方法,本申请实施例还提供了所述认证方法的一些具体实施方案,以及扩展方案,下面进行说明。
在本申请实施例中,前面已经提到,图2中的标准信息可以是根据第一用户针对所述图片的交互操作生成的,为了便于理解,下面对图2中的标准信息的生成流程进行说明,如图3所示。
图3为本申请实施例提供的图2中的标准信息的生成流程示意图,图3中的流程的执行主体与图2中的流程的执行主体可以是相同的设备,也可以是不同的设备。
图3中的流程可以包括以下步骤:
S301:获取所述第一用户指定的所述图片(也即,特定图片)。
在本申请实施例中,对特定图片的内容、格式等相关信息并不做限定。本申请实施例提供了特定图片的两个示例,如图4所示。
图4为本申请提供的特定图片的两个示例,分别为图4中左侧的狗的图片、图4中右侧的猫的图片。为了便于描述,以下的实施例也基于图4中的特定图片示例进行说明。
S302:显示所述图片,以及在所述图片上确定一个或多个特征区域。
在本申请实施例中,可以基于特定的图像特征区域检测算法,对特定图片进行特征检测,以在特定图片上确定出所述一个或多个特征区域,其中,所述特征区域可以指由执行主体自行指定或者由第一用户指定。这种确定特征区域的方式的优点是:减少了用户的操作和干预,提高了本申请的方案的自动化程度。
本申请对所述图像特征区域检测算法并不做限定,在此列举几种算法作为示例,图像特征区域检测算法可以是:尺度不变特征变化(Scale-invariant feature transform,SIFT)算法、SURF算法、FAST算法、ORB算法、Harris算法、BRISK算法等。由于不同的图像特征区域检测算 法所关注的特征可能不同,因此,不同的图像特征区域检测算法能检测出的特征区域也可能不同。比如,采用SURF算法一般可以检测出特定图片中的圆形区域,作为特征区域,采用Harris算法一般可以检测出特定图片中的棱角区域,作为特征区域,等等。在实施本申请的方案时,可以根据实际需求选择一种或多种图像特征区域检测算法,作为所述特定的图像特征区域检测算法。
需要说明的是,对于不同的特定图片,可以确定出的特征区域的数量也可能不相同,当特征区域过多(比如,一张特定图片上确定出十几个甚至几十个特征区域)时,可能不利于后续操作,当特征区域过少(比如,一张特定图片上仅确定出一两个特征区域)时,可能会使认证的严格程度未达到预期。针对这样的问题,可以允许对确定出的特征区域的数量、或者用于认证的特征区域的数量进行限定,比如,可以允许第一用户将在每张特定图片上确定出的特征区域的数量限定为9个或者其他数目,若超过限定数目,可以去掉一部分,若未达到限定数目,可以补充一部分,从而可以使特征区域既不过多也不过少。
在本申请实施例中,也可以不基于特定的图像特征区域检测算法,确定特征区域,而是可以由第一用户直接在特定图像上指定一个或多个区域,作为特征区域。这种确定特征区域的方式的优点是:第一用户对于特征区域的可控性较强,而且由于特征区域由第一用户指定,因此,也便于第一用户记忆特征区域。
根据上面对确定特征区域的方式的分析可知,在本申请实施例中,对于步骤S302,在所述图片上确定一个或多个特征区域,具体可以包括:对所述图片进行特征检测,通过所述特征检测,在所述特定图片上确定出所述一个或多个特征区域;和/或,确定所述第一用户在所述特定图片上指定的一个或多个区域,作为所述特征区域。
在本申请实施例中,在确定特征区域后,为了便于第一用户知晓确定出的特征区域,以及便于第一用户针对特征区域进行交互操作,还可以在显示的特定图片上标示确定出的特征区域。可以采用文字和/或图形和/或颜色等方式进行所述标示,所述标示可以用于表明其对应的区域为特征区域。
本申请实施例提供了在特定图片中确定以及标示的特征区域示意图,如图5所示,具体是以图4中的特定图片为例的。
在图5中,是用圆形的图形对在特定图片中确定的各特征区域分别标示的,其中,图5中左侧的特定图片中标示了5个特征区域,图5中右侧的特定图片中标示了3个特征区域。
S303:检测所述第一用户针对所述一个或多个特征区域的交互操作。
S304:根据检测到的所述第一用户的交互操作,生成所述标准信息。
在本申请实施例中,生成标准信息后,可以在满足预设条件时触发认证流程的执行。在实际应用中,为了调整认证的严格程度,还可以在认证前(比如,执行步骤S101前),执行:针对所述一个或多个特征区域进行设置,所述设置用于确定:是否在显示的所述第一用户预先指定的图片上标示所述一个或多个特征区域。
若通过设置,使得进行认证时,在显示的特定图片上标示特征区域,则第二用户通过标示可以直接知晓特定图片上的特征区域,则有利于第二用户重现第一用户针对特征区域的交互操作,在这种情况下,认证的严格程度相对较低。
若通过设置,使得进行认证时,不在显示的特定图片上标示特征区域,则第二用户无法直接知晓特定图片上的特征区域,若第二用户并非第一用户,则第二用户难以确定特定图片上的特征区域,进而也难以重现针对特征区域的交互操作,认证的严格程度相对较高,可以提高第一用户的信息 安全性。
本申请实施例提供了对特征区域标示与否这两种情况的特定图片示意图,如图6所示,具体是以图4中左侧的特定图片为例的。
在图6中,图6中的左侧是对特征区域标示的特定图片示意图,图6中的右侧是不对特征区域标示的特定图片示意图。
在本申请实施例中,前面已经提到,交互操作信息可以反映对应的交互操作内容,实现所述反映的具体方式可以有多种,以下列举两种具体方式作为示例。
第一种具体方式。针对特定图片上的各特征区域的操作顺序可以属于交互操作内容的一部分。交互操作信息可以仅反映对应的交互操作内容的这一部分。
在这种情况下,为了便于表示所述操作顺序,在特定图片上确定出一个或多个特征区域后,还可以为每个特征区域生成对应的标识信息,标识信息可以用于在特定图片上唯一确定该标识信息对应的特征区域。比如,标识信息可以是其对应的特征区域的坐标信息,也可以是与其对应的特征区域的坐标信息建立了唯一对应关系的数字、字母等字符或字符串,等等。
则在生成标准信息时,对于步骤S304,根据检测到的所述第一用户的交互操作,生成所述标准信息,具体可以包括:根据检测到的所述第一用户的交互操作,确定所述第一用户针对所述一个或多个特征区域的操作顺序;根据所述操作顺序和所述一个或多个特征区域对应的标识信息,生成用于表明所述操作顺序的特征区域标识信息序列,作为所述标准信息。
例如,假定在特定图片上确定出3个特征区域,生成这3个特征区域对应的标识信息,分别为数字“1”、“2”、“3”。假定用户针对这3个特征区域的交互操作为:依次对这3个特征区域进行一次点击操作。则第一用户针对这3个特征区域的操作顺序从前至后为:第1个特征区域、第2个 特征区域、第3个特征区域。用特征区域的标识信息对该操作顺序进行表示,即生成特征区域标识信息序列“1、2、3”或“123”,作为标准信息。需要说明的是,该例中的“1、2、3”、“123”是特征区域标识信息序列的示例而并非限定,在实际应用中,特征区域标识信息序列也可以以数字序列以外的其他形式表现,能够表明第一用户针对各特征区域的操作顺序即可。
相应地,在进行认证时,也可以采用第一种具体方式,生成第二用户的交互操作信息。则对于步骤103,根据检测到的所述第二用户的交互操作,生成所述第二用户的交互操作信息,具体可以包括:根据检测到的所述第二用户的交互操作,当确定所述第二用户的交互操作包含所述第二用户针对所述一个或多个特征区域的交互操作时,确定所述第二用户针对所述一个或多个特征区域的操作顺序;根据所述操作顺序和所述一个或多个特征区域对应的标识信息,生成用于表明所述操作顺序的特征区域标识信息序列,作为所述第二用户的交互操作信息。
第二种具体方式。交互操作信息除了反映上述的操作顺序以外,还可以反映更具体的交互操作内容。比如,当交互操作为滑动操作时,除了可以反映操作顺序(也即,滑动轨迹),还可以反映滑动接触力度。
则在生成标准信息时,对于步骤S304,根据检测到的所述第一用户的交互操作,生成所述标准信息,具体可以包括:根据检测到的所述第一用户的交互操作,确定所述第一用户针对所述一个或多个特征区域的操作顺序,以及所述一个或多个特征区域的操作特征表征值,所述操作特征表征值用于表征:所述第一用户针对所述操作特征表征值对应的特征区域进行所述交互操作时的操作特征;根据所述操作顺序、所述一个或多个特征区域对应的标识信息,以及所述一个或多个特征区域的操作特征表征值,生成用于表明所述操作顺序和所述操作特征的特征区域标识信息及操作特 征表征值序列,作为所述标准信息。
例如,假定在特定图片上确定出3个特征区域,生成这3个特征区域对应的标识信息,分别为数字“1”、“2”、“3”。假定用户针对这3个特征区域的交互操作为:从第1个特征区域滑动至从第2个特征区域,再从第2个特征区域滑动至第3个特征区域。则第一用户针对这3个特征区域的操作顺序从前至后为:第1个特征区域、第2个特征区域、第3个特征区域。进一步地,假定操作特征为滑动接触力度,将滑动接触力度按照力度大小分为“A”档、“B”档共两档,也即,操作特征表征值可以为“A”或“B”。
又假定从第1个特征区域滑动至从第2个特征区域时第一用户的滑动接触力度为“A”档,从第2个特征区域滑动至从第3个特征区域时第一用户的滑动接触力度为“B”档,则可以生成特征区域标识信息及操作特征表征值序列:“1、A、2、B、3”或“1A2B3”,作为标准信息。需要说明的是,该例中的“1、A、2、B、3”、“1A2B3”是特征区域标识信息及操作特征表征值序列的示例而并非限定,在实际应用中,特征区域标识信息及操作特征表征值序列也可以以数字字母序列以外的其他形式表现,能够表明第一用户针对各特征区域的操作顺序及操作特征即可。
相应地,在进行认证时,也可以采用第二种具体方式,生成第二用户的交互操作信息。在此不再赘述。
在本申请实施例,在生成标准信息时,为了防止第一用户误操作,一般可以让第一用户对生成的标准信息进行一次再确认操作(称为:标准信息二次确认)。具体地,可以重新生成一次标准信息,并对前后两次生成的标准信息进行比较,若比较结果相同,则确定可以将生成的标准信息用于认证。
基于上面对生成标准信息的说明,本申请实施例提供了一种用于认证 的信息生成方法,通过执行该信息生成方法可以生成标准信息,该信息生成方法的流程如图7所示。
图7中的流程可以包括以下步骤:
S701:获取所述第一用户指定的图片。
S702:显示所述图片,以及在所述图片上确定一个或多个特征区域。
S703:检测所述第一用户针对所述一个或多个特征区域的交互操作。
S704:根据检测到的所述第一用户的交互操作,生成标准信息,以用于认证第二用户是否为所述第一用户。
在本申请实施例中,对于步骤S702,在所述图片上确定一个或多个特征区域,具体可以包括:对所述图片进行特征检测,通过所述特征检测,在所述特定图片上确定出所述一个或多个特征区域;和/或,确定所述第一用户在所述特定图片上指定的一个或多个区域,作为所述特征区域。
进一步地,基于图7中的流程以及对上述的生成标准信息相关的扩展方案,本申请实施例还提供了一种实际应用场景下,生成标准信息的详细流程示意图,如图8所示。在该实际应用场景下,上述的交互操作为点击操作。
图8中的流程可以包括以下步骤:
S801:接收第一用户上传的自定义的图片。
S802:确定第一用户指定的图片特征检测算法,基于该图片特征检测算法,在接收的图片上确定出多个特征区域。
S803:显示该图片,并对特征区域进行标示,以及为特征区域生成对应的标识信息。
S804:检测第一用户针对特征区域进行的点击操作。
S805:根据特征区域的标识信息,以及检测到的第一用户点击特征区域的点击顺序,生成用于表明该点击顺序的特征区域标识信息序列,作为 标准信息。
S806:接收第一用户对标准信息的二次确认。
S807:根据第一用户的指示,对基于标准信息认证时是否在显示的该图片上标示特征区域进行设置。
在本申请实施例中,对于诸如上述的序列形式的标准信息和第二用户的交互操作信息,一般地,当两者完全相同时,可以确定或推定第二用户重现了第一用户的交互操作。在这种情况下,对于步骤204,通过将所述第二用户的交互操作信息与所述标准信息进行匹配,认证所述第二用户是否为所述第一用户,具体可以包括:通过将所述第二用户的交互操作信息与所述标准信息进行匹配,判定所述第二用户的交互操作信息与所述标准信息是否相同;若是,则认证所述第二用户为所述第一用户;否则,可以不认证所述第二用户为所述第一用户。
在本申请实施例中,在实际应用中,也未必要求标准信息和第二用户的交互操作信息相同,才能认证第二用户为第一用户,而是可以通过对标准信息和第二用户的交互操作信息进行匹配,判定第二用户的交互操作与第一用户的交互操作是否相同或相似,并以判定结果为依据进行认证。在这种情况下,对于步骤204,通过将所述第二用户的交互操作信息与所述标准信息进行匹配,认证所述第二用户是否为所述第一用户,具体可以包括:通过将所述第二用户的交互操作信息与所述标准信息进行匹配,判定所述第二用户的交互操作信息对应的交互操作与所述标准信息对应的交互操作是否相同,若是,则认证所述第二用户为所述第一用户;或者,通过将所述第二用户的交互操作信息与所述标准信息进行匹配,判定所述第二用户的交互操作信息对应的交互操作与所述标准信息对应的交互操作相似程度是否不小于预定相似程度阈值,若是,则认证所述第二用户为所述第一用户;否则,可以不认证所述第二用户为所述第一用户。
在本申请实施例中,一般地,针对所述图片的交互操作可以包括:在所述图片上一个或多个特征区域中进行的点击操作;和/或,当所述图片上有多个特征区域时,用于从一个特征区域滑动至另一个特征区域的滑动操作。除此之外,还可以包括在所述特定图片上一个或多个特征区域中进行的按压操作,等等。
在实际应用中,除了背景技术中提到的现有技术以外,还有另一种常用的用于认证的现有技术,但是,所述另一种现有技术与背景技术中提到的现有技术也存在类似地问题。
图9为所述另一种现有技术中使用的密码输入界面示意图。在这种情况下,密码是预先设定的数字序列,第二用户需要通过点击密码输入界面中的各数字区域,以输入该密码,才能通过认证。
但是,图9中的密码输入界面单一,攻击者一般也很熟悉这种密码输入界面,这可能会导致认证可靠性较低。
针对所述另一种现有技术的问题,通过本申请的方案,可以使得第一用户可以自定义密码输入界面,所述密码即可以为上述的标准信息,从而实现密码输入界面的可自定义化和多样化,由于攻击者未必熟悉第一用户自定义的密码输入界面,可以增加攻击者偷看及记忆第一用户输入的密码的难度,和/或增加攻击者以穷举方式破解第一用户设定的密码的难度,进而可以提高认证可靠性。因此,本申请也可以部分或全部地解决所述另一种现有技术中的问题。
以上为本申请实施例提供的认证方法、用于认证的信息生成方法,基于同样的思路,本申请实施例还提供相应的认证装置、用于认证的信息生成装置,如图10、图11所示。
图10为本申请实施例提供的认证装置结构示意图,包括:
显示模块1001,显示第一用户预先指定的图片;
检测模块1002,检测第二用户针对所述图片的交互操作;
生成模块1003,根据检测到的所述第二用户的交互操作,生成所述第二用户的交互操作信息;
认证模块1004,通过将所述第二用户的交互操作信息与标准信息进行匹配,认证所述第二用户是否为所述第一用户,所述标准信息是根据所述第一用户针对所述图片的交互操作生成的。
可选地,所述装置还包括:
标准信息模块1005,按照如下方式,根据所述第一用户针对所述图片的交互操作生成所述标准信息:
获取所述第一用户指定的所述图片;
显示所述图片,以及在所述图片上确定一个或多个特征区域;
检测所述第一用户针对所述一个或多个特征区域的交互操作;
根据检测到的所述第一用户的交互操作,生成所述标准信息。
可选地,标准信息模块1005,对所述图片进行特征检测,通过所述特征检测,在所述特定图片上确定出所述一个或多个特征区域;和/或,
确定所述第一用户在所述特定图片上指定的一个或多个区域,作为所述特征区域。
可选地,标准信息模块1005,在显示模块1001显示第一用户预先指定的图片前,针对所述一个或多个特征区域进行设置,所述设置用于确定:是否在显示的所述第一用户预先指定的图片上标示所述一个或多个特征区域。
可选地,标准信息模块1005,在所述图片上确定所述一个或多个特征区域后,为每个所述特征区域生成对应的标识信息;根据检测到的所述第一用户的交互操作,确定所述第一用户针对所述一个或多个特征区域的操作顺序;根据所述操作顺序和所述一个或多个特征区域对应的标识信息, 生成用于表明所述操作顺序的特征区域标识信息序列,作为所述标准信息;
根据检测到的所述第二用户的交互操作,当确定所述第二用户的交互操作包含所述第二用户针对所述一个或多个特征区域的交互操作时,确定所述第二用户针对所述一个或多个特征区域的操作顺序;
根据所述操作顺序和所述一个或多个特征区域对应的标识信息,生成用于表明所述操作顺序的特征区域标识信息序列,作为所述第二用户的交互操作信息。
可选地,认证模块1004,通过将所述第二用户的交互操作信息与标准信息进行匹配,判定所述第二用户的交互操作信息与所述标准信息是否相同;若是,则认证所述第二用户为所述第一用户。
可选地,认证模块1004,通过将所述第二用户的交互操作信息与标准信息进行匹配,判定所述第二用户的交互操作信息对应的交互操作与所述标准信息对应的交互操作是否相同,若是,则认证所述第二用户为所述第一用户;或者,通过将所述第二用户的交互操作信息与所述标准信息进行匹配,判定所述第二用户的交互操作信息对应的交互操作与所述标准信息对应的交互操作相似程度是否不小于预定相似程度阈值,若是,则认证所述第二用户为所述第一用户。
可选地,针对所述图片的交互操作包括:
在所述图片上一个或多个特征区域中进行的点击操作;和/或,
当所述图片上有多个特征区域时,用于从一个特征区域滑动至另一个特征区域的滑动操作。
图10中的装置具体可以位于认证相关的设备上。
图11为本申请实施例提供的用于认证的信息生成装置结构示意图,包括:
获取模块1101,获取所述第一用户指定的图片;
显示确定模块1102,显示所述图片,以及在所述图片上确定一个或多个特征区域;
检测模块1103,检测所述第一用户针对所述一个或多个特征区域的交互操作;
生成模块1104,根据检测到的所述第一用户的交互操作,生成标准信息,以用于认证第二用户是否为所述第一用户。
可选地,显示确定模块1102,对所述图片进行特征检测,通过所述特征检测,在所述特定图片上确定出所述一个或多个特征区域;和/或,确定所述第一用户在所述特定图片上指定的一个或多个区域,作为所述特征区域。
图11中的装置具体可以位于认证相关的设备上。
本申请提供的装置是与本申请提供的方法一一对应的,因此,所述装置也具有与所述方法类似的有益技术效果,由于上面已经对所述方法的有益技术效果进行了详细说明,因此,这里不再赘述所述装置的有益技术效果。
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图 中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读 光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
本领域技术人员应明白,本申请的实施例可提供为方法、系统或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
以上所述仅为本申请的实施例而已,并不用于限制本申请。对于本领域技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本申请的权利要求范围之内。

Claims (20)

  1. 一种认证方法,其特征在于,包括:
    显示第一用户预先指定的图片;
    检测第二用户针对所述图片的交互操作;
    根据检测到的所述第二用户的交互操作,生成所述第二用户的交互操作信息;
    通过将所述第二用户的交互操作信息与标准信息进行匹配,认证所述第二用户是否为所述第一用户,所述标准信息是根据所述第一用户针对所述图片的交互操作生成的。
  2. 如权利要求1所述的方法,其特征在于,按照如下方式,根据所述第一用户针对所述图片的交互操作生成所述标准信息:
    获取所述第一用户指定的所述图片;
    显示所述图片,以及在所述图片上确定一个或多个特征区域;
    检测所述第一用户针对所述一个或多个特征区域的交互操作;
    根据检测到的所述第一用户的交互操作,生成所述标准信息。
  3. 如权利要求2所述的方法,其特征在于,在所述图片上确定一个或多个特征区域,具体包括:
    对所述图片进行特征检测,通过所述特征检测,在所述特定图片上确定出所述一个或多个特征区域;和/或,
    确定所述第一用户在所述特定图片上指定的一个或多个区域,作为所述特征区域。
  4. 如权利要求2所述的方法,其特征在于,显示第一用户预先指定的图片前,所述方法还包括:
    针对所述一个或多个特征区域进行设置,所述设置用于确定:是否在显示的所述第一用户预先指定的图片上标示所述一个或多个特征区域。
  5. 如权利要求2所述的方法,其特征在于,在所述图片上确定所述一个或多个特征区域后,所述方法还包括:
    为每个所述特征区域生成对应的标识信息;
    根据检测到的所述第一用户的交互操作,生成所述标准信息,具体包括:
    根据检测到的所述第一用户的交互操作,确定所述第一用户针对所述一个或多个特征区域的操作顺序;
    根据所述操作顺序和所述一个或多个特征区域对应的标识信息,生成用于表明所述操作顺序的特征区域标识信息序列,作为所述标准信息;
    根据检测到的所述第二用户的交互操作,生成所述第二用户的交互操作信息,具体包括:
    根据检测到的所述第二用户的交互操作,当确定所述第二用户的交互操作包含所述第二用户针对所述一个或多个特征区域的交互操作时,确定所述第二用户针对所述一个或多个特征区域的操作顺序;
    根据所述操作顺序和所述一个或多个特征区域对应的标识信息,生成用于表明所述操作顺序的特征区域标识信息序列,作为所述第二用户的交互操作信息。
  6. 如权利要求5所述的方法,其特征在于,通过将所述第二用户的交互操作信息与标准信息进行匹配,认证所述第二用户是否为所述第一用户,具体包括:
    通过将所述第二用户的交互操作信息与标准信息进行匹配,判定所述第二用户的交互操作信息与所述标准信息是否相同;
    若是,则认证所述第二用户为所述第一用户。
  7. 如权利要求1所述的方法,其特征在于,通过将所述第二用户的交互操作信息与标准信息进行匹配,认证所述第二用户是否为所述第一用 户,具体包括:
    通过将所述第二用户的交互操作信息与标准信息进行匹配,判定所述第二用户的交互操作信息对应的交互操作与所述标准信息对应的交互操作是否相同,若是,则认证所述第二用户为所述第一用户;或者,
    通过将所述第二用户的交互操作信息与所述标准信息进行匹配,判定所述第二用户的交互操作信息对应的交互操作与所述标准信息对应的交互操作相似程度是否不小于预定相似程度阈值,若是,则认证所述第二用户为所述第一用户。
  8. 如权利要求1~7任一项所述的方法,其特征在于,针对所述图片的交互操作包括:
    在所述图片上一个或多个特征区域中进行的点击操作;和/或,
    当所述图片上有多个特征区域时,用于从一个特征区域滑动至另一个特征区域的滑动操作。
  9. 一种用于认证的信息生成方法,其特征在于,包括:
    获取所述第一用户指定的图片;
    显示所述图片,以及在所述图片上确定一个或多个特征区域;
    检测所述第一用户针对所述一个或多个特征区域的交互操作;
    根据检测到的所述第一用户的交互操作,生成标准信息,以用于认证第二用户是否为所述第一用户。
  10. 如权利要求9所述的方法,其特征在于,在所述图片上确定一个或多个特征区域,具体包括:
    对所述图片进行特征检测,通过所述特征检测,在所述特定图片上确定出所述一个或多个特征区域;和/或,
    确定所述第一用户在所述特定图片上指定的一个或多个区域,作为所述特征区域。
  11. 一种认证装置,其特征在于,包括:
    显示模块,显示第一用户预先指定的图片;
    检测模块,检测第二用户针对所述图片的交互操作;
    生成模块,根据检测到的所述第二用户的交互操作,生成所述第二用户的交互操作信息;
    认证模块,通过将所述第二用户的交互操作信息与标准信息进行匹配,认证所述第二用户是否为所述第一用户,所述标准信息是根据所述第一用户针对所述图片的交互操作生成的。
  12. 如权利要求10所述的装置,其特征在于,所述装置还包括:
    标准信息模块,按照如下方式,根据所述第一用户针对所述图片的交互操作生成所述标准信息:
    获取所述第一用户指定的所述图片;
    显示所述图片,以及在所述图片上确定一个或多个特征区域;
    检测所述第一用户针对所述一个或多个特征区域的交互操作;
    根据检测到的所述第一用户的交互操作,生成所述标准信息。
  13. 如权利要求12所述的装置,其特征在于,所述标准信息模块,对所述图片进行特征检测,通过所述特征检测,在所述特定图片上确定出所述一个或多个特征区域;和/或,
    确定所述第一用户在所述特定图片上指定的一个或多个区域,作为所述特征区域。
  14. 如权利要求12所述的装置,其特征在于,所述标准信息模块,在所述显示模块显示第一用户预先指定的图片前,针对所述一个或多个特征区域进行设置,所述设置用于确定:是否在显示的所述第一用户预先指定的图片上标示所述一个或多个特征区域。
  15. 如权利要求12所述的装置,其特征在于,所述标准信息模块, 在所述图片上确定所述一个或多个特征区域后,为每个所述特征区域生成对应的标识信息;根据检测到的所述第一用户的交互操作,确定所述第一用户针对所述一个或多个特征区域的操作顺序;根据所述操作顺序和所述一个或多个特征区域对应的标识信息,生成用于表明所述操作顺序的特征区域标识信息序列,作为所述标准信息;
    根据检测到的所述第二用户的交互操作,当确定所述第二用户的交互操作包含所述第二用户针对所述一个或多个特征区域的交互操作时,确定所述第二用户针对所述一个或多个特征区域的操作顺序;
    根据所述操作顺序和所述一个或多个特征区域对应的标识信息,生成用于表明所述操作顺序的特征区域标识信息序列,作为所述第二用户的交互操作信息。
  16. 如权利要求15所述的装置,其特征在于,所述认证模块,通过将所述第二用户的交互操作信息与标准信息进行匹配,判定所述第二用户的交互操作信息与所述标准信息是否相同;若是,则认证所述第二用户为所述第一用户。
  17. 如权利要求11所述的装置,其特征在于,所述认证模块,通过将所述第二用户的交互操作信息与标准信息进行匹配,判定所述第二用户的交互操作信息对应的交互操作与所述标准信息对应的交互操作是否相同,若是,则认证所述第二用户为所述第一用户;或者,通过将所述第二用户的交互操作信息与所述标准信息进行匹配,判定所述第二用户的交互操作信息对应的交互操作与所述标准信息对应的交互操作相似程度是否不小于预定相似程度阈值,若是,则认证所述第二用户为所述第一用户。
  18. 如权利要求11~17任一项所述的装置,其特征在于,针对所述图片的交互操作包括:
    在所述图片上一个或多个特征区域中进行的点击操作;和/或,
    当所述图片上有多个特征区域时,用于从一个特征区域滑动至另一个特征区域的滑动操作。
  19. 一种用于认证的信息生成装置,其特征在于,包括:
    获取模块,获取所述第一用户指定的图片;
    显示确定模块,显示所述图片,以及在所述图片上确定一个或多个特征区域;
    检测模块,检测所述第一用户针对所述一个或多个特征区域的交互操作;
    生成模块,根据检测到的所述第一用户的交互操作,生成标准信息,以用于认证第二用户是否为所述第一用户。
  20. 如权利要求19所述的装置,其特征在于,所述显示确定模块,对所述图片进行特征检测,通过所述特征检测,在所述特定图片上确定出所述一个或多个特征区域;和/或,确定所述第一用户在所述特定图片上指定的一个或多个区域,作为所述特征区域。
PCT/CN2017/079862 2016-05-05 2017-04-10 一种认证、用于认证的信息生成方法及装置 Ceased WO2017190577A1 (zh)

Priority Applications (8)

Application Number Priority Date Filing Date Title
MYPI2018001825A MY192160A (en) 2016-05-05 2017-04-10 Authentication method and device, and method and device for generating information for authentication
KR1020187032616A KR20190005870A (ko) 2016-05-05 2017-04-10 인증 방법 및 디바이스, 인증용 정보를 생성하기 위한 방법 및 디바이스
JP2018558116A JP7046006B2 (ja) 2016-05-05 2017-04-10 認証方法及びデバイス並びに認証用情報を生成する方法及びデバイス
SG11201808945UA SG11201808945UA (en) 2016-05-05 2017-04-10 Authentication method and device, method and device for generating information for authentication
EP17792404.0A EP3454244B1 (en) 2016-05-05 2017-04-10 Authentication method and device, method and device for generating information for authentication
US16/176,766 US11416598B2 (en) 2016-05-05 2018-10-31 Authentication and generation of information for authentication
PH12018502324A PH12018502324A1 (en) 2016-05-05 2018-11-05 Authentication method and device, method and device for generating information for authentication
US16/721,663 US11392680B2 (en) 2016-05-05 2019-12-19 Authentication and generation of information for authentication

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610292695.4A CN107346386A (zh) 2016-05-05 2016-05-05 一种认证、用于认证的信息生成方法及装置
CN201610292695.4 2016-05-05

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/176,766 Continuation US11416598B2 (en) 2016-05-05 2018-10-31 Authentication and generation of information for authentication

Publications (1)

Publication Number Publication Date
WO2017190577A1 true WO2017190577A1 (zh) 2017-11-09

Family

ID=60202694

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/079862 Ceased WO2017190577A1 (zh) 2016-05-05 2017-04-10 一种认证、用于认证的信息生成方法及装置

Country Status (10)

Country Link
US (2) US11416598B2 (zh)
EP (1) EP3454244B1 (zh)
JP (1) JP7046006B2 (zh)
KR (1) KR20190005870A (zh)
CN (1) CN107346386A (zh)
MY (1) MY192160A (zh)
PH (1) PH12018502324A1 (zh)
SG (1) SG11201808945UA (zh)
TW (1) TW201740301A (zh)
WO (1) WO2017190577A1 (zh)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107346386A (zh) 2016-05-05 2017-11-14 阿里巴巴集团控股有限公司 一种认证、用于认证的信息生成方法及装置
US10523606B2 (en) 2018-01-02 2019-12-31 Snap Inc. Generating interactive messages with asynchronous media content
US10567321B2 (en) * 2018-01-02 2020-02-18 Snap Inc. Generating interactive messages with asynchronous media content
CN109215197B (zh) * 2018-09-17 2021-09-03 广州小鹏汽车科技有限公司 一种鉴权方法、电子设备及计算机可读存储介质
KR102619558B1 (ko) * 2018-11-16 2024-01-02 현대모비스 주식회사 자율주행차의 제어시스템 및 그 제어방법
US11265274B1 (en) 2020-02-28 2022-03-01 Snap Inc. Access and routing of interactive messages
KR20230168859A (ko) * 2022-06-08 2023-12-15 현대모비스 주식회사 자동차 조명 장치 및 그 작동 방법

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102243754A (zh) * 2010-05-11 2011-11-16 汤姆森特许公司 生成秘密值的方法和装置
CN104156654A (zh) * 2013-05-13 2014-11-19 中兴通讯股份有限公司 一种解密方法及装置
CN104200150A (zh) * 2014-09-01 2014-12-10 湖北盛天网络技术股份有限公司 验证码处理方法和装置

Family Cites Families (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW299410B (zh) * 1994-04-04 1997-03-01 At & T Corp
TW510954B (en) 2000-04-08 2002-11-21 Motovario S P A Reduction gear comprising a crown gear and worm screw first stage and a second stage with an epicycloidal group
US7243239B2 (en) * 2002-06-28 2007-07-10 Microsoft Corporation Click passwords
US20040230843A1 (en) 2003-08-20 2004-11-18 Wayne Jansen System and method for authenticating users using image selection
JP4360871B2 (ja) * 2003-09-10 2009-11-11 富士通テン株式会社 情報端末における入力装置
US9058765B1 (en) 2008-03-17 2015-06-16 Taaz, Inc. System and method for creating and sharing personalized virtual makeovers
US8683582B2 (en) * 2008-06-16 2014-03-25 Qualcomm Incorporated Method and system for graphical passcode security
US8458485B2 (en) * 2009-06-17 2013-06-04 Microsoft Corporation Image-based unlock functionality on a computing device
US9146669B2 (en) * 2009-12-29 2015-09-29 Bizmodeline Co., Ltd. Password processing method and apparatus
JP5367169B2 (ja) * 2010-06-18 2013-12-11 シャープ株式会社 情報端末装置およびこれを利用した個人認証方法
JP5782783B2 (ja) * 2011-03-31 2015-09-24 カシオ計算機株式会社 タッチ処理装置及びプログラム
AU2011202415B1 (en) * 2011-05-24 2012-04-12 Microsoft Technology Licensing, Llc Picture gesture authentication
US9250801B2 (en) 2011-11-30 2016-02-02 Novatek Microelectronics Corp. Unlocking method, portable electronic device and touch-sensitive device
JP2013190992A (ja) * 2012-03-14 2013-09-26 Hitachi Consumer Electronics Co Ltd 情報処理端末、その認証方法、及び認証プログラム
US8819812B1 (en) * 2012-08-16 2014-08-26 Amazon Technologies, Inc. Gesture recognition for device input
CA3202407A1 (en) 2012-08-24 2014-02-27 Samsung Electronics Co., Ltd. Apparatus and method for providing interaction information by using image on device display
CN103729130A (zh) 2012-10-12 2014-04-16 华为技术有限公司 触敏设备解锁的方法及触敏设备
US9311472B2 (en) * 2012-12-21 2016-04-12 Abbott Laboratories Methods and apparatus for authenticating user login
KR20150003957A (ko) 2013-07-01 2015-01-12 삼성전자주식회사 전자 장치의 잠금 화면 운용 방법 및 장치
JP6248478B2 (ja) * 2013-08-30 2017-12-20 富士通株式会社 情報処理装置、認証方法、及び認証プログラム
CN103488404B (zh) 2013-09-22 2016-03-02 华为技术有限公司 一种解除电子设备锁定的方法及其装置
US9607138B1 (en) * 2013-12-18 2017-03-28 Amazon Technologies, Inc. User authentication and verification through video analysis
US10489912B1 (en) 2013-12-20 2019-11-26 Amazon Technologies, Inc. Automated rectification of stereo cameras
EP3134841A2 (en) * 2014-04-22 2017-03-01 Antique Books Inc. Method and system of providing a picture password for relatively smaller displays
JP6448767B2 (ja) * 2014-04-24 2019-01-09 ナント・ホールデイングス・アイ・ピー・エル・エル・シー 画像物体認識におけるロバスト特徴特定
TWI528213B (zh) 2014-05-30 2016-04-01 由田新技股份有限公司 手持式身分驗證裝置、身分驗證方法與身分驗證系統
CN104869562A (zh) 2015-04-24 2015-08-26 小米科技有限责任公司 一种进行信息传输的方法、装置和系统
KR102355039B1 (ko) 2015-06-11 2022-01-25 삼성전자주식회사 잠금 화면 출력 제어 방법 및 이를 지원하는 전자 장치
US11042288B2 (en) 2016-02-04 2021-06-22 Huawei Technologies Co., Ltd. Information processing method and electronic device for obtaining a touch gesture operation on a suspended button
JP2017151556A (ja) * 2016-02-22 2017-08-31 富士通株式会社 電子機器、認証方法および認証プログラム
CN105809017A (zh) * 2016-03-03 2016-07-27 联发科技(新加坡)私人有限公司 电子设备及其屏幕解锁方法
CN107346386A (zh) 2016-05-05 2017-11-14 阿里巴巴集团控股有限公司 一种认证、用于认证的信息生成方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102243754A (zh) * 2010-05-11 2011-11-16 汤姆森特许公司 生成秘密值的方法和装置
CN104156654A (zh) * 2013-05-13 2014-11-19 中兴通讯股份有限公司 一种解密方法及装置
CN104200150A (zh) * 2014-09-01 2014-12-10 湖北盛天网络技术股份有限公司 验证码处理方法和装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3454244A4 *

Also Published As

Publication number Publication date
US11416598B2 (en) 2022-08-16
US20190065729A1 (en) 2019-02-28
JP7046006B2 (ja) 2022-04-01
EP3454244A1 (en) 2019-03-13
EP3454244B1 (en) 2022-09-14
EP3454244A4 (en) 2019-11-20
JP2019515394A (ja) 2019-06-06
SG11201808945UA (en) 2018-11-29
PH12018502324A1 (en) 2019-03-25
KR20190005870A (ko) 2019-01-16
CN107346386A (zh) 2017-11-14
TW201740301A (zh) 2017-11-16
MY192160A (en) 2022-08-03
US11392680B2 (en) 2022-07-19
US20200134161A1 (en) 2020-04-30

Similar Documents

Publication Publication Date Title
WO2017190577A1 (zh) 一种认证、用于认证的信息生成方法及装置
US10313882B2 (en) Dynamic unlock mechanisms for mobile devices
US10218506B1 (en) Cross-device authentication
US11057948B2 (en) Method and apparatus for connecting to wireless access point
US9264419B1 (en) Two factor authentication with authentication objects
CN111651797B (zh) 一种信息展示方法及装置
KR102258430B1 (ko) 신원 인증을 위한 방법 및 장치
US10296162B2 (en) User authentication security system
KR102135998B1 (ko) 바코드 생성 및 바코드에 기초한 인증
US10587594B1 (en) Media based authentication
US9202035B1 (en) User authentication based on biometric handwriting aspects of a handwritten code
KR20190085543A (ko) 보안 질문들을 생성하고 아이덴티티들을 검증하기 위한 방법 및 장치
CN104636715A (zh) 动态手写验证和基于手写的用户认证
US9576123B2 (en) Pattern-based password with dynamic shape overlay
US20160335611A1 (en) User attribute value transfer method and terminal
WO2019165875A1 (zh) 一种交易处理方法、服务器、客户端及系统
WO2016101813A1 (zh) 用户界面解锁的方法及装置
WO2017008630A1 (zh) 隐藏设置方法及装置、应用程序内容处理方法及装置
CN112685725B (zh) 一种安全验证的方法与设备
CN110880023A (zh) 一种检测证件图片的方法及装置
WO2017129068A1 (zh) 事件执行方法和装置及系统
HK1246434A1 (zh) 一种认证、用於认证的资讯生成方法及装置
JP2020046998A (ja) 認証装置、認証方法および認証プログラム
TW201734713A (zh) 資訊輸入方法、設備和系統
Escalante et al. MyLock

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 2018558116

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20187032616

Country of ref document: KR

Kind code of ref document: A

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17792404

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2017792404

Country of ref document: EP

Effective date: 20181205