CN105245346A - Identity authentication method and user terminal - Google Patents
Identity authentication method and user terminal Download PDFInfo
- Publication number
- CN105245346A CN105245346A CN201510678799.4A CN201510678799A CN105245346A CN 105245346 A CN105245346 A CN 105245346A CN 201510678799 A CN201510678799 A CN 201510678799A CN 105245346 A CN105245346 A CN 105245346A
- Authority
- CN
- China
- Prior art keywords
- identity authentication
- information
- matched
- mode
- user terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000013475 authorization Methods 0.000 claims description 20
- 238000001514 detection method Methods 0.000 claims description 18
- 230000004044 response Effects 0.000 claims description 8
- 238000010586 diagram Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 4
- 238000013500 data storage Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Landscapes
- Collating Specific Patterns (AREA)
Abstract
The embodiment of the invention discloses an identity authentication method and a user terminal. The identity authentication method comprises the following steps of acquiring current position information of the user terminal; after that, judging whether an identity authentication mode, the bound position information of which is matched with the current position information, exists in a plurality of preset identity authentication modes, if so, then selecting the identity authentication mode with the bound position information matched with the current position information as a first target identity authentication mode; receiving a first identity authentication request, and detecting whether first identity authentication information carried in the first identity authentication request is matched with the authentication information corresponding to the first target identity authentication mode, if so, then the identity authentication is successful. In the embodiment of the invention, a plurality of identity authentication modes can be preset in the user terminal and the user terminal can select different identity authentication modes according to different position information, therefore, the diversity of the terminal identity authentication modes can be increased.
Description
Technical Field
The present invention relates to the field of electronic technologies, and in particular, to an identity authentication method and a user terminal.
Background
With the rapid development of electronic technology and the rapid popularization of terminals, the functions of terminals are increasingly enhanced. For example, the user may access external network data resources, take pictures, and communicate with friends, etc. by using the terminal. In practical application, while the terminal brings convenience to the user, the personal information or data of the user stored in the user terminal may be stolen by lawbreakers, thereby causing immeasurable loss. At present, in order to prevent any user from operating the user terminal at will and reading data stored in the user terminal, identity authentication (such as fingerprint identification) is set in the user terminal, and the user terminal can be operated only after the identity authentication is successful. However, in the prior art, the user terminal can only set one authentication mode, that is, only one authentication mode can be adopted in any case, so that the current terminal authentication mode is too single
Disclosure of Invention
The embodiment of the invention provides an identity authentication method and a user terminal, which can increase the diversity of terminal identity authentication modes.
In a first aspect, an embodiment of the present invention discloses an identity authentication method, including:
acquiring current position information of a user terminal;
judging whether an identity authentication mode with bound position information matched with the current position information exists in a plurality of preset identity authentication modes, if so, selecting the identity authentication mode with the bound position information matched with the current position information as a first target identity authentication mode;
and receiving a first identity authentication request, detecting whether first identity authentication information carried in the first identity authentication request is matched with authentication information corresponding to the first target identity authentication mode, and if so, successfully authenticating the identity.
With reference to the implementation manner of the first aspect, in a first possible implementation manner of the first aspect, the following steps may be further performed:
if the bound position information does not exist in the preset identity authentication modes, acquiring the current time of the user terminal;
selecting a second target identity authentication mode matched with the current time from the preset identity authentication modes;
and receiving a second identity authentication request, detecting whether second identity authentication information carried in the second identity authentication request is matched with authentication information corresponding to the second target identity authentication mode, and if so, successfully authenticating the identity.
With reference to the implementation manner of the first aspect, in a second possible implementation manner of the first aspect, the detecting whether the first identity authentication information carried in the first identity authentication request matches the authentication information corresponding to the first target identity authentication mode includes:
detecting whether the touch pressure value is within a pressure value range corresponding to the first target identity authentication mode, if so, detecting whether the fingerprint information is matched with the fingerprint information corresponding to the first target identity authentication mode, and if so, successfully matching; or,
and detecting whether the fingerprint information is matched with the fingerprint information corresponding to the first target identity authentication mode, if so, detecting whether the touch pressure value is within a pressure value range corresponding to the first target identity authentication mode, and if so, successfully matching.
With reference to any one implementation manner of the first aspect, the first possible implementation manner of the first aspect, and the second possible implementation manner of the first aspect, in a third possible implementation manner of the first aspect, the following steps may be further performed:
if the first identity authentication information is not matched with the authentication information corresponding to the first target identity authentication mode, collecting biological characteristic information of the user;
detecting whether the biological characteristic information is matched with biological characteristic information corresponding to a preset safe user;
and if not, outputting alarm information.
With reference to any one implementation manner of the first aspect, the first possible implementation manner of the first aspect, and the second possible implementation manner of the first aspect, in a fourth possible implementation manner of the first aspect, the following steps may be further performed:
if the first identity authentication information is not matched with the authentication information corresponding to the first target identity authentication mode, sending an authentication request to a pre-bound authorization terminal, wherein the authentication request is used for indicating that the first target identity authentication request fails to authenticate;
and when receiving an indication message which is sent by the authorization terminal in response to the authentication request and indicates that the current authenticated user is a safe user, the identity authentication is successful.
In a second aspect, an embodiment of the present invention further discloses a user terminal, including:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring the current position information of a user terminal;
the judging unit is used for judging whether an identity authentication mode with the bound position information matched with the current position information exists in a plurality of preset identity authentication modes;
the selecting unit is used for selecting the identity authentication mode with the bound position information matched with the current position information as a first target identity authentication mode if the judging unit judges that the bound position information matched with the current position information exists in the preset identity authentication modes;
a receiving unit configured to receive a first identity authentication request;
and the detection unit is used for detecting whether the first identity authentication information carried in the first identity authentication request is matched with the authentication information corresponding to the first target identity authentication mode, and if so, the identity authentication is successful.
With reference to the user terminal of the second aspect, in a first possible user terminal of the second aspect,
the obtaining unit is further configured to obtain the current time of the user terminal if the determining unit determines that the bound location information does not exist in the plurality of preset identity authentication modes, where the identity authentication mode is matched with the current location information;
the selecting unit is further used for selecting a second target identity authentication mode matched with the current time from the preset identity authentication modes;
the receiving unit is further configured to receive a second identity authentication request;
the detection unit is further configured to detect whether second identity authentication information carried in the second identity authentication request matches authentication information corresponding to the second target identity authentication mode, and if the second identity authentication information matches the authentication information corresponding to the second target identity authentication mode, the identity authentication is successful.
With reference to the user terminal of the second aspect, in a second possible user terminal of the second aspect, the first identity authentication information includes a touch pressure value when the first identity authentication request is input and fingerprint information when the first identity authentication request is input, the detection unit is specifically configured to detect whether the touch pressure value is within a pressure value range corresponding to the first target identity authentication mode, and if the touch pressure value is within the pressure value range corresponding to the first target identity authentication mode, detect whether the fingerprint information is matched with the fingerprint information corresponding to the first target identity authentication mode, and if so, the matching is successful; or,
the detection unit is specifically configured to detect whether the fingerprint information matches the fingerprint information corresponding to the first target identity authentication mode, and if so, detect whether the touch pressure value is within a pressure value range corresponding to the first target identity authentication mode, and if so, successfully match.
With reference to any one of the user terminal of the second aspect, the first possible user terminal of the second aspect, and the second possible user terminal of the second aspect, in a third possible user terminal of the second aspect, the user terminal further includes:
the acquisition unit is used for acquiring the biological characteristic information of the user if the detection unit detects that the first identity authentication information is not matched with the authentication information corresponding to the first target identity authentication mode;
the detection unit is also used for detecting whether the biological characteristic information is matched with the biological characteristic information corresponding to a preset safe user;
and the output unit is used for outputting alarm information if the detection unit detects that the biological characteristic information is not matched with the biological characteristic information corresponding to the preset safe user.
With reference to any one of the user terminal of the second aspect, the first possible user terminal of the second aspect, and the second possible user terminal of the second aspect, in a fourth possible user terminal of the second aspect, the user terminal further includes:
a sending unit, configured to send an authentication request to a pre-bound authorization terminal if the detecting unit detects that the first identity authentication information is not matched with authentication information corresponding to the first target identity authentication mode, where the authentication request is used to indicate that the first target identity authentication request fails to authenticate;
the receiving unit is further configured to, when receiving an indication message indicating that the current authenticated user is a secure user, which is sent by the authorization terminal in response to the authentication request, successfully authenticate the identity.
In the embodiment of the invention, after the current position information of the user terminal is acquired; judging whether an identity authentication mode with the bound position information matched with the current position information exists in a plurality of preset identity authentication modes, if so, selecting the identity authentication mode with the bound position information matched with the current position information as a first target identity authentication mode; and receiving a first identity authentication request, detecting whether the first identity authentication information carried in the first identity authentication request is matched with the authentication information corresponding to the first target identity authentication mode, and if so, successfully authenticating the identity. In the embodiment of the invention, a plurality of identity authentication modes can be preset in the user terminal, and the user terminal can select different identity authentication modes according to different position information, so that the diversity of terminal identity authentication modes can be increased.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flow chart of an identity authentication method disclosed in an embodiment of the present invention;
FIG. 2 is a flow chart of another identity authentication method disclosed in the embodiment of the present invention;
fig. 3 is a schematic structural diagram of a user terminal according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of another user terminal disclosed in the embodiment of the present invention;
fig. 5 is a schematic structural diagram of another user terminal disclosed in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses an identity authentication method and a user terminal. In the embodiment of the invention, a plurality of identity authentication modes can be preset in the user terminal, and the user terminal can select different identity authentication modes according to different position information, so that the diversity of terminal identity authentication modes can be increased.
Referring to fig. 1, fig. 1 is a schematic flow chart illustrating an identity authentication method according to an embodiment of the present invention. The method shown in fig. 1 may be applied to user terminals such as smart phones (e.g., Android phones, iOS phones, etc.), tablet computers, palmtop computers, Mobile Internet Devices (MID), PADs, etc. As shown in fig. 1, the identity authentication method may include the following steps:
s101, obtaining current position information of the user terminal.
In the embodiment of the invention, the position information is used for reflecting the current geographic position of the user terminal, can be the longitude and latitude coordinates of the current position of the user terminal, and can determine the actual position of the user terminal through the longitude and latitude coordinates; but also the current actual location of the user terminal including the area, street, house number, etc.
S102, judging whether an identity authentication mode with the bound position information matched with the current position information exists in a plurality of preset identity authentication modes.
In the embodiment of the invention, a plurality of identity authentication modes can be preset in the user terminal, wherein authentication information corresponding to different identity authentication modes can be different. That is, the preset authentication information is different in different authentication modes. For example, if the identity authentication mode a and the identity authentication mode B are two different identity authentication modes, where the authentication information included in the identity authentication mode a is fingerprint information, the authentication information included in the identity authentication mode B may be any other authentication information except the fingerprint information; the authentication information contained in the identity authentication mode B may also be a combination of fingerprint information and any other authentication information; the invention is not limited.
In the embodiment of the invention, the binding relationship between the identity authentication mode and the position information can be preset in the user terminal, namely, the identity authentication modes corresponding to different position information are different. It can also be said that the authentication mode has a default binding relationship with the location information. For example, when the current location information indicates that the user terminal is at home, an authentication information containing a digital password may be selected, that is, the user only needs to input a corresponding number to successfully authenticate the user terminal. If the current location information indicates that the user terminal is currently in a public place, a relatively secure identity authentication mode may be selected, for example, the identity authentication mode may need to include one or more combinations of fingerprint information, iris information, or other biometric information corresponding to the authentication information.
In the embodiment of the invention, after the current position information of the user terminal is acquired, whether the bound position information and the identity authentication mode matched with the current position information exist in the plurality of preset identity authentication modes can be judged.
S103, if the current location information exists, selecting an identity authentication mode with the bound location information matched with the current location information as a first target identity authentication mode.
In the embodiment of the invention, because the binding relationship between the identity authentication mode and the position information can be preset, that is, after the current position information is acquired, whether the identity authentication mode with the bound position information matched with the current position information exists in the preset identity authentication modes or not can be judged, and if the identity authentication mode with the bound position information matched with the current position information exists, the identity authentication mode with the bound position information matched with the current position information can be selected as the first target identity authentication mode.
In the embodiment of the present invention, since a plurality of identity authentication modes are preset in the user terminal, that is, at least one identity authentication mode corresponding to the same location information may be used, or none of the identity authentication modes may exist.
S104, receiving a first identity authentication request.
S105, whether the first identity authentication information carried in the first identity authentication request is matched with the authentication information corresponding to the first target identity authentication mode is detected.
And S106, if the identity authentication is matched, the identity authentication is successful.
In the embodiment of the present invention, the first identity authentication request may be input by a user through voice or input by a user through input touch operation. Specifically, when the user inputs the first authentication request through voice, the first authentication information carried by the first authentication request may be at least one or more of tone, and loudness. When the user inputs the first identity authentication request by inputting the touch operation, the first identity authentication information carried by the first identity authentication request may include fingerprint information of the input touch operation, a touch pressure value of the input touch operation, a touch direction of the input touch operation, and the like.
In the embodiment of the present invention, the authentication information included in each identity authentication mode may be preset in the user terminal, that is, one identity authentication mode may include one or more kinds of authentication information.
In the embodiment of the present invention, after receiving the first identity authentication mode, it may be detected whether the first identity authentication information carried in the first identity authentication request matches the authentication information corresponding to the first target identity authentication mode, and if the first identity authentication information matches the authentication information corresponding to the first target identity authentication mode, the current identity authentication is successful.
As an optional implementation manner, the first identity authentication information may include a touch pressure value when the first identity authentication request is input and fingerprint information when the first identity authentication request is input, where detecting, by the user terminal, whether the first identity authentication information carried in the first identity authentication request matches authentication information corresponding to the first target identity authentication mode may include: and detecting whether the touch pressure value is within a pressure value range corresponding to the first target identity authentication mode, if so, detecting whether the fingerprint information is matched with the fingerprint information corresponding to the first target identity authentication mode, and if so, successfully matching. The user terminal detects whether the first identity authentication information carried in the first identity authentication request is matched with the authentication information corresponding to the first target identity authentication mode, and also can detect whether the fingerprint information is matched with the fingerprint information corresponding to the first target identity authentication mode, if so, detects whether the touch pressure value is within the pressure value range corresponding to the first target identity authentication mode, and if so, the matching is successful.
In the embodiment of the invention, whether the touch pressure value is in the pressure value range corresponding to the first target identity authentication mode and whether the fingerprint information is matched with the fingerprint information corresponding to the first target identity authentication mode are detected, no obvious sequence exists, and the requirement can be met at the same time.
As another optional implementation manner, if it is detected that the first identity authentication information does not match the authentication information corresponding to the first target identity authentication mode, the following steps may be performed:
11) collecting biological characteristic information of a user;
12) detecting whether the biological characteristic information is matched with the biological characteristic information corresponding to a preset safe user;
13) and if not, outputting alarm information.
In the embodiment of the present invention, the biometric information may include, but is not limited to, one or more combinations of fingerprint information, iris information, and palm print information.
In the embodiment of the invention, a safety user can be preset in the user terminal, wherein the preset safety user can set according to the requirement; or the user terminal can set according to the history setting record of the user; the invention is not limited.
In the embodiment of the present invention, the biometric information corresponding to the secure user may be one or more combinations of fingerprint information, iris information, and palm print information, which is not limited in the present invention.
In the embodiment of the invention, the output of the alarm information can be one or more of voice information, character information, vibration information and the three kinds of information.
Specifically, if it is detected that the first identity authentication information does not match authentication information corresponding to the first target identity authentication mode, biometric information of the user may be collected; detecting whether the biological characteristic information is matched with the biological characteristic information corresponding to the preset safe user; and if not, outputting alarm information. For example, when the collected biometric information of the user includes fingerprint information, the user terminal may detect whether the biometric information corresponding to the preset secure user matches the fingerprint information, that is, if it is detected that the biometric information corresponding to the preset secure user also includes the fingerprint information, and the fingerprint information included in the biometric information corresponding to the preset secure user matches the collected fingerprint information, the user may be said to be a secure user. If the fingerprint information included in the preset biological characteristic information corresponding to the safe user is not matched with the acquired fingerprint information, the user is a non-safe user, and the user terminal can output alarm information.
As another optional implementation manner, if it is detected that the first identity authentication information does not match the authentication information corresponding to the first target identity authentication mode, the following steps may be further performed:
21) sending an authentication request to a pre-bound authorization terminal, wherein the authentication request is used for indicating that the authentication of the first target identity authentication request fails;
22) and when receiving an indication message which is sent by the authorization terminal in response to the authentication request and indicates that the current authenticated user is a safe user, the identity authentication is successful.
In the embodiment of the invention, the binding relationship between the user terminal and the authorization terminal can be preset. The authorization terminal includes, but is not limited to, a smart phone (such as an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, and a Mobile Internet Device (MID), a PAD, and other user terminals.
In the embodiment of the present invention, if it is detected that the first identity authentication information does not match the authentication information corresponding to the first target identity authentication mode, it indicates that the user inputting the first identity authentication request is not a preset secure user, and the user terminal may send an authentication request for indicating that the first target identity authentication request fails in authentication to the pre-bound authorization terminal. And if receiving an indication message which is sent by the authorization terminal in response to the authentication request and indicates that the current authenticated user is a safe user, the identity authentication is successful. And if the indication message which is sent by the authorization terminal responding to the authentication request and indicates that the current authenticated user is the safe user is not received, the identity authentication fails at the time.
In fig. 1, after acquiring the current location information of the user terminal; whether an identity authentication mode with the bound position information matched with the current position information exists in a plurality of preset identity authentication modes can be judged, and if the identity authentication mode with the bound position information matched with the current position information exists, the identity authentication mode with the bound position information matched with the current position information is selected as a first target identity authentication mode; and receiving a first identity authentication request, detecting whether the first identity authentication information carried in the first identity authentication request is matched with the authentication information corresponding to the first target identity authentication mode, and if so, successfully authenticating the identity. In the embodiment of the invention, a plurality of identity authentication modes can be preset in the user terminal, and the user terminal can select different identity authentication modes according to different position information, so that the diversity of terminal identity authentication modes can be increased.
Referring to fig. 2, fig. 2 is a schematic flow chart illustrating another identity authentication method according to an embodiment of the present invention. As shown in fig. 2, the identity authentication method may include the following steps:
s201, obtaining the current position information of the user terminal.
In the embodiment of the invention, the position information is used for reflecting the current geographic position of the user terminal, can be the longitude and latitude coordinates of the current position of the user terminal, and can determine the actual position of the user terminal through the longitude and latitude coordinates; but also the current actual location of the user terminal including the area, street, house number, etc.
S202, judging whether an identity authentication mode with the bound position information matched with the current position information exists in a plurality of preset identity authentication modes.
S203, if the bound identity authentication mode matched with the current position information does not exist in the plurality of preset identity authentication modes, obtaining the current time of the user terminal, and selecting a second target identity authentication mode matched with the current time from the plurality of preset identity authentication modes.
In the embodiment of the invention, if the bound identity authentication mode matched with the current position information does not exist in the plurality of preset identity authentication modes, the current time of the user terminal can be acquired. The current time is the time currently displayed by the user terminal system, and may include the specific time currently displayed by the user terminal system (e.g., 8:00) and the date currently displayed by the user terminal system (e.g., 1/2015).
In the embodiment of the invention, the binding relationship between the identity authentication mode and the time can be preset in the user terminal, namely, the identity authentication modes corresponding to different times are different. It can also be said that the authentication mode has a default binding relationship with time. For example, if the current time is 6:00 a.m., an authentication message including a digital password may be selected, that is, the user only needs to input a corresponding number to successfully authenticate the user. If the current time is 10:00 am, a more secure authentication mode may be selected, for example, the authentication mode may include one or more of fingerprint information, iris information, or other biometric information corresponding to the authentication information.
And S204, receiving a second identity authentication request.
S205, detecting whether second identity authentication information carried in the second identity authentication request is matched with authentication information corresponding to the second target identity authentication mode;
and S206, if the identity authentication is matched, the identity authentication is successful.
In the embodiment of the present invention, the second identity authentication request may be input by the user through voice, or may be input by the user through input touch operation. Specifically, when the user inputs the second authentication request through voice, the second authentication information carried by the second authentication request may be at least one or more of tone, and loudness. When the user inputs the second identity authentication request by inputting the touch operation, the second identity authentication information carried by the second identity authentication request may include fingerprint information of the input touch operation, a touch pressure value of the input touch operation, a touch direction of the input touch operation, and the like.
In the embodiment of the present invention, the authentication information included in each identity authentication mode may be preset in the user terminal, that is, one identity authentication mode may include one or more kinds of authentication information.
In the embodiment of the present invention, after receiving the second identity authentication mode, it may be detected whether the second identity authentication information carried in the second identity authentication request matches the authentication information corresponding to the second target identity authentication mode, and if matching, it indicates that the identity authentication is successful.
In fig. 2, it is described in detail that when there is no identity authentication mode in which the bound location information matches the current location information among the preset identity authentication modes, the user terminal may select the identity authentication mode that matches the current time of the user terminal. In the embodiment of the invention, a plurality of identity authentication modes can be preset in the user terminal, and the user terminal can select different identity authentication modes according to different time, so that the diversity of terminal identity authentication modes can be increased.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a user terminal according to an embodiment of the present invention, configured to execute the identity authentication method. The user terminal shown in fig. 3 may include, but is not limited to, a smart phone (such as an Android phone, an iOS phone, etc.), a tablet computer, a palmtop computer, and a Mobile Internet Device (MID), a PAD, and other user terminals. As shown in fig. 3, the user terminal may include: an acquisition unit 301, a determination unit 302, a selection unit 303, a reception unit 304, and a detection unit 305, wherein,
an obtaining unit 301, configured to obtain current location information of the user terminal.
In the embodiment of the invention, the position information is used for reflecting the current geographic position of the user terminal, can be the longitude and latitude coordinates of the current position of the user terminal, and can determine the actual position of the user terminal through the longitude and latitude coordinates; but also the current actual location of the user terminal including the area, street, house number, etc.
The determining unit 302 is configured to determine whether an identity authentication mode exists in the preset identity authentication modes, where the bound location information matches the current location information.
In the embodiment of the invention, a plurality of identity authentication modes can be preset in the user terminal, wherein authentication information corresponding to different identity authentication modes can be different. That is, the preset authentication information is different in different authentication modes. For example, if the identity authentication mode a and the identity authentication mode B are two different identity authentication modes, where the authentication information included in the identity authentication mode a is fingerprint information, the authentication information included in the identity authentication mode B may be any other authentication information except the fingerprint information; the authentication information contained in the identity authentication mode B may also be a combination of fingerprint information and any other authentication information; the invention is not limited.
In the embodiment of the invention, the binding relationship between the identity authentication mode and the position information can be preset in the user terminal, namely, the identity authentication modes corresponding to different position information are different. It can also be said that the authentication mode has a default binding relationship with the location information. For example, when the current location information indicates that the user terminal is at home, an authentication information containing a digital password may be selected, that is, the user only needs to input a corresponding number to successfully authenticate the user terminal. If the current location information indicates that the user terminal is currently in a public place, a relatively secure identity authentication mode may be selected, for example, the identity authentication mode may need to include one or more of fingerprint information, iris information, or other biometric information corresponding to the authentication information.
In this embodiment of the present invention, after the obtaining unit 301 obtains the current location information of the user terminal, the determining unit 302 may determine whether there is an identity authentication mode in which the bound location information matches the current location information in a plurality of preset identity authentication modes.
A selecting unit 303, configured to select, if the determining unit 302 determines that there is an identity authentication mode matching the bound location information with the current location information in the preset identity authentication modes, the identity authentication mode matching the bound location information with the current location information as the first target identity authentication mode.
In the embodiment of the present invention, since the binding relationship between the identity authentication mode and the location information may be preset, that is, after the obtaining unit 301 obtains the current location information, the determining unit 302 may determine whether an identity authentication mode in which the bound location information matches the current location information exists in the preset identity authentication modes, and if the identity authentication mode exists, the selecting unit 303 may select the identity authentication mode in which the bound location information matches the current location information as the first target identity authentication mode.
In the embodiment of the present invention, since a plurality of identity authentication modes are preset in the user terminal, that is, at least one identity authentication mode corresponding to the same location information may be used, or none of the identity authentication modes may exist.
A receiving unit 304, configured to receive the first identity authentication request.
The detecting unit 305 is configured to detect whether the first identity authentication information carried in the first identity authentication request matches the authentication information corresponding to the first target identity authentication mode, and if the first identity authentication information matches the authentication information corresponding to the first target identity authentication mode, the identity authentication is successful.
In the embodiment of the present invention, the first identity authentication request may be input by a user through voice or input by a user through input touch operation. Specifically, when the user inputs the first authentication request through voice, the first authentication information carried by the first authentication request may be at least one or more of tone, and loudness. When the user inputs the first identity authentication request by inputting the touch operation, the first identity authentication information carried by the first identity authentication request may include fingerprint information of the input touch operation, a touch pressure value of the input touch operation, a touch direction of the input touch operation, and the like.
In the embodiment of the present invention, the authentication information included in each identity authentication mode may be preset in the user terminal, that is, one identity authentication mode may include one or more kinds of authentication information.
In this embodiment of the present invention, after the receiving unit 304 receives the first identity authentication mode, the detecting unit 305 may detect whether the first identity authentication information carried in the first identity authentication request matches the authentication information corresponding to the first target identity authentication mode, and if the first identity authentication information matches the authentication information corresponding to the first target identity authentication mode, it indicates that the current identity authentication is successful.
In fig. 3, after the acquisition unit 301 acquires the current location information of the user terminal; the determining unit 302 may determine whether an identity authentication mode in which the bound location information matches the current location information exists among a plurality of preset identity authentication modes, and if so, the selecting unit 303 selects the identity authentication mode in which the bound location information matches the current location information as a first target identity authentication mode; the receiving unit 304 receives the first identity authentication request, and the detecting unit 305 detects whether the first identity authentication information carried in the first identity authentication request matches with the authentication information corresponding to the first target identity authentication mode, and if so, the identity authentication is successful. In the embodiment of the present invention, a plurality of identity authentication modes may be preset in the user terminal, and the selecting unit 303 may select different identity authentication modes according to different location information, so that the diversity of the terminal identity authentication modes can be increased.
Referring to fig. 4, fig. 4 is a schematic structural diagram of another user terminal disclosed in the embodiment of the present invention, configured to execute the above identity authentication method. Fig. 4 is further detailed on the basis of fig. 3, and may include, in addition to all the units shown in fig. 3: an acquisition unit 306, an output unit 307, and a transmission unit 308, wherein,
the collecting unit 306 is configured to collect biometric information of the user if the detecting unit 305 detects that the first identity authentication information does not match the authentication information corresponding to the first target identity authentication mode.
The detection unit 305 is further configured to detect whether the biometric information matches biometric information corresponding to a preset secure user.
An output unit 307, configured to output alarm information if the detection unit 305 detects that the biometric information does not match the biometric information corresponding to the preset safe user.
In embodiments of the present invention, the biometric information may include, but is not limited to, one or more of fingerprint information, iris information, and palm print information.
In the embodiment of the invention, a safety user can be preset in the user terminal, wherein the preset safety user can set according to the requirement; or the user terminal can set according to the history setting record of the user; the invention is not limited.
In the embodiment of the present invention, the biometric information corresponding to the secure user may be one or more of fingerprint information, iris information, and palm print information, which is not limited in the present invention.
In the embodiment of the invention, the output of the alarm information can be one or more of voice information, character information, vibration information and the three kinds of information.
Specifically, if the detecting unit 305 detects that the first identity authentication information does not match the authentication information corresponding to the first target identity authentication mode, the acquiring unit 306 may acquire biometric information of the user; the detection unit 305 detects whether the biometric information matches with the biometric information corresponding to the preset safe user; if not, the output unit 307 outputs alarm information. For example, when the collecting unit 306 collects the biometric information of the user and includes the fingerprint information, the detecting unit 305 may detect whether the biometric information corresponding to the preset security user matches with the fingerprint information, that is, if the detecting unit 305 detects that the biometric information corresponding to the preset security user also includes the fingerprint information and the fingerprint information included in the biometric information corresponding to the preset security user matches with the collected fingerprint information, the user may be said to be the security user. If the fingerprint information included in the preset biological characteristic information corresponding to the safe user is not matched with the acquired fingerprint information, the user is a non-safe user, and the user terminal can output alarm information.
A sending unit 308, configured to send an authentication request to a pre-bound authorized terminal if the detecting unit 305 detects that the first identity authentication information does not match the authentication information corresponding to the first target identity authentication mode, where the authentication request is used to indicate that the first target identity authentication request fails to authenticate.
In the embodiment of the invention, the binding relationship between the user terminal and the authorization terminal can be preset. The authorization terminal includes, but is not limited to, a smart phone (such as an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, and a Mobile Internet Device (MID), a PAD, and other user terminals.
In this embodiment of the present invention, if the detecting unit 305 detects that the first identity authentication information does not match the authentication information corresponding to the first target identity authentication mode, which indicates that the user inputting the first identity authentication request is not a preset secure user, the sending unit 308 may send an authentication request for indicating that the first target identity authentication request fails to authenticate the authentication request to the pre-bound authorized terminal. And if receiving an indication message which is sent by the authorization terminal in response to the authentication request and indicates that the current authenticated user is a safe user, the identity authentication is successful. And if the indication message which is sent by the authorization terminal responding to the authentication request and indicates that the current authenticated user is the safe user is not received, the identity authentication fails at the time.
In this embodiment of the present invention, the obtaining unit 301 is further configured to obtain the current time of the user terminal if the determining unit 302 determines that there is no identity authentication mode matching the bound location information and the current location information in the plurality of preset identity authentication modes.
In this embodiment of the present invention, the selecting unit 303 is further configured to select a second target identity authentication mode matching the current time from a plurality of preset identity authentication modes.
In this embodiment of the present invention, the receiving unit 304 is further configured to receive a second identity authentication request.
In this embodiment of the present invention, the detecting unit 305 is further configured to detect whether the second identity authentication information carried in the second identity authentication request matches the authentication information corresponding to the second target identity authentication mode, and if the second identity authentication information matches the authentication information corresponding to the second target identity authentication mode, the identity authentication is successful.
In an embodiment of the present invention, the first identity authentication information includes a touch pressure value when the first identity authentication request is input and fingerprint information when the first identity authentication request is input, where the detecting unit 305 is specifically configured to detect whether the touch pressure value is within a pressure value range corresponding to the first target identity authentication mode, and if the touch pressure value is within the pressure value range corresponding to the first target identity authentication mode, detect whether the fingerprint information is matched with the fingerprint information corresponding to the first target identity authentication mode, and if so, the matching is successful; or,
in an embodiment of the present invention, the detecting unit 305 is specifically configured to detect whether the fingerprint information is matched with the fingerprint information corresponding to the first target identity authentication mode, and if so, detect whether the touch pressure value is within a pressure value range corresponding to the first target identity authentication mode, and if so, the matching is successful.
Referring to fig. 5, fig. 5 is a schematic structural diagram of another user terminal according to an embodiment of the present invention, configured to execute the identity authentication method. As shown in fig. 5, the user terminal 500 may include: at least one processor 501, at least one input device 502, at least one output device 503, memory 505, and the like. Wherein the components are communicatively coupled via one or more buses 504. It will be understood by those skilled in the art that the configuration of the user terminal shown in fig. 5 is not intended to limit the embodiments of the present invention, and may be a bus configuration, a star configuration, a combination of more or fewer components than those shown, or a different arrangement of components. Wherein:
the processor 501 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by running or executing programs and/or modules stored in the memory 505 and calling data stored in the memory 505. The processor 501 may be composed of an Integrated Circuit (IC), for example, a single packaged IC, or a plurality of packaged ICs connected with the same or different functions. For example, the processor 501 may include only a Central Processing Unit (CPU), or may be a combination of a CPU, a Digital Signal Processor (DSP), a Graphics Processing Unit (GPU), and various control chips. In the embodiment of the present invention, the CPU may be a single operation core, or may include multiple operation cores.
The input device 502 may include a standard touch screen, keyboard, etc., and may also include a wired interface, wireless interface, etc.
The output device 503 may include a display screen, a speaker, etc., and may also include a wired interface, a wireless interface, etc.
The memory 505 can be used for storing software programs and modules, and the processor 501, the input device 502 and the output device 503 execute various functional applications of the terminal and realize data processing by calling the software programs and modules stored in the memory 505. The memory 505 mainly includes a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like; the data storage area may store data created according to the use of the terminal, and the like. In the embodiment of the present invention, the operating system may be an Android system, an iOS system, a Windows operating system, or the like.
Specifically, the processor 501 invokes an application program stored in the memory 505 for performing the following steps:
the processor 501 controls the input device 502 to obtain the current position information of the user terminal;
the processor 501 judges whether an identity authentication mode in which the bound position information matches with the current position information exists in a plurality of preset identity authentication modes, and if so, selects the identity authentication mode in which the bound position information matches with the current position information as a first target identity authentication mode;
the processor 501 controls the input device 502 to receive the first identity authentication request, and the processor 501 detects whether the first identity authentication information carried in the first identity authentication request matches with the authentication information corresponding to the first target identity authentication mode, and if so, the identity authentication is successful.
In the present invention, the processor 501 calls the application program stored in the memory 505, and is further configured to perform the following steps:
if the bound position information does not exist in the preset identity authentication modes, the identity authentication mode is matched with the current position information, the processor 501 controls the input device 502 to acquire the current time of the user terminal;
the processor 501 selects a second target identity authentication mode matched with the current time from a plurality of preset identity authentication modes;
the processor 501 controls the input device 502 to receive the second identity authentication request, and detects whether the second identity authentication information carried in the second identity authentication request matches with the authentication information corresponding to the second target identity authentication mode, and if so, the identity authentication is successful.
In the present invention, the processor 501 invokes an application program stored in the memory 505, where the first identity authentication information includes a touch pressure value when the first identity authentication request is input and fingerprint information when the first identity authentication request is input, and the processor 501 detects whether the first identity authentication information carried in the first identity authentication request matches authentication information corresponding to a first target identity authentication mode, including:
the processor 501 detects whether the touch pressure value is within the pressure value range corresponding to the first target identity authentication mode, if so, the processor 501 detects whether the fingerprint information is matched with the fingerprint information corresponding to the first target identity authentication mode, and if so, the matching is successful; or,
the processor 501 detects whether the fingerprint information is matched with the fingerprint information corresponding to the first target identity authentication mode, if so, the processor 501 detects whether the touch pressure value is within the pressure value range corresponding to the first target identity authentication mode, and if so, the matching is successful.
In the present invention, the processor 501 calls the application program stored in the memory 505, and is further configured to perform the following steps:
if the processor 501 detects that the first identity authentication information is not matched with the authentication information corresponding to the first target identity authentication mode, the processor 501 controls the input device 502 to acquire the biological feature information of the user;
the processor 501 detects whether the biometric information is matched with the biometric information corresponding to the preset safe user;
if not, the processor 501 controls the output device 503 to output alarm information.
In the present invention, the processor 501 calls the application program stored in the memory 505, and is further configured to perform the following steps:
if the processor 501 detects that the first identity authentication information is not matched with the authentication information corresponding to the first target identity authentication mode, the processor 501 controls the output device 503 to send an authentication request to the pre-bound authorized terminal, where the authentication request is used to indicate that the first target identity authentication request fails to be authenticated;
and when receiving an indication message which is sent by the authorization terminal in response to the authentication request and indicates that the current authenticated user is a safe user, the identity authentication is successful.
Specifically, the user terminal described in the embodiment of the present invention may implement part or all of the processes in the embodiment of the identity authentication method described in conjunction with fig. 1 and fig. 2 of the present invention.
The modules or sub-modules in all embodiments of the present invention may be implemented by a general-purpose integrated circuit, such as a CPU (central processing unit), or an ASIC (application specific integrated circuit).
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
The units in the terminal of the embodiment of the invention can be merged, divided and deleted according to actual needs.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-only memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.
Claims (10)
1. An identity authentication method, comprising:
acquiring current position information of a user terminal;
judging whether an identity authentication mode with bound position information matched with the current position information exists in a plurality of preset identity authentication modes, if so, selecting the identity authentication mode with the bound position information matched with the current position information as a first target identity authentication mode;
and receiving a first identity authentication request, detecting whether first identity authentication information carried in the first identity authentication request is matched with authentication information corresponding to the first target identity authentication mode, and if so, successfully authenticating the identity.
2. The method of claim 1, further comprising:
if the bound position information does not exist in the preset identity authentication modes, acquiring the current time of the user terminal;
selecting a second target identity authentication mode matched with the current time from the preset identity authentication modes;
and receiving a second identity authentication request, detecting whether second identity authentication information carried in the second identity authentication request is matched with authentication information corresponding to the second target identity authentication mode, and if so, successfully authenticating the identity.
3. The method of claim 1, wherein the first identity authentication information comprises a touch pressure value when the first identity authentication request is input and fingerprint information when the first identity authentication request is input, and the detecting whether the first identity authentication information carried in the first identity authentication request matches authentication information corresponding to the first target identity authentication mode comprises:
detecting whether the touch pressure value is within a pressure value range corresponding to the first target identity authentication mode, if so, detecting whether the fingerprint information is matched with the fingerprint information corresponding to the first target identity authentication mode, and if so, successfully matching; or,
and detecting whether the fingerprint information is matched with the fingerprint information corresponding to the first target identity authentication mode, if so, detecting whether the touch pressure value is within a pressure value range corresponding to the first target identity authentication mode, and if so, successfully matching.
4. The method according to any one of claims 1 to 3, further comprising:
if the first identity authentication information is not matched with the authentication information corresponding to the first target identity authentication mode, collecting biological characteristic information of the user;
detecting whether the biological characteristic information is matched with biological characteristic information corresponding to a preset safe user;
and if not, outputting alarm information.
5. The method according to any one of claims 1 to 3, further comprising:
if the first identity authentication information is not matched with the authentication information corresponding to the first target identity authentication mode, sending an authentication request to a pre-bound authorization terminal, wherein the authentication request is used for indicating that the first target identity authentication request fails to authenticate;
and when receiving an indication message which is sent by the authorization terminal in response to the authentication request and indicates that the current authenticated user is a safe user, the identity authentication is successful.
6. A user terminal, comprising:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring the current position information of a user terminal;
the judging unit is used for judging whether an identity authentication mode with the bound position information matched with the current position information exists in a plurality of preset identity authentication modes;
the selecting unit is used for selecting the identity authentication mode with the bound position information matched with the current position information as a first target identity authentication mode if the judging unit judges that the bound position information matched with the current position information exists in the preset identity authentication modes;
a receiving unit configured to receive a first identity authentication request;
and the detection unit is used for detecting whether the first identity authentication information carried in the first identity authentication request is matched with the authentication information corresponding to the first target identity authentication mode, and if so, the identity authentication is successful.
7. The user terminal of claim 6,
the obtaining unit is further configured to obtain the current time of the user terminal if the determining unit determines that the bound location information does not exist in the plurality of preset identity authentication modes, where the identity authentication mode is matched with the current location information;
the selecting unit is further used for selecting a second target identity authentication mode matched with the current time from the preset identity authentication modes;
the receiving unit is further configured to receive a second identity authentication request;
the detection unit is further configured to detect whether second identity authentication information carried in the second identity authentication request matches authentication information corresponding to the second target identity authentication mode, and if the second identity authentication information matches the authentication information corresponding to the second target identity authentication mode, the identity authentication is successful.
8. The user terminal according to claim 6, wherein the first identity authentication information includes a touch pressure value when the first identity authentication request is input and fingerprint information when the first identity authentication request is input, the detection unit is specifically configured to detect whether the touch pressure value is within a pressure value range corresponding to the first target identity authentication mode, and if the touch pressure value is within the pressure value range corresponding to the first target identity authentication mode, detect whether the fingerprint information matches the fingerprint information corresponding to the first target identity authentication mode, and if so, the matching is successful; or,
the detection unit is specifically configured to detect whether the fingerprint information matches the fingerprint information corresponding to the first target identity authentication mode, and if so, detect whether the touch pressure value is within a pressure value range corresponding to the first target identity authentication mode, and if so, successfully match.
9. The user terminal according to any of claims 6-8, wherein the user terminal further comprises:
the acquisition unit is used for acquiring the biological characteristic information of the user if the detection unit detects that the first identity authentication information is not matched with the authentication information corresponding to the first target identity authentication mode;
the detection unit is also used for detecting whether the biological characteristic information is matched with the biological characteristic information corresponding to a preset safe user;
and the output unit is used for outputting alarm information if the detection unit detects that the biological characteristic information is not matched with the biological characteristic information corresponding to the preset safe user.
10. The user terminal according to any of claims 6-8, wherein the user terminal further comprises:
a sending unit, configured to send an authentication request to a pre-bound authorization terminal if the detecting unit detects that the first identity authentication information is not matched with authentication information corresponding to the first target identity authentication mode, where the authentication request is used to indicate that the first target identity authentication request fails to authenticate;
the receiving unit is further configured to, when receiving an indication message indicating that the current authenticated user is a secure user, which is sent by the authorization terminal in response to the authentication request, successfully authenticate the identity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510678799.4A CN105245346B (en) | 2015-10-19 | 2015-10-19 | A kind of identity identifying method and user terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510678799.4A CN105245346B (en) | 2015-10-19 | 2015-10-19 | A kind of identity identifying method and user terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105245346A true CN105245346A (en) | 2016-01-13 |
CN105245346B CN105245346B (en) | 2019-01-25 |
Family
ID=55042858
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510678799.4A Expired - Fee Related CN105245346B (en) | 2015-10-19 | 2015-10-19 | A kind of identity identifying method and user terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105245346B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105760725A (en) * | 2016-01-29 | 2016-07-13 | 广东欧珀移动通信有限公司 | Identity authentication method and user terminal |
CN106210272A (en) * | 2016-06-27 | 2016-12-07 | 成都轻车快马网络科技有限公司 | A kind of method preventing mobile phone malice brush machine based on ID |
CN107145776A (en) * | 2017-04-27 | 2017-09-08 | 维沃移动通信有限公司 | A kind of method for secret protection and mobile terminal |
CN107493289A (en) * | 2017-08-31 | 2017-12-19 | 中国工商银行股份有限公司 | A kind of Network Bank security authentication method and device |
CN108421253A (en) * | 2018-03-15 | 2018-08-21 | 努比亚技术有限公司 | A kind of terminal control method, terminal and computer readable storage medium |
CN109218269A (en) * | 2017-07-05 | 2019-01-15 | 阿里巴巴集团控股有限公司 | Identity authentication method, device, equipment and data processing method |
CN110502963A (en) * | 2018-09-12 | 2019-11-26 | 深圳市文鼎创数据科技有限公司 | Fingerprint verification method, fingerprint certification device and terminal |
CN111723350A (en) * | 2020-05-11 | 2020-09-29 | 口碑(上海)信息技术有限公司 | Push method, device and equipment for identifying mode |
CN112235177A (en) * | 2020-08-29 | 2021-01-15 | 上海量明科技发展有限公司 | Method, device and system for sending authentication information through instant messaging |
CN112967314A (en) * | 2021-02-19 | 2021-06-15 | 武汉特斯联智能工程有限公司 | Target tracking method and device applied to smart community and computer equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1801708A (en) * | 2005-01-04 | 2006-07-12 | 富士通株式会社 | Security management method, program, and information device |
US20120280785A1 (en) * | 2006-02-02 | 2012-11-08 | NL Giken Incorporated | Biometrics System, Biologic Information Storage, and Portable Device |
CN103514416A (en) * | 2013-10-15 | 2014-01-15 | 广东欧珀移动通信有限公司 | Dynamic unlocking method and unlocking system for mobile terminal |
CN103902861A (en) * | 2012-12-28 | 2014-07-02 | 联想(北京)有限公司 | Status switching method and electronic device |
CN104703136A (en) * | 2015-03-06 | 2015-06-10 | Tcl移动通信科技(宁波)有限公司 | Unlocking processing method of MT (Mobile Terminal) based on geographic position, system and MT |
CN104794381A (en) * | 2015-03-24 | 2015-07-22 | 百度在线网络技术(北京)有限公司 | Method, device, equipment and system used for authentication |
CN104834520A (en) * | 2015-04-17 | 2015-08-12 | 惠州Tcl移动通信有限公司 | Application starting method of intelligent terminal and intelligent terminal |
CN104935739A (en) * | 2015-05-29 | 2015-09-23 | 努比亚技术有限公司 | Audio and video application control method and device |
-
2015
- 2015-10-19 CN CN201510678799.4A patent/CN105245346B/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1801708A (en) * | 2005-01-04 | 2006-07-12 | 富士通株式会社 | Security management method, program, and information device |
US20120280785A1 (en) * | 2006-02-02 | 2012-11-08 | NL Giken Incorporated | Biometrics System, Biologic Information Storage, and Portable Device |
CN103902861A (en) * | 2012-12-28 | 2014-07-02 | 联想(北京)有限公司 | Status switching method and electronic device |
CN103514416A (en) * | 2013-10-15 | 2014-01-15 | 广东欧珀移动通信有限公司 | Dynamic unlocking method and unlocking system for mobile terminal |
CN104703136A (en) * | 2015-03-06 | 2015-06-10 | Tcl移动通信科技(宁波)有限公司 | Unlocking processing method of MT (Mobile Terminal) based on geographic position, system and MT |
CN104794381A (en) * | 2015-03-24 | 2015-07-22 | 百度在线网络技术(北京)有限公司 | Method, device, equipment and system used for authentication |
CN104834520A (en) * | 2015-04-17 | 2015-08-12 | 惠州Tcl移动通信有限公司 | Application starting method of intelligent terminal and intelligent terminal |
CN104935739A (en) * | 2015-05-29 | 2015-09-23 | 努比亚技术有限公司 | Audio and video application control method and device |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105760725A (en) * | 2016-01-29 | 2016-07-13 | 广东欧珀移动通信有限公司 | Identity authentication method and user terminal |
CN105760725B (en) * | 2016-01-29 | 2018-05-29 | 广东欧珀移动通信有限公司 | A kind of identity identifying method and user terminal |
CN106210272A (en) * | 2016-06-27 | 2016-12-07 | 成都轻车快马网络科技有限公司 | A kind of method preventing mobile phone malice brush machine based on ID |
CN107145776A (en) * | 2017-04-27 | 2017-09-08 | 维沃移动通信有限公司 | A kind of method for secret protection and mobile terminal |
CN109218269A (en) * | 2017-07-05 | 2019-01-15 | 阿里巴巴集团控股有限公司 | Identity authentication method, device, equipment and data processing method |
CN107493289A (en) * | 2017-08-31 | 2017-12-19 | 中国工商银行股份有限公司 | A kind of Network Bank security authentication method and device |
CN108421253A (en) * | 2018-03-15 | 2018-08-21 | 努比亚技术有限公司 | A kind of terminal control method, terminal and computer readable storage medium |
CN110502963A (en) * | 2018-09-12 | 2019-11-26 | 深圳市文鼎创数据科技有限公司 | Fingerprint verification method, fingerprint certification device and terminal |
CN111723350A (en) * | 2020-05-11 | 2020-09-29 | 口碑(上海)信息技术有限公司 | Push method, device and equipment for identifying mode |
CN111723350B (en) * | 2020-05-11 | 2024-02-02 | 口碑(上海)信息技术有限公司 | Method, device and equipment for pushing recognition mode |
CN112235177A (en) * | 2020-08-29 | 2021-01-15 | 上海量明科技发展有限公司 | Method, device and system for sending authentication information through instant messaging |
CN112235177B (en) * | 2020-08-29 | 2021-12-24 | 上海量明科技发展有限公司 | Method, device and system for sending authentication information through instant messaging |
CN112967314A (en) * | 2021-02-19 | 2021-06-15 | 武汉特斯联智能工程有限公司 | Target tracking method and device applied to smart community and computer equipment |
Also Published As
Publication number | Publication date |
---|---|
CN105245346B (en) | 2019-01-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105245346B (en) | A kind of identity identifying method and user terminal | |
CN105306204B (en) | Security verification method, device and system | |
CN105281906B (en) | Security verification method and device | |
CN105404809B (en) | A kind of identity identifying method and user terminal | |
KR20150027329A (en) | Terminal including fingerprint reader and operating method of the terminal | |
CN104468531A (en) | Authorization method, device and system for sensitive data | |
US9225700B1 (en) | Proximity-based authentication | |
CN105468952A (en) | Authentication method and apparatus | |
US11164022B2 (en) | Method for fingerprint enrollment, terminal, and non-transitory computer readable storage medium | |
CN108737638B (en) | Application control method and device, mobile terminal and computer readable medium | |
CN113468515B (en) | User identity verification method, device, electronic equipment and storage medium | |
CN106255102B (en) | Terminal equipment identification method and related equipment | |
CN112313983A (en) | User authentication using companion device | |
CN108306886B (en) | Identity authentication method, device and storage medium | |
CN105306737A (en) | Information management method and user terminal | |
CN105050061A (en) | Method and device for sending messages on the basis of user voiceprint information | |
CN105100449A (en) | Picture sharing method and mobile terminal | |
CN108769366B (en) | Authority management method, device, mobile terminal and storage medium | |
CN111901353A (en) | Identity recognition preprocessing method, identity recognition method, and equipment and system thereof | |
CN110958234B (en) | Application login control method and device and storage medium | |
CN106357684B (en) | Game application program login method and device | |
CN113836509B (en) | Information acquisition method, device, electronic equipment and storage medium | |
CN108650594B (en) | Sound box management method, user terminal and computer storage medium | |
CN105468947A (en) | Information processing method and device and electronic equipment | |
CN108763884B (en) | Authority management method, device, mobile terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190125 Termination date: 20211019 |