CN105577375B - Identity verification method and device - Google Patents
Identity verification method and device Download PDFInfo
- Publication number
- CN105577375B CN105577375B CN201410534430.1A CN201410534430A CN105577375B CN 105577375 B CN105577375 B CN 105577375B CN 201410534430 A CN201410534430 A CN 201410534430A CN 105577375 B CN105577375 B CN 105577375B
- Authority
- CN
- China
- Prior art keywords
- information
- user
- physical function
- pressing
- function key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Telephone Function (AREA)
Abstract
The invention provides an identity authentication method, which is applied to a mobile terminal and comprises the following steps: receiving confirmation information which is sent by a server and used for executing corresponding operation of the preset service; entering an information confirmation mode in which physical function keys of the mobile terminal are designated for inputting authentication information; acquiring an account identifier of a user and verification information input by the user through pressing the physical function key; and sending the account identifier and the verification information as identity information to the server, so that the server performs identity verification on the identity information according to the account identifier and the verification information, and executing operation corresponding to the preset service when the verification is passed. The invention also provides an identity authentication device, and the identity authentication method and the identity authentication device can improve the security of identity authentication and the accuracy of authentication information input.
Description
Technical Field
The invention relates to the technical field of computers, in particular to an identity authentication method and device.
Background
With the development of computer and network technologies, people increasingly use computers to perform operations related to personal privacy and property security through networks, such as: album management, electronic payment, account information management, and the like.
In order to ensure the information security of people in the operation process, the identity of the user performing the operation is generally required to be authenticated before the operation is performed. The existing identity authentication method mainly performs identity authentication by inputting authentication passwords preset by users (such as WeChat payment and confirmed payment schemes used by various internet banks) or biometric identification technologies (such as fingerprint identification and face identification).
However, the user is required to input characters on the screen of the mobile terminal for authentication by inputting the authentication password preset by the user, so that the characters are easily peeped and stolen by criminals, and the security is low. The identity authentication through the biological identification technology has higher requirements on the hardware of the mobile terminal, is limited by the level of the existing identification technology, and has low identification rate.
Disclosure of Invention
In view of this, the present invention provides an identity authentication method and apparatus, which can improve the security of identity authentication and the accuracy of authentication information input.
The identity authentication method provided by the embodiment of the invention is applied to a mobile terminal and comprises the following steps: receiving confirmation information which is sent by a server and used for executing corresponding operation of the preset service; entering an information confirmation mode in which a physical function key of the mobile terminal is designated for inputting authentication information; acquiring an account identifier of a user and verification information input by the user through pressing the physical function key; and sending the account identification and the verification information as identity information to the server, so that the server performs identity verification on the identity information according to the account identification and the verification information, and executing operation corresponding to the preset service when the verification is passed.
The identity authentication device provided by the embodiment of the invention operates in a mobile terminal and comprises: the receiving module is used for receiving confirmation information which is sent by the server and used for executing the corresponding operation of the preset service; the mobile terminal comprises a specifying module, a verification module and a verification module, wherein the specifying module is used for entering an information confirmation mode, and under the information confirmation mode, a physical function key of the mobile terminal is specified to be used for inputting verification information; the acquisition module is used for acquiring the account identification of the user and the verification information input by the user through pressing the physical function key; and the sending module is used for sending the account identifier and the verification information acquired by the acquiring module to the server as identity information, so that the server performs identity verification on the identity information according to the account identifier and the verification information, and executes an operation corresponding to the preset service when the verification is passed.
According to the authentication method and the authentication device provided by the embodiment of the invention, the physical function key is designated to be used for inputting authentication information, the authentication information input by a user through pressing the physical function key is obtained and is sent to the server for authentication, and the physical function key is generally arranged at a hidden position of the mobile terminal, so that the authentication information input by using the physical function key is more hidden, the password can be effectively prevented from being peeped by people in the input process, and the security of the authentication is improved. Meanwhile, the pressing of the physical function key can be performed by one hand, so that misoperation of a user can be effectively prevented, and the method is fast and accurate.
In order to make the aforementioned and other objects, features and advantages of the invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
Fig. 1 is an application environment diagram of an authentication method and apparatus according to an embodiment of the present invention;
fig. 2 shows a block diagram of a mobile terminal;
fig. 3 is a flowchart of an authentication method according to a first embodiment of the present invention;
fig. 4 is a schematic diagram of a confirmation operation page in the identity authentication method according to the first embodiment of the present invention;
fig. 5 is a flowchart of an authentication method according to a second embodiment of the present invention;
fig. 6 is a schematic diagram of first prompt information in an identity authentication method according to a second embodiment of the present invention;
fig. 7 is a flowchart of an authentication method according to a third embodiment of the present invention;
fig. 8 is a flowchart of an authentication method according to a fourth embodiment of the present invention;
fig. 9 is a schematic diagram of second prompt information in an identity authentication method according to a fourth embodiment of the present invention;
fig. 10 is a flowchart of an authentication method according to a fifth embodiment of the present invention;
fig. 11 is a flowchart of an authentication method according to a sixth embodiment of the present invention;
fig. 12 is a schematic structural diagram of an authentication device according to a seventh embodiment of the present invention;
fig. 13 is a schematic structural diagram of an authentication device according to an eighth embodiment of the present invention.
Detailed Description
To further illustrate the technical means and effects of the present invention adopted to achieve the predetermined objects, the following detailed description of the embodiments, structures, features and effects according to the present invention will be made with reference to the accompanying drawings and preferred embodiments.
Referring to fig. 1, fig. 1 is an application environment diagram of an authentication method and apparatus according to an embodiment of the present invention. As shown in fig. 1, the server 100 and the mobile terminal 200 are located in a wireless or wired network through which the server 100 performs data interaction with the mobile terminal 200. The mobile terminal 200 receives the confirmation information of the corresponding operation of executing the preset service sent by the server 100; entering an information confirmation mode in which physical function keys of the mobile terminal 200 are designated for inputting authentication information; acquiring an account identifier of a user and verification information input by the user through pressing the physical function key; and sending the account identifier and the verification information as identity information to the server 100, so that the server 100 performs identity verification on the identity information according to the account identifier and the verification information, and executing an operation corresponding to the preset service when the verification is passed.
Fig. 2 shows a block diagram of a mobile terminal. As shown in fig. 2, the mobile terminal 200 includes: memory 202, memory controller 204, one or more (only one shown) processors 206, peripheral interface 208, radio frequency module 210, audio module 212, display module 214, and button module 216. These components communicate with each other via one or more communication buses/signal lines 218.
It is to be understood that the configuration shown in fig. 2 is merely exemplary, and that mobile terminal 200 may include more or fewer components than shown in fig. 2, or may have a different configuration than shown in fig. 2. The components shown in fig. 2 may be implemented in hardware, software, or a combination thereof.
The memory 202 may be used to store software programs and modules, such as program instructions/modules corresponding to the authentication method and apparatus in the embodiments of the present invention, and the processor 206 executes various functional applications and data processing by running the software programs and modules stored in the memory 202, so as to implement the above-mentioned authentication method.
The memory 202 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 202 may further include memory located remotely from the processor 206, which may be connected to the mobile terminal 200 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. Access to the memory 202 by the processor 206, and possibly other components, may be under the control of the memory controller 204.
The peripherals interface 208 is used to couple various external devices to the CPU and to the memory 202.
In some embodiments, the memory controller 204, the processor 206, and the peripheral interface 208 may be implemented in a single chip. In other examples, they may be implemented separately from the individual chips.
The rf module 210 is used for receiving and transmitting electromagnetic waves, and implementing interconversion between the electromagnetic waves and electrical signals, so as to communicate with a communication network or other devices. The rf module 210 may include various existing circuit elements for performing these functions, such as an antenna, an rf transceiver, a digital signal processor, an encryption/decryption chip, a Subscriber Identity Module (SIM) card, memory, and so forth. The rf module 210 may communicate with various networks such as the internet, an intranet, a wireless network, or with other devices via a wireless network. The wireless network may comprise a cellular telephone network, a wireless local area network, or a metropolitan area network. The Wireless network may use various Communication standards, protocols and technologies, including, but not limited to, Global System for Mobile Communication (GSM), Enhanced Mobile Communication (Enhanced Data GSM Environment, EDGE), wideband Code division multiple Access (W-CDMA), Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), bluetooth, Wireless Fidelity (WiFi) (e.g., ieee802.11a, ieee802.11b, ieee802.11g and/or ieee802.11n), Voice over internet protocol (VoIP), Worldwide Interoperability Access (internet mail), Wi-Max, short-time messaging (wimax), and other protocols for short-time messaging, as well as any other suitable communication protocols, and may even include those that have not yet been developed.
The audio module 212 provides an audio interface to the user, which may include one or more microphones, one or more speakers, and audio circuitry. The audio circuitry receives audio data from the peripheral interface 208, converts the audio data to electrical information, and transmits the electrical information to the speaker. The speaker converts the electrical information into sound waves that the human ear can hear. The audio circuitry also receives electrical information from the microphone, converts the electrical information to voice data, and transmits the voice data to the peripheral interface 208 for further processing. The audio data may be retrieved from the memory 202 or through the radio frequency module 210. In addition, the audio data may also be stored in the memory 202 or transmitted through the radio frequency module 210. In some examples, the audio module 212 may also include an earphone jack for providing an audio interface to a headset or other device.
The display module 214 provides an output interface between the mobile terminal 200 and the user to display video output to the user, the content of which may include text, graphics, video, and any combination thereof. Some of the output results are for some of the user interface objects. It is understood that the display module 214 may also provide both an output and input interface between the mobile terminal 200 and the user. In particular, in addition to displaying video output to users, the display module 214 also receives user input, such as user clicks, swipes, and other gesture operations, such that user interface objects respond to these user input. The technique of detecting user input may be based on resistive, capacitive, or any other possible touch detection technique. Specific examples of display units of the display module 214 include, but are not limited to, a liquid crystal display or a light emitting polymer display.
The mobile terminal 200 may include a smart phone, a tablet computer, an e-book reader, an MP3 player (Moving Picture Experts Group Audio L layer III, mpeg compressed standard Audio layer 3), an MP4 player (Moving Picture Experts Group Audio L layer IV, mpeg compressed standard Audio layer 4), a laptop portable computer, a car computer, a wearable device, a navigator, etc. having physical function keys and supporting network data transmission.
First embodiment
Referring to fig. 3, fig. 3 is a flowchart of an authentication method according to a first embodiment of the present invention. The identity authentication method provided in this embodiment can be applied to the mobile terminal 200 shown in fig. 1. As shown in fig. 3, the method includes:
step S101, receiving confirmation information which is sent by a server and used for executing corresponding operation of the preset service;
the mobile terminal 200 is preset with a client for providing a preset service for a user, and the client can receive interaction information related to the preset service sent by the server 100 and display the interaction information to the user, acquire interaction information related to the preset service input by the user and send the interaction information to the server 100, so as to provide the preset service for the user, for example: instant messaging client, payment client, financial payment client, etc.
In this embodiment, the preset services may include specific services related to personal privacy or property security of the user, such as: electronic payment, password management, and the like.
The confirmation information of the corresponding operation of the preset service is used for confirming whether the corresponding operation of the preset service is executed.
Step S102, entering an information confirmation mode, wherein a physical function key of the mobile terminal is appointed to be used for inputting verification information in the information confirmation mode;
in the information confirmation mode, the physical function keys of the mobile terminal 200 are designated for inputting authentication information. The information confirmation schema may be, but is not limited to, an isolated system environment created by virtualization technologies, such as: and (4) a sandbox. Since the physical function keys of the mobile terminal 200 generally have specific purposes, in order to avoid generating conflicts and affecting the normal input of authentication information, after receiving the confirmation information of the corresponding operation of executing the preset service sent by the server 100 through the client, the mobile terminal 200 enters an information confirmation mode, in the information confirmation mode, the physical function keys are designated to be used for inputting the authentication information, and meanwhile, a confirmation operation page (shown in fig. 4) is generated according to the received confirmation information and displayed to the user through the client, so that the user can input the authentication information by pressing the physical function keys under the guidance of the confirmation operation page, and instruct the mobile terminal 200 to send the authentication information and the account identifier of the user to the server 100 for authentication.
Step S103, acquiring an account identification of a user and verification information input by the user through pressing the physical function key;
the mobile terminal 200 obtains, through the client, an account id input by the user in an account id input area of the confirmation operation page shown in fig. 4, where the account id includes, but is not limited to: the financial account registered by the user at the operator of the preset service or other service account numbers associated with the financial account, such as: a wechat account, an instant messaging account number associated with the wechat account number, a mobile phone number, and the like.
The physical function keys are physical keys on the mobile terminal 200, including but not limited to: volume adjusting key, power key (on-off key), camera key, return key, menu key, home screen key, back key, search key, cross key, mute key, etc., but does not include function keys of a keypad region for inputting characters such as numbers, letters, etc., such as: functional keys on the full keyboard of nokia N97mini, functional keys in the keyboard region of blackberry Q20 Classic, and so on. Preferably, the physical function keys are physical keys disposed at respective sides (four sides of top, bottom, left, and right) of the mobile terminal 200, such as: a power key provided at a top side of the mobile terminal 200, a volume adjustment key at a left or right side, a camera key, etc.
When the event of acquiring the verification information is triggered, the mobile terminal 200 detects whether the physical function key is pressed, acquires a location code of the pressed physical function key, converts the location code into a corresponding key value, determines which key is pressed by the user according to the key value, and converts the key value into a corresponding numeric code according to a preset conversion rule, as the verification information input by the user. It is understood that the event of acquiring the verification information may be triggered by the user clicking a "confirm button" in the confirm operations page shown in fig. 4.
Preferably, the user may input the authentication information by pressing any combination of keys of at least two different functions among the physical function keys a plurality of times. For example: assuming that the "+" sign and the "-" sign denote two volume adjustment keys and the "+" sign denotes an on-off key, the user can input preset authentication information by pressing the volume adjustment key and the on-off key several times, such as: "++ - - + - + - **".
Step S104, sending the account identifier and the verification information as identity information to the server, so that the server performs identity verification on the identity information according to the account identifier and the verification information, and executing an operation corresponding to the preset service when the verification is passed.
The server 100 receives the identity information sent by the mobile terminal 200, compares the account identifier and the verification information in the identity information with the account identifier and the verification information preset by the user to perform identity verification on the identity information, and when the account identifier and the verification information in the identity information are consistent with the account identifier and the verification information preset by the user, confirms that the verification is passed, and executes the operation corresponding to the preset service.
According to the identity authentication method provided by the embodiment of the invention, the physical function key is designated to be used for inputting authentication information, the authentication information input by a user through pressing the physical function key is obtained and sent to the server for identity authentication, and the physical function key is generally arranged at a hidden position of the mobile terminal, so that the authentication information input by using the physical function key is more hidden, a password can be effectively prevented from being peeped by a person in the input process, and the security of identity authentication is improved. Meanwhile, the pressing of the physical function key can be performed by one hand, so that misoperation of a user can be effectively prevented, and the method is fast and accurate.
Second embodiment
Referring to fig. 5, fig. 5 is a flowchart of an authentication method according to a second embodiment of the present invention. The identity authentication method provided in this embodiment can be applied to the mobile terminal 200 shown in fig. 1. As shown in fig. 5, the method includes:
step S201, receiving confirmation information sent by a server for executing corresponding operation of the preset service;
step S202, entering an information confirmation mode, wherein a physical function key of the mobile terminal is appointed to be used for inputting verification information;
step S203, acquiring an account identifier of a user and verification information input by the user through pressing the physical function key;
steps S201 to S203 are the same as steps S101 to S103 in the first embodiment, and are not described again here.
Step S204, when detecting that the user finishes the action of pressing the physical function key, judging whether the pressing frequency of the user at the moment is equal to a preset first numerical value;
specifically, after detecting that the user completes one action of pressing the physical function key, if the action of pressing the physical function key is not performed again after exceeding a preset time period, it is determined that the user finishes the action of pressing the physical function key. For example: and when detecting that the user presses the on-off key once, if the user does not press any physical function key for more than 20 seconds, determining that the user finishes the action of pressing the physical function key.
The preset first value is the number of bits of the authentication information preset in the server 100 as a standard for verifying whether the identity information transmitted by the mobile terminal 200 is correct, wherein the authentication information input by the user pressing the physical function key once is regarded as one bit. For example, assuming that the user presses the physical function key 6 times, the input authentication information is 6 bits. The server 100 may transmit the first value to the mobile terminal 200 together with the confirmation information for performing the corresponding operation of the preset service.
If the value is equal to the first value, step S205 is executed: sending the account identifier and the verification information to the server as identity information;
when the fact that the user finishes the action of pressing the physical function key is detected, if the pressing times of the user at this time (namely when the user finishes the pressing action) are equal to a preset first numerical value, the account identifier and the verification information input by the user by pressing the physical function key are sent to the server 100 as identity information, so that the server 100 conducts identity verification on the identity information according to the account identifier and the verification information, and when the verification is passed, the operation corresponding to the preset service is executed.
Further, before sending, the mobile terminal 200 may encrypt the authentication information input by the user by pressing the physical function key according to a preset encryption rule to improve security of the authentication information, and send the encrypted authentication information and the account id as identity information to the server 100.
The server 100 receives the encrypted verification information and the account identifier sent by the mobile terminal 200, obtains the verification information by decrypting the encrypted verification information, compares the account identifier and the verification information with an account identifier and verification information preset by a user to perform identity verification on the identity information, and when the account identifier and the verification information in the identity information are consistent with the account identifier and the verification information preset by the user, confirms that the verification is passed, and executes an operation corresponding to the preset service.
If the value is greater than or less than the first value, step S206 is executed: and displaying first prompt information, wherein the first prompt information is used for prompting that the verification information input by the user is wrong.
When it is detected that the user finishes the action of pressing the physical function key, if the pressing frequency of the user at this time (i.e., when the user finishes the pressing action) is greater than or less than the first value, a first prompt message (as shown in fig. 6) is displayed, where the first prompt message is used to prompt the user that the input authentication information is incorrect, and to guide the user to re-input the password or return.
According to the identity authentication method provided by the embodiment of the invention, the physical function key is designated to be used for inputting authentication information, the authentication information input by a user through pressing the physical function key is obtained and sent to the server for identity authentication, and the physical function key is generally arranged at a hidden position of the mobile terminal, so that the authentication information input by using the physical function key is more hidden, a password can be effectively prevented from being peeped by a person in the input process, and the security of identity authentication is improved. Meanwhile, the pressing of the physical function key can be performed by one hand, so that misoperation of a user can be effectively prevented, and the method is fast and accurate.
Third embodiment
Referring to fig. 7, fig. 7 is a flowchart of an authentication method according to a third embodiment of the present invention. The identity authentication method provided in this embodiment can be applied to the mobile terminal 200 shown in fig. 1. As shown in fig. 7, the method includes:
step S301, receiving confirmation information which is sent by a server and used for executing corresponding operation of the preset service;
step S302, entering an information confirmation mode, wherein in the information confirmation mode, the physical function key of the mobile terminal is appointed to be used for inputting verification information;
step S303, acquiring an account identifier of a user and verification information input by the user through pressing the physical function key;
steps S301 to S303 are the same as steps S101 to S103 in the first embodiment, and are not described again here.
Step S304, counting the number of times that the user presses the physical function key, and sending the account id and the verification information to the server as identity information when the number of times is equal to a preset second value.
The preset second value is the number of bits of the authentication information preset in the server 100 as a standard for verifying whether the identity information sent by the mobile terminal 200 is correct, wherein the authentication information input by the user pressing the physical function key once is regarded as one bit. For example, assuming that the user presses the physical function key 6 times, the input authentication information is 6 bits. The server 100 may transmit the second value to the mobile terminal 200 together with confirmation information for performing a corresponding operation of the preset service.
It is to be understood that, while waiting for the user to finish pressing the physical function key for the second numerical time, the input of the verification information may be stopped according to a stop instruction triggered by the user pressing the return key.
Further, before sending, the mobile terminal 200 may encrypt the authentication information input by the user by pressing the physical function key according to a preset encryption rule to improve security of the authentication information, and send the encrypted authentication information and the account identifier as identity information to the server 100, so that the server 100 performs identity authentication on the identity information according to the account identifier and the authentication information, and executes an operation corresponding to the preset service when the authentication passes.
The server 100 receives the encrypted verification information and the account identifier sent by the mobile terminal 200, obtains the verification information by decrypting the encrypted verification information, compares the account identifier and the verification information with an account identifier and verification information preset by a user to perform identity verification on the identity information, and when the account identifier and the verification information in the identity information are consistent with the account identifier and the verification information preset by the user, confirms that the verification is passed, and executes an operation corresponding to the preset service.
According to the identity authentication method provided by the embodiment of the invention, the physical function key is designated to be used for inputting authentication information, the authentication information input by a user through pressing the physical function key is obtained and sent to the server for identity authentication, and the physical function key is generally arranged at a hidden position of the mobile terminal, so that the authentication information input by using the physical function key is more hidden, a password can be effectively prevented from being peeped by a person in the input process, and the security of identity authentication is improved. Meanwhile, the pressing of the physical function key can be performed by one hand, so that misoperation of a user can be effectively prevented, and the method is fast and accurate.
Fourth embodiment
Referring to fig. 8, fig. 8 is a flowchart of an authentication method according to a fourth embodiment of the present invention. The identity authentication method provided in this embodiment can be applied to the mobile terminal 200 shown in fig. 1. As shown in fig. 8, the method includes:
step S401, receiving confirmation information sent by a server for executing corresponding operation of the preset service;
step S402, entering an information confirmation mode, wherein the physical function key of the mobile terminal is appointed to be used for inputting verification information;
step S403, acquiring an account identifier of a user and verification information input by the user through pressing the physical function key;
steps S401 to S403 are the same as steps S101 to S103 in the first embodiment, and are not described again here.
Step S404, when detecting that the user finishes the action of pressing the physical function key, judging whether the pressing frequency of the user is larger than a preset third numerical value;
specifically, after detecting that the user completes one pressing of the physical function key, if the user does not perform the pressing of the physical function key again for more than a preset time period, it is determined that the user finishes the pressing of the physical function key, and it is determined whether the pressing frequency of the user at this time (i.e., when the user finishes the pressing) is greater than a preset third value. For example: and after detecting that the user presses the on-off key once, if the user does not press the physical function key for more than 20 seconds, determining that the user finishes the action of pressing the physical function key.
It is understood that the third value is greater than the number of bits of the authentication information preset in the server 100 as a criterion for verifying whether the identity information transmitted by the mobile terminal 200 is correct.
If the pressing times of the user is greater than the third value, step S405 is executed: judging whether the physical function key pressed by the user for the last time is a preset first appointed key or not;
if the physical function key last pressed by the user is the first designated key, then step S406 is executed: sending the verification information input by the user through pressing the physical function key for the previous preset time in the verification information and the account identification as identity information to the server;
if the physical function key pressed by the user for the last time is the first designated key, the mobile terminal 200 sends the authentication information, which is input by pressing the physical function key for the previous preset time of the user, and the account identifier in the authentication information to the server 100 as the identity information, so that the server 100 performs identity authentication on the identity information according to the account identifier and the authentication information, and executes the operation corresponding to the preset service when the authentication is passed.
Further, before sending, the mobile terminal 200 may encrypt the verification information to be sent according to a preset encryption rule to improve the security of the verification information, and send the encrypted verification information and the account id as the identity information to the server 100.
The server 100 receives the encrypted verification information and the account identifier sent by the mobile terminal 200, obtains the verification information by decrypting the encrypted verification information, compares the account identifier and the verification information with an account identifier and verification information preset by a user to perform identity verification on the identity information, and when the account identifier and the verification information in the identity information are consistent with the account identifier and the verification information preset by the user, confirms that the verification is passed, and executes an operation corresponding to the preset service.
If the physical function key last pressed by the user is not the first designated key, step S407 is executed: displaying second prompt information, wherein the second prompt information is used for prompting that the physical function key pressed by the user for the last time is wrong;
if the physical function key pressed last time by the user is not the first designated key, displaying a second prompt message (as shown in fig. 9), where the second prompt message is used to prompt the user that the physical function key pressed last time is wrong and guide the user to re-input the password or return. Here, the pressing of the first designated key corresponds to transmitting an instruction to confirm the transmission of the identity information to the mobile terminal 200 to instruct the mobile terminal 200 to transmit the identity information to the server 100.
If the pressing times of the user is less than or equal to the third value, step S408 is executed: and displaying third prompt information, wherein the third prompt information is used for prompting that the verification information input by the user is wrong.
The prompting content of the third prompting message can be the same as the first prompting message shown in fig. 6.
For example, assuming that the authentication information preset by the user is 6 bits (that is, the preset time is 6 times), the third numerical value is 8, the first designated key is an on/off key, and according to the detection that the user does not press another physical function key again within the preset time length after pressing the physical function key 10 times, it can be determined that the user has finished pressing the physical function key. At this time, since the number of times 10 that the user presses the physical function key is greater than the third value 8, the mobile terminal 200 determines whether the physical function key that the user pressed for the last time is an on-off key according to the detected key value of the physical function key that the user pressed for the last time, and if the physical function key is the on-off key, acquires the first 6 verification information (i.e., the verification information input by pressing the physical function key for the 1 st to 6 th times) in the verification information input by the user by pressing the physical function key for the 10 times, and sends the verification information and the account identifier together as identity information to the server 100; if the key is not the on-off key, displaying a second prompt message shown in fig. 9 to prompt the user that the physical function key pressed last time is wrong, and guiding the user to re-input the password or return.
According to the identity authentication method provided by the embodiment of the invention, the physical function key is designated to be used for inputting authentication information, the authentication information input by a user through pressing the physical function key is obtained and sent to the server for identity authentication, and the physical function key is generally arranged at a hidden position of the mobile terminal, so that the authentication information input by using the physical function key is more hidden, a password can be effectively prevented from being peeped by a person in the input process, and the security of identity authentication is improved. Meanwhile, the pressing of the physical function key can be performed by one hand, so that misoperation of a user can be effectively prevented, and the method is fast and accurate.
Fifth embodiment
Referring to fig. 10, fig. 10 is a flowchart of an authentication method according to a fifth embodiment of the present invention. The identity authentication method provided in this embodiment can be applied to the mobile terminal 200 shown in fig. 1. As shown in fig. 10, the method includes:
step S501, receiving confirmation information which is sent by a server and used for executing corresponding operation of the preset service;
step S502, entering an information confirmation mode, wherein the physical function key of the mobile terminal is appointed to be used for inputting verification information in the information confirmation mode;
step S503, acquiring the account identification of the user and the verification information input by the user by pressing the physical function key;
steps S501 to S503 are the same as steps S101 to S103 in the first embodiment, and are not described again here.
Step S504, when it is detected that the user presses a preset second designated key, sending, as identity information, authentication information and the account id, which are input by the user by pressing other physical function keys except the second designated key, in the authentication information to the server.
The second designated key can be preset according to a setting instruction of a user. For example, assuming that the second designated key is a camera key, when it is detected that the user presses the camera key, the authentication information input by pressing other physical function keys before the user presses the camera key is transmitted to the server 100 together with the account id as the identity information.
Further, before sending, the mobile terminal 200 may encrypt the verification information to be sent according to a preset encryption rule to improve the security of the verification information, and send the encrypted verification information and the account id as the identity information to the server 100.
The server 100 receives the encrypted verification information and the account identifier sent by the mobile terminal 200, obtains the verification information by decrypting the encrypted verification information, compares the account identifier and the verification information with an account identifier and verification information preset by a user to perform identity verification on the identity information, and when the account identifier and the verification information in the identity information are consistent with the account identifier and the verification information preset by the user, confirms that the verification is passed, and executes an operation corresponding to the preset service.
It should be understood that fig. 4, fig. 6, and fig. 9 are only examples, and in practical applications, specific expressions of the confirmation operation page, the first prompt message, the second prompt message, and the third prompt message may not be limited thereto.
According to the identity authentication method provided by the embodiment of the invention, the physical function key is designated to be used for inputting authentication information, the authentication information input by a user through pressing the physical function key is obtained and sent to the server for identity authentication, and the physical function key is generally arranged at a hidden position of the mobile terminal, so that the authentication information input by using the physical function key is more hidden, a password can be effectively prevented from being peeped by a person in the input process, and the security of identity authentication is improved. Meanwhile, the pressing of the physical function key can be performed by one hand, so that misoperation of a user can be effectively prevented, and the method is fast and accurate.
Sixth embodiment
Referring to fig. 11, fig. 11 is a flowchart of an authentication method according to a sixth embodiment of the present invention. In this embodiment, a scenario of practical application of value transfer is taken as an example to describe the identity authentication method provided in the present invention, where the service server 300 is a server for providing offline resource transfer service, such as a server of a treasure-panning transaction platform, and the server 100 is a server for providing value transfer service, such as: a server for each bank or third party payment platform. As shown in fig. 11, the identity authentication method provided in this embodiment includes:
step S601, the mobile terminal 200 sends an offline resource transfer request to the service server 300 according to a sending instruction triggered by the user, where the offline resource transfer request includes an identifier of an offline resource to be transferred;
step S602, the service server 300 obtains the account identifier of the provider of the offline resource to be transferred and the value to be transferred according to the identifier of the offline resource to be transferred, and sends the identifier of the offline resource to be transferred, the account identifier of the provider, the IP address of the mobile terminal 200, and the value to be transferred as value transfer information to the server 100 together with a confirmed value transfer request, so as to request the server 100 to execute a value transfer operation according to the value transfer information;
step S603, the server 100 receives the numerical value transfer information and the confirmed numerical value transfer request sent by the service server 300, and generates and sends confirmed numerical value transfer information to the mobile terminal 200 according to the numerical value transfer information, where the confirmed numerical value transfer information includes an identifier of the offline resource to be transferred, the numerical value to be transferred, and an account identifier of the provider;
step S604, the mobile terminal 200 receives the confirmation value transfer information sent by the server 100 through the client, acquires the identity information of the user, and sends the identity information to the server 100;
specifically, the present step may comprise the steps of:
the first step is as follows: the mobile terminal 200 receives the confirmation value transfer information sent by the server 100 through the client;
the mobile terminal 200 is preset with a client capable of providing a value transfer service for a user, such as: a pay for treasure client, a financial payment client, etc.
Confirming the value transfer information is used for confirming whether to execute the value transfer operation, such as: whether to perform an operation to transfer the value in the user's account to a designated account.
The second step is that: entering an information confirmation mode in which physical function keys of the mobile terminal are designated for inputting authentication information;
the physical function keys of the mobile terminal 200 in the information confirmation mode are designated for inputting authentication information. The information confirmation schema may be, but is not limited to, an isolated system environment created by virtualization technologies, such as: and (4) a sandbox. Since the physical function keys of the mobile terminal 200 generally have specific purposes, in order to avoid generating conflicts and affecting the normal input of the verification information, the mobile terminal 200 enters an information confirmation mode after receiving the confirmation value transfer information sent by the server 100 through the client, and in the information confirmation mode, the physical function keys are designated to be used for inputting the verification information, and meanwhile, a confirmation operation page (as shown in fig. 4) is generated according to the received confirmation information and is displayed to the user through the client, so that the user can input the verification information by pressing the physical function keys under the guidance of the confirmation operation page, and instruct the mobile terminal 200 to send the verification information and the account identifier of the user to the server 100 for identity verification.
The third step: acquiring an account identifier of a user and verification information input by the user through pressing the physical function key;
the mobile terminal 200 obtains, through the client, an account id input by the user in an account id input area of the confirmation operation page shown in fig. 4, where the account id includes: the account number of the bank opened by the user at the bank, the financial account number opened by the user at the third-party payment mechanism, or the account identifier associated with the financial account, such as an instant messaging account number, an email address, a mobile phone number and the like associated with the entered account.
The physical function keys are physical keys disposed at respective sides (four sides of top, bottom, left, and right) of the mobile terminal 200, such as: a power key provided at a top side of the mobile terminal 200, a volume adjustment key at a left or right side, a camera key, etc.
When the event of acquiring the verification information is triggered, the mobile terminal 200 detects whether the physical function key is pressed, acquires a location code of the pressed physical function key, converts the location code into a corresponding key value, determines which key is pressed by the user according to the key value, and converts the key value into a corresponding numeric code according to a preset conversion rule, as the verification information input by the user. It is understood that the event of acquiring the verification information may be triggered by the user clicking a "confirm button" in the confirm operations page shown in fig. 4.
The authentication information may be input by the user by pressing any combination of keys of at least two different functions of the physical function keys a plurality of times. For example: assuming that the "+" sign and the "-" sign denote two volume adjustment keys and the "+" sign denotes an on-off key, the user can input preset authentication information by pressing the volume adjustment key and the on-off key several times, such as: "++ - - + - + - **".
The fourth step: and sending the account identifier and the verification information as identity information to the server, so that the server performs identity verification on the identity information according to the account identifier and the verification information in the identity information, and confirming to execute numerical value transfer operation when the verification is passed.
This step is the same as step S104 of the first embodiment, and is not described here again.
Step S605, the server 100 receives the identity information sent by the mobile terminal 200, compares the account id and the verification information in the identity information with the account id and the verification information preset by the user to perform identity verification on the identity information, confirms that the verification is passed and executes a value transfer operation when the account id and the verification information in the identity information are consistent with the account id and the verification information preset by the user, transfers the value to be transferred in the account of the user to the account of the provider according to the account id of the user and the account id of the provider of the offline resource, and sends information confirming that the value transfer operation is executed to the mobile terminal 200.
According to the identity authentication method provided by the embodiment of the invention, the physical function key is designated to be used for inputting authentication information, the authentication information input by a user through pressing the physical function key is obtained and sent to the server for identity authentication, and the physical function key is generally arranged at a hidden position of the mobile terminal, so that the authentication information input by using the physical function key is more hidden, a password can be effectively prevented from being peeped by a person in the input process, and the security of identity authentication is improved. Meanwhile, the pressing of the physical function key can be performed by one hand, so that misoperation of a user can be effectively prevented, and the method is fast and accurate.
Seventh embodiment
Fig. 12 is a schematic structural diagram of an authentication device according to a seventh embodiment of the present invention. The authentication apparatus provided in this embodiment can be operated in the mobile terminal 200 shown in fig. 1, and is used to implement the authentication method in the above-described embodiment. As shown in fig. 12, the authentication device 70 includes:
a receiving module 71, configured to receive confirmation information sent by the server to perform a corresponding operation of the preset service;
a designating module 72 for entering an information confirmation mode in which a physical function key of the mobile terminal is designated for inputting authentication information;
an obtaining module 73, configured to obtain an account identifier of a user and verification information input by the user by pressing the physical function key;
a sending module 74, configured to send the account identifier and the verification information acquired by the acquiring module 73 to the server as identity information, so that the server performs identity verification on the identity information according to the account identifier and the verification information, and when the verification passes, executes an operation corresponding to the preset service.
For the specific process of implementing each function of each functional module of the identity authentication device 70 in this embodiment, please refer to the specific contents described in the embodiments shown in fig. 1 to fig. 11, which will not be described herein again.
According to the identity authentication device provided by the embodiment of the invention, the physical function key is designated to be used for inputting authentication information, the authentication information input by a user through pressing the physical function key is obtained and sent to the server for identity authentication, and the physical function key is generally arranged at a hidden position of the mobile terminal, so that the authentication information input by using the physical function key is more hidden, a password can be effectively prevented from being peeped by a person in the input process, and the security of identity authentication is improved. Meanwhile, the pressing of the physical function key can be performed by one hand, so that misoperation of a user can be effectively prevented, and the method is fast and accurate.
Eighth embodiment
Fig. 13 is a schematic structural diagram of an authentication device according to an eighth embodiment of the present invention. The authentication apparatus provided in this embodiment can be operated in the mobile terminal 200 shown in fig. 1, and is used to implement the authentication method in the above-described embodiment. As shown in fig. 13, the authentication device 80 includes:
a receiving module 71, configured to receive confirmation information sent by the server to perform a corresponding operation of the preset service;
a designating module 72 for entering an information confirmation mode in which a physical function key of the mobile terminal is designated for inputting authentication information;
an obtaining module 73, configured to obtain an account identifier of a user and verification information input by the user by pressing the physical function key;
a sending module 74, configured to send the account identifier and the verification information acquired by the acquiring module 73 to the server as identity information, so that the server performs identity verification on the identity information according to the account identifier and the verification information, and when the verification passes, executes an operation corresponding to the preset service.
Preferably, the physical function keys include physical keys disposed at respective sides of the mobile terminal.
Preferably, the obtaining module 73 is further configured to obtain the verification information input by the user by pressing any combination of keys of at least two different functions of the physical function keys multiple times.
Preferably, the authentication device 80 further comprises:
a judging module 85, configured to, when it is detected that the user finishes the action of pressing the physical function key, judge whether the pressing frequency of the user at this time is equal to a preset first numerical value;
the sending module 74, configured to send the account identifier and the verification information to the server as the identity information if the determining module 85 determines that the pressing frequency of the user is equal to the first numerical value at this time;
the display module 86 is configured to display a first prompt message if the determining module 85 determines that the pressing frequency of the user is greater than or less than the first value, where the first prompt message is used to prompt that the verification information input by the user is incorrect.
Preferably, the authentication device 80 further comprises:
a counting module 87, configured to count the number of times that the user presses the physical function key;
the sending module 74 is further configured to send the account id and the verification information to the server as the identity information when the number counted by the counting module 87 is equal to a preset second value.
Preferably, the judging module 85 is further configured to, when it is detected that the user finishes the action of pressing the physical function key, judge whether the pressing frequency of the user at this time is greater than a preset third numerical value;
the judging module 85 is further configured to, if the pressing frequency of the user is greater than the third numerical value, judge whether the physical function key pressed by the user for the last time is a preset first designated key;
the sending module 74 is further configured to send, if the determining module 85 determines that the physical function key pressed by the user for the last time is the first designated key, the authentication information and the account identifier, which are preset in the authentication information and input by pressing the physical function key by the user for the previous time, as the identity information to the server;
the display module 86 is further configured to display a second prompt message if the determining module 85 determines that the physical function key pressed by the user for the last time is not the first designated key, where the second prompt message is used to prompt that the physical function key pressed by the user for the last time is incorrect;
the display module 86 is further configured to display a third prompt message if the determining module 85 determines that the pressing frequency of the user is less than or equal to the third value, where the third prompt message is used to prompt that the verification information input by the user is incorrect.
Preferably, the sending module 74 is further configured to, when it is detected that the user presses a preset second specified key, send, as the identity information, the authentication information and the account identifier, which are included in the authentication information and input by pressing a physical function key other than the second specified key, to the server.
Preferably, the determining module 85 is further configured to determine that the user finishes the action of pressing the physical function key if the action of pressing the physical function key is not performed again after the preset time length is exceeded after the user completes one action of pressing the physical function key.
Preferably, the authentication device 80 further comprises:
an encryption module 88 for encrypting the authentication information according to a preset rule;
the sending module 74 is further configured to send the authentication information and the account identifier encrypted by the encryption module 87 to the server as the identity information.
For the specific process of implementing each function of each functional module of the identity authentication apparatus 80 in this embodiment, please refer to the specific contents described in the embodiments shown in fig. 1 to fig. 11, which is not described herein again.
According to the identity authentication device provided by the embodiment of the invention, the physical function key is designated to be used for inputting authentication information, the authentication information input by a user through pressing the physical function key is obtained and sent to the server for identity authentication, and the physical function key is generally arranged at a hidden position of the mobile terminal, so that the authentication information input by using the physical function key is more hidden, a password can be effectively prevented from being peeped by a person in the input process, and the security of identity authentication is improved. Meanwhile, the pressing of the physical function key can be performed by one hand, so that misoperation of a user can be effectively prevented, and the method is fast and accurate.
It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
It will be understood by those skilled in the art that all or part of the steps of implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Although the present invention has been described with reference to the preferred embodiments, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (19)
1. An identity authentication method is applied to a mobile terminal, and is characterized by comprising the following steps:
receiving confirmation information which is sent by a server and used for executing corresponding operation of the preset service;
entering an information confirmation mode, wherein a physical function key of the mobile terminal is designated to be used for inputting verification information under the information confirmation mode, and the information confirmation mode is an isolated system environment created through a virtualization technology;
generating and displaying a confirmation operation page according to the received confirmation information, so that a user can input verification information by pressing a physical function key under the guidance of the confirmation operation page;
acquiring an account identifier input by a user in an account identifier input area of the confirmation operation page;
when an event for acquiring the verification information is triggered, acquiring a position code of a pressed physical function key, and converting the position code into a corresponding key value;
converting the key value into a corresponding digital code, and using the digital code as verification information input by the user through pressing the physical function key;
and sending the account identification and the verification information as identity information to the server, so that the server performs identity verification on the identity information according to the account identification and the verification information, and executing operation corresponding to the preset service when the verification is passed.
2. The method of claim 1, wherein the physical function keys comprise physical keys disposed on respective sides of the mobile terminal.
3. The method of claim 2, wherein obtaining authentication information entered by the user by pressing the physical function key comprises:
and acquiring the verification information input by the user through pressing any combination of at least two keys with different functions in the physical function keys for many times.
4. The method of claim 3, wherein sending the account identification and the authentication information to the server as identity information comprises:
when the fact that the user finishes the action of pressing the physical function key is detected, whether the pressing times of the user at the moment are equal to a preset first numerical value or not is judged;
if the value is equal to the first value, the account identification and the verification information are used as the identity information and sent to the server;
and if the value is larger than or smaller than the first numerical value, displaying first prompt information, wherein the first prompt information is used for prompting that the verification information input by the user is wrong.
5. The method of claim 3, wherein sending the account identification and the authentication information to the server as identity information further comprises:
counting the times of pressing the physical function key by the user;
and when the times are equal to a preset second numerical value, sending the account identification and the verification information to the server as the identity information.
6. The method of claim 3, wherein sending the account identification and the authentication information to the server as identity information further comprises:
when the fact that the user finishes the action of pressing the physical function key is detected, whether the pressing frequency of the user is larger than a preset third numerical value or not is judged;
if the value is larger than the third numerical value, judging whether the physical function key pressed by the user for the last time is a preset first appointed key;
if the first appointed key is the first appointed key, sending verification information input by the user through pressing the physical function key for the previous preset time in the verification information and the account identification as the identity information to the server;
if the key is not the first appointed key, displaying second prompt information, wherein the second prompt information is used for prompting that the physical function key pressed by the user for the last time is wrong;
and if the value is less than or equal to the third numerical value, displaying third prompt information, wherein the third prompt information is used for prompting that the verification information input by the user is wrong.
7. The method of claim 3, wherein sending the account identification and the authentication information to the server as identity information further comprises:
and when detecting that the user presses a preset second designated key, sending verification information input by the user through pressing other physical function keys except the second designated key in the verification information and the account identification as the identity information to the server.
8. The method according to claim 4 or 6, wherein the detecting the action of the user ending pressing the physical function key comprises:
and when the fact that the user finishes one action of pressing the physical function key is detected, if the action of pressing the physical function key is not carried out again after the preset time length is exceeded, the fact that the user finishes the action of pressing the physical function key is determined.
9. The method of claim 1, wherein sending the account identification and the authentication information to the server as identity information further comprises:
encrypting the verification information according to a preset rule;
and sending the encrypted verification information and the encrypted account identification to the server as the identity information.
10. An authentication apparatus, operating in a mobile terminal, comprising:
the receiving module is used for receiving confirmation information which is sent by the server and used for executing the corresponding operation of the preset service;
the mobile terminal comprises a specifying module, a judging module and a judging module, wherein the specifying module is used for entering an information confirmation mode, under the information confirmation mode, a physical function key of the mobile terminal is specified to be used for inputting verification information, and the information confirmation mode is an isolated system environment established by a virtualization technology;
the acquisition module is used for acquiring the account identifier input by the user in the account identifier input area of the confirmation operation page; when an event for acquiring the verification information is triggered, acquiring a position code of a pressed physical function key, and converting the position code into a corresponding key value; converting the key value into a corresponding digital code, and using the digital code as verification information input by the user through pressing the physical function key;
the display module is used for generating and displaying a confirmation operation page according to the received confirmation information, so that a user can input verification information by pressing a physical function key under the guidance of the confirmation operation page;
and the sending module is used for sending the account identifier and the verification information acquired by the acquiring module to the server as identity information, so that the server performs identity verification on the identity information according to the account identifier and the verification information, and executes an operation corresponding to the preset service when the verification is passed.
11. The apparatus of claim 10, wherein the physical function keys comprise physical keys disposed on respective sides of the mobile terminal.
12. The apparatus of claim 11,
the obtaining module is further configured to obtain the verification information input by the user through multiple pressing of any combination of at least two different functions of the physical function keys.
13. The apparatus of claim 12,
the device further comprises:
the judging module is used for judging whether the pressing times of the user at the moment are equal to a preset first numerical value or not when the action that the user finishes pressing the physical function key is detected;
the sending module is further configured to send the account identifier and the verification information to the server as the identity information if the judging module judges that the pressing times of the user at this time are equal to the first numerical value;
and the display module is used for displaying first prompt information if the judging module judges that the pressing times of the user at the moment are greater than or less than the first numerical value, wherein the first prompt information is used for prompting that the verification information input by the user is wrong.
14. The apparatus of claim 13,
the device further comprises:
the counting module is used for counting the times of pressing the physical function key by the user;
the sending module is further configured to send the account identifier and the verification information to the server as the identity information when the number of times counted by the counting module is equal to a preset second numerical value.
15. The apparatus of claim 13,
the judging module is further configured to judge whether the pressing frequency of the user is greater than a preset third numerical value at the moment when the action of pressing the physical function key by the user is detected to be finished;
the judging module is further configured to judge whether the physical function key pressed by the user for the last time is a preset first designated key if the pressing frequency of the user is greater than the third numerical value;
the sending module is further configured to send, if the judging module judges that the physical function key pressed last time by the user is the first designated key, the authentication information and the account identifier, which are input by pressing the physical function key in the previous preset time by the user, in the authentication information as the identity information to the server;
the display module is further configured to display second prompt information if the determination module determines that the physical function key pressed by the user for the last time is not the first designated key, where the second prompt information is used to prompt that the physical function key pressed by the user for the last time is incorrect;
the display module is further configured to display third prompt information if the determining module determines that the pressing frequency of the user at this time is less than or equal to the third numerical value, where the third prompt information is used to prompt that the verification information input by the user is incorrect.
16. The apparatus of claim 13,
the sending module is further configured to send, when it is detected that the user presses a preset second specified key, verification information input by the user by pressing other physical function keys except the second specified key in the verification information and the account identifier as the identity information to the server.
17. The apparatus according to any one of claims 13 to 16, wherein the determining module is further configured to determine that the user ends the action of pressing the physical function key if the action of pressing the physical function key is not performed again after a preset duration is exceeded after the action of pressing the physical function key by the user is detected to be completed once.
18. The apparatus of claim 11,
the device further comprises:
the encryption module is used for encrypting the verification information according to a preset rule;
the sending module is further configured to send the authentication information and the account identifier encrypted by the encryption module to the server as the identity information.
19. A computer-readable storage medium storing executable instructions that, when executed by a processor, perform the authentication method of any one of claims 1 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410534430.1A CN105577375B (en) | 2014-10-11 | 2014-10-11 | Identity verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410534430.1A CN105577375B (en) | 2014-10-11 | 2014-10-11 | Identity verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105577375A CN105577375A (en) | 2016-05-11 |
CN105577375B true CN105577375B (en) | 2020-07-14 |
Family
ID=55887092
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410534430.1A Active CN105577375B (en) | 2014-10-11 | 2014-10-11 | Identity verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105577375B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109756465A (en) * | 2017-11-07 | 2019-05-14 | 中移(杭州)信息技术有限公司 | A kind of method and apparatus of authentication |
CN108062810B (en) * | 2017-12-12 | 2020-08-07 | 南京江泽智能科技有限公司 | NFC intelligent household door lock and using method |
CN108319826A (en) * | 2017-12-13 | 2018-07-24 | 阿里巴巴集团控股有限公司 | A kind of method, apparatus and equipment of authentication |
CN109063430A (en) * | 2018-06-12 | 2018-12-21 | 阿里巴巴集团控股有限公司 | A kind of method, device and equipment of data storage and authentication |
CN111753229B (en) * | 2020-06-10 | 2024-07-09 | 支付宝(杭州)信息技术有限公司 | Page configuration method, device and equipment |
CN112365258B (en) * | 2020-11-09 | 2024-09-17 | 中国人民银行数字货币研究所 | Binding method and device for electronic money account and electronic equipment |
CN115374419B (en) * | 2022-10-26 | 2023-02-07 | 中航信移动科技有限公司 | Data processing system for paperless identity verification |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102088583A (en) * | 2009-12-08 | 2011-06-08 | 鸿富锦精密工业(深圳)有限公司 | Remote controller and password protection method thereof |
CN102184372A (en) * | 2011-05-27 | 2011-09-14 | 北京洋浦伟业科技发展有限公司 | Reverse-sandbox-based mobilephone payment protection method |
CN103324874A (en) * | 2012-03-23 | 2013-09-25 | 联想(北京)有限公司 | Verification method and electronic device |
CN103606082A (en) * | 2013-11-15 | 2014-02-26 | 四川长虹电器股份有限公司 | A television payment system based on fingerprint identification and a method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101729492A (en) * | 2008-10-15 | 2010-06-09 | 英业达股份有限公司 | Information recording system with client identification and method thereof |
US20120179915A1 (en) * | 2011-01-07 | 2012-07-12 | Apple Inc. | System and method for full disk encryption authentication |
TWI564747B (en) * | 2012-10-19 | 2017-01-01 | 威盛電子股份有限公司 | Electronic device and secure boot method |
-
2014
- 2014-10-11 CN CN201410534430.1A patent/CN105577375B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102088583A (en) * | 2009-12-08 | 2011-06-08 | 鸿富锦精密工业(深圳)有限公司 | Remote controller and password protection method thereof |
CN102184372A (en) * | 2011-05-27 | 2011-09-14 | 北京洋浦伟业科技发展有限公司 | Reverse-sandbox-based mobilephone payment protection method |
CN103324874A (en) * | 2012-03-23 | 2013-09-25 | 联想(北京)有限公司 | Verification method and electronic device |
CN103606082A (en) * | 2013-11-15 | 2014-02-26 | 四川长虹电器股份有限公司 | A television payment system based on fingerprint identification and a method |
Also Published As
Publication number | Publication date |
---|---|
CN105577375A (en) | 2016-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105577375B (en) | Identity verification method and device | |
CN105306204B (en) | Security verification method, device and system | |
US9824234B2 (en) | Method of protecting care information in a care provider terminal | |
CN105590043B (en) | Identity verification method, device and system | |
US9628482B2 (en) | Mobile based login via wireless credential transfer | |
CN105281906B (en) | Security verification method and device | |
CN109039990B (en) | Behavior verification method and device based on verification code | |
US9569607B2 (en) | Security verification method and apparatus | |
CN105260673A (en) | Short message reading method and apparatus | |
TW201525754A (en) | Method, apparatus and system of identity authentication | |
CN107395610B (en) | Communication authentication method, first terminal and second terminal | |
WO2015035936A1 (en) | Identity authentication method, identity authentication apparatus, and identity authentication system | |
KR101639147B1 (en) | Method, device, program and storage medium for sending information in voice service | |
CN105592005B (en) | Security verification method, device and system | |
CN106255102B (en) | Terminal equipment identification method and related equipment | |
WO2017113119A1 (en) | Method and device for associating application with biological characteristic, and mobile terminal | |
CN103914541A (en) | Information search method and device | |
US9398450B2 (en) | Mobile survey tools with added security | |
CN104217328A (en) | Multi-verification payment method and multi-verification payment device | |
CN105407070A (en) | Logging-in authorization method and device | |
US9667784B2 (en) | Methods and devices for providing information in voice service | |
CN106060027B (en) | Method, apparatus, equipment and the system verified based on identifying code | |
JP2009193272A (en) | Authentication system and mobile terminal | |
KR101633965B1 (en) | User security authentication system in internet and method thereof | |
CN105681261A (en) | Security authentication method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |