[go: up one dir, main page]

CN112417429A - Security verification method and device, electronic equipment and storage medium - Google Patents

Security verification method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112417429A
CN112417429A CN202011348819.9A CN202011348819A CN112417429A CN 112417429 A CN112417429 A CN 112417429A CN 202011348819 A CN202011348819 A CN 202011348819A CN 112417429 A CN112417429 A CN 112417429A
Authority
CN
China
Prior art keywords
user
preset
unlocking information
information
unlocking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011348819.9A
Other languages
Chinese (zh)
Inventor
黄燕萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202011348819.9A priority Critical patent/CN112417429A/en
Publication of CN112417429A publication Critical patent/CN112417429A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

本申请公开了一种安全验证方法、装置、电子设备及存储介质,属于电子设备技术领域。该方法包括:接收用户输入的N个第一解锁信息;N个第一解锁信息与电子设备中预设的当前验证信息均不匹配;再确定N个第一解锁信息中与历史验证信息匹配的第一解锁信息的数量,得到匹配数量M;在匹配数量M不小于第一预设数量的情况下,对用户进行身份认证;若用户通过身份认证,则解锁电子设备;若用户未通过身份认证,则锁定电子设备。这样,在用户输入的第一解锁信息的匹配数量不小于第一预设数量时对用户进行身份认证,丰富了电子设备安全验证的方式,使得安全验证的方式更加灵活,能够避免电子设备不必要的强制锁定,保证用户对电子设备的正常使用。

Figure 202011348819

The present application discloses a security verification method, device, electronic device and storage medium, which belong to the technical field of electronic devices. The method includes: receiving N pieces of first unlocking information input by a user; none of the N pieces of first unlocking information matches the current verification information preset in the electronic device; and then determining the N pieces of first unlocking information that match the historical verification information The number of the first unlocking information, the matching number M is obtained; if the matching number M is not less than the first preset number, the user is authenticated; if the user passes the identity authentication, the electronic device is unlocked; if the user does not pass the identity authentication , the electronic device is locked. In this way, the identity authentication of the user is performed when the matching number of the first unlocking information input by the user is not less than the first preset number, which enriches the security verification method of the electronic device, makes the security verification method more flexible, and can avoid unnecessary electronic devices. to ensure the normal use of the electronic device by the user.

Figure 202011348819

Description

Security verification method and device, electronic equipment and storage medium
Technical Field
The invention belongs to the technical field of communication, and particularly relates to a security verification method and device, electronic equipment and a storage medium.
Background
Currently, electronic devices are widely used in daily work and life of users. In the prior art, in order to improve the safety of the electronic device, manufacturers often set a safety protection mechanism for forcibly locking the electronic device after the electronic device has a password error for multiple times.
However, the forced locking manner in the prior art is not flexible enough, the verification manner is single, in the scenario that the user forgets the password and tries to unlock the electronic device for multiple times or the acquaintance and the child try to unlock the electronic device, the electronic device is forced to be locked after multiple trial and error, and the unnecessary forced locking of the electronic device affects the normal use of the electronic device by the user.
Disclosure of Invention
The embodiment of the application aims to provide a security verification method, a security verification device, electronic equipment and a storage medium, and can solve the technical problems that in the prior art, the security verification mode of the electronic equipment is not flexible and single enough, and the normal use of a user is influenced by unnecessary forced locking of the electronic equipment.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides a security verification method, where the method includes:
receiving N pieces of first unlocking information input by a user; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment;
determining the number of first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M;
under the condition that the matching number M is not less than a first preset number, performing identity authentication on the user;
if the user passes the identity authentication, unlocking the electronic equipment;
and if the user does not pass the identity authentication, locking the electronic equipment.
In a second aspect, an embodiment of the present application provides a security verification apparatus, including:
the receiving module is used for receiving N pieces of first unlocking information input by a user; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment;
the determining module is used for determining the number of the first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M;
the authentication module is used for performing identity authentication on the user under the condition that the matching number M is not less than a first preset number;
the unlocking module is used for unlocking the electronic equipment if the user passes the identity authentication;
and the locking module is used for locking the electronic equipment if the user does not pass the identity authentication.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a processor, a memory, and a program or an instruction stored on the memory and executable on the processor, and when executed by the processor, the program or the instruction implements the steps of the security verification method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the security authentication method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the security verification method according to the first aspect.
In the embodiment of the application, N pieces of first unlocking information input by a user are received; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment; determining the number of first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M; under the condition that the matching number M is not less than the first preset number, performing identity authentication on the user; if the user passes the identity authentication, unlocking the electronic equipment; and if the user does not pass the identity authentication, locking the electronic equipment. Therefore, in the embodiment of the application, the identity authentication is performed on the user when the matching quantity of the first unlocking information input by the user is not less than the first preset quantity, so that the safety verification mode of the electronic equipment is enriched, the safety verification mode is more flexible, unnecessary forced locking of the electronic equipment can be avoided, and the normal use of the user on the electronic equipment is ensured.
Drawings
FIG. 1 is a flow chart illustrating the steps of a security authentication method according to an embodiment of the present application;
FIG. 2 is a flow chart illustrating steps of another security authentication method according to an embodiment of the present application;
FIG. 3 is a schematic diagram illustrating face recognition according to an embodiment of the present application;
FIG. 4 is a schematic diagram illustrating fingerprint recognition according to an embodiment of the present application;
FIG. 5 is a schematic diagram illustrating speech recognition according to an embodiment of the present application;
FIG. 6 is a flow chart illustrating a security verification method according to an embodiment of the present application;
fig. 7 is a block diagram showing a configuration of a security authentication apparatus according to an embodiment of the present application;
fig. 8 is a block diagram showing a structure of an electronic device according to an embodiment of the present application;
fig. 9 is a schematic diagram illustrating a hardware structure of an electronic device implementing various embodiments of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
A security verification method, a security verification device, an electronic apparatus, and a storage medium according to embodiments of the present application are described in detail below with reference to the accompanying drawings.
Referring to fig. 1, a flowchart illustrating steps of a security verification method according to an embodiment of the present application is shown, where the method may specifically include:
step 101, receiving N pieces of first unlocking information input by a user; and the N pieces of first unlocking information are not matched with the current verification information preset in the electronic equipment.
In this embodiment of the application, the first unlocking information may be unlocking information input by a user attempting to unlock the electronic device. The type of the unlocking information may specifically be a digital password, a touch track, an unlocking graph, and the like, and the specific type of the unlocking information is not limited in the embodiment of the present application. The electronic device can be a smart phone, a notebook, a tablet computer, a vehicle-mounted computer and the like. The current verification information may be currently set verification information in the electronic device, and the user may directly unlock the electronic device after inputting the current verification information.
In this step, the scenario in which the N pieces of first unlocking information are input to attempt to unlock the electronic device may be that the user forgets a password to attempt to unlock the electronic device, or an acquaintance or a child attempts to unlock the electronic device, or a stranger attempts to unlock the electronic device, or other scenarios in which the user attempts to unlock the electronic device, which is not limited in the embodiment of the present application. After receiving the N pieces of first unlocking information input by the user, the electronic device may perform a subsequent security verification process according to the N pieces of first unlocking information when the N pieces of first unlocking information are not matched with the current verification information.
And 102, determining the number of the first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M.
In this embodiment, the historical verification information may be verification information that the electronic device has used historically, such as an unlocking password or an unlocking pattern that the electronic device has used once. The matching number M may refer to the number of the N pieces of first unlocking information that match the historical authentication information. Matching may refer to complete identity, or may refer to similarity exceeding 80% or 90%, and the like, and may be specifically selected according to actual needs of a user, which is not limited in this embodiment of the present application.
In this step, when the matching number is determined, the N pieces of first unlocking information may be compared with the historical verification information to obtain a matching number M, and subsequently, whether to perform identity authentication is determined according to the matching number M.
And 103, performing identity authentication on the user under the condition that the matching number M is not less than a first preset number.
In this embodiment of the application, the first preset number may be a preset critical value of the matching number, and when the first preset number is equal to or greater than the first preset number, the identity authentication function of the electronic device may be triggered. The specific numerical value of the first preset number may be 4, 5, 6, and the like, and may be flexibly set according to the actual requirement of the user.
It is to be understood that, in an alternative embodiment of the present application, the first preset number may be related to the historical verification information, for example, if the first unlocking information is unlocking by inputting a password, a different first preset number may be determined according to a time length from the current time length in the password used historically, where the password input in the first unlocking information is the historical password. If the password of the first unlocking information is the last unlocking password, the first preset number may be smaller, and if the password of the first unlocking information is the unlocking password used 5 times before, the first preset number may be larger.
The identity authentication may be biometric identification verification of the user, specifically fingerprint verification, face verification, voice verification, iris verification, and the like, which is not limited in the embodiments of the present application.
In this step, after receiving N pieces of first unlocking information input by the user, the electronic device may compare the N pieces of first unlocking information with the historical verification information to determine a matching number M, and when the matching number M is equal to or greater than a first preset number, the electronic device may determine that the user attempting to unlock at present is the user of the electronic device or an acquaintance, may start authentication, and verifies the identity of the user. Therefore, the flexibility of the electronic equipment safety verification can be improved, and when a user or an acquaintance forgets a password and tries to unlock, the electronic equipment can be prevented from being locked forcibly based on identity authentication.
And step 104, if the user passes the identity authentication, unlocking the electronic equipment.
In the embodiment of the application, when the matching number M is not less than the first preset number, the electronic device starts identity authentication, and when the user passes the identity authentication, the user specifically may succeed in face image recognition, succeed in fingerprint verification, succeed in voice verification, and the like.
And 105, if the user does not pass the identity authentication, locking the electronic equipment.
In the embodiment of the application, after the electronic device starts the identity authentication function, if the user trying to unlock fails to pass the identity authentication, the electronic device may be forcibly locked at this time. In the forced locking state, the user cannot perform input operation of the first unlocking information and cannot unlock the electronic device.
To sum up, in the security verification method provided in the embodiment of the present application, N pieces of first unlocking information input by a user are received; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment; determining the number of first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M; under the condition that the matching number M is not less than the first preset number, performing identity authentication on the user; if the user passes the identity authentication, unlocking the electronic equipment; and if the user does not pass the identity authentication, locking the electronic equipment. Therefore, in the embodiment of the application, the identity authentication is performed on the user when the matching quantity of the first unlocking information input by the user is not less than the first preset quantity, so that the safety verification mode of the electronic equipment is enriched, the safety verification mode is more flexible, unnecessary forced locking of the electronic equipment can be avoided, and the normal use of the user on the electronic equipment is ensured.
Referring to fig. 2, a flowchart illustrating steps of another security authentication method according to an embodiment of the present application is shown. The method specifically comprises the following steps:
step 201, receiving N pieces of first unlocking information input by a user; and the N pieces of first unlocking information are not matched with the current verification information preset in the electronic equipment.
Specifically, the implementation manner of this step may refer to step 101 described above, and details of this embodiment are not described herein.
Step 202, determining the number of the first unlocking information matched with the historical verification information in the N pieces of first unlocking information, and obtaining the matching number M.
Optionally, in this embodiment of the application, the first unlocking information includes at least one of a password and an unlocking graph.
In the embodiment of the present application, the password may refer to a digital password for unlocking. The unlocking graph can refer to a graph for unlocking, for example, a graph formed by connecting lines of a nine-square grid and the like.
Alternatively, step 202 may include the following steps (1) to (2):
and (1) determining a matching result of the first unlocking information and the historical verification information for the first unlocking information received each time.
In this embodiment of the application, the matching result may refer to a matching condition between each of the N pieces of first unlocking information and the historical verification information, and specifically may include a matching result representing that the first unlocking information and the historical verification information are matched and a matching result representing that the first unlocking information and the historical verification information are not matched. When the matching result is determined, each piece of unlocking information may be directly compared with the historical verification information, and the matching condition of each piece of first unlocking information is determined.
For example, the first unlocking information input by the user may be a digital password, and in this step, each group of digital passwords input by the user may be compared with the historical unlocking digital passwords in the historical verification information, and whether the groups of digital passwords are matched with the historical unlocking digital passwords is determined, so as to obtain a matching result.
Optionally, in this embodiment of the present application, step (1) may include the following steps a to C:
and step A, determining the similarity between the first unlocking information and the historical verification information.
In this embodiment of the application, the similarity may refer to a similarity between the first unlocking information and the historical verification information. Specifically, during the determination, for each piece of first unlocking information, the first unlocking information may be compared with each piece of historical verification information, the similarity between the first unlocking information and each piece of historical verification information is determined, and the maximum value of the similarity between the first unlocking information and each piece of historical verification information is selected as the similarity between the first unlocking information and the historical verification information.
And B, under the condition that the similarity is larger than a preset similarity threshold, generating a matching result representing that the first unlocking information is matched with the historical verification information.
In this embodiment of the application, the preset similarity threshold may refer to a preset threshold of similarity, and may specifically be 90%, 95%, and the like. When the similarity is greater than the preset similarity threshold, it may be determined that the first unlocking information matches the historical verification information, and at this time, a matching result representing that the first unlocking information matches the historical verification information may be generated.
And C, under the condition that the similarity is not larger than a preset similarity threshold, generating a matching result representing that the first unlocking information is not matched with the historical verification information.
In this embodiment of the application, if the similarity is not greater than the preset similarity threshold, it may be determined that the first unlocking information is not matched with the historical verification information, and at this time, a matching result representing that the first unlocking information is not matched with the historical verification information may be generated.
In the embodiment of the application, the electronic equipment determines the similarity between the first unlocking information and the historical verification information; under the condition that the similarity is larger than a preset similarity threshold, generating a matching result representing that the first unlocking information is matched with the historical verification information; and under the condition that the similarity is not greater than a preset similarity threshold, generating a matching result representing that the first unlocking information is not matched with the historical verification information. Therefore, whether the first unlocking information is matched with the historical verification information or not is judged through calculating the similarity, so that the calculation process is more accurate, and the calculation accuracy can be improved.
And (2) determining the matching number M in the matching result.
In this embodiment of the application, the matching result may include a matching result representing that the first unlocking information matches the historical verification information, or may include a matching result representing that the first unlocking information does not match the historical verification information, and the electronic device may count the number of matching results representing that the first unlocking information matches the historical verification information, as the matching number M. For example, the electronic device may record a matching result of the first unlocking information and the historical verification information as an identification bit 1, record a matching result of the first unlocking information and the historical verification information as an identification bit 0, and then directly count the number of the identification bits 1 as the matching number M.
In this step, the electronic device may also adopt a mode in which the first unlocking information is matched one by one, the electronic device may set an initial value of the matching number M to 0, then compare each piece of the first unlocking information with the historical verification information, respectively, to obtain a matching result, if the matching result is that there is historical verification information matched with the first unlocking information, add 1 to the matching number M, and if not, the matching number is unchanged; and then the electronic equipment compares the next first unlocking information with the historical verification information to obtain a matching result, and executes the process of judging whether to increase the matching number based on the matching result again. Therefore, the electronic device can complete the matching process of the N pieces of first unlocking information and the historical verification information, and obtain the matching number M in the N pieces of first unlocking information.
It should be noted that other indexes may be used in the embodiment of the present application to determine whether to trigger the identity authentication. For example, the ratio of the number of matches, that is, the ratio of the first unlocking information in which there is matching historical verification information to the total number N of the first unlocking information may be used. For example, the number N of the first unlocking information input by the user is 6, and if there are 4 times of matching historical authentication information, the matching ratio is 67%.
In the embodiment of the application, for the received first unlocking information each time, the matching result of the first unlocking information and the historical verification information is determined; and determining the number M of matches in the matching result. Therefore, the electronic equipment can determine the matching number M based on the matching condition of the first unlocking information and the historical verification information, and the accuracy of determining the matching number is improved.
Optionally, in this embodiment of the application, the number N of the first unlocking information is less than or equal to the preset total input times.
In this embodiment of the application, the preset total input times may be a total number of times that the user may attempt to input the first unlocking information. And after the input times of the first unlocking information reach the first preset number threshold value and the first unlocking information still fails to pass the verification, the electronic equipment is forcibly locked. The first preset number threshold may be 5 times, 6 times, 8 times or more, and may be specifically set according to an actual requirement of a user, or may be a factory default value of the electronic device, which is not limited in this embodiment of the application. The number N of the first unlocking information may be smaller than or equal to the preset total input times.
For example, the electronic device may set the preset total number of inputs to 6 times, that is, the total number of times that the user can attempt to input the first unlocking information to 6 times, and the first preset number for determining whether to start the authentication may be set to 4 times. The electronic device may set an initial value of the matching number M to 0, and after receiving first unlocking information input by a user, add 1 to the matching number M if there is history verification information matching the first unlocking information. Within the preset total input times, for example, the user inputs 4 times, 5 times or 6 times, and if the matching number M reaches the first preset number, that is, 4 times, the electronic device determines that the matching degree of the first unlocking information input by the user and the historical verification information meets the preset condition, starts an identity authentication function, and verifies the identity of the user. It should be noted that, when the number N of the first unlocking information does not reach the preset total input times, if the identity authentication fails, the user may continue to input the first unlocking information until the number N of the first unlocking information reaches the preset total input times.
It should be noted that, specifically, when the matching number is calculated in the embodiment of the present application, the electronic device may calculate once after receiving the first unlocking information once, or perform comparison calculation after the number of user inputs reaches the preset total number of inputs, which is not limited in the embodiment of the present application.
In the embodiment of the application, before the user does not complete the preset total input times, the electronic device may determine the matching number M based on the matching condition of the first unlocking information and the historical verification information, and may trigger the identity authentication when the matching number M reaches the first preset number. Therefore, the user does not need to wait for the completion of the total input times, the safety verification operation of the user is simplified to a certain extent, and the safety verification mode of the electronic equipment is more flexible.
And 203, performing identity authentication on the user under the condition that the matching number M is not less than a first preset number.
Optionally, in this embodiment of the present application, step 203 may include the following steps (3) to (4):
step (3), collecting the face image of the user; or, collecting the fingerprint of the user; or, collecting the voice of the user.
In the embodiment of the application, after the electronic device starts the identity authentication function, the user can be verified by any one of face recognition, fingerprint recognition and voice recognition. When the face recognition is adopted, the electronic equipment can automatically start the camera to collect the face image of the user, and then whether the similarity between the face image and the preset face image is greater than a first preset threshold value or not is determined through image recognition technologies such as image feature extraction and image contrast. The first preset threshold may be a critical value of the corresponding similarity when the face recognition is successful, and may be, for example, 95%, 98%, or the like.
Exemplarily, fig. 3 shows a schematic diagram of face recognition according to an embodiment of the present application. As shown in fig. 3, the electronic apparatus is provided with a camera 301. The display screen of the electronic equipment displays the text prompt information of 'identity authentication, namely starting the camera'. Meanwhile, the electronic equipment displays an image acquisition area 302, and a user can adjust the body position, so that the image acquisition area 302 corresponds to the human face area of the user, and the electronic equipment can conveniently acquire the human face image.
When fingerprint identification is adopted, the electronic equipment can call the fingerprint identification module, and the user is prompted to press the finger to the fingerprint identification module of the electronic equipment so as to collect the fingerprint of the user, then based on the fingerprint identification technology, the electronic equipment compares the fingerprint of the user with the preset fingerprint, and whether the similarity of the fingerprint of the user and the preset fingerprint is greater than a second preset threshold value or not is judged. The second preset threshold may be a threshold of the corresponding similarity when the fingerprint identification is successful.
Illustratively, fig. 4 shows a schematic diagram of fingerprint identification according to an embodiment of the present application. As shown in fig. 4, the electronic device displays a text prompt message "authentication, please press a fingerprint identification button with a finger" on the display screen, and displays a fingerprint identification button 401. The electronic device collects the fingerprint of the user through the fingerprint identification button 401 and performs subsequent comparison and verification.
When the voice recognition is adopted, the electronic equipment can start a microphone to collect the voice of the user, then the voice of the user is compared with the preset voice through voice recognition technologies such as voiceprint feature extraction and voiceprint comparison, and whether the similarity between the voice of the user and the preset voice is larger than a third preset threshold value is determined. The third preset threshold may refer to a threshold of the corresponding similarity when the voice recognition is successful.
Illustratively, fig. 5 shows a schematic diagram of speech recognition according to an embodiment of the present application. As shown in fig. 5, the electronic device displays a text prompt message of "authentication, please speak the following sentence" in the display screen, and displays a content prompt box 501 of "jovi hello". And then the electronic equipment can collect the voice of the user reading the sentence, compare the voice of the user with the preset voice and determine the similarity of the voice of the user and the preset voice.
And (4) determining that the user passes the identity authentication under the condition that the similarity of the face image is greater than a first preset threshold, the similarity of the fingerprint is greater than a second preset threshold or the similarity of the voice is greater than a third preset threshold.
In the embodiment of the application, for three modes of face image recognition, fingerprint recognition and voice recognition, the electronic equipment can also set that the user is determined to pass the identity authentication after one verification mode passes, so that the steps of the identity authentication of the user can be simplified, and the efficiency of the identity authentication is improved. Of course, the electronic device may also set that the user can be determined to pass the identity authentication after all three verification modes pass, so that the comprehensiveness of the identity authentication can be ensured, and the use safety of the electronic device can be ensured.
In the embodiment of the application, the electronic equipment carries out identity verification on the user through any one of face image recognition, fingerprint recognition and voice recognition, and acquires a face image of the user or a fingerprint of the user; and determining that the user passes the identity authentication under the conditions that the similarity of the face image is greater than a first preset threshold, the similarity of the fingerprint is greater than a second preset threshold or the similarity of the voice is greater than a third preset threshold. Therefore, the electronic equipment performs identity authentication on the user through various optional modes, the flexibility of identity authentication can be improved, and the use safety of the electronic equipment is ensured.
And 204, if the user passes the identity authentication, unlocking the electronic equipment.
Specifically, the implementation manner of this step may refer to the foregoing step 104, and details of this embodiment are not described herein.
Step 205, if the user fails the identity authentication, and if the matching number M is lower than a second preset number, locking the electronic device at a first preset time.
In this embodiment of the application, the second preset number may refer to a critical value of the matching number, and may be 3, 4, 5, and the like, and may be flexibly set according to actual needs of a user. The first preset time may refer to a forced locking duration of the electronic device, and the first preset time may refer to a longer time, specifically, 15 minutes, 20 minutes, and the like, which is not limited in this embodiment of the application.
In this step, the time for the electronic device to forcibly lock may be determined according to the matching number. When a user tries to unlock the electronic equipment, if the matching number M is smaller than the second preset number, the matching degree of the N pieces of first unlocking information input by the user and the historical verification information is low, the probability that the user trying to unlock the electronic equipment is a stranger is high, and the electronic equipment can increase the forced locking time so as to ensure the safety of the electronic equipment and protect personal information of a user of the electronic equipment.
Step 206, if the user fails to pass the identity authentication, and if the matching number M is higher than a second preset number, locking the electronic device at a second preset time; wherein the first preset time is longer than the second preset time.
In this embodiment of the application, the second preset time may refer to a locking duration of the electronic device, and the second preset time may refer to a shorter time, specifically, 3 minutes, 5 minutes, and the like, which is not limited in this embodiment of the application.
In this step, when the user attempts to unlock the electronic device, if the matching number M is greater than the second preset number, it indicates that the degree of matching between the N pieces of first unlocking information input by the user and the historical verification information is high, and indicates that the probability that the user attempting to unlock is acquaintance or the user of the electronic device is high at this time, and the electronic device may shorten the locking time, so that the waiting time of the user may be reduced.
In the embodiment of the application, the electronic equipment is locked in first preset time under the condition that the matching number M is lower than a second preset number; locking the electronic equipment at a second preset time under the condition that the matching number M is higher than a second preset number; the first preset time is greater than the second preset time. Therefore, the electronic equipment determines the locking time of the electronic equipment based on the matching number, reduces the locking time when the matching number is high, can reduce the waiting time of a user, and ensures the normal use of the user while improving the safety.
Exemplarily, fig. 6 shows a flow chart of a security verification method according to an embodiment of the present application. As shown in fig. 6, after receiving N pieces of first unlocking information input by the user, if the first unlocking information matches the current verification information, the electronic device is successfully unlocked. And if the first unlocking information is not matched with the current verification information, determining the matching number M of the N pieces of first unlocking information and the historical verification information. When the matching number M is not less than the first preset number, starting identity authentication; and when the matching number M is smaller than the first preset number, locking the electronic equipment. When the identity authentication is carried out, after the face image of the user is successfully identified, the electronic equipment is directly unlocked without carrying out subsequent fingerprint identification and voice identification; under the condition that the face image identification is not passed, fingerprint identification is carried out on the user, after the fingerprint identification is passed, the subsequent voice identification step is not executed, and the electronic equipment is directly unlocked; and under the condition that the fingerprint identification is not passed, carrying out voice identification on the user, unlocking the electronic equipment after the voice identification is passed, and locking the electronic equipment if the voice identification is still not passed, namely, all three identity authentication modes are not passed. And the locking duration is determined according to the matching number M of the N pieces of first unlocking information and the historical verification information.
To sum up, the security verification method provided by the embodiment of the application receives N pieces of first unlocking information input by a user; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment; determining the number of first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M; under the condition that the matching number M is not less than the first preset number, performing identity authentication on the user; if the user passes the identity authentication, unlocking the electronic equipment; if the user does not pass the identity authentication and the matching number M is lower than a second preset number, locking the electronic equipment at a first preset time; if the user does not pass the identity authentication and the matching number M is higher than a second preset number, locking the electronic equipment at a second preset time; the first preset time is greater than the second preset time. In this way, in the embodiment of the application, the identity authentication is performed on the user when the matching number of the first unlocking information input by the user is not less than the first preset number, so that the security verification mode of the electronic equipment is enriched, the security verification mode is more flexible, unnecessary forced locking of the electronic equipment can be avoided, and the normal use of the electronic equipment by the user is ensured; and subsequently, the locking duration of the electronic equipment is determined according to the matching number, and the locking time is correspondingly reduced when the matching degree is high, so that the waiting time of a user can be reduced, the safety is improved, and the normal use of the user is ensured.
It should be noted that, in the security authentication method provided in the embodiment of the present application, the execution subject may be a security authentication apparatus, or a control module in the security authentication apparatus for executing loading of the security authentication method. In the embodiment of the present application, a security verification method executed by a security verification apparatus is taken as an example to describe the security verification apparatus provided in the embodiment of the present application.
Referring to fig. 7, a block diagram of a security authentication apparatus according to an embodiment of the present application is shown, and in particular, the security authentication apparatus 70 may include the following modules:
a receiving module 701, configured to receive N pieces of first unlocking information input by a user; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment;
a determining module 702, configured to determine the number of first unlocking information, which is matched with the historical verification information, in the N pieces of first unlocking information, to obtain a matching number M;
an authentication module 703, configured to perform identity authentication on the user when the matching number M is not less than a first preset number;
an unlocking module 704, configured to unlock the electronic device if the user passes the identity authentication;
a locking module 705, configured to lock the electronic device if the user fails the identity authentication.
Optionally, the first unlocking information includes at least one of a password and an unlocking graph; the determining module 702 includes:
the first determining submodule is used for determining a matching result of the first unlocking information and the historical verification information for the first unlocking information received each time; and the second determining submodule is used for determining the matching number M in the matching result.
Optionally, the locking module 705 is specifically configured to:
locking the electronic equipment at a first preset time under the condition that the matching number M is lower than a second preset number; locking the electronic equipment at a second preset time under the condition that the matching number M is higher than a second preset number; wherein the first preset time is longer than the second preset time.
Optionally, the authentication module 703 is specifically configured to:
acquiring a face image of the user; or, collecting the fingerprint of the user; or, collecting the voice of the user;
and determining that the user passes the identity authentication under the condition that the similarity of the face image is greater than a first preset threshold, the similarity of the fingerprint is greater than a second preset threshold or the similarity of the voice is greater than a third preset threshold.
Optionally, the first determining submodule is specifically configured to:
determining the similarity between the first unlocking information and the historical verification information;
under the condition that the similarity is larger than a preset similarity threshold, generating a matching result representing that the first unlocking information is matched with the historical verification information;
and under the condition that the similarity is not greater than a preset similarity threshold, generating a matching result representing that the first unlocking information is not matched with the historical verification information.
To sum up, the security verification apparatus provided in the embodiment of the present application receives N pieces of first unlocking information input by a user; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment; determining the number of first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M; under the condition that the matching number M is not less than the first preset number, performing identity authentication on the user; if the user passes the identity authentication, unlocking the electronic equipment; and if the user does not pass the identity authentication, locking the electronic equipment. Therefore, in the embodiment of the application, the identity authentication is performed on the user when the matching quantity of the first unlocking information input by the user is not less than the first preset quantity, so that the safety verification mode of the electronic equipment is enriched, the safety verification mode is more flexible, unnecessary forced locking of the electronic equipment can be avoided, and the normal use of the user on the electronic equipment is ensured.
The security verification device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The security authentication device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The security verification device provided in the embodiment of the present application can implement each process implemented by the method embodiments of fig. 1 to fig. 6, and is not described here again to avoid repetition.
Optionally, as shown in fig. 8, an electronic device 80 is further provided in this embodiment of the present application, and includes a processor 801, a memory 802, and a program or an instruction stored in the memory 802 and capable of running on the processor 801, where the program or the instruction is executed by the processor 801 to implement each process of the foregoing embodiment of the security verification method, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
It should be noted that the electronic devices in the embodiments of the present application include the mobile electronic devices and the non-mobile electronic devices described above.
Referring to fig. 9, a hardware structure diagram of an electronic device implementing various embodiments of the present application is shown.
The electronic device 90 includes, but is not limited to: a radio frequency unit 901, a network module 902, an audio output unit 903, an input unit 904, a sensor 905, a display unit 906, a user input unit 907, an interface unit 908, a memory 909, and a processor 910.
Those skilled in the art will appreciate that the electronic device 90 may further include a power source (e.g., a battery) for supplying power to various components, and the power source may be logically connected to the processor 910 through a power management system, so as to manage charging, discharging, and power consumption management functions through the power management system. The electronic device structure shown in fig. 9 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is not repeated here.
The user input unit 907 is configured to receive N pieces of first unlocking information input by a user; and the N pieces of first unlocking information are not matched with the current verification information preset in the electronic equipment.
The processor 910 is configured to determine the number of the first unlocking information matched with the historical verification information in the N pieces of first unlocking information, so as to obtain a matching number M.
A processor 910, configured to perform identity authentication on the user if the matching number M is not less than a first preset number.
A processor 910, configured to unlock the electronic device if the user passes the identity authentication.
A processor 910, configured to lock the electronic device if the user fails the identity authentication.
In the embodiment of the application, the electronic device can receive N pieces of first unlocking information input by a user; the N pieces of first unlocking information are not matched with current verification information preset in the electronic equipment; determining the number of first unlocking information matched with the historical verification information in the N pieces of first unlocking information to obtain a matching number M; under the condition that the matching number M is not less than the first preset number, performing identity authentication on the user; if the user passes the identity authentication, unlocking the electronic equipment; and if the user does not pass the identity authentication, locking the electronic equipment. Therefore, in the embodiment of the application, the identity authentication is performed on the user when the matching quantity of the first unlocking information input by the user is not less than the first preset quantity, so that the safety verification mode of the electronic equipment is enriched, the safety verification mode is more flexible, unnecessary forced locking of the electronic equipment can be avoided, and the normal use of the user on the electronic equipment is ensured.
It should be understood that, in the embodiment of the present application, the input Unit 904 may include a Graphics Processing Unit (GPU) 9041 and a microphone 9042, and the Graphics Processing Unit 9041 processes image data of a still picture or a video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 906 may include a display panel 9061, and the display panel 9061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 907 includes a touch panel 9071 and other input devices 9072. A touch panel 9071 also referred to as a touch screen. The touch panel 9071 may include two parts, a touch detection device and a touch controller. Other input devices 9072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. Memory 909 can be used to store software programs as well as various data including, but not limited to, application programs and operating systems. The processor 910 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It is to be appreciated that the modem processor described above may not be integrated into processor 910.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the process of the embodiment of the security verification method is implemented, and the same technical effect can be achieved, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement each process of the above-mentioned security verification method embodiment, and can achieve the same technical effect, and is not described here again to avoid repetition.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1.一种安全验证方法,其特征在于,包括:1. a security verification method, is characterized in that, comprises: 接收用户输入的N个第一解锁信息;其中,所述N个第一解锁信息与电子设备中预设的当前验证信息均不匹配;receiving N pieces of first unlocking information input by the user; wherein, the N pieces of first unlocking information do not match the current verification information preset in the electronic device; 确定所述N个第一解锁信息中与历史验证信息匹配的第一解锁信息的数量,得到匹配数量M;Determine the number of the first unlocking information that matches the historical verification information in the N first unlocking information, and obtain the matching number M; 在所述匹配数量M不小于第一预设数量的情况下,对所述用户进行身份认证;Under the condition that the matching number M is not less than the first preset number, perform identity authentication on the user; 若所述用户通过所述身份认证,则解锁所述电子设备;If the user passes the identity authentication, unlocking the electronic device; 若所述用户未通过所述身份认证,则锁定所述电子设备。If the user fails the identity authentication, the electronic device is locked. 2.根据权利要求1所述的方法,其特征在于,所述第一解锁信息包括密码、解锁图形其中至少一种;2. The method according to claim 1, wherein the first unlocking information comprises at least one of a password and an unlocking graphic; 所述确定所述N个第一解锁信息中与历史验证信息匹配的第一解锁信息的数量,得到匹配数量M,包括:Determining the number of first unlocking information that matches the historical verification information in the N first unlocking information to obtain the matching number M, including: 对于每次接收到的所述第一解锁信息,确定所述第一解锁信息与所述历史验证信息的匹配结果;For each received first unlocking information, determine a matching result between the first unlocking information and the historical verification information; 确定所述匹配结果中匹配的数量M。Determine the number M of matches in the matching result. 3.根据权利要求1或2所述的方法,其特征在于,所述若所述用户未通过所述身份认证,则锁定所述电子设备,包括:3. The method according to claim 1 or 2, wherein the locking the electronic device if the user fails the identity authentication, comprises: 在所述匹配数量M低于第二预设数量的情况下,以第一预设时间锁定所述电子设备;In the case that the matching number M is lower than a second preset number, locking the electronic device for a first preset time; 在所述匹配数量M高于第二预设数量的情况下,以第二预设时间锁定所述电子设备;In the case that the matching number M is higher than a second preset number, locking the electronic device for a second preset time; 其中,所述第一预设时间大于所述第二预设时间。Wherein, the first preset time is greater than the second preset time. 4.根据权利要求1所述的方法,其特征在于,所述对所述用户进行身份认证,包括:4. The method according to claim 1, wherein the performing identity authentication on the user comprises: 采集所述用户的人脸图像;或,采集所述用户的指纹;或,采集所述用户的语音;collecting the face image of the user; or, collecting the fingerprint of the user; or, collecting the voice of the user; 在所述人脸图像的相似度大于第一预设阈值、所述指纹的相似度大于第二预设阈值或所述语音的相似度大于第三预设阈值的情况下,确定所述用户通过所述身份认证。When the similarity of the face image is greater than a first preset threshold, the similarity of the fingerprint is greater than a second preset threshold, or the similarity of the voice is greater than a third preset threshold, it is determined that the user has passed the the identity authentication. 5.根据权利要求2所述的方法,其特征在于,所述确定所述第一解锁信息与所述历史验证信息的匹配结果,包括:5. The method according to claim 2, wherein the determining a matching result between the first unlocking information and the historical verification information comprises: 确定第一解锁信息与所述历史验证信息的相似度;determining the similarity between the first unlocking information and the historical verification information; 在所述相似度大于预设相似度阈值的情况下,生成表征所述第一解锁信息与所述历史验证信息相匹配的匹配结果;In the case that the similarity is greater than a preset similarity threshold, generating a matching result representing that the first unlocking information matches the historical verification information; 在所述相似度不大于预设相似度阈值的情况下,生成表征所述第一解锁信息与所述历史验证信息不相匹配的匹配结果。In the case that the similarity is not greater than a preset similarity threshold, a matching result indicating that the first unlocking information does not match the historical verification information is generated. 6.一种安全验证装置,其特征在于,包括:6. A safety verification device, characterized in that, comprising: 接收模块,用于接收用户输入的N个第一解锁信息;其中,所述N个第一解锁信息与电子设备中预设的当前验证信息均不匹配;a receiving module, configured to receive N pieces of first unlocking information input by a user; wherein, the N pieces of first unlocking information do not match the current verification information preset in the electronic device; 确定模块,用于确定所述N个第一解锁信息中与历史验证信息匹配的第一解锁信息的数量,得到匹配数量M;A determination module, used for determining the number of first unlocking information matching the historical verification information in the N first unlocking information, to obtain the matching number M; 认证模块,用于在所述匹配数量M不小于第一预设数量的情况下,对所述用户进行身份认证;an authentication module, configured to perform identity authentication on the user when the matching number M is not less than a first preset number; 解锁模块,用于若所述用户通过所述身份认证,则解锁所述电子设备;an unlocking module for unlocking the electronic device if the user passes the identity authentication; 锁定模块,用于若所述用户未通过所述身份认证,则锁定所述电子设备。A locking module, configured to lock the electronic device if the user fails the identity authentication. 7.根据权利要求6所述的装置,其特征在于,所述第一解锁信息包括密码、解锁图形其中至少一种;7. The device according to claim 6, wherein the first unlocking information comprises at least one of a password and an unlocking graphic; 所述确定模块,包括:The determining module includes: 第一确定子模块,用于对于每次接收到的所述第一解锁信息,确定所述第一解锁信息与所述历史验证信息的匹配结果;a first determination submodule, configured to determine a matching result between the first unlocking information and the historical verification information for the first unlocking information received each time; 第二确定子模块,用于确定所述匹配结果中匹配的数量M。The second determination submodule is configured to determine the number M of matches in the matching result. 8.根据权利要求6或7所述的装置,其特征在于,所述锁定模块,具体用于:8. The device according to claim 6 or 7, wherein the locking module is specifically used for: 在所述匹配数量M低于第二预设数量的情况下,以第一预设时间锁定所述电子设备;In the case that the matching number M is lower than a second preset number, locking the electronic device for a first preset time; 在所述匹配数量M高于第二预设数量的情况下,以第二预设时间锁定所述电子设备;In the case that the matching number M is higher than a second preset number, locking the electronic device for a second preset time; 其中,所述第一预设时间大于所述第二预设时间。Wherein, the first preset time is greater than the second preset time. 9.根据权利要求6所述的装置,其特征在于,所述认证模块,具体用于:9. The device according to claim 6, wherein the authentication module is specifically used for: 采集所述用户的人脸图像;或,采集所述用户的指纹;或,采集所述用户的语音;collecting the face image of the user; or, collecting the fingerprint of the user; or, collecting the voice of the user; 在所述人脸图像的相似度大于第一预设阈值、所述指纹的相似度大于第二预设阈值或所述语音的相似度大于第三预设阈值的情况下,确定所述用户通过所述身份认证。When the similarity of the face image is greater than a first preset threshold, the similarity of the fingerprint is greater than a second preset threshold, or the similarity of the voice is greater than a third preset threshold, it is determined that the user has passed the the identity authentication. 10.根据权利要求7所述的装置,其特征在于,所述第一确定子模块,用于:10. The apparatus according to claim 7, wherein the first determination submodule is configured to: 确定第一解锁信息与所述历史验证信息的相似度;determining the similarity between the first unlocking information and the historical verification information; 在所述相似度大于预设相似度阈值的情况下,生成表征所述第一解锁信息与所述历史验证信息相匹配的匹配结果;In the case that the similarity is greater than a preset similarity threshold, generating a matching result representing that the first unlocking information matches the historical verification information; 在所述相似度不大于预设相似度阈值的情况下,生成表征所述第一解锁信息与所述历史验证信息不相匹配的匹配结果。In the case that the similarity is not greater than a preset similarity threshold, a matching result indicating that the first unlocking information does not match the historical verification information is generated.
CN202011348819.9A 2020-11-26 2020-11-26 Security verification method and device, electronic equipment and storage medium Pending CN112417429A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011348819.9A CN112417429A (en) 2020-11-26 2020-11-26 Security verification method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011348819.9A CN112417429A (en) 2020-11-26 2020-11-26 Security verification method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112417429A true CN112417429A (en) 2021-02-26

Family

ID=74842556

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011348819.9A Pending CN112417429A (en) 2020-11-26 2020-11-26 Security verification method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112417429A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113313350A (en) * 2021-04-23 2021-08-27 武汉瑞安科技发展有限公司 Internet of things data acquisition, analysis and management system
CN120415883A (en) * 2025-06-11 2025-08-01 四川亿源聚鸿科技有限公司 An identity authentication method based on Internet of Vehicles technology

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778129A (en) * 2016-11-30 2017-05-31 成都中科创达软件有限公司 A kind of cipher management method, system and intelligent terminal
CN107729742A (en) * 2017-10-11 2018-02-23 广州视源电子科技股份有限公司 Equipment unlocking control method, device, equipment and storage medium
CN110011992A (en) * 2019-03-25 2019-07-12 联想(北京)有限公司 System login method and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778129A (en) * 2016-11-30 2017-05-31 成都中科创达软件有限公司 A kind of cipher management method, system and intelligent terminal
CN107729742A (en) * 2017-10-11 2018-02-23 广州视源电子科技股份有限公司 Equipment unlocking control method, device, equipment and storage medium
CN110011992A (en) * 2019-03-25 2019-07-12 联想(北京)有限公司 System login method and electronic equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113313350A (en) * 2021-04-23 2021-08-27 武汉瑞安科技发展有限公司 Internet of things data acquisition, analysis and management system
CN120415883A (en) * 2025-06-11 2025-08-01 四川亿源聚鸿科技有限公司 An identity authentication method based on Internet of Vehicles technology

Similar Documents

Publication Publication Date Title
US11914693B2 (en) Fingerprint recognition method and apparatus, and touchscreen terminal
US9122913B2 (en) Method for logging a user in to a mobile device
CN106355141B (en) Portable electronic device and operation method thereof
US8121359B2 (en) Fingerprint identification system and method of an electronic device
CN108629174B (en) Method and device for checking character strings
CN107924436A (en) Electronic device access control using biometrics
CN105320864A (en) A processing method and device for event operation
US9021270B1 (en) Combining wake-up and unlock into a single gesture
CN105159585A (en) Function unlocking method and system based on fingerprint
CN108804006B (en) Unlocking method, device, device and storage medium for wearable device
WO2017167094A1 (en) Data processing method, device and smart terminal
CN101667234A (en) Lock state transition method, electronic device and computer program product
CN105678147B (en) Touch operation method and device
CN107360276A (en) A kind of verification method based on double fingerprint recognitions, mobile terminal and storage device
US20140347161A1 (en) Authorizing system and method of portable electronic device
CN105205380A (en) Unlocking method and device of mobile terminal
CN114268453B (en) Power system unlocking method and device, computer equipment and storage medium
CN108171033A (en) Mixing auth method, device, storage medium and the terminal of intelligent terminal
WO2021244531A1 (en) Payment method and apparatus based on facial recognition
CN109508522A (en) A data clearing method, device, storage medium and terminal
CN107145772A (en) Terminal equipment security control method, device and terminal equipment
CN101276586A (en) Voice control device and method
CN112417429A (en) Security verification method and device, electronic equipment and storage medium
CN109814964B (en) Interface display method, terminal equipment and computer readable storage medium
CN111641751B (en) Screen unlocking method and device of terminal equipment, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination