CN105608356A - Password generation method and device, password authentication method and device as well as terminal - Google Patents

Password generation method and device, password authentication method and device as well as terminal Download PDF

Info

Publication number
CN105608356A
CN105608356A CN201510427191.4A CN201510427191A CN105608356A CN 105608356 A CN105608356 A CN 105608356A CN 201510427191 A CN201510427191 A CN 201510427191A CN 105608356 A CN105608356 A CN 105608356A
Authority
CN
China
Prior art keywords
information
password
biological
terminal
posture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510427191.4A
Other languages
Chinese (zh)
Inventor
王盛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510427191.4A priority Critical patent/CN105608356A/en
Publication of CN105608356A publication Critical patent/CN105608356A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Abstract

The invention provides a password generation method and device, a password authentication method and device as well as a terminal. The password generation method comprises the following steps: after obtaining an instruction indicating to carry out password generation on appointed business data by a user, collecting biological characteristic information of the user; obtaining gesture information of a terminal in a time range of collecting the biological characteristic information; and generating a combined password according to the biological characteristic information and the gesture information so as to complete the encryption process of the appointed business data, wherein the biological characteristic information comprises at least one biological characteristic or a plurality of biological characteristics and the collection sequence among a plurality of biological characteristic information, the gesture information of the terminal comprises at least one gesture characteristic or a plurality of gesture characteristics and the obtaining sequence of the plurality of gesture characteristics. Through the technical scheme, the safety and reliability of the password generation scheme and the password authentication scheme are strengthened under the premise of not increasing the step of carrying out touch operation on the terminal by the user, so that the user experience is improved.

Description

Method for generating cipher code and device, method of password authentication and device and terminal
Technical field
The present invention relates to field of information security technology, in particular to a kind of method for generating cipher code,A kind of method of password authentication, a kind of password generating apparatus, a kind of password authentication device and a kind of terminal.
Background technology
In correlation technique, become with deciphering (password authentification) for the encryption (password generation) of dataFor the important step that user ensures for data security, wherein, encipherment scheme adopts character conventionallyThe single modes such as password encryption or finger-print cipher encryption are carried out password encryption, not in conjunction with multiplePassword is realized ciphering process, and the security performance of single password encryption is not high, easily by othersAfter learning or cracking, cause data to reveal, in addition, for the decrypt scheme of above-mentioned encryption method,Conventionally adopt the single modes such as character password coupling or finger-print cipher coupling to carry out password authentification, andNot realizing proof procedure in conjunction with multiple password, there are great data in single password authentification modeDisclosure risk, in addition, needs user easily to obscure the password that each business is configured, thereby causesThe low inferior problem of authentication failed and verification efficiency.
Therefore, how to design a kind of password and generate scheme, a kind of password authentification scheme and a kind of terminal,Not increase under the prerequisite of the touch control operation step of user to terminal, strengthened password generate scheme andThe safety and reliability of password authentification scheme, becomes technical problem urgently to be resolved hurrily.
Summary of the invention
The present invention just based on above-mentioned technical problem one of at least, proposed a kind of password generate scheme,A kind of password authentification scheme and a kind of terminal, by the biology spy in conjunction with user by the attitude information of terminalLevy Information generation enciphered message, and in password authentification process, designed for above-mentioned enciphered messageCorresponding verification step, not increasing under the prerequisite of the touch control operation step of user to terminal, has strengthenedPassword generates the safety and reliability of scheme and password authentification scheme, has promoted user's use bodyTest.
In view of this, embodiment according to a first aspect of the invention, provides a kind of password generation sideMethod, comprising: specified services data are carried out after the instruction of password generation obtaining user, gather userBiological information; Gathering in the time range of described biological information, obtain described terminalAttitude information; Generate combination pin according to described biological information and described attitude information, with completeThe ciphering process of paired described specified services data, wherein, described biological information comprises at least oneIndividual biological characteristic, or acquisition order between multiple biological characteristic and described multiple biological information,The attitude information of described terminal comprises at least one posture feature, or multiple posture feature and described multipleObtaining sequentially between posture feature.
In this technical scheme, by the attitude information of user's biological information and terminal is appliedIn the password generative process of terminal traffic, effectively raise the safety and reliability of enciphered message,Above-mentioned terminal comprises mobile terminal (as mobile phone, panel computer and music player etc.).
Wherein, biological information comprises that (fingerprint identification device by terminal obtains user fingerprints information), user's face image information (obtaining by the equipment such as terminal camera), user's tone color information(sound identification module by terminal obtains) and client iris information (are known by the iris in terminalOther equipment obtains) etc., the gravity sensor of the attitude information of terminal by terminal is (as gyroscope with addSpeedometer etc.) obtain, default biological information and preset posture information can be stored in the basis of terminalOn ground hard disk and/or server.
Particularly, mobile phone screen locking is carried out after the instruction of password generation obtaining user, gathered user'sA biological information (for example finger print information), at the Preset Time gathering after finger print information successFor example, after (30 seconds), a kind of attitude information (for example rotating mobile) of acquisition terminal. To gatherTo finger print information and attitude information generate a pair of combination pin, complete the encryption to mobile phone screen locking. ThisOutward, can also mobile phone screen locking be carried out after the instruction of password generation obtaining user, gather the many of userIndividual and/or multiple biological information (for example finger print information, face image information), and recordThe acquisition order of multiple biological informations, the Preset Time after the success of collection finger print information (for example30 seconds) in, the one of acquisition terminal and/or multiple terminal attitude information are (such as rotating and turning overTurn), and the acquisition order of storing multiple attitude informations, according to the biological information collecting,The order of order, attitude information and the attitude information of biological information generates one group or many group combinationsPassword, completes the encryption to mobile phone screen locking.
In technique scheme, preferably, described attitude information comprises: between terminal and plumb lineRotation information in arbitrary plane of angle change information, terminal and/or described terminal in the time specifyingInterior vibration information.
In technique scheme, preferably, according to described biological information and described attitude informationGenerate combination pin, to complete the ciphering process to described specified services data, specifically comprise following stepRapid: according to preset rules, described biological characteristic and corresponding posture feature to be combined to form at least one is closeCode element; Generate described combination pin according to described at least one password unit.
In this technical scheme, by according to preset rules by biological characteristic and corresponding posture feature groupClose and form a password unit or multiple password unit, and by this password unit or multiple closeCode element generates combination pin, has further strengthened reliability and the security of password generation scheme.
In technique scheme, preferably, according to preset rules by described biological characteristic with correspondingPosture feature is combined to form at least one password unit, specifically comprises the following steps: obtaining a lifeThing feature, and do not obtain before next biological characteristic, judge whether to obtain at least one posture feature;In the time that described at least one posture feature is obtained in judgement, judgement obtain a described biological characteristic with described inWhether the time interval between at least one posture feature is less than Preset Time interval; Obtain institute in judgementThe time interval of stating between a biological characteristic and described at least one posture feature is less than between Preset TimeEvery time, a described biological characteristic and the whole posture features in the described time interval are combined to form to oneIndividual described password unit.
In this technical scheme, by technique scheme, provide the tool that a kind of password unit generatesBody scheme, also within the typing time interval of two biological characteristics, if first biological informationBe less than Preset Time interval to the time interval of obtaining several posture features, that first is biological specialReference breath and several posture features that meet time constraint condition are all as a password unit, successivelyAnalogize, determine all password units.
According to a second aspect of the invention, a kind of method of password authentication is also proposed, described password authentificationMethod comprises: the biological information that obtains user; Obtain the attitude information of described terminal, described endThe attitude information of end comprises at least one posture feature; Judge that described biological information is with default biologicalWhether characteristic information mates; Judging described biological information and described default biological informationTiming, judge arbitrary posture feature in described attitude information whether with preset posture information in arbitraryPreset posture characteristic matching; The described arbitrary posture feature obtaining in judgement and described arbitrary preset postureWhen characteristic matching, determine password authentification success, wherein, described biological information comprises at least oneThe typing order of biological characteristic and biological characteristic, described attitude information comprise described terminal and plumb line itBetween angle change information, rotation information and/or the described terminal of described terminal in arbitrary plane existVibration information in fixed time.
In this technical scheme, by the attitude information of user's biological information and terminal is appliedIn the proof procedure of terminal traffic, effectively improve the safety and reliability of password authentification process,Promoted user's experience, above-mentioned terminal comprises that mobile terminal is (as mobile phone, panel computer and soundHappy player etc.).
Particularly, mobile phone screen locking is carried out after the instruction of password authentification obtaining user, input user'sA biological information (for example finger print information), the Preset Time after the success of input finger print informationFor example, after (30 seconds), a kind of attitude information (for example rotating mobile) of input terminal, inputFinger print information and attitude information generate a pair of combined authentication password, complete the deciphering to mobile phone screen locking. ThisOutward, can also mobile phone screen locking be carried out after the instruction of password authentification obtaining user, input user's is manyIndividual and/or multiple biological information (for example finger print information, face image information), wherein, defeatedThe multiple biological informations that enter there is certain order, default after the success of input finger print informationFor example, in the time (30 seconds), input terminal one and/or multiple terminal attitude information are (such as rotationAnd upset), and the combination pin of input is mated with default combination pin.
Wherein, biological information comprises user fingerprints information, user's face image information, Yong HuyinLook information and client iris information etc., the gravity sensor of the attitude information of terminal by terminal is (as topSpiral shell instrument and accelerometer etc.) obtain, default biological information and preset posture information can be stored inOn the local hard drive and/or server of terminal, preset biological spy with the Real-time Obtaining that needs according to checkingReference breath and preset posture information.
Be worth particularly pointing out, the matching process of biological information is according to completely mating and sentenceBreaking, is also that arbitrary biological characteristic of typing all can find coupling right in default biological informationResemble, and the typing of all biological feature order is consistent with preset order, and the typing of all biological featureNumber is consistent with default number, and the attitude information of terminal is as long as get final product really with preset posture information matchesRecognize and be proved to be successful (twice coupling), further, preset order that can preset posture information withThe typing order of attitude information is mated, complete above-mentioned after three times the match is successful, furtherGround, can assembled gesture information and biological information, and by the feature of combination pin and default combinationThe feature of password is mated, and completes definite being proved to be successful after above-mentioned four matching judgment, and above-mentionedAll password authentification processes are all exceeded the operating procedure that increases user, have realized safer and convenientPassword authentification mode.
In technique scheme, preferably, the described arbitrary posture feature obtaining in judgement with described inWhen arbitrary preset posture characteristic matching, determine password authentification success, comprise following concrete steps: sentencingSurely, when the described arbitrary posture feature obtaining and described arbitrary preset posture characteristic matching, judge described appearanceWhether the typing order of state feature is consistent with the preset order of described preset posture feature; Described in judgingWhen the typing order of at least one posture feature is consistent with the preset order of described preset posture feature, reallyDetermine password authentification success.
In this technical scheme, by judging posture feature when coupling, continue to judge posture featureWhether typing order is consistent with preset order, is proved to be successful determining whether, promoted further closeThe security of code proof procedure.
In technique scheme, preferably, the described arbitrary posture feature obtaining in judgement with described inWhen arbitrary preset posture characteristic matching, determine password authentification success, comprise following concrete steps: sentencingSurely, when the described arbitrary posture feature obtaining and described arbitrary preset posture characteristic matching, generate and comprise entirelyThe combination pin information of biological information and whole described attitude informations described in portion; Judge described combinationWhether the typing order of encrypted message is consistent with the preset order of default combination encrypted message; Judging instituteState the typing order of combination pin information and the preset order of described default combination encrypted message when consistent,Determine password authentification success.
In this technical scheme, by when posture feature and the preset posture characteristic matching, for biologyThe combination pin that characteristic information and attitude information form carries out matching judgment, has improved further passwordThe security of proof procedure, meanwhile, does not increase user's operating procedure.
In technique scheme, preferably, also comprise: in arbitrary biological characteristic described in typing or instituteState in the fixed time after arbitrary posture feature, judge whether to obtain another biological characteristic or anotherPosture feature; In the time that another biological characteristic or another posture feature are not obtained in judgement, determine passwordAuthentication failed.
In this technical scheme, by limiting any two cipher features of typing (biological information or appearanceState information) between the time interval, further promoted the security of password authentification, also existThe time interval, when long, forces to finish password authentification process, in addition, and for the higher industry of level of securityThe password authentification process of business, can be in the time forcing to finish password authentification process, the prompting that gives the alarm, withEffectively avoid password authentification overlong time and cause the situation that password is decrypted to occur.
According to a third aspect of the invention we, also proposed a kind of password generating apparatus, described password generatesDevice comprises: collecting unit, and for the finger that is obtaining user and specified services data are carried out to password generationAfter order, gather user's biological information; Acquiring unit, for gathering described biological characteristic letterIn the time range of breath, obtain the attitude information of described terminal; Assembled unit, for according to described lifeThing characteristic information and described attitude information generate combination pin, with what complete described specified services dataCiphering process, wherein, described biological information comprises at least one biological characteristic, or multiple biologyAcquisition order between feature and described multiple biological information, the attitude information of described terminal comprisesAt least one posture feature, or obtaining between multiple posture feature and described multiple posture feature is suitableOrder.
In this technical scheme, by the attitude information of user's biological information and terminal is appliedIn the password generative process of terminal traffic, effectively raise the safety and reliability of enciphered message,Above-mentioned terminal comprises mobile terminal (as mobile phone, panel computer and music player etc.).
Wherein, biological information comprises that (fingerprint identification device by terminal obtains user fingerprints information), user's face image information (obtaining by the equipment such as terminal camera), user's tone color information(sound identification module by terminal obtains) and client iris information (are known by the iris in terminalOther equipment obtains) etc., the gravity sensor of the attitude information of terminal by terminal is (as gyroscope with addSpeedometer etc.) obtain, default biological information and preset posture information can be stored in the basis of terminalOn ground hard disk and/or server, before password generative process is particularly carried out, determine whether to establishDetermine time restriction or the restriction of password figure place that password generates, or confirm that user password setting completesAfter, complete password generative process according to user's confirmation instruction, in addition, complete after password generation,The specifying information of combination pin is converted to text or schematic diagram that can be recognized by the user and is prompted to useFamily, so that user determines whether correct encryption, thereby has improved the accuracy that password generates.
Particularly, mobile phone screen locking is carried out after the instruction of password generation obtaining user, gathered user'sA biological information (for example finger print information), at the Preset Time gathering after finger print information successFor example, after (30 seconds), a kind of attitude information (for example rotating mobile) of acquisition terminal. To gatherTo finger print information and attitude information generate a pair of combination pin, complete the encryption to mobile phone screen locking. ThisOutward, can also mobile phone screen locking be carried out after the instruction of password generation obtaining user, gather the many of userIndividual and/or multiple biological information (for example finger print information, face image information), and recordThe acquisition order of multiple biological informations, the Preset Time after the success of collection finger print information (for example30 seconds) in, the one of acquisition terminal and/or multiple terminal attitude information are (such as rotating and turning overTurn), and the acquisition order of storing multiple attitude informations, according to the biological information collecting,The order of order, attitude information and the attitude information of biological information generates one group or many group combinationsPassword, completes the encryption to mobile phone screen locking.
In technique scheme, preferably, described attitude information comprises: between terminal and plumb lineRotation information in arbitrary plane of angle change information, terminal and/or described terminal in the time specifyingInterior vibration information.
In technique scheme, preferably, described assembled unit also for: according to preset rules willDescribed biological characteristic is combined to form at least one password unit with corresponding posture feature; Described combination is singleUnit also comprises: generation unit, and close for generating described combination according to described at least one password unitCode.
In this technical scheme, by according to preset rules by biological characteristic and corresponding posture feature groupClose and form a password unit or multiple password unit, and by this password unit or multiple closeCode element generates combination pin, has further strengthened reliability and the security of password generation scheme.
In technique scheme, preferably, described assembled unit also comprises: judgment sub-unit, useIn obtaining a biological characteristic, and do not obtain before next biological characteristic, judge whether to obtain at leastA posture feature; Described judgment sub-unit is used for: obtain described at least one posture feature in judgementTime, the time interval between a described biological characteristic and described at least one posture feature is obtained in judgementWhether be less than Preset Time interval; Described assembled unit also for: obtain a described biology in judgementThe time interval between feature and described at least one posture feature is while being less than Preset Time interval, by instituteState a biological characteristic and the whole posture features in the described time interval are combined to form a described passwordUnit.
In this technical scheme, by technique scheme, provide the tool that a kind of password unit generatesBody scheme, also within the typing time interval of two biological characteristics, if first biological informationBe less than Preset Time interval to the time interval of obtaining several posture features, that first is biological specialReference breath and several posture features that meet time constraint condition are all as a password unit, successivelyAnalogize, determine all password units.
According to a forth aspect of the invention, also propose a kind of password authentication device, be applicable to terminal,It is characterized in that, described password authentication device comprises: acquisition module, and for obtaining user's biology spyReference breath; Described acquisition module also for: obtain the attitude information of described terminal, the appearance of described terminalState information comprises at least one posture feature; Described password authentication device also comprises: correction verification module, useIn judging whether described biological information mates with default biological information; Described correction verification module alsoBe used for: in the time judging that described biological information mates with described default biological information, judge instituteState arbitrary posture feature in attitude information whether with preset posture information in arbitrary preset posture featureCoupling; Described password authentication device also comprises: determination module, and described arbitrary for what obtain in judgementWhen posture feature and described arbitrary preset posture characteristic matching, determine password authentification success, wherein, instituteState the typing order that biological information comprises at least one biological characteristic and biological characteristic, described attitudeInformation comprises that the angle change information between described terminal and plumb line, described terminal are in arbitrary planeRotation information and/or the vibration information of described terminal at the appointed time.
In this technical scheme, by the attitude information of user's biological information and terminal is appliedIn the proof procedure of terminal traffic, effectively improve the safety and reliability of password authentification process,Promoted user's experience, above-mentioned terminal comprises that mobile terminal is (as mobile phone, panel computer and soundHappy player etc.).
Particularly, mobile phone screen locking is carried out after the instruction of password authentification obtaining user, input user'sA biological information (for example finger print information), the Preset Time after the success of input finger print informationFor example, after (30 seconds), a kind of attitude information (for example rotating mobile) of input terminal, inputFinger print information and attitude information generate a pair of combined authentication password, complete the deciphering to mobile phone screen locking. ThisOutward, can also mobile phone screen locking be carried out after the instruction of password authentification obtaining user, input user's is manyIndividual and/or multiple biological information (for example finger print information, face image information), wherein, defeatedThe multiple biological informations that enter there is certain order, default after the success of input finger print informationFor example, in the time (30 seconds), input terminal one and/or multiple terminal attitude information are (such as rotationAnd upset), and the combination pin of input is mated with default combination pin.
Wherein, biological information comprises user fingerprints information, user's face image information, Yong HuyinLook information and client iris information etc., the gravity sensor of the attitude information of terminal by terminal is (as topSpiral shell instrument and accelerometer etc.) obtain, default biological information and preset posture information can be stored inOn the local hard drive and/or server of terminal, preset biological spy with the Real-time Obtaining that needs according to checkingReference breath and preset posture information.
Be worth particularly pointing out, the matching process of biological information is according to completely mating and sentenceBreaking, is also that arbitrary biological characteristic of typing all can find coupling right in default biological informationResemble, and the typing of all biological feature order is consistent with preset order, and the typing of all biological featureNumber is consistent with default number, and the attitude information of terminal is as long as get final product really with preset posture information matchesRecognize and be proved to be successful (twice coupling), further, preset order that can preset posture information withThe typing order of attitude information is mated, complete above-mentioned after three times the match is successful, furtherGround, can assembled gesture information and biological information, and by the feature of combination pin and default combinationThe feature of password is mated, and completes definite being proved to be successful after above-mentioned four matching judgment, and above-mentionedAll password authentification processes are all exceeded the operating procedure that increases user, have realized safer and convenientPassword authentification mode.
In technique scheme, preferably, described correction verification module is also for the institute that obtains in judgementWhile stating arbitrary posture feature and described arbitrary preset posture characteristic matching, judge the record of described posture featureEnter order whether consistent with the preset order of described preset posture feature; Described determination module also for:Judging the typing order of described at least one posture feature and the preset order of described preset posture featureWhen consistent, determine password authentification success.
In this technical scheme, by judging posture feature when coupling, continue to judge posture featureWhether typing order is consistent with preset order, is proved to be successful determining whether, promoted further closeThe security of code proof procedure.
In technique scheme, preferably, described determination module also comprises: generation module, forWhen the described arbitrary posture feature obtaining in judgement and described arbitrary preset posture characteristic matching, generate bagDraw together the combination pin information of whole described biological informations and whole described attitude informations; Described verificationModule also for: the typing order that judges described combination pin information is pre-with default combination encrypted messageIf whether order is consistent; Described determination module also for: judging the typing of described combination pin informationWhen order is consistent with the preset order of described default combination encrypted message, determine password authentification success.
In this technical scheme, by when posture feature and the preset posture characteristic matching, for biologyThe combination pin that characteristic information and attitude information form carries out matching judgment, has improved further passwordThe security of proof procedure, meanwhile, does not increase user's operating procedure.
In technique scheme, preferably, described correction verification module also for: arbitrary described in typingIn fixed time after biological characteristic or described arbitrary posture feature, judge whether to obtain another biologyFeature or another posture feature; Described determination module also for: do not obtain another biology judgingWhen feature or another posture feature, determine password authentification failure.
In this technical scheme, by limiting any two cipher features of typing (biological information or appearanceState information) between the time interval, further promoted the security of password authentification, also existThe time interval, when long, forces to finish password authentification process, in addition, and for the higher industry of level of securityThe password authentification process of business, can be in the time forcing to finish password authentification process, the prompting that gives the alarm, withEffectively avoid password authentification overlong time and cause the situation that password is decrypted to occur.
According to a fifth aspect of the invention, also propose a kind of terminal, having comprised: as above-mentioned any one skillPassword authentification dress described in password generating apparatus described in art scheme and/or above-mentioned any one technical schemePut.
By above technical scheme, by the biological information in conjunction with user by the attitude information of terminalGenerate enciphered message, and in password authentification process, designed accordingly for above-mentioned enciphered messageVerification step, is not increasing under the prerequisite of the touch control operation step of user to terminal, has strengthened password rawThe safety and reliability of one-tenth scheme and password authentification scheme, has promoted user's experience.
Brief description of the drawings
Fig. 1 shows the schematic flow diagram of method for generating cipher code according to an embodiment of the invention;
Fig. 2 shows the schematic flow diagram of password generation scheme according to an embodiment of the invention;
Fig. 3 shows the schematic flow diagram of method of password authentication according to an embodiment of the invention;
Fig. 4 shows the schematic block diagram of password generating apparatus according to an embodiment of the invention;
Fig. 5 shows the schematic block diagram of password authentication device according to an embodiment of the invention;
Fig. 6 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 7 to Fig. 9 shows the schematic diagram of the attitude information of terminal according to an embodiment of the invention.
Detailed description of the invention
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with attachedFigure and detailed description of the invention are further described in detail the present invention. It should be noted that, notIn the situation of conflict, the feature in the application's embodiment and embodiment can combine mutually.
Set forth in the following description a lot of details so that fully understand the present invention, still,The present invention can also adopt other to be different from other modes described here and implement, therefore, and the present inventionProtection domain be not subject to the restriction of following public specific embodiment.
Fig. 1 shows the schematic flow diagram of method for generating cipher code according to an embodiment of the invention.
As shown in Figure 1, method for generating cipher code according to an embodiment of the invention, comprising: step102, specified services data are carried out after the instruction of password generation obtaining user, gather user's lifeThing characteristic information; Step 104, gathering in the time range of described biological information, obtains instituteState the attitude information of terminal; Step 106, raw according to described biological information and described attitude informationBecome combination pin, to complete the ciphering process to described specified services data, wherein, described biological specialReference breath comprises at least one biological characteristic, or multiple biological characteristic and described multiple biological informationBetween acquisition order, the attitude information of described terminal comprises at least one posture feature, or multiple appearanceObtaining sequentially between state feature and described multiple posture feature.
In this technical scheme, by the attitude information of user's biological information and terminal is appliedIn the password generative process of terminal traffic, effectively raise the safety and reliability of enciphered message,Above-mentioned terminal comprises mobile terminal (as mobile phone, panel computer and music player etc.).
Wherein, biological information comprises that (fingerprint identification device by terminal obtains user fingerprints information), user's face image information (obtaining by the equipment such as terminal camera), user's tone color information(sound identification module by terminal obtains) and client iris information (are known by the iris in terminalOther equipment obtains) etc., the gravity sensor of the attitude information of terminal by terminal is (as gyroscope with addSpeedometer etc.) obtain, default biological information and preset posture information can be stored in the basis of terminalOn ground hard disk and/or server, before password generative process is particularly carried out, determine whether to establishDetermine time restriction or the restriction of password figure place that password generates, or confirm that user password setting completesAfter, complete password generative process according to user's confirmation instruction, in addition, complete after password generation,The specifying information of combination pin is converted to text or schematic diagram that can be recognized by the user and is prompted to useFamily, so that user determines whether correct encryption, thereby has improved the accuracy that password generates.
Particularly, mobile phone screen locking is carried out after the instruction of password generation obtaining user, gathered user'sA biological information (for example finger print information), at the Preset Time gathering after finger print information successFor example, after (30 seconds), a kind of attitude information (for example rotating mobile) of acquisition terminal. To gatherTo finger print information and attitude information generate a pair of combination pin, complete the encryption to mobile phone screen locking. ThisOutward, can also mobile phone screen locking be carried out after the instruction of password generation obtaining user, gather the many of userIndividual and/or multiple biological information (for example finger print information, face image information), and recordThe acquisition order of multiple biological informations, the Preset Time after the success of collection finger print information (for example30 seconds) in, the one of acquisition terminal and/or multiple terminal attitude information are (such as rotating and turning overTurn), and the acquisition order of storing multiple attitude informations, according to the biological information collecting,The order of order, attitude information and the attitude information of biological information generates one group or many group combinationsPassword, completes the encryption to mobile phone screen locking.
In technique scheme, preferably, described attitude information comprises: between terminal and plumb lineAngle change information (as shown in Figure 7, terminal upwards sideway swivel 30 °), terminal arbitrary flatRotation information (as shown in Figure 8, terminal is planar to 30 ° of right rotations) in face and/or described inThe vibration information (as shown in Figure 9) of terminal at the appointed time.
In technique scheme, preferably, according to described biological information and described attitude informationGenerate combination pin, to complete the ciphering process to described specified services data, specifically comprise following stepRapid: according to preset rules, described biological characteristic and corresponding posture feature to be combined to form at least one is closeCode element; Generate described combination pin according to described at least one password unit.
In this technical scheme, by according to preset rules by biological characteristic and corresponding posture feature groupClose and form a password unit or multiple password unit, and by this password unit or multiple closeCode element generates combination pin, has further strengthened reliability and the security of password generation scheme.
In technique scheme, preferably, according to preset rules by described biological characteristic with correspondingPosture feature is combined to form at least one password unit, specifically comprises the following steps: obtaining a lifeThing feature, and do not obtain before next biological characteristic, judge whether to obtain at least one posture feature;In the time that described at least one posture feature is obtained in judgement, judgement obtain a described biological characteristic with described inWhether the time interval between at least one posture feature is less than Preset Time interval; Obtain institute in judgementThe time interval of stating between a biological characteristic and described at least one posture feature is less than between Preset TimeEvery time, a described biological characteristic and the whole posture features in the described time interval are combined to form to oneIndividual described password unit.
In this technical scheme, by technique scheme, provide the tool that a kind of password unit generatesBody scheme, also within the typing time interval of two biological characteristics, if first biological informationBe less than Preset Time interval to the time interval of obtaining several posture features, that first is biological specialReference breath and several posture features that meet time constraint condition are all as a password unit, successivelyAnalogize, determine all password units.
As shown in Figure 2, password generative process comprises according to an embodiment of the invention: step 202,Obtain the attitude information of terminal; Step 204, obtains user's biological information; Step 206,Generate combination pin; Step 208, prompting user combination pin, wherein, raw at password particularlyBefore one-tenth process is carried out, determine whether time restriction or the restriction of password figure place that setting code generates,Or after user confirms that password setting completes, complete password according to user's confirmation instruction and generatedJourney, in addition, completing after password generation, is converted to the specifying information of combination pin can be known by userOther text or schematic diagram are also prompted to user, so that user determines whether correct encryption, thereby carryThe accuracy that high password generates.
Fig. 3 shows the schematic flow diagram of method of password authentication according to an embodiment of the invention.
As shown in Figure 3, method of password authentication according to an embodiment of the invention, described password authentification sideMethod comprises: step 302, obtain user's biological information; Step 304, obtains described terminalAttitude information, the attitude information of described terminal comprises at least one posture feature; Step 306, sentencesWhether disconnected described biological information mates with default biological information; Step 308, is judging instituteWhen stating biological information and mating with described default biological information, judge in described attitude informationArbitrary posture feature whether with preset posture information in arbitrary preset posture characteristic matching; Step310, when the described arbitrary posture feature obtaining in judgement and described arbitrary preset posture characteristic matching,Determine password authentification success, wherein, described biological information comprises at least one biological characteristic and lifeThe typing order of thing feature, described attitude information comprises that the angle between described terminal and plumb line changesRotation information in arbitrary plane of information, described terminal and/or described terminal are at the appointed timeVibration information.
In this technical scheme, by the attitude information of user's biological information and terminal is appliedIn the proof procedure of terminal traffic, effectively improve the safety and reliability of password authentification process,Promoted user's experience, above-mentioned terminal comprises that mobile terminal is (as mobile phone, panel computer and soundHappy player etc.).
Wherein, biological information comprises user fingerprints information, user's face image information, Yong HuyinLook information and client iris information etc., the gravity sensor of the attitude information of terminal by terminal is (as topSpiral shell instrument and accelerometer etc.) obtain, default biological information and preset posture information can be stored inOn the local hard drive and/or server of terminal, preset biological spy with the Real-time Obtaining that needs according to checkingReference breath and preset posture information.
Particularly, mobile phone screen locking is carried out after the instruction of password authentification obtaining user, input user'sA biological information (for example finger print information), the Preset Time after the success of input finger print informationFor example, after (30 seconds), a kind of attitude information (for example rotating mobile) of input terminal, inputFinger print information and attitude information generate a pair of combined authentication password, complete the deciphering to mobile phone screen locking. ThisOutward, can also mobile phone screen locking be carried out after the instruction of password authentification obtaining user, input user's is manyIndividual and/or multiple biological information (for example finger print information, face image information), wherein, defeatedThe multiple biological informations that enter there is certain order, default after the success of input finger print informationFor example, in the time (30 seconds), input terminal one and/or multiple terminal attitude information are (such as rotationAnd upset), and the combination pin of input is mated with default combination pin.
Described attitude information comprises: the angle change information between terminal and plumb line is (as Fig. 7 instituteShow upwards 30 ° of sideway swivels of terminal), the rotation information of terminal in arbitrary plane be (as Fig. 8 instituteShow, terminal is planar to 30 ° of right rotations) and/or the vibration letter of described terminal at the appointed timeBreath (as shown in Figure 9).
Be worth particularly pointing out, the matching process of biological information is according to completely mating and sentenceBreaking, is also that arbitrary biological characteristic of typing all can find coupling right in default biological informationResemble, and the typing of all biological feature order is consistent with preset order, and the typing of all biological featureNumber is consistent with default number, and the attitude information of terminal is as long as get final product really with preset posture information matchesRecognize and be proved to be successful (twice coupling), further, preset order that can preset posture information withThe typing order of attitude information is mated, complete above-mentioned after three times the match is successful, furtherGround, can assembled gesture information and biological information, and by the feature of combination pin and default combinationThe feature of password is mated, and completes definite being proved to be successful after above-mentioned four matching judgment, and above-mentionedAll password authentification processes are all exceeded the operating procedure that increases user, have realized safer and convenientPassword authentification mode.
In technique scheme, preferably, the described arbitrary posture feature obtaining in judgement with described inWhen arbitrary preset posture characteristic matching, determine password authentification success, comprise following concrete steps: sentencingSurely, when the described arbitrary posture feature obtaining and described arbitrary preset posture characteristic matching, judge described appearanceWhether the typing order of state feature is consistent with the preset order of described preset posture feature; Described in judgingWhen the typing order of at least one posture feature is consistent with the preset order of described preset posture feature, reallyDetermine password authentification success.
In this technical scheme, by judging posture feature when coupling, continue to judge posture featureWhether typing order is consistent with preset order, is proved to be successful determining whether, promoted further closeThe security of code proof procedure.
In technique scheme, preferably, the described arbitrary posture feature obtaining in judgement with described inWhen arbitrary preset posture characteristic matching, determine password authentification success, comprise following concrete steps: sentencingSurely, when the described arbitrary posture feature obtaining and described arbitrary preset posture characteristic matching, generate and comprise entirelyThe combination pin information of biological information and whole described attitude informations described in portion; Judge described combinationWhether the typing order of encrypted message is consistent with the preset order of default combination encrypted message; Judging instituteState the typing order of combination pin information and the preset order of described default combination encrypted message when consistent,Determine password authentification success.
In this technical scheme, by when posture feature and the preset posture characteristic matching, for biologyThe combination pin that characteristic information and attitude information form carries out matching judgment, has improved further passwordThe security of proof procedure, meanwhile, does not increase user's operating procedure.
In technique scheme, preferably, also comprise: in arbitrary biological characteristic described in typing or instituteState in the fixed time after arbitrary posture feature, judge whether to obtain another biological characteristic or anotherPosture feature; In the time that another biological characteristic or another posture feature are not obtained in judgement, determine passwordAuthentication failed.
In this technical scheme, by limiting any two cipher features of typing (biological information or appearanceState information) between the time interval, further promoted the security of password authentification, also existThe time interval, when long, forces to finish password authentification process, in addition, and for the higher industry of level of securityThe password authentification process of business, can be in the time forcing to finish password authentification process, the prompting that gives the alarm, withEffectively avoid password authentification overlong time and cause the situation that password is decrypted to occur.
Fig. 4 shows the schematic block diagram of password generating apparatus according to an embodiment of the invention;
As shown in Figure 4, password generating apparatus 400 according to an embodiment of the invention, described password is rawApparatus for converting comprises: collecting unit 402, and for obtaining user, that specified services data are carried out to password is rawAfter the instruction becoming, gather user's biological information; Acquiring unit 404, for gather described inIn the time range of biological information, obtain the attitude information of described terminal; Assembled unit 406,For generating combination pin according to described biological information and described attitude information, to complete describedThe ciphering process of specified services data, wherein, described biological information comprises that at least one is biological specialLevy, or acquisition order between multiple biological characteristic and described multiple biological information, described terminalAttitude information comprise at least one posture feature, or multiple posture feature and described multiple posture featureBetween obtain order.
In this technical scheme, by the attitude information of user's biological information and terminal is appliedIn the password generative process of terminal traffic, effectively raise the safety and reliability of enciphered message,Above-mentioned terminal comprises mobile terminal (as mobile phone, panel computer and music player etc.).
Wherein, biological information comprises that (fingerprint identification device by terminal obtains user fingerprints information), user's face image information (obtaining by the equipment such as terminal camera), user's tone color information(sound identification module by terminal obtains) and client iris information (are known by the iris in terminalOther equipment obtains) etc., the gravity sensor of the attitude information of terminal by terminal is (as gyroscope with addSpeedometer etc.) obtain, default biological information and preset posture information can be stored in the basis of terminalOn ground hard disk and/or server, before password generative process is particularly carried out, determine whether to establishDetermine time restriction or the restriction of password figure place that password generates, or confirm that user password setting completesAfter, complete password generative process according to user's confirmation instruction, in addition, complete after password generation,The specifying information of combination pin is converted to text or schematic diagram that can be recognized by the user and is prompted to useFamily, so that user determines whether correct encryption, thereby has improved the accuracy that password generates.
Particularly, mobile phone screen locking is carried out after the instruction of password generation obtaining user, gathered user'sA biological information (for example finger print information), at the Preset Time gathering after finger print information successFor example, after (30 seconds), a kind of attitude information (for example rotating mobile) of acquisition terminal. To gatherTo finger print information and attitude information generate a pair of combination pin, complete the encryption to mobile phone screen locking. ThisOutward, can also mobile phone screen locking be carried out after the instruction of password generation obtaining user, gather the many of userIndividual and/or multiple biological information (for example finger print information, face image information), and recordThe acquisition order of multiple biological informations, the Preset Time after the success of collection finger print information (for example30 seconds) in, the one of acquisition terminal and/or multiple terminal attitude information are (such as rotating and turning overTurn), and the acquisition order of storing multiple attitude informations, according to the biological information collecting,The order of order, attitude information and the attitude information of biological information generates one group or many group combinationsPassword, completes the encryption to mobile phone screen locking.
In technique scheme, preferably, described attitude information comprises: between terminal and plumb lineAngle change information (as shown in Figure 7, terminal upwards sideway swivel 30 °), terminal arbitrary flatRotation information (as shown in Figure 8, terminal is planar to 30 ° of right rotations) in face and/or described inThe vibration information (as shown in Figure 9) of terminal at the appointed time.
In technique scheme, preferably, described assembled unit 406 also for: according to default ruleDescribed biological characteristic and corresponding posture feature are combined to form at least one password unit; Described groupClosing unit also comprises: generation unit 4062, and for generating institute according to described at least one password unitState combination pin.
In this technical scheme, by according to preset rules by biological characteristic and corresponding posture feature groupClose and form a password unit or multiple password unit, and by this password unit or multiple closeCode element generates combination pin, has further strengthened reliability and the security of password generation scheme.
In technique scheme, preferably, described assembled unit 406 also comprises: judgment sub-unit4064, for obtaining a biological characteristic, and do not obtain before next biological characteristic, judge whetherObtain at least one posture feature; Described judgment sub-unit 4064 for: judgement obtain described in extremelyWhen a few posture feature, a described biological characteristic and described at least one posture feature are obtained in judgementBetween the time interval whether be less than Preset Time interval; Described assembled unit 406 also for: sentencingThe time interval of surely obtaining between a described biological characteristic and described at least one posture feature is less than in advanceIf when the time interval, by a described biological characteristic and the whole posture feature groups in the described time intervalClose and form a described password unit.
In this technical scheme, by technique scheme, provide the tool that a kind of password unit generatesBody scheme, also within the typing time interval of two biological characteristics, if first biological informationBe less than Preset Time interval to the time interval of obtaining several posture features, that first is biological specialReference breath and several posture features that meet time constraint condition are all as a password unit, successivelyAnalogize, determine all password units.
Fig. 5 shows the schematic block diagram of password authentication device according to an embodiment of the invention;
As shown in Figure 5, password authentication device 500 according to an embodiment of the invention, comprising: obtainModule 502, for obtaining user's biological information; Described acquisition module 502 also for: obtainGet the attitude information of described terminal, the attitude information of described terminal comprises at least one posture feature; InstituteStating password authentication device 500 also comprises: correction verification module 504, and for judging described biological informationWhether mate with default biological information; Described correction verification module 504 also for: judge described lifeWhen thing characteristic information mates with described default biological information, judge arbitrary in described attitude informationPosture feature whether with preset posture information in arbitrary preset posture characteristic matching; Described password authentificationDevice 500 also comprises: determination module 506, for described arbitrary posture feature of obtaining in judgement withWhen described arbitrary preset posture characteristic matching, determine password authentification success, wherein, described biological characteristicInformation comprises the typing order of at least one biological characteristic and biological characteristic, and described attitude information comprises instituteState the angle change information between terminal and plumb line, the rotation information of described terminal in arbitrary planeAnd/or the vibration information of described terminal at the appointed time.
In this technical scheme, by the attitude information of user's biological information and terminal is appliedIn the proof procedure of terminal traffic, effectively improve the safety and reliability of password authentification process,Promoted user's experience, above-mentioned terminal comprises that mobile terminal is (as mobile phone, panel computer and soundHappy player etc.).
Wherein, biological information comprises user fingerprints information, user's face image information, Yong HuyinLook information and client iris information etc., the gravity sensor of the attitude information of terminal by terminal is (as topSpiral shell instrument and accelerometer etc.) obtain, default biological information and preset posture information can be stored inOn the local hard drive and/or server of terminal, preset biological spy with the Real-time Obtaining that needs according to checkingReference breath and preset posture information.
Described attitude information comprises: the angle change information between terminal and plumb line is (as Fig. 7 instituteShow upwards 30 ° of sideway swivels of terminal), the rotation information of terminal in arbitrary plane be (as Fig. 8 instituteShow, terminal is planar to 30 ° of right rotations) and/or the vibration letter of described terminal at the appointed timeBreath (as shown in Figure 9).
Particularly, mobile phone screen locking is carried out after the instruction of password generation obtaining user, gathered user'sA biological information (for example finger print information), at the Preset Time gathering after finger print information successFor example, after (30 seconds), a kind of attitude information (for example rotating mobile) of acquisition terminal. To gatherTo finger print information and attitude information generate a pair of combination pin, complete the encryption to mobile phone screen locking. ThisOutward, can also mobile phone screen locking be carried out after the instruction of password generation obtaining user, gather the many of userIndividual and/or multiple biological information (for example finger print information, face image information), and recordThe acquisition order of multiple biological informations, the Preset Time after the success of collection finger print information (for example30 seconds) in, the one of acquisition terminal and/or multiple terminal attitude information are (such as rotating and turning overTurn), and the acquisition order of storing multiple attitude informations, according to the biological information collecting,The order of order, attitude information and the attitude information of biological information generates one group or many group combinationsPassword, completes the encryption to mobile phone screen locking.
Be worth particularly pointing out, the matching process of biological information is according to completely mating and sentenceBreaking, is also that arbitrary biological characteristic of typing all can find coupling right in default biological informationResemble, and the typing of all biological feature order is consistent with preset order, and the typing of all biological featureNumber is consistent with default number, and the attitude information of terminal is as long as get final product really with preset posture information matchesRecognize and be proved to be successful (twice coupling), further, preset order that can preset posture information withThe typing order of attitude information is mated, complete above-mentioned after three times the match is successful, furtherGround, can assembled gesture information and biological information, and by the feature of combination pin and default combinationThe feature of password is mated, and completes definite being proved to be successful after above-mentioned four matching judgment, and above-mentionedAll password authentification processes are all exceeded the operating procedure that increases user, have realized safer and convenientPassword authentification mode.
In technique scheme, preferably, described correction verification module 504 also for: obtain in judgementDescribed arbitrary posture feature and when described arbitrary preset posture characteristic matching, judge described posture featureTyping order whether consistent with the preset order of described preset posture feature; Described determination module is also usedIn: judging the typing order of described at least one posture feature and presetting of described preset posture featureWhen sequence consensus, determine password authentification success.
In this technical scheme, by judging posture feature when coupling, continue to judge posture featureWhether typing order is consistent with preset order, is proved to be successful determining whether, promoted further closeThe security of code proof procedure.
In technique scheme, preferably, described determination module 506 also comprises: generation module5062, for described arbitrary posture feature and the described arbitrary preset posture characteristic matching obtained in judgementTime, generate the combination pin letter that comprises whole described biological informations and whole described attitude informationsBreath; Described correction verification module 506 also for: judge that the typing order of described combination pin information is with defaultWhether the preset order of combination pin information is consistent; Described determination module 506 also for: judge instituteState the typing order of combination pin information and the preset order of described default combination encrypted message when consistent,Determine password authentification success.
In this technical scheme, by when posture feature and the preset posture characteristic matching, for biologyThe combination pin that characteristic information and attitude information form carries out matching judgment, has improved further passwordThe security of proof procedure, meanwhile, does not increase user's operating procedure.
In technique scheme, preferably, described correction verification module 504 also for: described in typingIn fixed time after arbitrary biological characteristic or described arbitrary posture feature, judge whether to obtain anotherBiological characteristic or another posture feature; Described determination module 506 also for: judge do not obtain anotherWhen a biological characteristic or another posture feature, determine password authentification failure.
In this technical scheme, by limiting any two cipher features of typing (biological information or appearanceState information) between the time interval, further promoted the security of password authentification, also existThe time interval, when long, forces to finish password authentification process, in addition, and for the higher industry of level of securityThe password authentification process of business, can be in the time forcing to finish password authentification process, the prompting that gives the alarm, withEffectively avoid password authentification overlong time and cause the situation that password is decrypted to occur.
As shown in Figure 6, terminal 600 comprises according to an embodiment of the invention: as above-mentioned any one skillPassword described in password generating apparatus 400 described in art scheme and/or above-mentioned any one technical scheme is testedCard device 500.
More than be described with reference to the accompanying drawings technical scheme of the present invention, proposed a kind of password generation sideCase, a kind of password authentification scheme and a kind of terminal, by the life in conjunction with user by the attitude information of terminalThing characteristic information generates enciphered message, and in password authentification process, establishes for above-mentioned enciphered messageCount corresponding verification step, do not increased under the prerequisite of the touch control operation step of user to terminal, strongThe safety and reliability of having changed password generation scheme and password authentification scheme, has promoted user's useExperience.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, forThose skilled in the art, the present invention can have various modifications and variations. All in essence of the present inventionWithin god and principle, any amendment of doing, be equal to replacement, improvement etc., all should be included in the present inventionProtection domain within.

Claims (17)

1. a method for generating cipher code, is applicable to terminal, it is characterized in that, described password generation sideMethod comprises:
Specified services data are carried out after the instruction of password generation obtaining user, gather user's biologyCharacteristic information;
Gathering in the time range of described biological information, obtain the attitude information of described terminal;
Generate combination pin according to described biological information and described attitude information, to complete describedThe ciphering process of specified services data,
Wherein, described biological information comprises at least one biological characteristic, or multiple biological characteristic andAcquisition order between described multiple biological information, the attitude information of described terminal comprises at least oneIndividual posture feature, or obtaining sequentially between multiple posture feature and described multiple posture feature.
2. method for generating cipher code as claimed in claim 1, is characterized in that, described attitude informationComprise:
Rotation information in arbitrary plane of angle change information between terminal and plumb line, terminal and/ or the vibration information of described terminal at the appointed time.
3. method for generating cipher code as claimed in claim 1, is characterized in that, according to described biologyCharacteristic information and described attitude information generate combination pin, to complete adding described specified services dataClose process, specifically comprises the following steps:
According to preset rules, described biological characteristic and corresponding posture feature are combined to form at least one is closeCode element;
Generate described combination pin according to described at least one password unit.
4. method for generating cipher code as claimed in claim 3, is characterized in that, according to preset rulesDescribed biological characteristic and corresponding posture feature are combined to form at least one password unit, specifically compriseFollowing steps:
Obtaining a biological characteristic, and do not obtaining before next biological characteristic, judge whether to obtain toA few posture feature;
In the time that described at least one posture feature is obtained in judgement, judgement obtain a described biological characteristic withWhether the time interval between described at least one posture feature is less than Preset Time interval;
Obtain between the time between a described biological characteristic and described at least one posture feature in judgementIn the time being less than Preset Time interval, by a described biological characteristic and the whole appearances in the described time intervalState Feature Combination forms a described password unit.
5. a method of password authentication, is applicable to terminal, it is characterized in that, described password authentification sideMethod comprises:
Obtain user's biological information;
Obtain the attitude information of described terminal, the attitude information of described terminal comprises at least one attitude spyLevy;
Judge whether described biological information mates with default biological information;
Judging that described biological information is while mating with described default biological information, described in judgementArbitrary posture feature in attitude information whether with preset posture information in arbitrary preset posture featureJoin;
When the described arbitrary posture feature obtaining in judgement and described arbitrary preset posture characteristic matching, reallyDetermine password authentification success,
Wherein, described biological information comprises that the typing of at least one biological characteristic and biological characteristic is suitableOrder, described attitude information comprises the angle change information between described terminal and plumb line, described terminalRotation information in arbitrary plane and/or the described terminal vibration information at the appointed time.
6. method of password authentication according to claim 5, is characterized in that, obtains in judgementDescribed arbitrary posture feature and when described arbitrary preset posture characteristic matching, determine password authentification success,Comprise following concrete steps:
When the described arbitrary posture feature obtaining in judgement and described arbitrary preset posture characteristic matching, sentenceWhether the typing order of disconnected described posture feature is consistent with the preset order of described preset posture feature;
Judging the typing order of described at least one posture feature and presetting of described preset posture featureWhen sequence consensus, determine password authentification success.
7. method of password authentication according to claim 6, is characterized in that, obtains in judgementDescribed arbitrary posture feature and when described arbitrary preset posture characteristic matching, determine password authentification success,Comprise following concrete steps:
When the described arbitrary posture feature obtaining in judgement and described arbitrary preset posture characteristic matching, rawBecome to comprise the combination pin information of whole described biological informations and whole described attitude informations;
The typing order that judges described combination pin information with the preset order of default combination encrypted message isNo consistent;
Judging the typing order of described combination pin information and presetting of described default combination encrypted messageWhen sequence consensus, determine password authentification success.
8. according to the method for password authentication described in any one in claim 5 to 7, its feature existsIn, also comprise:
In fixed time after arbitrary biological characteristic described in typing or described arbitrary posture feature, judgementWhether obtain another biological characteristic or another posture feature;
In the time that another biological characteristic or another posture feature are not obtained in judgement, determine password authentification mistakeLose.
9. a password generating apparatus, is applicable to terminal, it is characterized in that, described password generates dressPut and comprise:
Collecting unit, for specified services data being carried out after the instruction of password generation obtaining user,Gather user's biological information;
Acquiring unit, for gathering in the time range of described biological information, obtains described endThe attitude information of end;
Assembled unit, for close according to described biological information and described attitude information generation combinationCode, to complete the ciphering process to described specified services data,
Wherein, described biological information comprises at least one biological characteristic, or multiple biological characteristic andAcquisition order between described multiple biological information, the attitude information of described terminal comprises at least oneIndividual posture feature, or obtaining sequentially between multiple posture feature and described multiple posture feature.
10. password generating apparatus as claimed in claim 9, is characterized in that, described attitude informationComprise:
Rotation information in arbitrary plane of angle change information between terminal and plumb line, terminal and/ or the vibration information of described terminal at the appointed time.
11. password generating apparatus as claimed in claim 9, is characterized in that, described assembled unitAlso for:
According to preset rules, described biological characteristic and corresponding posture feature are combined to form at least one is closeCode element;
Described assembled unit also comprises: generation unit, and for raw according to described at least one password unitBecome described combination pin.
12. password generating apparatus as claimed in claim 11, is characterized in that, described combination is singleUnit also comprises:
Judgment sub-unit, for obtaining a biological characteristic, and does not obtain next biological characteristicBefore, judge whether to obtain at least one posture feature;
Described judgment sub-unit is used for: in the time that described at least one posture feature is obtained in judgement, judgement obtainsWhether the time interval of getting between a described biological characteristic and described at least one posture feature is less than in advanceIf the time interval;
Described assembled unit also for: judgement obtain a described biological characteristic and described at least oneThe time interval between posture feature is while being less than Preset Time interval, by a described biological characteristic and instituteWhole posture features of stating in the time interval are combined to form a described password unit.
13. 1 kinds of password authentication devices, are applicable to terminal, it is characterized in that, described password authentification dressPut and comprise:
Acquisition module, for obtaining user's biological information;
Described acquisition module also for: obtain the attitude information of described terminal, the attitude of described terminal letterBreath comprises at least one posture feature;
Described password authentication device also comprises:
Correction verification module, for judging that whether described biological information and default biological informationJoin;
Described correction verification module also for: judging described biological information and described default biological characteristicWhen information matches, judge arbitrary posture feature in described attitude information whether with preset posture information inArbitrary preset posture characteristic matching;
Described password authentication device also comprises:
Determination module, for described arbitrary posture feature and the described arbitrary preset posture obtained in judgementWhen characteristic matching, determine password authentification success,
Wherein, described biological information comprises that the typing of at least one biological characteristic and biological characteristic is suitableOrder, described attitude information comprises the angle change information between described terminal and plumb line, described terminalRotation information in arbitrary plane and/or the described terminal vibration information at the appointed time.
14. password authentication devices according to claim 13, is characterized in that, described verificationModule also for:
When the described arbitrary posture feature obtaining in judgement and described arbitrary preset posture characteristic matching, sentenceWhether the typing order of disconnected described posture feature is consistent with the preset order of described preset posture feature;
Described determination module also for: judging typing order and the institute of described at least one posture featureState the preset order of preset posture feature when consistent, determine password authentification success.
15. password authentication devices according to claim 14, is characterized in that, described definiteModule also comprises:
Generation module, for described arbitrary posture feature and the described arbitrary preset posture obtained in judgementWhen characteristic matching, generate the combination that comprises whole described biological informations and whole described attitude informationsEncrypted message;
Described correction verification module also for: judge typing order and the default combination of described combination pin informationWhether the preset order of encrypted message is consistent;
Described determination module also for: in the typing order of judging described combination pin information with described pre-If when the preset order of combination pin information is consistent, determine password authentification success.
16. according to claim 13 to the password authentication device described in any one in 15, and its feature existsIn, described correction verification module also for:
In fixed time after arbitrary biological characteristic described in typing or described arbitrary posture feature, judgementWhether obtain another biological characteristic or another posture feature;
Described determination module also for: do not obtain another biological characteristic or another attitude spy judgingWhile levying, determine password authentification failure.
17. 1 kinds of terminals, is characterized in that, comprising: as any one institute in claim 9 to 12The password generating apparatus of stating and/or the dress of the password authentification as described in any one in claim 13 to 16Put.
CN201510427191.4A 2015-07-20 2015-07-20 Password generation method and device, password authentication method and device as well as terminal Pending CN105608356A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510427191.4A CN105608356A (en) 2015-07-20 2015-07-20 Password generation method and device, password authentication method and device as well as terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510427191.4A CN105608356A (en) 2015-07-20 2015-07-20 Password generation method and device, password authentication method and device as well as terminal

Publications (1)

Publication Number Publication Date
CN105608356A true CN105608356A (en) 2016-05-25

Family

ID=55988285

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510427191.4A Pending CN105608356A (en) 2015-07-20 2015-07-20 Password generation method and device, password authentication method and device as well as terminal

Country Status (1)

Country Link
CN (1) CN105608356A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106203038A (en) * 2016-06-30 2016-12-07 维沃移动通信有限公司 A kind of unlocking method and mobile terminal
CN106599660A (en) * 2016-12-02 2017-04-26 宇龙计算机通信科技(深圳)有限公司 Terminal safety verification method and terminal safety verification device
CN106941506A (en) * 2017-05-17 2017-07-11 北京京东尚科信息技术有限公司 Data processing method and device based on biological characteristic
CN107295016A (en) * 2017-08-10 2017-10-24 广州杰之良软件有限公司 Auth method and device
CN107506628A (en) * 2017-07-24 2017-12-22 广东欧珀移动通信有限公司 Biometric discrimination method and Related product
CN107507308A (en) * 2017-08-17 2017-12-22 美的智慧家居科技有限公司 The method, apparatus and intelligent door lock of a kind of match information
CN108989041A (en) * 2018-05-03 2018-12-11 北京集创北方科技股份有限公司 Encryption method and device, decryption method and device
CN109214294A (en) * 2018-08-07 2019-01-15 信利光电股份有限公司 A kind of safety enters system and method
CN109241718A (en) * 2018-08-23 2019-01-18 百度在线网络技术(北京)有限公司 Cipher processing method and equipment
CN113243571A (en) * 2021-05-05 2021-08-13 深圳市美深威科技有限公司 Atomization device and gesture sound starting password generation method thereof
CN116781397A (en) * 2023-07-24 2023-09-19 深圳建安润星安全技术有限公司 Internet information security method and platform based on biological recognition

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102279923A (en) * 2010-06-12 2011-12-14 安凯(广州)微电子技术有限公司 Multi-fingerprint encryption method for raising encryption level
CN103810439A (en) * 2012-11-14 2014-05-21 纬创资通股份有限公司 Password input system and password input method
JP2014186602A (en) * 2013-03-25 2014-10-02 Konica Minolta Inc Authentication system, information processing device, authentication method and program
CN104700016A (en) * 2015-03-17 2015-06-10 上海与德通讯技术有限公司 Starting method and device of application program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102279923A (en) * 2010-06-12 2011-12-14 安凯(广州)微电子技术有限公司 Multi-fingerprint encryption method for raising encryption level
CN103810439A (en) * 2012-11-14 2014-05-21 纬创资通股份有限公司 Password input system and password input method
JP2014186602A (en) * 2013-03-25 2014-10-02 Konica Minolta Inc Authentication system, information processing device, authentication method and program
CN104700016A (en) * 2015-03-17 2015-06-10 上海与德通讯技术有限公司 Starting method and device of application program

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106203038B (en) * 2016-06-30 2018-11-30 维沃移动通信有限公司 A kind of unlocking method and mobile terminal
CN106203038A (en) * 2016-06-30 2016-12-07 维沃移动通信有限公司 A kind of unlocking method and mobile terminal
CN106599660A (en) * 2016-12-02 2017-04-26 宇龙计算机通信科技(深圳)有限公司 Terminal safety verification method and terminal safety verification device
CN106941506A (en) * 2017-05-17 2017-07-11 北京京东尚科信息技术有限公司 Data processing method and device based on biological characteristic
CN107506628A (en) * 2017-07-24 2017-12-22 广东欧珀移动通信有限公司 Biometric discrimination method and Related product
CN107506628B (en) * 2017-07-24 2019-12-06 Oppo广东移动通信有限公司 Biometric identification method and related product
CN107295016A (en) * 2017-08-10 2017-10-24 广州杰之良软件有限公司 Auth method and device
CN107507308A (en) * 2017-08-17 2017-12-22 美的智慧家居科技有限公司 The method, apparatus and intelligent door lock of a kind of match information
CN108989041A (en) * 2018-05-03 2018-12-11 北京集创北方科技股份有限公司 Encryption method and device, decryption method and device
CN109214294A (en) * 2018-08-07 2019-01-15 信利光电股份有限公司 A kind of safety enters system and method
CN109241718A (en) * 2018-08-23 2019-01-18 百度在线网络技术(北京)有限公司 Cipher processing method and equipment
CN113243571A (en) * 2021-05-05 2021-08-13 深圳市美深威科技有限公司 Atomization device and gesture sound starting password generation method thereof
CN116781397A (en) * 2023-07-24 2023-09-19 深圳建安润星安全技术有限公司 Internet information security method and platform based on biological recognition
CN116781397B (en) * 2023-07-24 2024-03-15 深圳建安润星安全技术有限公司 Internet information security method and platform based on biological recognition

Similar Documents

Publication Publication Date Title
CN105608356A (en) Password generation method and device, password authentication method and device as well as terminal
US9531710B2 (en) Behavioral authentication system using a biometric fingerprint sensor and user behavior for authentication
US20230129693A1 (en) Transaction authentication and verification using text messages and a distributed ledger
US10440019B2 (en) Method, computer program, and system for identifying multiple users based on their behavior
RU2718226C2 (en) Biometric data safe handling systems and methods
US9646296B2 (en) Mobile-to-mobile transactions
US8478990B2 (en) Mobile transaction methods and devices with three-dimensional colorgram tokens
CN100414867C (en) Protection of biometric data via key-dependent sampling
EP2813961B1 (en) Biometric verification with improved privacy and network performance in client-server networks
EP2722001B1 (en) Secure data communication
US11811754B2 (en) Authenticating devices via tokens and verification computing devices
US20210398134A1 (en) Biocrypt Digital Wallet
CN105681269A (en) Privacy preserving set-based biometric authentication
EA037018B1 (en) Method for digitally signing an electronic file
CN108229220B (en) System and method for trusted presentation of information on untrusted user devices
WO2018121377A1 (en) Transaction method, device and system used in virtual reality environment
US10848309B2 (en) Fido authentication with behavior report to maintain secure data connection
EP2927834A1 (en) Information processing apparatus, information processing method, and recording medium
KR102592375B1 (en) Create biometric digital signatures for identity verification
KR20120042684A (en) Data transfer/receive method and system using finger printinformation
CN103297237A (en) Identity registration method, identity authentication method, identity registration system, identity authentication system, personal authentication equipment and authentication server
JP2006155547A (en) Individual authentication system, terminal device and server
WO2023244602A1 (en) Systems and methods that provide a high level of security for a user
CN112334897A (en) Method and electronic equipment for authenticating user
JP3739773B2 (en) Biometric authentication system, biometric authentication gateway used therefor, and biometric authentication information distribution method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160525