CN106304066A - A kind of authentication method and mobile terminal - Google Patents

A kind of authentication method and mobile terminal Download PDF

Info

Publication number
CN106304066A
CN106304066A CN201610605451.7A CN201610605451A CN106304066A CN 106304066 A CN106304066 A CN 106304066A CN 201610605451 A CN201610605451 A CN 201610605451A CN 106304066 A CN106304066 A CN 106304066A
Authority
CN
China
Prior art keywords
solicited message
target device
mobile terminal
proved
successful
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610605451.7A
Other languages
Chinese (zh)
Other versions
CN106304066B (en
Inventor
张恒莉
汤青良
黄韬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610605451.7A priority Critical patent/CN106304066B/en
Publication of CN106304066A publication Critical patent/CN106304066A/en
Application granted granted Critical
Publication of CN106304066B publication Critical patent/CN106304066B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Embodiments providing a kind of authentication method and mobile terminal, this authentication method includes: obtain the link order that the length specifying object acting on touch screen is triggered by operation;According to link order, generate the first solicited message;The first solicited message is sent to target device;And long by operation time-continuing process, the second solicited message from target device received is verified;If being proved to be successful, then carry out data transmission with target device, thus provide a kind of simple to operate, authentication method easily, effectively improve Consumer's Experience.

Description

A kind of authentication method and mobile terminal
Technical field
The present embodiments relate to the communications field, particularly relate to a kind of authentication method and mobile terminal.
Background technology
At present, for the safety of data transmission, between multiple stage mobile terminal before carrying out data transmission, need to carry out even Connect certification.
Authentication method of the prior art is typically with invited party and arranges password, and sends invitation.Recipient receives and invites After please, input password.In the case of Password Input is correct, data interaction could be carried out with invited party.
Obviously, when moving terminal authentication, there is complex operation, problem that authentication efficiency is low in prior art.
For this technical problem, effective solution is the most not yet proposed.
Summary of the invention
The embodiment of the present invention provides a kind of authentication method and mobile terminal, recognizes moving terminal solving prior art During card, there is complex operation, problem that authentication efficiency is low.
First aspect, it is provided that a kind of authentication method, described method is applied to mobile terminal, and described method includes:
Obtain the link order that the length specifying object acting on touch screen is triggered by operation;
According to link order, generate the first solicited message;
The first solicited message is sent to target device;And
Long by operation time-continuing process, the second solicited message from target device received is verified;
If being proved to be successful, then carry out data transmission with target device.
On the other hand, the embodiment of the present invention additionally provides a kind of mobile terminal, including:
Acquisition module, for obtaining the link order that the length specifying object acting on touch screen is triggered by operation;
Generation module, for according to link order, generates the first solicited message;
First sending module, for sending the first solicited message to target device;And
Authentication module, for pressing in operation time-continuing process long, to the second request letter from target device received Breath is verified;
Transport module, if for being proved to be successful, then carrying out data transmission with target device.
So, in the embodiment of the present invention, the length specifying object acted on touch screen by acquisition is triggered by operation Link order;According to link order, generate the first solicited message;The first solicited message is sent to target device;And growing By in operation time-continuing process, the second solicited message from target device received is verified;If being proved to be successful, then with Target device carries out data transmission, thus provides a kind of simple to operate, authentication method easily, effectively improves user's body Test.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below by institute in the description to the embodiment of the present invention The accompanying drawing used is needed to be briefly described, it should be apparent that, the accompanying drawing in describing below is only some enforcements of the present invention Example, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to according to these accompanying drawings Obtain other accompanying drawing.
Fig. 1 is the flow chart of the authentication method in the embodiment of the present invention one;
Fig. 2 is the flow chart of the authentication method in the embodiment of the present invention two;
Fig. 3 is the flow chart of the authentication method in the embodiment of the present invention two;
Fig. 4 is the block diagram of the mobile terminal in the embodiment of the present invention three;
Fig. 5 is the block diagram of the mobile terminal in the embodiment of the present invention four;
Fig. 6 is the block diagram of the mobile terminal in the embodiment of the present invention five;
Fig. 7 is the structural representation of the mobile terminal in the embodiment of the present invention six.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is a part of embodiment of the present invention rather than whole embodiments wholely.Based on this Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise Example, broadly falls into the scope of protection of the invention.
Embodiment one
With reference to Fig. 1, it is shown that the flow chart of a kind of authentication method in the embodiment of the present invention.
Step 101, obtains the link order that the length specifying object acting on touch screen is triggered by operation.
In the case of needing to be mutually authenticated between at least two mobile terminal, mobile phone users is moved by long pressing Appointment object on dynamic terminal touch screen.Mobile terminal detects that this length by event, and triggers long by operating corresponding company with this Connect instruction.
Step 102, according to link order, generates the first solicited message.
Concrete, mobile terminal, according to the link order received, generates the first solicited message.
Step 103, sends the first solicited message to target device.
Concrete, the first solicited message generated is sent to target device by mobile terminal.
Step 104, long by operation time-continuing process, is carried out the second solicited message from target device received Checking.
Concrete, in an embodiment of the present invention, mobile terminal, just can be right only in the case of detecting that length is by operation Verify from target device the second solicited message, so that it is determined that whether target device meets authentication condition.In other words, if Long by operation stopping, mobile terminal is not detected by acting on specifies the length of object by operation, then mobile terminal will not dock again The second solicited message received is verified.
Step 105, if being proved to be successful, then carries out data transmission with target device.
Concrete, if the second solicited message that target device is sent meets authentication condition, it is determined that be proved to be successful, mobile Terminal will set up communication connection passage with this target device, and carry out data transmission.
In sum, the technical scheme that the embodiment of the present invention provides, the appointment object on touch screen is acted on by acquisition Length by the link order that triggered of operation;According to link order, generate the first solicited message;Sending first to target device please Seek information;And long by operation time-continuing process, the second solicited message from target device received is verified; If being proved to be successful, then carry out data transmission with target device, thus provide a kind of simple to operate, authentication method easily, have Improve Consumer's Experience to effect.
Embodiment two
With reference to Fig. 2, it is shown that the flow chart of a kind of authentication method in the embodiment of the present invention.
In an embodiment of the present invention, authentication method can apply to bluetooth, WI-FI, WI-FI focus, sudden strain of a muscle biography etc. arbitrarily Closely in data transfer mode.It is applied to as a example by Bluetooth transmission be described in detail by authentication method below.
Step 201, obtains the link order that the length specifying object acting on touch screen is triggered by operation.
In the present embodiment, illustrate with the Bluetooth connection authentication between mobile terminal A and mobile terminal B.At other In embodiment, it is mutual that the authentication method of the present invention can apply between two and any number of mobile terminal of two or more Certification.This is not limited by the present invention.
Mobile terminal A and mobile terminal B opens Bluetooth function and shows Bluetooth interface, wherein, and the bluetooth in mobile terminal A Interface display has the title of mobile terminal B, the Bluetooth interface in mobile terminal B to show the title of mobile terminal A equally.
Mobile phone users A length presses the title of mobile terminal B in Bluetooth interface.Mobile terminal A detects and acts on this district The length in territory presses event, and triggers link order.
Meanwhile, the action that mobile terminal B is identical with mobile terminal A execution, do not repeat.
In other embodiments, when authentication method is applied to WI-FI connection, i.e. mobile terminal A has connected WI-FI, moves When dynamic terminal use B wants to obtain WI-FI password by mobile terminal A, mobile phone users A length is pressed on mobile terminal touch screen WI-FI title, and mobile phone users B length presses WI-FI title.Appointment object on mobile terminal screen can be applied according to reality Scene is set, and this is not done any restriction by the present invention.
With reference to Fig. 3, in a preferred embodiment of the invention, on the basis of Fig. 2, step 201 can also include Step 2011, obtains and acts on the force value specifying object.Mobile terminal detection acts on the force value specifying object.
Step 2012, whether detection force value exceedes predetermined threshold.
Step 2013, if force value exceedes predetermined threshold, then triggers link order.If force value is more than predetermined threshold, Then trigger link order.It is thus possible to prevent the maloperation of user.
Step 202, according to link order, generates the first solicited message.
Mobile terminal A, according to link order, generates with designated identification information the first solicited message.Wherein, it is intended that mark Information includes that band is not limited to: sub-identification information and the title of equipment B.Concrete, sub-identification information Flag is used for identifying movement Whether terminal detects long by event.When length being detected by event, Flag=1;Long by event when being not detected by, i.e. long by thing When part terminates, Flag=0.
In a preferred embodiment of the invention, after length exceedes the scheduled time by operation, mobile terminal just can be given birth to Become the first solicited message.Illustrate: at the 5s of 10: 30, mobile terminal A detects that the touch acting on appointment object is grasped Making, after this touch operation continues 0.5s, mobile terminal just can generate the first solicited message.
Step 203, before length is terminated by operation, continues to send the first solicited message to target device.
Before length is terminated by event, continue to send the first solicited message to target device.Wherein, each first solicited message Between interval time by user's sets itself or can be set by manufacturer, this is not limited by the present invention.
Mobile terminal B in this step, generates the second solicited message, and sends to mobile terminal A.Concrete steps are with above-mentioned Step is identical, does not repeats.
Step 204, long by operation time-continuing process, persistently receives multiple second solicited messages from target device.
Concrete, after mobile terminal A opens Bluetooth function, just can receive mobile terminal B send the second request come Information.It should be noted that the second solicited message received, after sending the first solicited message, is just entered by mobile terminal A Row checking, before this, the second solicited message received is not made any process by mobile terminal A.
Step 205, identifies in multiple second solicited message whether include designated identification information.
Mobile terminal A before verification is complete, constantly identifies the son whether including FLAG=1 in multiple second solicited messages Identification information, identifies that the name information in the second solicited message is the most correct simultaneously.
Wherein, if multiple second solicited message all includes designated identification information, then it is proved to be successful.It is completed in checking Before, if the identification information in all second solicited messages all meets authentication condition, it may be assumed that FLAG=1 and entitled mobile terminal A Facility information, then judge be proved to be successful.
If at least one second solicited message in multiple second solicited messages does not include designated identification information, then verify mistake Lose.
Step 206, if being proved to be successful, then carries out data transmission with target device.
Concrete, if being proved to be successful, mobile terminal sends, to target device, the information that is proved to be successful, and notice mobile terminal B can To carry out data transmission, and receive mobile terminal B send come be proved to be successful information after, with mobile terminal B set up indigo plant Tooth interface channel, and carried out data transmission by bluetooth with mobile terminal B.
In other embodiments, if the authentication method of the present invention is applied to WI-FI connection, in this step, mobile whole The password of the WI-FI being connected to can be sent to mobile terminal B, mobile terminal B and get WI-FI password by end A, and fill in The password field that WI-FI is corresponding, thus realize the connection of WI-FI.
In another embodiment of the present invention, if the authentication method of the present invention is applied to the connection of WI-FI focus, at this In step, the focus password arranged in this equipment can be sent to mobile terminal B, mobile terminal B and receive this focus by mobile terminal A Password, and password is filled in password field corresponding to focus, thus realize the connection of WI-FI focus.
In sum, the technical scheme that the embodiment of the present invention provides, the appointment object on touch screen is acted on by acquisition Length by the link order that triggered of operation;According to link order, generate the first solicited message;Sending first to target device please Seek information;And long by operation time-continuing process, the second solicited message from target device received is verified; If being proved to be successful, then carry out data transmission with target device, thus provide a kind of simple to operate, authentication method easily, have Improve Consumer's Experience to effect.
Embodiment three
With reference to Fig. 4, it is shown that the block diagram of a kind of mobile terminal in the embodiment of the present invention.
Mobile terminal 400 shown in Fig. 4 includes: acquisition module 401, generation module the 402, first sending module 403, checking Module 404, transport module 405.
Acquisition module 401, the connection triggered by operation for obtaining the length specifying object acting on touch screen refers to Order.
In the case of needing to be mutually authenticated between at least two mobile terminal, mobile phone users is moved by long pressing Appointment object on dynamic terminal touch screen.Acquisition module 401 detects that this length, by event, and triggers long corresponding by operating with this Link order.
Generation module 402, for according to link order, generates the first solicited message.
Concrete, generation module 402, according to the link order received, generates the first solicited message.
First sending module 403, for sending the first solicited message to target device.
Concrete, the first solicited message that generation module 402 is generated by the first sending module 403 sends to target device.
Authentication module 404, for pressing in operation time-continuing process long, to the second request from target device received Information is verified.
Concrete, in an embodiment of the present invention, only in the case of mobile terminal detects that length is by operation, verify mould Block 404 just can be verified from target device the second solicited message, so that it is determined that whether target device meets authentication condition. In other words, stop if long by operation, mobile terminal be not detected by acting on specify the length of object by operation, then authentication module The second solicited message received will not be verified by 404 again.
Transport module 405, if for being proved to be successful, then carrying out data transmission with target device.
Concrete, if the second solicited message that target device is sent meets authentication condition, it is determined that be proved to be successful, transmission Module 405 will set up communication connection passage with this target device, and carry out data transmission.
In sum, the technical scheme that the embodiment of the present invention provides, mobile terminal is acted on touch screen by acquisition Specify the link order that the length of object is triggered by operation;According to link order, generate the first solicited message;Send out to target device Send the first solicited message;And long by operation time-continuing process, to the second solicited message from target device received Verify;If being proved to be successful, then carry out data transmission with target device, thus provide a kind of simple to operate, recognize easily Card method, improves Consumer's Experience effectively.
Embodiment four
With reference to Fig. 5, it is shown that the block diagram of a kind of mobile terminal in the embodiment of the present invention.
Mobile terminal 500 shown in Fig. 5 includes: acquisition module 501, generation module the 502, first sending module 503, checking Module the 504, second sending module 505, transport module 506.
Acquisition module 501, the connection triggered by operation for obtaining the length specifying object acting on touch screen refers to Order.
Optionally, acquisition module 501 can also include: obtains submodule 5011, specifies object for obtaining to act on Force value.Detection sub-module 5012, is used for detecting whether force value exceedes predetermined threshold.Triggers module 5013, if for pressure Force value exceedes predetermined threshold, then trigger link order.
Generation module 502, for according to link order, generates the first solicited message.
First sending module 503, for sending the first solicited message to target device.
Optionally, the first sending module 503 can also include: sends submodule 5031, for operating end long pressing Before, continue to send the first solicited message to target device.
Authentication module 504, for pressing in operation time-continuing process long, to the second request from target device received Information is verified.
Optionally, authentication module 504 can also include receiving submodule 5041, for pressing in operation time-continuing process long, Persistently receive multiple second solicited messages from target device.Identify submodule 5042, be used for identifying multiple second request letter Whether breath includes designated identification information.First checking submodule 5043, if all include referring in multiple second solicited messages Determine identification information, be then proved to be successful.Second checking submodule 5044, if at least one in multiple second solicited messages the Two solicited messages do not include designated identification information, then authentication failed.
Second sending module 505, if for being proved to be successful, then sends to target device and is proved to be successful information.
Transport module 506, if for being proved to be successful, then carrying out data transmission with target device.
Mobile terminal 500 is capable of each process that in the embodiment of the method for Fig. 2 and Fig. 3, mobile terminal realizes, for keeping away Exempt to repeat, repeat no more here.
In sum, the technical scheme that the embodiment of the present invention provides, mobile terminal is acted on touch screen by acquisition Specify the link order that the length of object is triggered by operation;According to link order, generate the first solicited message;Send out to target device Send the first solicited message;And long by operation time-continuing process, to the second solicited message from target device received Verify;If being proved to be successful, then carry out data transmission with target device, thus provide a kind of simple to operate, recognize easily Card method, improves Consumer's Experience effectively.
Embodiment five
Fig. 6 is the block diagram of the mobile terminal of another embodiment of the present invention.Mobile terminal 600 shown in Fig. 6 includes: at least One processor 601, memorizer 602, at least one network interface 604 and other user interfaces 603.In mobile terminal 600 Each assembly is coupled by bus system 605.It is understood that bus system 605 is for realizing the company between these assemblies Connect letter.Bus system 605, in addition to including data/address bus, also includes power bus, controls bus and status signal bus in addition.But It is for the sake of understanding explanation, in figure 6 various buses is all designated as bus system 605.
Wherein, user interface 603 can include display, keyboard or pointing device (such as, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
The memorizer 602 being appreciated that in the embodiment of the present invention can be volatile memory or nonvolatile memory, Maybe can include volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (RandomAccess Memory, RAM), and it is used as outside high speed Caching.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memorizer 602 of the system and method that the embodiment of the present invention describes is intended to include but not limited to these Memorizer with arbitrarily other applicable type.
In some embodiments, memorizer 602 stores following element, executable module or data structure, or Their subset of person, or their superset: operating system 6021 and application program 6022.
Wherein, operating system 6021, comprise various system program, such as ccf layer, core library layer, driving layer etc., be used for Realize various basic business and process hardware based task.Application program 6022, comprises various application program, such as media Player (Media Player), browser (Browser) etc., be used for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 6022.
In embodiments of the present invention, by calling program or the instruction of memorizer 602 storage, concrete, can be application The program stored in program 6022 or instruction, processor 601 is for obtaining the length of the appointment object acted on touch screen by behaviour Make the link order triggered;According to link order, generate the first solicited message;The first solicited message is sent to target device; And long by operation time-continuing process, the second solicited message from target device received is verified;If checking Success, then carry out data transmission with target device.
The method that the invention described above embodiment discloses can apply in processor 601, or is realized by processor 601. Processor 601 is probably a kind of IC chip, has the disposal ability of signal.During realizing, said method each Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 601 or software form.Above-mentioned process Device 601 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic, Discrete hardware components.Can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.General The processor etc. that processor can be microprocessor or this processor can also be any routine.In conjunction with embodiment of the present invention institute The step of disclosed method can be embodied directly in hardware decoding processor and perform, or with the hardware in decoding processor And software module combination execution completes.Software module may be located at random access memory, and flash memory, read only memory are able to programme read-only In the storage medium that this areas such as memorizer or electrically erasable programmable memorizer, depositor are ripe.This storage medium is positioned at Memorizer 602, processor 601 reads the information in memorizer 602, completes the step of said method in conjunction with its hardware.
It is understood that the embodiment of the present invention describe these embodiments can use hardware, software, firmware, middleware, Microcode or a combination thereof realize.Realizing for hardware, processing unit can be implemented in one or more special IC (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general place Reason device, controller, microcontroller, microprocessor, for performing in other electronic unit or a combination thereof of herein described function.
Software is realized, can come by performing the module (such as process, function etc.) of function described in the embodiment of the present invention Realize the technology described in the embodiment of the present invention.Software code is storable in performing in memorizer and by processor.Memorizer can Within a processor or to realize outside processor.
Alternatively, processor 601 is additionally operable to: before length is terminated by operation, continues to send the first request to target device Information.
Alternatively, processor 601 is additionally operable to: long by operation time-continuing process, persistently receive from target device many Individual second solicited message;Identify in multiple second solicited message and whether include designated identification information;If multiple second solicited messages In all include designated identification information, then be proved to be successful.If at least one second solicited message in multiple second solicited messages is not Including designated identification information, then authentication failed.
Alternatively, as another embodiment, processor 601 is additionally operable to: sends to target device and is proved to be successful information.
Alternatively, processor 601 is additionally operable to: obtains to act on and specifies whether the force value detection force value of object exceedes pre- Determine threshold value;If force value exceedes predetermined threshold, then trigger link order.
Mobile terminal 600 is capable of each process that in previous embodiment, mobile terminal realizes, for avoiding repeating, here Repeat no more.
In sum, the technical scheme that the embodiment of the present invention provides, mobile terminal is acted on touch screen by acquisition Specify the link order that the length of object is triggered by operation;According to link order, generate the first solicited message;Send out to target device Send the first solicited message;And long by operation time-continuing process, to the second solicited message from target device received Verify;If being proved to be successful, then carry out data transmission with target device, thus provide a kind of simple to operate, recognize easily Card method, improves Consumer's Experience effectively.
Embodiment six
Fig. 7 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 7 Can be mobile phone, panel computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle-mounted computer Deng.
Mobile terminal in Fig. 7 includes radio frequency (Radio Frequency, RF) circuit 710, memorizer 720, input block 730, display unit 740, processor 760, voicefrequency circuit 770, WiFi (Wireless Fidelity) module 780 and power supply 790。
Wherein, input block 730 can be used for receiving numeral or the character information of user's input, and produces and mobile terminal User setup and function control the input of relevant signal.Specifically, in the embodiment of the present invention, this input block 730 is permissible Including contact panel 731.Contact panel 731, also referred to as touch screen, thereon or neighbouring touch operation (is compared can to collect user As user uses any applicable object such as finger, stylus or adnexa operation on contact panel 731), and according to setting in advance Fixed formula drives corresponding attachment means.Optionally, contact panel 731 can include touch detecting apparatus and touch controller two Individual part.Wherein, the touch orientation of touch detecting apparatus detection user, and detect the signal that touch operation brings, signal is passed Give touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then Give this processor 760, and order that processor 760 sends can be received and performed.Furthermore, it is possible to use resistance-type, electricity The polytypes such as appearance formula, infrared ray and surface acoustic wave realize contact panel 731.Except contact panel 731, input block 730 Can also include other input equipments 732, other input equipments 732 can include but not limited to physical keyboard, function key (such as Volume control button, switch key etc.), trace ball, mouse, one or more in action bars etc..
Wherein, display unit 740 can be used for showing the information inputted by user or the information being supplied to user and movement The various menu interfaces of terminal.Display unit 740 can include display floater 741, optionally, can use LCD or organic light emission The forms such as diode (Organic Light-Emitting Diode, OLED) configure display floater 741.
It should be noted that contact panel 731 can cover display floater 741, formed and touch display screen, when this touch display screen is examined Measure thereon or after neighbouring touch operation, send processor 760 to determine the type of touch event, with preprocessor 760 provide corresponding visual output according to the type of touch event on touch display screen.
Touch display screen and include Application Program Interface viewing area and conventional control viewing area.This Application Program Interface viewing area And the arrangement mode of this conventional control viewing area does not limit, can be arranged above and below, left-right situs etc. can be distinguished two and show Show the arrangement mode in district.This Application Program Interface viewing area is displayed for the interface of application program.Each interface is permissible The interface elements such as the icon and/or the widget desktop control that comprise at least one application program.This Application Program Interface viewing area It can also be the empty interface not comprising any content.This conventional control viewing area is for showing the control that utilization rate is higher, such as, The application icons etc. such as settings button, interface numbering, scroll bar, phone directory icon.
Wherein processor 760 is the control centre of mobile terminal, utilizes each of various interface and the whole mobile phone of connection Individual part, is stored in the software program in first memory 721 and/or module by running or performing, and calls and be stored in Data in second memory 722, perform the various functions of mobile terminal and process data, thus carrying out mobile terminal 700 Integral monitoring.Optionally, processor 760 can include one or more processing unit.
In embodiments of the present invention, by call the software program and/or module stored in this first memory 721 and/ Or the data in this second memory 722, processor 760 is for obtaining the length of the appointment object acted on touch screen by operation The link order triggered;According to link order, generate the first solicited message;The first solicited message is sent to target device;With And long by operation time-continuing process, the second solicited message from target device received is verified;If verifying into Merit, then carry out data transmission with target device.
Alternatively, processor 760 is additionally operable to: before length is terminated by operation, continues to send the first request to target device Information.
Alternatively, processor 760 is additionally operable to: long by operation time-continuing process, persistently receive from target device many Individual second solicited message;Identify in multiple second solicited message and whether include designated identification information;If multiple second solicited messages In all include designated identification information, then be proved to be successful.If at least one second solicited message in multiple second solicited messages is not Including designated identification information, then authentication failed.
Alternatively, as another embodiment, processor 760 is additionally operable to: sends to target device and is proved to be successful information.
Alternatively, processor 760 is additionally operable to: obtains to act on and specifies whether the force value detection force value of object exceedes pre- Determine threshold value;If force value exceedes predetermined threshold, then trigger link order.
Mobile terminal is capable of each process that in previous embodiment, mobile terminal realizes, for avoiding repeating, the most not Repeat again.
Visible, that the embodiment of the present invention provides technical scheme, mobile terminal acts on the appointment on touch screen by acquisition The link order that the length of object is triggered by operation;According to link order, generate the first solicited message;The is sent to target device One solicited message;And long by operation time-continuing process, the second solicited message from target device received is carried out Checking;If being proved to be successful, then carry out data transmission with target device, thus provide a kind of simple to operate, authenticating party easily Method, improves Consumer's Experience effectively.
Those of ordinary skill in the art are it is to be appreciated that combine that the disclosed embodiments in the embodiment of the present invention describe is each The unit of example and algorithm steps, it is possible to being implemented in combination in of electronic hardware or computer software and electronic hardware.These Function performs with hardware or software mode actually, depends on application-specific and the design constraint of technical scheme.Specialty Technical staff specifically should can be used for using different methods to realize described function to each, but this realization should not Think beyond the scope of this invention.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, the system of foregoing description, The specific works process of device and unit, is referred to the corresponding process in preceding method embodiment, does not repeats them here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can be passed through other Mode realizes.Such as, device embodiment described above is only schematically, such as, the division of described unit, it is only A kind of logic function divides, actual can have when realizing other dividing mode, the most multiple unit or assembly can in conjunction with or Person is desirably integrated into another system, or some features can be ignored, or does not performs.Another point, shown or discussed is mutual Between coupling direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit or communication link Connect, can be electrical, machinery or other form.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of the present embodiment scheme 's.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.
If described function is using the form realization of SFU software functional unit and as independent production marketing or use, permissible It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is the most in other words The part contributing prior art or the part of this technical scheme can embody with the form of software product, this meter Calculation machine software product is stored in a storage medium, including some instructions with so that a computer equipment (can be individual People's computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention. And aforesaid storage medium includes: USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. are various can store program code Medium.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited thereto, and any Those familiar with the art, in the technical scope that the invention discloses, can readily occur in change or replace, should contain Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with scope of the claims.

Claims (12)

1. an authentication method, described method is applied to mobile terminal, it is characterised in that described method includes:
Obtain the link order that the length specifying object acting on touch screen is triggered by operation;
According to described link order, generate the first solicited message;
Described first solicited message is sent to target device;And
In described length by operation time-continuing process, the second solicited message from described target device received is tested Card;
If being proved to be successful, then carry out data transmission with described target device.
Method the most according to claim 1, it is characterised in that described send described first solicited message to target device Step, including:
Before described length is terminated by operation, continue to send described first solicited message to described target device.
Method the most according to claim 1, it is characterised in that described to receive from the second of described target device Solicited message carries out the step verified, including:
In described length by operation time-continuing process, persistently receive multiple second solicited messages from described target device;
Identify in the plurality of second solicited message and whether include designated identification information;
If the plurality of second solicited message all includes described designated identification information, then it is proved to be successful;
If at least one second solicited message in the plurality of second solicited message does not include described designated identification information, then test Demonstrate,prove unsuccessfully.
Method the most according to claim 3, it is characterised in that if being proved to be successful, described method also includes:
Send to described target device and be proved to be successful information.
Method the most according to claim 1, it is characterised in that the mode of described data transmission includes at least one of:
Bluetooth, WI-FI, WI-FI focus, sudden strain of a muscle pass.
Method the most according to claim 1, it is characterised in that described acquisition acts on the length specifying object on touch screen The step of link order triggered by operation, including:
Obtain the force value acting on described appointment object;
Detect whether described force value exceedes predetermined threshold;
If described force value exceedes described predetermined threshold, then trigger described link order.
7. a mobile terminal, it is characterised in that including:
Acquisition module, for obtaining the link order that the length specifying object acting on touch screen is triggered by operation;
Generation module, for according to described link order, generates the first solicited message;
First sending module, for sending described first solicited message to target device;And
Authentication module, in pressing operation time-continuing process in described length, please from the second of described target device to receive Information is asked to verify;
Transport module, if for being proved to be successful, then carrying out data transmission with described target device.
Mobile terminal the most according to claim 7, it is characterised in that described first sending module includes:
Send submodule, for before described length is terminated by operation, continue to send described first request to described target device Information.
Mobile terminal the most according to claim 7, it is characterised in that described authentication module includes:
Receive submodule, in described length by operation time-continuing process, persistently receive multiple the from described target device Two solicited messages;
Identify submodule, be used for identifying in the plurality of second solicited message whether include designated identification information;
First checking submodule, if all including described designated identification information in the plurality of second solicited message, then verifies Success;
Second checking submodule, if at least one second solicited message in the plurality of second solicited message does not include institute State designated identification information, then authentication failed.
Mobile terminal the most according to claim 9, it is characterised in that described mobile terminal also includes:
Second sending module, if for being proved to be successful, then sends to described target device and is proved to be successful information.
11. mobile terminals according to claim 7, it is characterised in that described data transmission mode include following at least One of:
Bluetooth, WI-FI, WI-FI focus, sudden strain of a muscle pass.
12. mobile terminals according to claim 7, it is characterised in that described acquisition module includes:
Obtain submodule, for obtaining the force value acting on described appointment object
Detection sub-module, is used for detecting whether described force value exceedes predetermined threshold;
Triggers module, if exceeding described predetermined threshold for described force value, then triggers described link order.
CN201610605451.7A 2016-07-27 2016-07-27 A kind of authentication method and mobile terminal Active CN106304066B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610605451.7A CN106304066B (en) 2016-07-27 2016-07-27 A kind of authentication method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610605451.7A CN106304066B (en) 2016-07-27 2016-07-27 A kind of authentication method and mobile terminal

Publications (2)

Publication Number Publication Date
CN106304066A true CN106304066A (en) 2017-01-04
CN106304066B CN106304066B (en) 2019-11-26

Family

ID=57662619

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610605451.7A Active CN106304066B (en) 2016-07-27 2016-07-27 A kind of authentication method and mobile terminal

Country Status (1)

Country Link
CN (1) CN106304066B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106993267A (en) * 2017-04-01 2017-07-28 维沃移动通信有限公司 A kind of hotspot connection method, first terminal and second terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104834458A (en) * 2014-02-11 2015-08-12 中兴通讯股份有限公司 Equipment paring method and device based on touch screen
CN105472134A (en) * 2015-11-18 2016-04-06 广东欧珀移动通信有限公司 Method and device for releasing Bluetooth pairing, and mobile terminal
CN105550137A (en) * 2015-12-14 2016-05-04 广东欧珀移动通信有限公司 Bluetooth pairing setting method and system
CN105631265A (en) * 2015-12-24 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Authentication method, authentication device and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104834458A (en) * 2014-02-11 2015-08-12 中兴通讯股份有限公司 Equipment paring method and device based on touch screen
CN105472134A (en) * 2015-11-18 2016-04-06 广东欧珀移动通信有限公司 Method and device for releasing Bluetooth pairing, and mobile terminal
CN105550137A (en) * 2015-12-14 2016-05-04 广东欧珀移动通信有限公司 Bluetooth pairing setting method and system
CN105631265A (en) * 2015-12-24 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Authentication method, authentication device and terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106993267A (en) * 2017-04-01 2017-07-28 维沃移动通信有限公司 A kind of hotspot connection method, first terminal and second terminal

Also Published As

Publication number Publication date
CN106304066B (en) 2019-11-26

Similar Documents

Publication Publication Date Title
CN106844067A (en) The processing method and mobile terminal of a kind of content
CN104954131B (en) The verification method and system of identifying code
CN106304276A (en) A kind of wireless network processing method and mobile terminal
CN106504777A (en) A kind of processing method of recording data and mobile terminal
CN104993961A (en) Equipment control methods, devices and system
CN107145782A (en) A kind of recognition methods, mobile terminal and the server of abnormal application program
CN106484301A (en) A kind of method of hiden application and terminal
CN106228085A (en) The method for secret protection of application program and mobile terminal
CN106469113A (en) Applied program testing method and system
CN107678884A (en) A kind of data transmission method, mobile terminal and computer-readable recording medium
CN106372470A (en) Method for reminding of inputting password and mobile terminal
CN106648113A (en) Message vibration prompting method and mobile terminal
CN106130735A (en) The processing method of a kind of communication information, device and mobile terminal
CN106371739A (en) Application quick startup method and mobile terminal
CN106503501A (en) A kind of startup method of user model and mobile terminal
CN106507334A (en) A kind of identity identifying method and mobile terminal
CN107329586A (en) A kind of data inputting method, mobile terminal and computer-readable recording medium
CN105847007A (en) Identity verification method for terminal device and computer device
CN104753672B (en) The method, apparatus and terminal of account authorization
CN106332217A (en) Wireless routing method and mobile terminal
CN106778217A (en) A kind of mobile terminal unlocks error handling method and mobile terminal
CN106530217A (en) Photo processing method and mobile terminal
CN107045295A (en) The control method and mobile terminal of a kind of mobile terminal
CN106445319B (en) A kind of file location method and terminal
CN106227612B (en) A kind of method and mobile terminal of word processing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant