CN109462579A - A kind of auth method and terminal device - Google Patents

A kind of auth method and terminal device Download PDF

Info

Publication number
CN109462579A
CN109462579A CN201811230454.2A CN201811230454A CN109462579A CN 109462579 A CN109462579 A CN 109462579A CN 201811230454 A CN201811230454 A CN 201811230454A CN 109462579 A CN109462579 A CN 109462579A
Authority
CN
China
Prior art keywords
address book
terminal device
book data
eigenvector
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811230454.2A
Other languages
Chinese (zh)
Inventor
彭思文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201811230454.2A priority Critical patent/CN109462579A/en
Publication of CN109462579A publication Critical patent/CN109462579A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/2753Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content
    • H04M1/2757Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content by data transmission, e.g. downloading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a kind of auth method and terminal devices, are related to field of communication technology, to solve the problems, such as to cause user's operation inconvenient due to needing user to carry out second of authentication when logging in some application programs by non-commonly used equipment.This method comprises: in the case where target user passes through terminal device logs destination application, obtain first eigenvector and second feature vector, the first eigenvector is the feature vector of the first address book data in the server of destination application, which is the feature vector of the second address book data saved in terminal device;In the case where the distance of first eigenvector and second feature vector is less than first threshold, determine that target user successfully logs in the destination application.This method can be applied in the scene by some application programs of terminal device logs.

Description

A kind of auth method and terminal device
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of auth methods and terminal device.
Background technique
With the continuous development of terminal technology and Internet technology, the types of applications program in user's using terminal equipment is got over Come more frequent.
Currently, the verification mode (hereinafter referred to as first time authentication) that user can usually be combined using account and password Log in some application programs (such as social category application program).In order to improve information security, when these application programs are corresponding Server detects that user is (referred to as non-in the equipment in addition to the equipment (referred to as commonly used equipment) for often logging in such application program Commonly used equipment, such as new cell-phone) on use account and password login when, the server may need user complete first time body Second of authentication is carried out after part verifying (for example, by using short message verification code, to sweep the modes such as two dimensional code and carry out identity again and test Card).By taking second of authentication is short message verification code as an example, the corresponding server of such application program can be to the common of user Equipment sends short message verification code, and such user can obtain the short message verification code by the commonly used equipment, so that user can be defeated Enter the short message verification code and carries out second of authentication.
However, in above-mentioned auth method, if user can not normal use commonly used equipment, user may nothing Method obtains short message verification code by commonly used equipment, thus is unable to complete second of authentication, so as to cause that can not log in Application program.
Summary of the invention
The embodiment of the present invention provides a kind of auth method and terminal device, to solve due to passing through non-commonly used equipment It needs user to carry out second of authentication when logging in some application programs and causes the problem of user's operation inconvenience.
In order to solve the above-mentioned technical problem, the present invention is implemented as follows:
In a first aspect, being applied to terminal device, this method packet the embodiment of the invention provides a kind of auth method It includes: in the case where target user is by terminal device logs destination application, obtaining first eigenvector and second feature Vector, and the distance of first eigenvector and second feature vector be less than first threshold in the case where, determine target user at Function logs in the destination application, which is the first address book data in the server of destination application Feature vector, the second feature vector are the feature vector of the second address book data saved in terminal device.
Second aspect, the embodiment of the invention provides a kind of terminal device, which includes obtaining module and determination Module.Module is obtained to be used to obtain fisrt feature in the case where target user passes through terminal device logs destination application Vector sum second feature vector, the first eigenvector are the first address book data in the server of the destination application Feature vector, the second feature vector are the feature vector of the second address book data saved in terminal device.Determining module is used In in the case where the distance for obtaining first eigenvector and second feature vector that module obtains is less than first threshold, institute is determined It states target user and successfully logs in destination application.
The third aspect, the embodiment of the invention provides a kind of terminal device, the terminal device include processor, memory and The computer program that can be run on a memory and on a processor is stored, is realized when which is executed by processor The step of stating the auth method in first aspect.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage mediums Computer program is stored in matter, which realizes the auth method in above-mentioned first aspect when being executed by processor The step of.
In embodiments of the present invention, can target user pass through terminal device logs destination application in the case where, First eigenvector and second feature vector are obtained, and in the distance of first eigenvector and second feature vector less than the first threshold In the case where value, determine that the target user successfully logs in the destination application, which is destination application Server in the first address book data feature vector, the second feature vector be terminal device in save second communication Record the feature vector of data.With this solution, lead to due to first eigenvector corresponding with the first address book data and with second The size of the distance of the corresponding second feature vector of news record data can characterize the first address book data and the second address book data Similarity, i.e. the distance of first eigenvector and second feature vector is smaller, then the first address book data and the second address list The similarity of data is higher, therefore the embodiment of the present invention can be in the distance of first eigenvector and second feature vector less than In the case where one threshold value, determine that the similarity of the second address book data and the first address book data meets the requirements (expression target use The confidence level at family is higher), and then can determine that user successfully logs in destination application (i.e. authentication success), without with Family manual operation carries out second of authentication, to improve the user when logging in some application programs by non-commonly used equipment The convenience of operation.
Detailed description of the invention
Fig. 1 is a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention;
Fig. 2 is one of the schematic diagram of auth method provided in an embodiment of the present invention;
Fig. 3 is one of the network diagram of auth method provided in an embodiment of the present invention;
Fig. 4 is one of the matrix schematic diagram of auth method provided in an embodiment of the present invention;
Fig. 5 is the two of the network diagram of auth method provided in an embodiment of the present invention;
Fig. 6 is the two of the matrix schematic diagram of auth method provided in an embodiment of the present invention;
Fig. 7 is the two of the schematic diagram of auth method provided in an embodiment of the present invention;
Fig. 8 is the structural schematic diagram of terminal device provided in an embodiment of the present invention;
Fig. 9 is the hardware schematic of terminal device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
The terms "and/or" is a kind of incidence relation for describing affiliated partner, indicates may exist three kinds of relationships, For example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.Symbol herein "/" indicates that affiliated partner is relationship such as A/B expression A or B perhaps.
Term " first " and " second " in description and claims of this specification etc. are for distinguishing different pairs As, rather than it is used for the particular order of description object.For example, first eigenvector and second feature vector etc. are for distinguishing not Same feature vector, rather than it is used for the particular order of Expressive Features vector.
In embodiments of the present invention, " illustrative " or " such as " etc. words for indicate make example, illustration or explanation.This Be described as in inventive embodiments " illustrative " or " such as " any embodiment or design scheme be not necessarily to be construed as comparing Other embodiments or design scheme more preferably or more advantage.Specifically, use " illustrative " or " such as " etc. words purport Related notion is being presented in specific ways.
In the description of the embodiment of the present invention, unless otherwise indicated, the meaning of " plurality " is refer to two or more, For example, multiple processing units refer to two or more processing unit etc..
The embodiment of the present invention provides a kind of auth method and terminal device, can pass through terminal device in target user In the case where logging in destination application, first eigenvector and second feature vector are obtained, and in first eigenvector and the In the case that the distance of two feature vectors is less than first threshold, determine that the target user successfully logs in the destination application, it should First eigenvector is the feature vector of the first address book data in the server of destination application, the second feature vector For the feature vector of the second address book data saved in terminal device.With this solution, due to the first address book data pair The first eigenvector answered and the size with the second address book data at a distance from corresponding second feature vector can characterize first The similarity of address book data and the second address book data, the i.e. distance of first eigenvector and second feature vector are smaller, then The similarity of first address book data and the second address book data is higher, therefore the embodiment of the present invention can be in first eigenvector In the case where being less than first threshold with the distance of second feature vector, the second address book data and the first address book data are determined Similarity meets the requirements and (indicates that the confidence level of target user is higher), and then can determine that target user successfully logs in target application Program (i.e. authentication success), is manually operated without user and carries out second of authentication, to improve by non- The convenience of user's operation when commonly used equipment logs in some application programs.
Terminal device in the embodiment of the present invention can be the terminal device with operating system.The operating system can be Android (Android) operating system can be ios operating system, can also be other possible operating systems, and the present invention is implemented Example is not especially limited.
Below by taking Android operation system as an example, introduce applied by auth method provided in an embodiment of the present invention Software environment.
As shown in Figure 1, being a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention.Scheming In 1, the framework of Android operation system includes 4 layers, be respectively as follows: application layer, application framework layer, system Runtime Library layer and Inner nuclear layer (is specifically as follows Linux inner core).
Wherein, application layer includes each application program (including system application and in Android operation system Tripartite's application program).
Application framework layer is the frame of application program, and developer can be in the exploitation for the frame for abiding by application program In the case where principle, some application programs are developed based on application framework layer.
System Runtime Library layer includes library (also referred to as system library) and Android operation system running environment.Library is mainly Android behaviour As system it is provided needed for all kinds of resources.Android operation system running environment is used to provide software loop for Android operation system Border.
Inner nuclear layer is the operating system layer of Android operation system, belongs to the bottom of Android operation system software level.It is interior Stratum nucleare provides core system service and hardware-related driver based on linux kernel for Android operation system.
By taking Android operation system as an example, in the embodiment of the present invention, developer can be based on above-mentioned Android as shown in Figure 1 The software program of auth method provided in an embodiment of the present invention is realized in the system architecture of operating system, exploitation, so that The auth method can be run based on Android operation system as shown in Figure 1.I.e. processor or terminal device can lead to It crosses and runs software program realization auth method provided in an embodiment of the present invention in Android operation system.
Terminal device in the embodiment of the present invention can be mobile terminal, or immobile terminal.Illustratively, it moves Dynamic terminal can be mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device, super movement People's computer (ultra-mobile personal computer, UMPC), net book or personal digital assistant (personal Digital assistant, PDA) etc., immobile terminal can be personal computer (personal computer, PC), electricity Depending on machine (television, TV), automatic teller machine or self-service machine etc., the embodiment of the present invention is not especially limited.
The executing subject of auth method provided in an embodiment of the present invention can be above-mentioned terminal device, or The functional module and/or functional entity that can be realized the auth method in the terminal device, specifically can be according to reality Use demand determines that the embodiment of the present invention is not construed as limiting.Below by taking terminal device as an example, to identity provided in an embodiment of the present invention Verification method is illustratively illustrated.
As shown in Fig. 2, the embodiment of the present invention provides a kind of auth method, which may include following S200-S203.
S200, target user pass through terminal device logs destination application in the case where, terminal device obtain first Feature vector and second feature vector.
Wherein, the first eigenvector be the destination application server in the first address book data feature to Amount, the second feature vector are the feature vector of the second address book data saved in terminal device.
In the embodiment of the present invention, it is assumed that target user is (following simple using the authentication mode of account name and password combination Claim first time authentication) pass through terminal device logs destination application.Illustratively, in target user in target application journey It is inputted after account name and password on the login interface of sequence, account name and password can be sent to target application by terminal device The server of program, server can receive account name and password, and by account name and password and preset account name and Password is compared, if account name and password correspond with preset account name and password, server can determine first Secondary authentication success, and first message is sent to terminal device, to indicate target user's first time authentication success.Into And terminal device can be with the interface of operational objective application program and displaying target application program.
In order to improve information security, when target user passes through terminal device logs destination application, target The server of application program can detecte whether the terminal device is the non-commonly used equipment for running the destination application.It needs It is bright, it whether is that the description of detection method of non-commonly used equipment of operational objective application program can specifically be joined to terminal device See the associated description of the detection method to the non-commonly used equipment for running a certain application program in the prior art, it will not go into details herein.
Illustratively, in the case where target user replaces new cell-phone and logs in destination application, destination application It is the non-commonly used equipment for running the destination application that server, which can detecte the new cell-phone,.Alternatively, temporarily being borrowed in target user In the case where logging in destination application with the mobile phone of friend, the mobile phone that the server of destination application can detecte friend is Run the non-commonly used equipment of the destination application.
If it is the non-commonly used equipment for running the destination application that the server of destination application, which detects the terminal device, And determining first time authentication success, then the server of destination application can send second message to terminal device, with Second of authentication of instruction target user's progress (such as short message verification code is obtained by commonly used equipment or is swept with commonly used equipment The modes such as two dimensional code carry out authentication).
In the embodiment of the present invention, in the feelings for the second message that the server that terminal device receives destination application is sent Under condition, terminal device available corresponding with the first address book data in the preservation of the server of destination application first is special The corresponding second feature vector of the second address book data for saving in sign vector sum and terminal device.Further, terminal device can In accordance with the following steps, to carry out second of authentication using first eigenvector and second feature vector.
Optionally, in the embodiment of the present invention, terminal device can obtain first eigenvector by various modes.Divide below Not by taking first embodiment, second embodiment and third embodiment as an example, it is discussed in detail and passes through terminal in target user In the case that equipment logs in destination application, terminal device obtains the specific implementation of first eigenvector.
In first embodiment, the step of terminal device acquisition first eigenvector, can specifically pass through in above-mentioned S200 Following S200a and S200b is realized.
S200a, terminal device receive the first address book data that server is sent.
It wherein, may include the mark of M the first users in first address book data, M can be positive integer.
S200b, terminal device obtain first eigenvector according to first address book data.
Optionally, in the embodiment of the present invention, the mark of above-mentioned first user can be the name of the first user, or The telephone number of first user can also be other marks arbitrarily met the actual needs, specifically can be according to actually making It is determined with demand, the present invention is not construed as limiting.
In the embodiment of the present invention, in the case where target user passes through terminal device logs destination application, target is answered With available first address book data (such as contacts list) of the server of program, then first address book data is sent out Give terminal device.Correspondingly, terminal device can receive first address book data from the server of destination application, and And first eigenvector can be obtained according to first address book data.
Optionally, in the embodiment of the present invention, above-mentioned S200b specifically can be real by following S200b1 and S200b2 It is existing.
S200b1, terminal device obtain the first topology information according to the first address book data.
Wherein, which can serve to indicate that the above-mentioned M marks of the first user and the mark of target user Between incidence relation.
S200b2, terminal device obtain first eigenvector according to first topology information.
Optionally, in the embodiment of the present invention, the mark of above-mentioned target user can be character, number or other any full The mark of full border use demand, and the mark of target user is different from the mark of the first user.The mark of target user can be with It is arranged by system default, concrete form can determine that the present invention is not construed as limiting according to actual use demand.
Optionally, in the embodiment of the present invention, terminal device can characterize the M of the first address book data using network representation Incidence relation between the mark of a first user and the mark of target user.Specifically, terminal device can be logical based on first News record data are identified as node with M the first users in the mark of target user and the first address book data, establish the One network.
In the embodiment of the present invention, in first network, the mark of M the first users in the first address book data can be equal Associated with the mark of target user, i.e. the mark of target user is as node, and M first in the first address book data uses Child node of the mark at family as the node.In this way, the first topology information of the first network may include the first address list number The M marks of the first user in and the incidence relation between the mark of target user.
Further, terminal device can use network representation learning algorithm, obtain the first topology information of first network. In turn, terminal device can obtain first eigenvector according to first topology information.
Optionally, above-mentioned network representation learning algorithm can be adjacency matrix method.Specifically, including (M+1) a In the network of node, each node in (M+1) a node can be indicated with (M+1) dimensional vector.For including (M+1) a section The network of point can indicate a network with the matrix of (M+1) * (M+1), if having between two nodes in (M+1) a node (there is incidence relation) in side, then in the corresponding position mark 1 of adjacency matrix.
Illustratively, Fig. 3 shows the M in the first address book data marks of the first user and the mark of target user Between incidence relation schematic diagram.As shown in figure 3, the mark (such as a) of target user is used as node so that M is equal to 5 as an example, And child node of the mark (such as 1,2,3,4,5) of 5 the first users as the node, such a and 1,2,3,4,5 form first Network.As shown in figure 3, the first topology information of first network includes: that a and 1,2,3,4,5 are respectively provided with incidence relation.In turn, Terminal device can obtain as shown in Figure 4 first according to the first topology information of first network using adjacency matrix method Feature vector.
It is appreciated that being the mark with the mark of 5 the first users in the first address book data and target user above Between incidence relation for illustratively illustrated, in actual implementation, M in the first address book data the first users' Other any possible incidence relations can also be presented between mark and the mark of target user, it specifically can be according to actual use Demand determines that the embodiment of the present invention is not construed as limiting.
In second embodiment, it is assumed that (M is positive whole the mark including M the first users in above-mentioned first address book data Number), then, the step of terminal device obtains first eigenvector in above-mentioned S200 specifically can by following S200c and S200d is realized.
S200c, terminal device receive the first topology information that server is sent.
Wherein, which can serve to indicate that the above-mentioned M marks of the first user and the mark of target user Between incidence relation.
S200d, terminal device obtain first eigenvector according to first topology information.
In the embodiment of the present invention, in the case where target user passes through terminal device logs destination application, target is answered With available first address book data of the server of program, and according to the first address book data, the first topology information is obtained, so The first topology information is sent to terminal device afterwards.Correspondingly, terminal device can receive the first topology letter from the server Breath, and according to first topology information, obtain first eigenvector.
In third embodiment, the step of terminal device acquisition first eigenvector, can specifically pass through in above-mentioned S200 Following S200e is realized.
S200e, terminal device receive the first eigenvector that server is sent.
In the embodiment of the present invention, in the case where target user passes through terminal device logs destination application, target is answered With available first address book data of the server of program, and according to first address book data, the first topology information is obtained, Then server can obtain first eigenvector, and the first eigenvector is sent to end according to first topology information End equipment.Terminal device can receive the first eigenvector from the server, thus obtain first eigenvector.
In the embodiment of the present invention, terminal device can receive the first address book data from the server of destination application, And the first topology information is obtained according to the first address book data, first eigenvector is obtained further according to the first topology information;Terminal Equipment can also receive the first topology information from the server of destination application, and obtain the first spy according to the first topology information Levy vector;Terminal device can also directly acquire first eigenvector from the server of destination application.In actual implementation, eventually The mode that end equipment obtains first eigenvector can specifically determine that the embodiment of the present invention is not limited according to actual use demand It is fixed.
Optionally, in the embodiment of the present invention, terminal device can obtain second feature vector by following manner.Specifically , the step of terminal device acquisition second feature vector, can specifically pass through following S200f and S200g reality in above-mentioned S200 It is existing.
S200f, terminal device obtain the second address book data.
It wherein, may include the mark of N number of second user in second address book data, N can be positive integer.
S200g, terminal device obtain second feature vector according to second address book data.
In the embodiment of the present invention, the second address book data that terminal device is available to be locally stored (such as contact person's column Table), and second feature vector can be obtained according to second address book data.
Optionally, above-mentioned S200g can specifically be realized by following S200g1 and S200g2.
S200g1, terminal device obtain the second topology information according to the second address book data.
Wherein, which is used to indicate between the mark of above-mentioned N number of second user and the mark of target user Incidence relation.
S200g2, terminal device obtain second feature vector according to second topology information.
In the embodiment of the present invention, the mark of above-mentioned target user and the mark of second user are different.About target user's The description of mark specifically may refer to above-mentioned terminal device and obtain in the embodiment of the method for first eigenvector to target user's The associated description of mark, details are not described herein again.
Optionally, in the embodiment of the present invention, terminal device can characterize the N of the second address book data using network representation Incidence relation between the mark of a second user and the mark of target user.Specifically, terminal device can be logical based on second News record data, are identified as node with N number of second user in the mark of target user and the second address book data, establish the Two networks.
In the embodiment of the present invention, in the second network, the mark of N number of second user in the second address book data can be equal Associated with the mark of target user, i.e. the mark of target user is as node, and N number of second in the second address book data is used Child node of the mark at family as the node.In this way, the second topology information of second network may include the second address list number The incidence relation between the mark of N number of second user and the mark of target user in.
Further, terminal device can use network representation learning algorithm, obtain the second topology information of the second network. In turn, terminal device can obtain second feature vector according to second topology information.
Optionally, above-mentioned network representation learning algorithm can be adjacency matrix method.Specifically, including (N+1) a In the network of node, each node in (N+1) a node can be indicated with (N+1) dimensional vector.For including (N+1) a section The network of point can indicate a network with the matrix of (N+1) * (N+1), if having between two nodes in (N+1) a node (there is incidence relation) in side, then in the corresponding position mark 1 of adjacency matrix.
Illustratively, Fig. 5 shows the mark of N number of second user in the second address book data and the mark of target user Between incidence relation schematic diagram.As shown in figure 5, the mark (such as a) of target user is used as node so that N is equal to 3 as an example, And child node of the mark (such as 6,7,8) of 3 second users as the node, such a and 6,7,8 form the second network.Such as Shown in Fig. 5, the second topology information of the second network may include: that a and 6,7,8 are respectively provided with incidence relation.In turn, terminal device Adjacency matrix method can be used, according to the second topology information of the second network, obtain second feature as shown in FIG. 6 to Amount.
It is appreciated that being the mark with the mark of 3 second users in the second address book data and target user above Between incidence relation for illustratively illustrated, in actual implementation, N number of second user in the second address book data Other any possible incidence relations can also be presented between mark and the mark of target user, it specifically can be according to actual use Demand determines that the embodiment of the present invention is not construed as limiting.
S201, terminal device judge whether the distance of first eigenvector and the second feature vector is less than first threshold.
In the embodiment of the present invention, above-mentioned first threshold can be terminal device according to the preset value of statistical result.It can Choosing, terminal device can carry out cluster to network data using machine learning mode and obtain first threshold.If distance algorithm is not Together, then first threshold is different, that is, is directed to different distance algorithm, and terminal device can use different first thresholds.
It should be noted that since feature vector is obtained according to the topology information of network, if network is different, The topology information of network is different, and also different according to the feature vector that the topology information of heterogeneous networks obtains.Also, feature vector Between the size of distance can characterize each internetwork similarity, i.e. distance between feature vector is smaller, each internetwork Similarity is bigger.The embodiment of the present invention can by by the distance and first threshold of first eigenvector and second feature vector into Row compares, and judges each internetwork similarity (i.e. the similarity of the first address book data and the second address book data), in turn Terminal device can be according to the judging result of similarity, it is determined whether needs to carry out second of authentication.
In the embodiment of the present invention, terminal device can be by the distance of the first eigenvector and the second feature vector and the One threshold value is compared, if terminal device judges the first eigenvector and the distance of the second feature vector less than the first threshold Value, then terminal device can continue to execute following S202;If terminal device judges the first eigenvector and the second feature The distance of vector is greater than or equal to first threshold, then terminal device can execute following S203.
S202, terminal device determine that target user successfully logs in destination application.
In the embodiment of the present invention, terminal device is judging the distance of first eigenvector and second feature vector less than first In the case where threshold value, terminal device can determine that target user successfully logs in destination application (i.e. authentication success), into And terminal device can be with the interface of operational objective application program and displaying target application program.
Illustratively illustrate the specific implementation of auth method provided in an embodiment of the present invention below by citing.
Illustratively, it is assumed that target user logs in destination application using terminal device 1 (such as new cell-phone) and should The second address book data is had been introduced into terminal device 1, then the server of destination application can detecte the terminal device 1 For the non-commonly used equipment for running the destination application, and sends to terminal device 1 and to be used to indicate the of second of authentication Two message.Correspondingly, terminal device 1 is after receiving second message, in the available server with destination application The corresponding first eigenvector of the first address book data and corresponding with the second address book data saved in terminal device 1 saved Second feature vector, and judge whether the distance of first eigenvector and second feature vector is less than first threshold, and In the case that terminal device 1 judges that the distance of first eigenvector and second feature vector is less than first threshold, terminal device 1 can To determine that target user successfully logs in destination application (i.e. authentication success), it is manually operated and carries out without target user Second of authentication.
It is again illustrative, it is assumed that target user logs in mesh using terminal device 2 (such as mobile phone of the good friend of target user) It include the mark of target user in the second address book data saved in mark application program and the terminal device 2, then target It is the non-commonly used equipment for running the destination application that the server of application program, which can detecte the terminal device 2, and to terminal Equipment 2 sends the second message for being used to indicate second of authentication.Correspondingly, terminal device 2 receive second message it Afterwards, the corresponding first eigenvector of the first address book data saved in the available server with destination application and with The corresponding second feature vector of the second address book data saved in terminal device 2, and judge first eigenvector and the second spy Whether the distance of sign vector is less than first threshold, and judges first eigenvector and second feature vector in terminal device 2 In the case that distance is less than first threshold, terminal device 2 can determine that target user successfully logs in destination application (i.e. identity It is proved to be successful), it is manually operated without target user and carries out second of authentication.
S203, terminal device show the interface of second of authentication.
In the embodiment of the present invention, if terminal device judges that the first eigenvector and the distance of the second feature vector are greater than Or it is equal to first threshold, then it represents that the similarity of the first address book data and the second address book data is lower, needs target user Carry out second of authentication.Therefore, terminal device can show the interface of second of authentication, and instruction target user carries out Second of authentication (such as input short message verification code or sweep the modes such as two dimensional code with commonly used equipment).
Illustratively illustrate the specific implementation of auth method provided in an embodiment of the present invention below by citing.
Illustratively, it is assumed that target user logs in destination application using terminal device 3 (such as mobile phone of stranger) It and does not include the mark of target user in the second address book data saved in the terminal device 3, then destination application Server can detecte the terminal device 3 be run the destination application non-commonly used equipment, and to terminal device 3 send It is used to indicate the second message of second of authentication.Correspondingly, terminal device 3 can obtain after receiving second message Take the corresponding first eigenvector of the first address book data saved in the server with destination application and with terminal device 3 The corresponding second feature vector of second address book data of middle preservation, and judge first eigenvector and second feature vector away from From whether less than first threshold.Judge that first eigenvector and the distance of second feature vector are greater than or equal in terminal device 3 In the case where first threshold, terminal device 3 can show the interface of second of authentication, instruction target user be manually operated into Second of authentication of row.
In the embodiment of the present invention, terminal device can be less than judging first eigenvector and the distance of second feature vector In the case where first threshold, determine that target user successfully logs in destination application (i.e. authentication success), without target User, which is manually operated, carries out second of authentication, uses to improve when logging in some application programs by non-commonly used equipment The convenience of family operation.
Auth method provided in an embodiment of the present invention can pass through terminal device logs target application in target user In the case where program, first eigenvector and second feature vector are obtained, and in first eigenvector and second feature vector In the case that distance is less than first threshold, determine that target user successfully logs in destination application, which is mesh The feature vector of the first address book data in the server of application program is marked, which is to save in terminal device The second address book data feature vector.With this solution, due to first eigenvector corresponding with the first address book data The first address book data and second can be characterized with the size at a distance from second feature vector corresponding with the second address book data The similarity of address book data, the i.e. distance of first eigenvector and second feature vector are smaller, then the first address book data and The similarity of second address book data is higher, therefore the embodiment of the present invention can be in first eigenvector and second feature vector In the case that distance is less than first threshold, determine that the second address book data and the similarity of the first address book data are met the requirements The confidence level of target user (indicate higher), and then can determine and target user successfully log in destination application (i.e. identity is tested Demonstrate,prove successfully), it is manually operated without user and carries out second of authentication, logging in one by non-commonly used equipment to improve The convenience of user's operation when a little application programs.
Optionally, in conjunction with Fig. 2, as shown in fig. 7, after above-mentioned S200, before above-mentioned S201, the embodiment of the present invention The auth method of offer further includes following S204.
S204, terminal device obtain the distance of first eigenvector and second feature vector.
Optionally, in the embodiment of the present invention, terminal device can be using Euclidean distance (i.e. Euclidean distance) algorithm, remaining Chordal distance algorithm etc. calculates the distance of first eigenvector and second feature vector, can also be practical using other any satisfactions The distance algorithm of use demand calculates the distance of first eigenvector and second feature vector, and distance algorithm specifically can basis Actual use demand determines that the embodiment of the present invention is not construed as limiting.
Illustratively, by taking Euclidean distance algorithm calculates the distance of first eigenvector and second feature vector as an example, it is assumed that First eigenvector is denoted as p=(p1,p2,...,pn), second feature vector is denoted as q=(q1,q2,...,qn), then first is special The distance of sign vector sum second feature vector can indicate are as follows:
It is appreciated that above-mentioned each distance algorithm is exemplary and enumerates, i.e., the embodiment of the present invention includes but it is unlimited In the above-mentioned each distance algorithm enumerated.In actual implementation, above-mentioned distance algorithm can also be calculated for other any possible distances Method can specifically determine that the embodiment of the present invention is not construed as limiting according to actual use demand.
As shown in figure 8, the embodiment of the present invention provides a kind of terminal device, which may include obtaining module 701 With determining module 702.Module 701 is obtained to be used in the case where target user passes through terminal device logs destination application, First eigenvector and second feature vector are obtained, which is first in the server of the destination application The feature vector of address book data, the second feature vector be the feature of the second address book data that is saved in terminal device to Amount.Determining module 702 is used to obtain the distance of first eigenvector and second feature vector that module 701 obtains less than first In the case where threshold value, determine that the target user successfully logs in destination application.
Optionally, it in the embodiment of the present invention, obtains module 701 and is specifically used for receiving the first address list number that server is sent According to, and according to first address book data, first eigenvector is obtained, may include M first in first address book data The mark of user, M can be positive integer.
Optionally, it in the embodiment of the present invention, obtains module 701 and specifically is also used to be obtained according to above-mentioned first address book data The first topology information is taken, and according to first topology information, obtains first eigenvector, which can be used for referring to Show the incidence relation between the above-mentioned M marks of the first user and the mark of target user.
It optionally, include the mark of M the first users in the embodiment of the present invention, in above-mentioned first address book data, M is positive Integer.It obtains module 701 to be specifically used for receiving the first topology information that server is sent, and according to first topology information, obtains First eigenvector is taken, which is used to indicate between the M marks of the first user and the mark of target user Incidence relation.
Optionally, in the embodiment of the present invention, obtain module 701 be specifically used for receive server send fisrt feature to Amount.
Optionally, it in the embodiment of the present invention, obtains module 701 and is specifically used for obtaining above-mentioned second address book data, and root According to second address book data, second feature vector is obtained, includes the mark of N number of second user, N in second address book data For positive integer.
Optionally, it in the embodiment of the present invention, obtains module 701 and specifically is also used to be obtained according to above-mentioned second address book data The second topology information is taken, and according to second topology information, obtains second feature vector, which can be used for referring to Show the incidence relation between the mark of above-mentioned N number of second user and the mark of target user.
Terminal device provided in an embodiment of the present invention can be realized terminal device in above method embodiment realize it is each Process, to avoid repeating, which is not described herein again.
Terminal device provided in an embodiment of the present invention can pass through terminal device logs destination application in target user In the case where, first eigenvector and second feature vector are obtained, and in the distance of first eigenvector and second feature vector In the case where less than first threshold, determine that target user successfully logs in the destination application, which is target The feature vector of the first address book data in the server of application program, the second feature vector are to save in terminal device The feature vector of second address book data.With this solution, due to first eigenvector corresponding with the first address book data and Size with the second address book data at a distance from corresponding second feature vector can characterize the first address book data and second and lead to The similarity of news record data, i.e. the distance of first eigenvector and second feature vector is smaller, then the first address book data and the The similarity of two address book datas is higher, thus the embodiment of the present invention can first eigenvector and second feature vector away from In the case where being less than first threshold, determine that the second address book data and the similarity of the first address book data meet the requirements (table Show that the confidence level of target user is higher), so can determine target user successfully log in destination application (i.e. authentication at Function), it is manually operated without user and carries out second of authentication, some answer is being logged in by non-commonly used equipment to improve With the convenience of user's operation when program.
A kind of hardware structural diagram of Fig. 9 terminal device of each embodiment to realize the present invention.As shown in figure 9, should Terminal device 800 includes but is not limited to: radio frequency unit 801, network module 802, audio output unit 803, input unit 804, Sensor 805, display unit 806, user input unit 807, interface unit 808, memory 809, processor 810, Yi Ji electricity The components such as source 811.It will be understood by those skilled in the art that terminal device structure shown in Fig. 9 is not constituted to terminal device Restriction, terminal device may include perhaps combining certain components or different components than illustrating more or fewer components Arrangement.In embodiments of the present invention, terminal device include but is not limited to mobile phone, tablet computer, laptop, palm PC, Car-mounted terminal, wearable device and pedometer etc..
Wherein, processor 810, for obtaining in the case where target user passes through terminal device logs destination application First eigenvector and second feature vector are taken, which is the first communication in the server of destination application The feature vector of data is recorded, which is the feature vector of the second address book data saved in terminal device;? In the case that the distance of first eigenvector and second feature vector is less than first threshold, determine that target user successfully logs in the mesh Mark application program.
The embodiment of the present invention provides a kind of terminal device, which can pass through terminal device logs in target user In the case where destination application, first eigenvector and second feature vector are obtained, and special in first eigenvector and second The distance of vector is levied less than in the case where first threshold, determines that target user successfully logs in the destination application, first spy The feature vector of the first address book data in the server that vector is destination application is levied, which is terminal The feature vector of the second address book data saved in equipment.With this solution, due to corresponding with the first address book data One feature vector and size with the second address book data at a distance from corresponding second feature vector can characterize the first address list The similarity of data and the second address book data, the i.e. distance of first eigenvector and second feature vector are smaller, then first is logical News record data and the similarity of the second address book data are higher, therefore the embodiment of the present invention can be in first eigenvector and second In the case that the distance of feature vector is less than first threshold, the similarity of the second address book data and the first address book data is determined It meets the requirements and (indicates that the confidence level of target user is higher), and then can determine that target user successfully logs in destination application (i.e. authentication success), is manually operated without user and carries out second of authentication, to improve by non-common The convenience of user's operation when equipment logs in some application programs.
It should be understood that the embodiment of the present invention in, radio frequency unit 801 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 810 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 801 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 801 can also by wireless communication system and network and other set Standby communication.
Terminal device 800 provides wireless broadband internet by network module 802 for user and accesses, and such as helps user It sends and receive e-mail, browse webpage and access streaming video etc..
Audio output unit 803 can be received by radio frequency unit 801 or network module 802 or in memory 809 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 803 can also provide and end The relevant audio output of specific function that end equipment 800 executes is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 803 includes loudspeaker, buzzer and receiver etc..
Input unit 804 is for receiving audio or video signal.Input unit 804 may include graphics processor (graphics processing unit, GPU) 8041 and microphone 8042, graphics processor 8041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 806.Through graphics processor 8041, treated that picture frame can be deposited Storage is sent in memory 809 (or other storage mediums) or via radio frequency unit 801 or network module 802.Mike Wind 8042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 801 is converted in the case where telephone calling model.
Terminal device 800 further includes at least one sensor 805, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 8061, and proximity sensor can close when terminal device 800 is moved in one's ear Display panel 8061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify terminal device posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes Sensor 805 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 806 is for showing information input by user or being supplied to the information of user.Display unit 806 can wrap Display panel 8061 is included, liquid crystal display (liquid crystal display, LCD), Organic Light Emitting Diode can be used Forms such as (organic light-emitting diode, OLED) configure display panel 8061.
User input unit 807 can be used for receiving the number or character information of input, and generate the use with terminal device Family setting and the related key signals input of function control.Specifically, user input unit 807 include touch panel 8071 and Other input equipments 8072.Touch panel 8071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 8071 or in touch panel 8071 Neighbouring operation).Touch panel 8071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 810, receiving area It manages the order that device 810 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Seed type realizes touch panel 8071.In addition to touch panel 8071, user input unit 807 can also include other input equipments 8072.Specifically, other input equipments 8072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 8071 can be covered on display panel 8061, when touch panel 8071 is detected at it On or near touch operation after, send processor 810 to determine the type of touch event, be followed by subsequent processing device 810 according to touching The type for touching event provides corresponding visual output on display panel 8061.Although in Fig. 9, touch panel 8071 and display Panel 8061 is the function that outputs and inputs of realizing terminal device as two independent components, but in some embodiments In, can be integrated by touch panel 8071 and display panel 8061 and realize the function that outputs and inputs of terminal device, it is specific this Place is without limitation.
Interface unit 808 is the interface that external device (ED) is connect with terminal device 800.For example, external device (ED) may include having Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 808 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in terminal device 800 or can be used in 800 He of terminal device Data are transmitted between external device (ED).
Memory 809 can be used for storing software program and various data.Memory 809 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 809 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 810 is the control centre of terminal device, utilizes each of various interfaces and the entire terminal device of connection A part by running or execute the software program and/or module that are stored in memory 809, and calls and is stored in storage Data in device 809 execute the various functions and processing data of terminal device, to carry out integral monitoring to terminal device.Place Managing device 810 may include one or more processing units;Optionally, processor 810 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 810.
Terminal device 800 can also include the power supply 811 (such as battery) powered to all parts, optionally, power supply 811 Can be logically contiguous by power-supply management system and processor 810, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, terminal device 800 includes some unshowned functional modules, details are not described herein.
Optionally, the embodiment of the present invention also provides a kind of terminal device, including processor 810 as shown in Figure 9, memory 809, it is stored in the computer program that can be run on memory 809 and on processor 810, the computer program is by processor 810 realize each process of above-mentioned auth method embodiment when executing, and can reach identical technical effect, to avoid weight Multiple, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each process of above-mentioned auth method embodiment, and energy when being executed by processor Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, which may include Read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic Dish or CD etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes Business device, air conditioner or the network equipment etc.) execute method disclosed in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (13)

1. a kind of auth method is applied to terminal device, which is characterized in that the described method includes:
In the case where target user passes through the terminal device logs destination application, first eigenvector and second is obtained Feature vector, the first eigenvector be the destination application server in the first address book data feature to Amount, the second feature vector are the feature vector of the second address book data saved in the terminal device;
In the case where the distance of the first eigenvector and the second feature vector is less than first threshold, the mesh is determined Mark user successfully logs in the destination application.
2. the method according to claim 1, wherein the acquisition first eigenvector, comprising:
First address book data that the server is sent is received, includes M first in first address book data and uses The mark at family, M are positive integer;
According to first address book data, the first eigenvector is obtained.
3. according to the method described in claim 2, it is characterized in that, described according to first address book data, described in acquisition First eigenvector, comprising:
According to first address book data, the first topology information is obtained, first topology information is used to indicate the M the Incidence relation between the mark and the mark of the target user of one user;
According to first topology information, the first eigenvector is obtained.
4. the method according to claim 1, wherein including M the first users in first address book data Mark, M is positive integer;
The acquisition first eigenvector, comprising:
The first topology information that the server is sent is received, first topology information is used to indicate the M the first users Mark the mark of the target user between incidence relation;
According to first topology information, the first eigenvector is obtained.
5. method according to claim 1 to 4, which is characterized in that the acquisition second feature vector, packet It includes:
Second address book data is obtained, includes the mark of N number of second user in second address book data, N is positive whole Number;
According to second address book data, the second feature vector is obtained.
6. according to the method described in claim 5, it is characterized in that, described according to second address book data, described in acquisition Second feature vector, comprising:
According to second address book data, the second topology information is obtained, second topology information is used to indicate described N number of the Incidence relation between the mark and the mark of the target user of two users;
According to second topology information, the second feature vector is obtained.
7. a kind of terminal device, which is characterized in that the terminal device includes obtaining module and determining module;
The acquisition module, for obtaining in the case where target user passes through the terminal device logs destination application First eigenvector and second feature vector, the first eigenvector are first in the server of the destination application The feature vector of address book data, the second feature vector are the spy of the second address book data saved in the terminal device Levy vector;
The determining module, the first eigenvector and the second feature vector for being obtained in the acquisition module In the case that distance is less than first threshold, determine that the target user successfully logs in the destination application.
8. terminal device according to claim 7, which is characterized in that the acquisition module is specifically used for receiving the clothes First address book data that business device is sent, and according to first address book data, obtain the first eigenvector, institute The mark including M the first users in the first address book data is stated, M is positive integer.
9. terminal device according to claim 8, which is characterized in that the acquisition module is specifically also used to according to First address book data obtains the first topology information, and according to first topology information, obtains first eigenvector, and described the One topology information is used to indicate the incidence relation between the mark and the mark of the target user of the M the first users.
10. terminal device according to claim 7, which is characterized in that include M first in first address book data The mark of user, M are positive integer;
The acquisition module, the first topology information sent specifically for receiving the server, and according to first topology Information, obtains the first eigenvector, first topology information be used to indicate the mark of the M the first users with it is described Incidence relation between the mark of target user.
11. terminal device according to any one of claims 7 to 10, which is characterized in that the acquisition module is specific to use In obtaining second address book data, and according to second address book data, the second feature vector is obtained, described the It include the mark of N number of second user in two address book datas, N is positive integer.
12. terminal device according to claim 11, which is characterized in that the acquisition module is specifically also used to according to institute State the second address book data, obtain the second topology information, and according to second topology information, obtain the second feature to Amount, second topology information are used to indicate the pass between the mark of N number of second user and the mark of the target user Connection relationship.
13. a kind of terminal device, which is characterized in that including processor, memory and be stored on the memory and can be in institute The computer program run on processor is stated, such as claim 1 to 6 is realized when the computer program is executed by the processor Any one of described in auth method the step of.
CN201811230454.2A 2018-10-22 2018-10-22 A kind of auth method and terminal device Pending CN109462579A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811230454.2A CN109462579A (en) 2018-10-22 2018-10-22 A kind of auth method and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811230454.2A CN109462579A (en) 2018-10-22 2018-10-22 A kind of auth method and terminal device

Publications (1)

Publication Number Publication Date
CN109462579A true CN109462579A (en) 2019-03-12

Family

ID=65608082

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811230454.2A Pending CN109462579A (en) 2018-10-22 2018-10-22 A kind of auth method and terminal device

Country Status (1)

Country Link
CN (1) CN109462579A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013076436A1 (en) * 2011-11-23 2013-05-30 Barclays Bank Plc Peer-to-peer payment registration and activation
CN104811428A (en) * 2014-01-28 2015-07-29 阿里巴巴集团控股有限公司 Method, device and system for verifying client identity by social relation data
CN105050089A (en) * 2015-08-21 2015-11-11 深圳市九洲电器有限公司 Wireless network login verification method and system
CN105578461A (en) * 2014-11-10 2016-05-11 阿里巴巴集团控股有限公司 Method and device for establishing communication mobile terminals, communication answering method and device, communication calling method and devices, and system
CN107920070A (en) * 2017-11-15 2018-04-17 中移在线服务有限公司 Identity identifying method, server and system
CN107944238A (en) * 2017-11-15 2018-04-20 中移在线服务有限公司 Identity identifying method, server and system
CN108495143A (en) * 2018-03-30 2018-09-04 百度在线网络技术(北京)有限公司 The method and apparatus of video recommendations

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013076436A1 (en) * 2011-11-23 2013-05-30 Barclays Bank Plc Peer-to-peer payment registration and activation
CN104811428A (en) * 2014-01-28 2015-07-29 阿里巴巴集团控股有限公司 Method, device and system for verifying client identity by social relation data
CN105578461A (en) * 2014-11-10 2016-05-11 阿里巴巴集团控股有限公司 Method and device for establishing communication mobile terminals, communication answering method and device, communication calling method and devices, and system
CN105050089A (en) * 2015-08-21 2015-11-11 深圳市九洲电器有限公司 Wireless network login verification method and system
CN107920070A (en) * 2017-11-15 2018-04-17 中移在线服务有限公司 Identity identifying method, server and system
CN107944238A (en) * 2017-11-15 2018-04-20 中移在线服务有限公司 Identity identifying method, server and system
CN108495143A (en) * 2018-03-30 2018-09-04 百度在线网络技术(北京)有限公司 The method and apparatus of video recommendations

Similar Documents

Publication Publication Date Title
CN108337374A (en) A kind of message prompt method and mobile terminal
CN109857495A (en) A kind of display control method and terminal device
CN109857494A (en) A kind of message prompt method and terminal device
CN110221737A (en) A kind of icon display method and terminal device
CN109543099A (en) A kind of content recommendation method and terminal device
CN108595946A (en) A kind of method and terminal of protection privacy
CN109600297A (en) A kind of mark sweep-out method and terminal device
CN109151176A (en) A kind of information acquisition method and terminal
CN110457935A (en) A kind of authority configuring method and terminal device
CN109901761A (en) A kind of content display method and mobile terminal
CN110049187A (en) A kind of display methods and terminal device
CN108733993A (en) A kind of method for information display and terminal
CN110366182A (en) A kind of data transmission method and terminal device
CN110536253A (en) A kind of group's Adding Way and mobile terminal
CN110069407A (en) A kind of function test method and device of application program
CN109218984A (en) A kind of method for tracing and mobile terminal
CN108984231A (en) A kind of login method and mobile terminal of application program account
CN108540951A (en) A kind of recharge method and mobile terminal
CN107704334A (en) A kind of SDK processing method and mobile terminal
CN108494949B (en) A kind of image classification method and mobile terminal
CN109547622A (en) A kind of verification method and terminal device
CN108764927A (en) A kind of payment verification method, server and terminal
CN109547330A (en) A kind of information sharing method and device
CN110045898A (en) A kind of display methods and terminal device
CN109582174A (en) A kind of touch-control input response method and terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190312

RJ01 Rejection of invention patent application after publication