CN109462579A - A kind of auth method and terminal device - Google Patents
A kind of auth method and terminal device Download PDFInfo
- Publication number
- CN109462579A CN109462579A CN201811230454.2A CN201811230454A CN109462579A CN 109462579 A CN109462579 A CN 109462579A CN 201811230454 A CN201811230454 A CN 201811230454A CN 109462579 A CN109462579 A CN 109462579A
- Authority
- CN
- China
- Prior art keywords
- address book
- terminal device
- book data
- eigenvector
- mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/2753—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content
- H04M1/2757—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content by data transmission, e.g. downloading
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention provides a kind of auth method and terminal devices, are related to field of communication technology, to solve the problems, such as to cause user's operation inconvenient due to needing user to carry out second of authentication when logging in some application programs by non-commonly used equipment.This method comprises: in the case where target user passes through terminal device logs destination application, obtain first eigenvector and second feature vector, the first eigenvector is the feature vector of the first address book data in the server of destination application, which is the feature vector of the second address book data saved in terminal device;In the case where the distance of first eigenvector and second feature vector is less than first threshold, determine that target user successfully logs in the destination application.This method can be applied in the scene by some application programs of terminal device logs.
Description
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of auth methods and terminal device.
Background technique
With the continuous development of terminal technology and Internet technology, the types of applications program in user's using terminal equipment is got over
Come more frequent.
Currently, the verification mode (hereinafter referred to as first time authentication) that user can usually be combined using account and password
Log in some application programs (such as social category application program).In order to improve information security, when these application programs are corresponding
Server detects that user is (referred to as non-in the equipment in addition to the equipment (referred to as commonly used equipment) for often logging in such application program
Commonly used equipment, such as new cell-phone) on use account and password login when, the server may need user complete first time body
Second of authentication is carried out after part verifying (for example, by using short message verification code, to sweep the modes such as two dimensional code and carry out identity again and test
Card).By taking second of authentication is short message verification code as an example, the corresponding server of such application program can be to the common of user
Equipment sends short message verification code, and such user can obtain the short message verification code by the commonly used equipment, so that user can be defeated
Enter the short message verification code and carries out second of authentication.
However, in above-mentioned auth method, if user can not normal use commonly used equipment, user may nothing
Method obtains short message verification code by commonly used equipment, thus is unable to complete second of authentication, so as to cause that can not log in
Application program.
Summary of the invention
The embodiment of the present invention provides a kind of auth method and terminal device, to solve due to passing through non-commonly used equipment
It needs user to carry out second of authentication when logging in some application programs and causes the problem of user's operation inconvenience.
In order to solve the above-mentioned technical problem, the present invention is implemented as follows:
In a first aspect, being applied to terminal device, this method packet the embodiment of the invention provides a kind of auth method
It includes: in the case where target user is by terminal device logs destination application, obtaining first eigenvector and second feature
Vector, and the distance of first eigenvector and second feature vector be less than first threshold in the case where, determine target user at
Function logs in the destination application, which is the first address book data in the server of destination application
Feature vector, the second feature vector are the feature vector of the second address book data saved in terminal device.
Second aspect, the embodiment of the invention provides a kind of terminal device, which includes obtaining module and determination
Module.Module is obtained to be used to obtain fisrt feature in the case where target user passes through terminal device logs destination application
Vector sum second feature vector, the first eigenvector are the first address book data in the server of the destination application
Feature vector, the second feature vector are the feature vector of the second address book data saved in terminal device.Determining module is used
In in the case where the distance for obtaining first eigenvector and second feature vector that module obtains is less than first threshold, institute is determined
It states target user and successfully logs in destination application.
The third aspect, the embodiment of the invention provides a kind of terminal device, the terminal device include processor, memory and
The computer program that can be run on a memory and on a processor is stored, is realized when which is executed by processor
The step of stating the auth method in first aspect.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage mediums
Computer program is stored in matter, which realizes the auth method in above-mentioned first aspect when being executed by processor
The step of.
In embodiments of the present invention, can target user pass through terminal device logs destination application in the case where,
First eigenvector and second feature vector are obtained, and in the distance of first eigenvector and second feature vector less than the first threshold
In the case where value, determine that the target user successfully logs in the destination application, which is destination application
Server in the first address book data feature vector, the second feature vector be terminal device in save second communication
Record the feature vector of data.With this solution, lead to due to first eigenvector corresponding with the first address book data and with second
The size of the distance of the corresponding second feature vector of news record data can characterize the first address book data and the second address book data
Similarity, i.e. the distance of first eigenvector and second feature vector is smaller, then the first address book data and the second address list
The similarity of data is higher, therefore the embodiment of the present invention can be in the distance of first eigenvector and second feature vector less than
In the case where one threshold value, determine that the similarity of the second address book data and the first address book data meets the requirements (expression target use
The confidence level at family is higher), and then can determine that user successfully logs in destination application (i.e. authentication success), without with
Family manual operation carries out second of authentication, to improve the user when logging in some application programs by non-commonly used equipment
The convenience of operation.
Detailed description of the invention
Fig. 1 is a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention;
Fig. 2 is one of the schematic diagram of auth method provided in an embodiment of the present invention;
Fig. 3 is one of the network diagram of auth method provided in an embodiment of the present invention;
Fig. 4 is one of the matrix schematic diagram of auth method provided in an embodiment of the present invention;
Fig. 5 is the two of the network diagram of auth method provided in an embodiment of the present invention;
Fig. 6 is the two of the matrix schematic diagram of auth method provided in an embodiment of the present invention;
Fig. 7 is the two of the schematic diagram of auth method provided in an embodiment of the present invention;
Fig. 8 is the structural schematic diagram of terminal device provided in an embodiment of the present invention;
Fig. 9 is the hardware schematic of terminal device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
The terms "and/or" is a kind of incidence relation for describing affiliated partner, indicates may exist three kinds of relationships,
For example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.Symbol herein
"/" indicates that affiliated partner is relationship such as A/B expression A or B perhaps.
Term " first " and " second " in description and claims of this specification etc. are for distinguishing different pairs
As, rather than it is used for the particular order of description object.For example, first eigenvector and second feature vector etc. are for distinguishing not
Same feature vector, rather than it is used for the particular order of Expressive Features vector.
In embodiments of the present invention, " illustrative " or " such as " etc. words for indicate make example, illustration or explanation.This
Be described as in inventive embodiments " illustrative " or " such as " any embodiment or design scheme be not necessarily to be construed as comparing
Other embodiments or design scheme more preferably or more advantage.Specifically, use " illustrative " or " such as " etc. words purport
Related notion is being presented in specific ways.
In the description of the embodiment of the present invention, unless otherwise indicated, the meaning of " plurality " is refer to two or more,
For example, multiple processing units refer to two or more processing unit etc..
The embodiment of the present invention provides a kind of auth method and terminal device, can pass through terminal device in target user
In the case where logging in destination application, first eigenvector and second feature vector are obtained, and in first eigenvector and the
In the case that the distance of two feature vectors is less than first threshold, determine that the target user successfully logs in the destination application, it should
First eigenvector is the feature vector of the first address book data in the server of destination application, the second feature vector
For the feature vector of the second address book data saved in terminal device.With this solution, due to the first address book data pair
The first eigenvector answered and the size with the second address book data at a distance from corresponding second feature vector can characterize first
The similarity of address book data and the second address book data, the i.e. distance of first eigenvector and second feature vector are smaller, then
The similarity of first address book data and the second address book data is higher, therefore the embodiment of the present invention can be in first eigenvector
In the case where being less than first threshold with the distance of second feature vector, the second address book data and the first address book data are determined
Similarity meets the requirements and (indicates that the confidence level of target user is higher), and then can determine that target user successfully logs in target application
Program (i.e. authentication success), is manually operated without user and carries out second of authentication, to improve by non-
The convenience of user's operation when commonly used equipment logs in some application programs.
Terminal device in the embodiment of the present invention can be the terminal device with operating system.The operating system can be
Android (Android) operating system can be ios operating system, can also be other possible operating systems, and the present invention is implemented
Example is not especially limited.
Below by taking Android operation system as an example, introduce applied by auth method provided in an embodiment of the present invention
Software environment.
As shown in Figure 1, being a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention.Scheming
In 1, the framework of Android operation system includes 4 layers, be respectively as follows: application layer, application framework layer, system Runtime Library layer and
Inner nuclear layer (is specifically as follows Linux inner core).
Wherein, application layer includes each application program (including system application and in Android operation system
Tripartite's application program).
Application framework layer is the frame of application program, and developer can be in the exploitation for the frame for abiding by application program
In the case where principle, some application programs are developed based on application framework layer.
System Runtime Library layer includes library (also referred to as system library) and Android operation system running environment.Library is mainly Android behaviour
As system it is provided needed for all kinds of resources.Android operation system running environment is used to provide software loop for Android operation system
Border.
Inner nuclear layer is the operating system layer of Android operation system, belongs to the bottom of Android operation system software level.It is interior
Stratum nucleare provides core system service and hardware-related driver based on linux kernel for Android operation system.
By taking Android operation system as an example, in the embodiment of the present invention, developer can be based on above-mentioned Android as shown in Figure 1
The software program of auth method provided in an embodiment of the present invention is realized in the system architecture of operating system, exploitation, so that
The auth method can be run based on Android operation system as shown in Figure 1.I.e. processor or terminal device can lead to
It crosses and runs software program realization auth method provided in an embodiment of the present invention in Android operation system.
Terminal device in the embodiment of the present invention can be mobile terminal, or immobile terminal.Illustratively, it moves
Dynamic terminal can be mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device, super movement
People's computer (ultra-mobile personal computer, UMPC), net book or personal digital assistant (personal
Digital assistant, PDA) etc., immobile terminal can be personal computer (personal computer, PC), electricity
Depending on machine (television, TV), automatic teller machine or self-service machine etc., the embodiment of the present invention is not especially limited.
The executing subject of auth method provided in an embodiment of the present invention can be above-mentioned terminal device, or
The functional module and/or functional entity that can be realized the auth method in the terminal device, specifically can be according to reality
Use demand determines that the embodiment of the present invention is not construed as limiting.Below by taking terminal device as an example, to identity provided in an embodiment of the present invention
Verification method is illustratively illustrated.
As shown in Fig. 2, the embodiment of the present invention provides a kind of auth method, which may include following
S200-S203.
S200, target user pass through terminal device logs destination application in the case where, terminal device obtain first
Feature vector and second feature vector.
Wherein, the first eigenvector be the destination application server in the first address book data feature to
Amount, the second feature vector are the feature vector of the second address book data saved in terminal device.
In the embodiment of the present invention, it is assumed that target user is (following simple using the authentication mode of account name and password combination
Claim first time authentication) pass through terminal device logs destination application.Illustratively, in target user in target application journey
It is inputted after account name and password on the login interface of sequence, account name and password can be sent to target application by terminal device
The server of program, server can receive account name and password, and by account name and password and preset account name and
Password is compared, if account name and password correspond with preset account name and password, server can determine first
Secondary authentication success, and first message is sent to terminal device, to indicate target user's first time authentication success.Into
And terminal device can be with the interface of operational objective application program and displaying target application program.
In order to improve information security, when target user passes through terminal device logs destination application, target
The server of application program can detecte whether the terminal device is the non-commonly used equipment for running the destination application.It needs
It is bright, it whether is that the description of detection method of non-commonly used equipment of operational objective application program can specifically be joined to terminal device
See the associated description of the detection method to the non-commonly used equipment for running a certain application program in the prior art, it will not go into details herein.
Illustratively, in the case where target user replaces new cell-phone and logs in destination application, destination application
It is the non-commonly used equipment for running the destination application that server, which can detecte the new cell-phone,.Alternatively, temporarily being borrowed in target user
In the case where logging in destination application with the mobile phone of friend, the mobile phone that the server of destination application can detecte friend is
Run the non-commonly used equipment of the destination application.
If it is the non-commonly used equipment for running the destination application that the server of destination application, which detects the terminal device,
And determining first time authentication success, then the server of destination application can send second message to terminal device, with
Second of authentication of instruction target user's progress (such as short message verification code is obtained by commonly used equipment or is swept with commonly used equipment
The modes such as two dimensional code carry out authentication).
In the embodiment of the present invention, in the feelings for the second message that the server that terminal device receives destination application is sent
Under condition, terminal device available corresponding with the first address book data in the preservation of the server of destination application first is special
The corresponding second feature vector of the second address book data for saving in sign vector sum and terminal device.Further, terminal device can
In accordance with the following steps, to carry out second of authentication using first eigenvector and second feature vector.
Optionally, in the embodiment of the present invention, terminal device can obtain first eigenvector by various modes.Divide below
Not by taking first embodiment, second embodiment and third embodiment as an example, it is discussed in detail and passes through terminal in target user
In the case that equipment logs in destination application, terminal device obtains the specific implementation of first eigenvector.
In first embodiment, the step of terminal device acquisition first eigenvector, can specifically pass through in above-mentioned S200
Following S200a and S200b is realized.
S200a, terminal device receive the first address book data that server is sent.
It wherein, may include the mark of M the first users in first address book data, M can be positive integer.
S200b, terminal device obtain first eigenvector according to first address book data.
Optionally, in the embodiment of the present invention, the mark of above-mentioned first user can be the name of the first user, or
The telephone number of first user can also be other marks arbitrarily met the actual needs, specifically can be according to actually making
It is determined with demand, the present invention is not construed as limiting.
In the embodiment of the present invention, in the case where target user passes through terminal device logs destination application, target is answered
With available first address book data (such as contacts list) of the server of program, then first address book data is sent out
Give terminal device.Correspondingly, terminal device can receive first address book data from the server of destination application, and
And first eigenvector can be obtained according to first address book data.
Optionally, in the embodiment of the present invention, above-mentioned S200b specifically can be real by following S200b1 and S200b2
It is existing.
S200b1, terminal device obtain the first topology information according to the first address book data.
Wherein, which can serve to indicate that the above-mentioned M marks of the first user and the mark of target user
Between incidence relation.
S200b2, terminal device obtain first eigenvector according to first topology information.
Optionally, in the embodiment of the present invention, the mark of above-mentioned target user can be character, number or other any full
The mark of full border use demand, and the mark of target user is different from the mark of the first user.The mark of target user can be with
It is arranged by system default, concrete form can determine that the present invention is not construed as limiting according to actual use demand.
Optionally, in the embodiment of the present invention, terminal device can characterize the M of the first address book data using network representation
Incidence relation between the mark of a first user and the mark of target user.Specifically, terminal device can be logical based on first
News record data are identified as node with M the first users in the mark of target user and the first address book data, establish the
One network.
In the embodiment of the present invention, in first network, the mark of M the first users in the first address book data can be equal
Associated with the mark of target user, i.e. the mark of target user is as node, and M first in the first address book data uses
Child node of the mark at family as the node.In this way, the first topology information of the first network may include the first address list number
The M marks of the first user in and the incidence relation between the mark of target user.
Further, terminal device can use network representation learning algorithm, obtain the first topology information of first network.
In turn, terminal device can obtain first eigenvector according to first topology information.
Optionally, above-mentioned network representation learning algorithm can be adjacency matrix method.Specifically, including (M+1) a
In the network of node, each node in (M+1) a node can be indicated with (M+1) dimensional vector.For including (M+1) a section
The network of point can indicate a network with the matrix of (M+1) * (M+1), if having between two nodes in (M+1) a node
(there is incidence relation) in side, then in the corresponding position mark 1 of adjacency matrix.
Illustratively, Fig. 3 shows the M in the first address book data marks of the first user and the mark of target user
Between incidence relation schematic diagram.As shown in figure 3, the mark (such as a) of target user is used as node so that M is equal to 5 as an example,
And child node of the mark (such as 1,2,3,4,5) of 5 the first users as the node, such a and 1,2,3,4,5 form first
Network.As shown in figure 3, the first topology information of first network includes: that a and 1,2,3,4,5 are respectively provided with incidence relation.In turn,
Terminal device can obtain as shown in Figure 4 first according to the first topology information of first network using adjacency matrix method
Feature vector.
It is appreciated that being the mark with the mark of 5 the first users in the first address book data and target user above
Between incidence relation for illustratively illustrated, in actual implementation, M in the first address book data the first users'
Other any possible incidence relations can also be presented between mark and the mark of target user, it specifically can be according to actual use
Demand determines that the embodiment of the present invention is not construed as limiting.
In second embodiment, it is assumed that (M is positive whole the mark including M the first users in above-mentioned first address book data
Number), then, the step of terminal device obtains first eigenvector in above-mentioned S200 specifically can by following S200c and
S200d is realized.
S200c, terminal device receive the first topology information that server is sent.
Wherein, which can serve to indicate that the above-mentioned M marks of the first user and the mark of target user
Between incidence relation.
S200d, terminal device obtain first eigenvector according to first topology information.
In the embodiment of the present invention, in the case where target user passes through terminal device logs destination application, target is answered
With available first address book data of the server of program, and according to the first address book data, the first topology information is obtained, so
The first topology information is sent to terminal device afterwards.Correspondingly, terminal device can receive the first topology letter from the server
Breath, and according to first topology information, obtain first eigenvector.
In third embodiment, the step of terminal device acquisition first eigenvector, can specifically pass through in above-mentioned S200
Following S200e is realized.
S200e, terminal device receive the first eigenvector that server is sent.
In the embodiment of the present invention, in the case where target user passes through terminal device logs destination application, target is answered
With available first address book data of the server of program, and according to first address book data, the first topology information is obtained,
Then server can obtain first eigenvector, and the first eigenvector is sent to end according to first topology information
End equipment.Terminal device can receive the first eigenvector from the server, thus obtain first eigenvector.
In the embodiment of the present invention, terminal device can receive the first address book data from the server of destination application,
And the first topology information is obtained according to the first address book data, first eigenvector is obtained further according to the first topology information;Terminal
Equipment can also receive the first topology information from the server of destination application, and obtain the first spy according to the first topology information
Levy vector;Terminal device can also directly acquire first eigenvector from the server of destination application.In actual implementation, eventually
The mode that end equipment obtains first eigenvector can specifically determine that the embodiment of the present invention is not limited according to actual use demand
It is fixed.
Optionally, in the embodiment of the present invention, terminal device can obtain second feature vector by following manner.Specifically
, the step of terminal device acquisition second feature vector, can specifically pass through following S200f and S200g reality in above-mentioned S200
It is existing.
S200f, terminal device obtain the second address book data.
It wherein, may include the mark of N number of second user in second address book data, N can be positive integer.
S200g, terminal device obtain second feature vector according to second address book data.
In the embodiment of the present invention, the second address book data that terminal device is available to be locally stored (such as contact person's column
Table), and second feature vector can be obtained according to second address book data.
Optionally, above-mentioned S200g can specifically be realized by following S200g1 and S200g2.
S200g1, terminal device obtain the second topology information according to the second address book data.
Wherein, which is used to indicate between the mark of above-mentioned N number of second user and the mark of target user
Incidence relation.
S200g2, terminal device obtain second feature vector according to second topology information.
In the embodiment of the present invention, the mark of above-mentioned target user and the mark of second user are different.About target user's
The description of mark specifically may refer to above-mentioned terminal device and obtain in the embodiment of the method for first eigenvector to target user's
The associated description of mark, details are not described herein again.
Optionally, in the embodiment of the present invention, terminal device can characterize the N of the second address book data using network representation
Incidence relation between the mark of a second user and the mark of target user.Specifically, terminal device can be logical based on second
News record data, are identified as node with N number of second user in the mark of target user and the second address book data, establish the
Two networks.
In the embodiment of the present invention, in the second network, the mark of N number of second user in the second address book data can be equal
Associated with the mark of target user, i.e. the mark of target user is as node, and N number of second in the second address book data is used
Child node of the mark at family as the node.In this way, the second topology information of second network may include the second address list number
The incidence relation between the mark of N number of second user and the mark of target user in.
Further, terminal device can use network representation learning algorithm, obtain the second topology information of the second network.
In turn, terminal device can obtain second feature vector according to second topology information.
Optionally, above-mentioned network representation learning algorithm can be adjacency matrix method.Specifically, including (N+1) a
In the network of node, each node in (N+1) a node can be indicated with (N+1) dimensional vector.For including (N+1) a section
The network of point can indicate a network with the matrix of (N+1) * (N+1), if having between two nodes in (N+1) a node
(there is incidence relation) in side, then in the corresponding position mark 1 of adjacency matrix.
Illustratively, Fig. 5 shows the mark of N number of second user in the second address book data and the mark of target user
Between incidence relation schematic diagram.As shown in figure 5, the mark (such as a) of target user is used as node so that N is equal to 3 as an example,
And child node of the mark (such as 6,7,8) of 3 second users as the node, such a and 6,7,8 form the second network.Such as
Shown in Fig. 5, the second topology information of the second network may include: that a and 6,7,8 are respectively provided with incidence relation.In turn, terminal device
Adjacency matrix method can be used, according to the second topology information of the second network, obtain second feature as shown in FIG. 6 to
Amount.
It is appreciated that being the mark with the mark of 3 second users in the second address book data and target user above
Between incidence relation for illustratively illustrated, in actual implementation, N number of second user in the second address book data
Other any possible incidence relations can also be presented between mark and the mark of target user, it specifically can be according to actual use
Demand determines that the embodiment of the present invention is not construed as limiting.
S201, terminal device judge whether the distance of first eigenvector and the second feature vector is less than first threshold.
In the embodiment of the present invention, above-mentioned first threshold can be terminal device according to the preset value of statistical result.It can
Choosing, terminal device can carry out cluster to network data using machine learning mode and obtain first threshold.If distance algorithm is not
Together, then first threshold is different, that is, is directed to different distance algorithm, and terminal device can use different first thresholds.
It should be noted that since feature vector is obtained according to the topology information of network, if network is different,
The topology information of network is different, and also different according to the feature vector that the topology information of heterogeneous networks obtains.Also, feature vector
Between the size of distance can characterize each internetwork similarity, i.e. distance between feature vector is smaller, each internetwork
Similarity is bigger.The embodiment of the present invention can by by the distance and first threshold of first eigenvector and second feature vector into
Row compares, and judges each internetwork similarity (i.e. the similarity of the first address book data and the second address book data), in turn
Terminal device can be according to the judging result of similarity, it is determined whether needs to carry out second of authentication.
In the embodiment of the present invention, terminal device can be by the distance of the first eigenvector and the second feature vector and the
One threshold value is compared, if terminal device judges the first eigenvector and the distance of the second feature vector less than the first threshold
Value, then terminal device can continue to execute following S202;If terminal device judges the first eigenvector and the second feature
The distance of vector is greater than or equal to first threshold, then terminal device can execute following S203.
S202, terminal device determine that target user successfully logs in destination application.
In the embodiment of the present invention, terminal device is judging the distance of first eigenvector and second feature vector less than first
In the case where threshold value, terminal device can determine that target user successfully logs in destination application (i.e. authentication success), into
And terminal device can be with the interface of operational objective application program and displaying target application program.
Illustratively illustrate the specific implementation of auth method provided in an embodiment of the present invention below by citing.
Illustratively, it is assumed that target user logs in destination application using terminal device 1 (such as new cell-phone) and should
The second address book data is had been introduced into terminal device 1, then the server of destination application can detecte the terminal device 1
For the non-commonly used equipment for running the destination application, and sends to terminal device 1 and to be used to indicate the of second of authentication
Two message.Correspondingly, terminal device 1 is after receiving second message, in the available server with destination application
The corresponding first eigenvector of the first address book data and corresponding with the second address book data saved in terminal device 1 saved
Second feature vector, and judge whether the distance of first eigenvector and second feature vector is less than first threshold, and
In the case that terminal device 1 judges that the distance of first eigenvector and second feature vector is less than first threshold, terminal device 1 can
To determine that target user successfully logs in destination application (i.e. authentication success), it is manually operated and carries out without target user
Second of authentication.
It is again illustrative, it is assumed that target user logs in mesh using terminal device 2 (such as mobile phone of the good friend of target user)
It include the mark of target user in the second address book data saved in mark application program and the terminal device 2, then target
It is the non-commonly used equipment for running the destination application that the server of application program, which can detecte the terminal device 2, and to terminal
Equipment 2 sends the second message for being used to indicate second of authentication.Correspondingly, terminal device 2 receive second message it
Afterwards, the corresponding first eigenvector of the first address book data saved in the available server with destination application and with
The corresponding second feature vector of the second address book data saved in terminal device 2, and judge first eigenvector and the second spy
Whether the distance of sign vector is less than first threshold, and judges first eigenvector and second feature vector in terminal device 2
In the case that distance is less than first threshold, terminal device 2 can determine that target user successfully logs in destination application (i.e. identity
It is proved to be successful), it is manually operated without target user and carries out second of authentication.
S203, terminal device show the interface of second of authentication.
In the embodiment of the present invention, if terminal device judges that the first eigenvector and the distance of the second feature vector are greater than
Or it is equal to first threshold, then it represents that the similarity of the first address book data and the second address book data is lower, needs target user
Carry out second of authentication.Therefore, terminal device can show the interface of second of authentication, and instruction target user carries out
Second of authentication (such as input short message verification code or sweep the modes such as two dimensional code with commonly used equipment).
Illustratively illustrate the specific implementation of auth method provided in an embodiment of the present invention below by citing.
Illustratively, it is assumed that target user logs in destination application using terminal device 3 (such as mobile phone of stranger)
It and does not include the mark of target user in the second address book data saved in the terminal device 3, then destination application
Server can detecte the terminal device 3 be run the destination application non-commonly used equipment, and to terminal device 3 send
It is used to indicate the second message of second of authentication.Correspondingly, terminal device 3 can obtain after receiving second message
Take the corresponding first eigenvector of the first address book data saved in the server with destination application and with terminal device 3
The corresponding second feature vector of second address book data of middle preservation, and judge first eigenvector and second feature vector away from
From whether less than first threshold.Judge that first eigenvector and the distance of second feature vector are greater than or equal in terminal device 3
In the case where first threshold, terminal device 3 can show the interface of second of authentication, instruction target user be manually operated into
Second of authentication of row.
In the embodiment of the present invention, terminal device can be less than judging first eigenvector and the distance of second feature vector
In the case where first threshold, determine that target user successfully logs in destination application (i.e. authentication success), without target
User, which is manually operated, carries out second of authentication, uses to improve when logging in some application programs by non-commonly used equipment
The convenience of family operation.
Auth method provided in an embodiment of the present invention can pass through terminal device logs target application in target user
In the case where program, first eigenvector and second feature vector are obtained, and in first eigenvector and second feature vector
In the case that distance is less than first threshold, determine that target user successfully logs in destination application, which is mesh
The feature vector of the first address book data in the server of application program is marked, which is to save in terminal device
The second address book data feature vector.With this solution, due to first eigenvector corresponding with the first address book data
The first address book data and second can be characterized with the size at a distance from second feature vector corresponding with the second address book data
The similarity of address book data, the i.e. distance of first eigenvector and second feature vector are smaller, then the first address book data and
The similarity of second address book data is higher, therefore the embodiment of the present invention can be in first eigenvector and second feature vector
In the case that distance is less than first threshold, determine that the second address book data and the similarity of the first address book data are met the requirements
The confidence level of target user (indicate higher), and then can determine and target user successfully log in destination application (i.e. identity is tested
Demonstrate,prove successfully), it is manually operated without user and carries out second of authentication, logging in one by non-commonly used equipment to improve
The convenience of user's operation when a little application programs.
Optionally, in conjunction with Fig. 2, as shown in fig. 7, after above-mentioned S200, before above-mentioned S201, the embodiment of the present invention
The auth method of offer further includes following S204.
S204, terminal device obtain the distance of first eigenvector and second feature vector.
Optionally, in the embodiment of the present invention, terminal device can be using Euclidean distance (i.e. Euclidean distance) algorithm, remaining
Chordal distance algorithm etc. calculates the distance of first eigenvector and second feature vector, can also be practical using other any satisfactions
The distance algorithm of use demand calculates the distance of first eigenvector and second feature vector, and distance algorithm specifically can basis
Actual use demand determines that the embodiment of the present invention is not construed as limiting.
Illustratively, by taking Euclidean distance algorithm calculates the distance of first eigenvector and second feature vector as an example, it is assumed that
First eigenvector is denoted as p=(p1,p2,...,pn), second feature vector is denoted as q=(q1,q2,...,qn), then first is special
The distance of sign vector sum second feature vector can indicate are as follows:
It is appreciated that above-mentioned each distance algorithm is exemplary and enumerates, i.e., the embodiment of the present invention includes but it is unlimited
In the above-mentioned each distance algorithm enumerated.In actual implementation, above-mentioned distance algorithm can also be calculated for other any possible distances
Method can specifically determine that the embodiment of the present invention is not construed as limiting according to actual use demand.
As shown in figure 8, the embodiment of the present invention provides a kind of terminal device, which may include obtaining module 701
With determining module 702.Module 701 is obtained to be used in the case where target user passes through terminal device logs destination application,
First eigenvector and second feature vector are obtained, which is first in the server of the destination application
The feature vector of address book data, the second feature vector be the feature of the second address book data that is saved in terminal device to
Amount.Determining module 702 is used to obtain the distance of first eigenvector and second feature vector that module 701 obtains less than first
In the case where threshold value, determine that the target user successfully logs in destination application.
Optionally, it in the embodiment of the present invention, obtains module 701 and is specifically used for receiving the first address list number that server is sent
According to, and according to first address book data, first eigenvector is obtained, may include M first in first address book data
The mark of user, M can be positive integer.
Optionally, it in the embodiment of the present invention, obtains module 701 and specifically is also used to be obtained according to above-mentioned first address book data
The first topology information is taken, and according to first topology information, obtains first eigenvector, which can be used for referring to
Show the incidence relation between the above-mentioned M marks of the first user and the mark of target user.
It optionally, include the mark of M the first users in the embodiment of the present invention, in above-mentioned first address book data, M is positive
Integer.It obtains module 701 to be specifically used for receiving the first topology information that server is sent, and according to first topology information, obtains
First eigenvector is taken, which is used to indicate between the M marks of the first user and the mark of target user
Incidence relation.
Optionally, in the embodiment of the present invention, obtain module 701 be specifically used for receive server send fisrt feature to
Amount.
Optionally, it in the embodiment of the present invention, obtains module 701 and is specifically used for obtaining above-mentioned second address book data, and root
According to second address book data, second feature vector is obtained, includes the mark of N number of second user, N in second address book data
For positive integer.
Optionally, it in the embodiment of the present invention, obtains module 701 and specifically is also used to be obtained according to above-mentioned second address book data
The second topology information is taken, and according to second topology information, obtains second feature vector, which can be used for referring to
Show the incidence relation between the mark of above-mentioned N number of second user and the mark of target user.
Terminal device provided in an embodiment of the present invention can be realized terminal device in above method embodiment realize it is each
Process, to avoid repeating, which is not described herein again.
Terminal device provided in an embodiment of the present invention can pass through terminal device logs destination application in target user
In the case where, first eigenvector and second feature vector are obtained, and in the distance of first eigenvector and second feature vector
In the case where less than first threshold, determine that target user successfully logs in the destination application, which is target
The feature vector of the first address book data in the server of application program, the second feature vector are to save in terminal device
The feature vector of second address book data.With this solution, due to first eigenvector corresponding with the first address book data and
Size with the second address book data at a distance from corresponding second feature vector can characterize the first address book data and second and lead to
The similarity of news record data, i.e. the distance of first eigenvector and second feature vector is smaller, then the first address book data and the
The similarity of two address book datas is higher, thus the embodiment of the present invention can first eigenvector and second feature vector away from
In the case where being less than first threshold, determine that the second address book data and the similarity of the first address book data meet the requirements (table
Show that the confidence level of target user is higher), so can determine target user successfully log in destination application (i.e. authentication at
Function), it is manually operated without user and carries out second of authentication, some answer is being logged in by non-commonly used equipment to improve
With the convenience of user's operation when program.
A kind of hardware structural diagram of Fig. 9 terminal device of each embodiment to realize the present invention.As shown in figure 9, should
Terminal device 800 includes but is not limited to: radio frequency unit 801, network module 802, audio output unit 803, input unit 804,
Sensor 805, display unit 806, user input unit 807, interface unit 808, memory 809, processor 810, Yi Ji electricity
The components such as source 811.It will be understood by those skilled in the art that terminal device structure shown in Fig. 9 is not constituted to terminal device
Restriction, terminal device may include perhaps combining certain components or different components than illustrating more or fewer components
Arrangement.In embodiments of the present invention, terminal device include but is not limited to mobile phone, tablet computer, laptop, palm PC,
Car-mounted terminal, wearable device and pedometer etc..
Wherein, processor 810, for obtaining in the case where target user passes through terminal device logs destination application
First eigenvector and second feature vector are taken, which is the first communication in the server of destination application
The feature vector of data is recorded, which is the feature vector of the second address book data saved in terminal device;?
In the case that the distance of first eigenvector and second feature vector is less than first threshold, determine that target user successfully logs in the mesh
Mark application program.
The embodiment of the present invention provides a kind of terminal device, which can pass through terminal device logs in target user
In the case where destination application, first eigenvector and second feature vector are obtained, and special in first eigenvector and second
The distance of vector is levied less than in the case where first threshold, determines that target user successfully logs in the destination application, first spy
The feature vector of the first address book data in the server that vector is destination application is levied, which is terminal
The feature vector of the second address book data saved in equipment.With this solution, due to corresponding with the first address book data
One feature vector and size with the second address book data at a distance from corresponding second feature vector can characterize the first address list
The similarity of data and the second address book data, the i.e. distance of first eigenvector and second feature vector are smaller, then first is logical
News record data and the similarity of the second address book data are higher, therefore the embodiment of the present invention can be in first eigenvector and second
In the case that the distance of feature vector is less than first threshold, the similarity of the second address book data and the first address book data is determined
It meets the requirements and (indicates that the confidence level of target user is higher), and then can determine that target user successfully logs in destination application
(i.e. authentication success), is manually operated without user and carries out second of authentication, to improve by non-common
The convenience of user's operation when equipment logs in some application programs.
It should be understood that the embodiment of the present invention in, radio frequency unit 801 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 810 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 801 includes but is not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 801 can also by wireless communication system and network and other set
Standby communication.
Terminal device 800 provides wireless broadband internet by network module 802 for user and accesses, and such as helps user
It sends and receive e-mail, browse webpage and access streaming video etc..
Audio output unit 803 can be received by radio frequency unit 801 or network module 802 or in memory 809
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 803 can also provide and end
The relevant audio output of specific function that end equipment 800 executes is (for example, call signal receives sound, message sink sound etc.
Deng).Audio output unit 803 includes loudspeaker, buzzer and receiver etc..
Input unit 804 is for receiving audio or video signal.Input unit 804 may include graphics processor
(graphics processing unit, GPU) 8041 and microphone 8042, graphics processor 8041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 806.Through graphics processor 8041, treated that picture frame can be deposited
Storage is sent in memory 809 (or other storage mediums) or via radio frequency unit 801 or network module 802.Mike
Wind 8042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be
The format output that mobile communication base station can be sent to via radio frequency unit 801 is converted in the case where telephone calling model.
Terminal device 800 further includes at least one sensor 805, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 8061, and proximity sensor can close when terminal device 800 is moved in one's ear
Display panel 8061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify terminal device posture (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes
Sensor 805 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet
Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 806 is for showing information input by user or being supplied to the information of user.Display unit 806 can wrap
Display panel 8061 is included, liquid crystal display (liquid crystal display, LCD), Organic Light Emitting Diode can be used
Forms such as (organic light-emitting diode, OLED) configure display panel 8061.
User input unit 807 can be used for receiving the number or character information of input, and generate the use with terminal device
Family setting and the related key signals input of function control.Specifically, user input unit 807 include touch panel 8071 and
Other input equipments 8072.Touch panel 8071, also referred to as touch screen collect the touch operation of user on it or nearby
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 8071 or in touch panel 8071
Neighbouring operation).Touch panel 8071 may include both touch detecting apparatus and touch controller.Wherein, touch detection
Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control
Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 810, receiving area
It manages the order that device 810 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Seed type realizes touch panel 8071.In addition to touch panel 8071, user input unit 807 can also include other input equipments
8072.Specifically, other input equipments 8072 can include but is not limited to physical keyboard, function key (such as volume control button,
Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 8071 can be covered on display panel 8061, when touch panel 8071 is detected at it
On or near touch operation after, send processor 810 to determine the type of touch event, be followed by subsequent processing device 810 according to touching
The type for touching event provides corresponding visual output on display panel 8061.Although in Fig. 9, touch panel 8071 and display
Panel 8061 is the function that outputs and inputs of realizing terminal device as two independent components, but in some embodiments
In, can be integrated by touch panel 8071 and display panel 8061 and realize the function that outputs and inputs of terminal device, it is specific this
Place is without limitation.
Interface unit 808 is the interface that external device (ED) is connect with terminal device 800.For example, external device (ED) may include having
Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end
Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module
Mouthful etc..Interface unit 808 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and
By one or more elements that the input received is transferred in terminal device 800 or can be used in 800 He of terminal device
Data are transmitted between external device (ED).
Memory 809 can be used for storing software program and various data.Memory 809 can mainly include storing program area
The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 809 may include high-speed random access memory, it can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 810 is the control centre of terminal device, utilizes each of various interfaces and the entire terminal device of connection
A part by running or execute the software program and/or module that are stored in memory 809, and calls and is stored in storage
Data in device 809 execute the various functions and processing data of terminal device, to carry out integral monitoring to terminal device.Place
Managing device 810 may include one or more processing units;Optionally, processor 810 can integrate application processor and modulatedemodulate is mediated
Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main
Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 810.
Terminal device 800 can also include the power supply 811 (such as battery) powered to all parts, optionally, power supply 811
Can be logically contiguous by power-supply management system and processor 810, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
In addition, terminal device 800 includes some unshowned functional modules, details are not described herein.
Optionally, the embodiment of the present invention also provides a kind of terminal device, including processor 810 as shown in Figure 9, memory
809, it is stored in the computer program that can be run on memory 809 and on processor 810, the computer program is by processor
810 realize each process of above-mentioned auth method embodiment when executing, and can reach identical technical effect, to avoid weight
Multiple, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program, the computer program realize each process of above-mentioned auth method embodiment, and energy when being executed by processor
Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, which may include
Read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic
Dish or CD etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes
Business device, air conditioner or the network equipment etc.) execute method disclosed in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within protection of the invention.
Claims (13)
1. a kind of auth method is applied to terminal device, which is characterized in that the described method includes:
In the case where target user passes through the terminal device logs destination application, first eigenvector and second is obtained
Feature vector, the first eigenvector be the destination application server in the first address book data feature to
Amount, the second feature vector are the feature vector of the second address book data saved in the terminal device;
In the case where the distance of the first eigenvector and the second feature vector is less than first threshold, the mesh is determined
Mark user successfully logs in the destination application.
2. the method according to claim 1, wherein the acquisition first eigenvector, comprising:
First address book data that the server is sent is received, includes M first in first address book data and uses
The mark at family, M are positive integer;
According to first address book data, the first eigenvector is obtained.
3. according to the method described in claim 2, it is characterized in that, described according to first address book data, described in acquisition
First eigenvector, comprising:
According to first address book data, the first topology information is obtained, first topology information is used to indicate the M the
Incidence relation between the mark and the mark of the target user of one user;
According to first topology information, the first eigenvector is obtained.
4. the method according to claim 1, wherein including M the first users in first address book data
Mark, M is positive integer;
The acquisition first eigenvector, comprising:
The first topology information that the server is sent is received, first topology information is used to indicate the M the first users
Mark the mark of the target user between incidence relation;
According to first topology information, the first eigenvector is obtained.
5. method according to claim 1 to 4, which is characterized in that the acquisition second feature vector, packet
It includes:
Second address book data is obtained, includes the mark of N number of second user in second address book data, N is positive whole
Number;
According to second address book data, the second feature vector is obtained.
6. according to the method described in claim 5, it is characterized in that, described according to second address book data, described in acquisition
Second feature vector, comprising:
According to second address book data, the second topology information is obtained, second topology information is used to indicate described N number of the
Incidence relation between the mark and the mark of the target user of two users;
According to second topology information, the second feature vector is obtained.
7. a kind of terminal device, which is characterized in that the terminal device includes obtaining module and determining module;
The acquisition module, for obtaining in the case where target user passes through the terminal device logs destination application
First eigenvector and second feature vector, the first eigenvector are first in the server of the destination application
The feature vector of address book data, the second feature vector are the spy of the second address book data saved in the terminal device
Levy vector;
The determining module, the first eigenvector and the second feature vector for being obtained in the acquisition module
In the case that distance is less than first threshold, determine that the target user successfully logs in the destination application.
8. terminal device according to claim 7, which is characterized in that the acquisition module is specifically used for receiving the clothes
First address book data that business device is sent, and according to first address book data, obtain the first eigenvector, institute
The mark including M the first users in the first address book data is stated, M is positive integer.
9. terminal device according to claim 8, which is characterized in that the acquisition module is specifically also used to according to
First address book data obtains the first topology information, and according to first topology information, obtains first eigenvector, and described the
One topology information is used to indicate the incidence relation between the mark and the mark of the target user of the M the first users.
10. terminal device according to claim 7, which is characterized in that include M first in first address book data
The mark of user, M are positive integer;
The acquisition module, the first topology information sent specifically for receiving the server, and according to first topology
Information, obtains the first eigenvector, first topology information be used to indicate the mark of the M the first users with it is described
Incidence relation between the mark of target user.
11. terminal device according to any one of claims 7 to 10, which is characterized in that the acquisition module is specific to use
In obtaining second address book data, and according to second address book data, the second feature vector is obtained, described the
It include the mark of N number of second user in two address book datas, N is positive integer.
12. terminal device according to claim 11, which is characterized in that the acquisition module is specifically also used to according to institute
State the second address book data, obtain the second topology information, and according to second topology information, obtain the second feature to
Amount, second topology information are used to indicate the pass between the mark of N number of second user and the mark of the target user
Connection relationship.
13. a kind of terminal device, which is characterized in that including processor, memory and be stored on the memory and can be in institute
The computer program run on processor is stated, such as claim 1 to 6 is realized when the computer program is executed by the processor
Any one of described in auth method the step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811230454.2A CN109462579A (en) | 2018-10-22 | 2018-10-22 | A kind of auth method and terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811230454.2A CN109462579A (en) | 2018-10-22 | 2018-10-22 | A kind of auth method and terminal device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109462579A true CN109462579A (en) | 2019-03-12 |
Family
ID=65608082
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811230454.2A Pending CN109462579A (en) | 2018-10-22 | 2018-10-22 | A kind of auth method and terminal device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109462579A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013076436A1 (en) * | 2011-11-23 | 2013-05-30 | Barclays Bank Plc | Peer-to-peer payment registration and activation |
CN104811428A (en) * | 2014-01-28 | 2015-07-29 | 阿里巴巴集团控股有限公司 | Method, device and system for verifying client identity by social relation data |
CN105050089A (en) * | 2015-08-21 | 2015-11-11 | 深圳市九洲电器有限公司 | Wireless network login verification method and system |
CN105578461A (en) * | 2014-11-10 | 2016-05-11 | 阿里巴巴集团控股有限公司 | Method and device for establishing communication mobile terminals, communication answering method and device, communication calling method and devices, and system |
CN107920070A (en) * | 2017-11-15 | 2018-04-17 | 中移在线服务有限公司 | Identity identifying method, server and system |
CN107944238A (en) * | 2017-11-15 | 2018-04-20 | 中移在线服务有限公司 | Identity identifying method, server and system |
CN108495143A (en) * | 2018-03-30 | 2018-09-04 | 百度在线网络技术(北京)有限公司 | The method and apparatus of video recommendations |
-
2018
- 2018-10-22 CN CN201811230454.2A patent/CN109462579A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013076436A1 (en) * | 2011-11-23 | 2013-05-30 | Barclays Bank Plc | Peer-to-peer payment registration and activation |
CN104811428A (en) * | 2014-01-28 | 2015-07-29 | 阿里巴巴集团控股有限公司 | Method, device and system for verifying client identity by social relation data |
CN105578461A (en) * | 2014-11-10 | 2016-05-11 | 阿里巴巴集团控股有限公司 | Method and device for establishing communication mobile terminals, communication answering method and device, communication calling method and devices, and system |
CN105050089A (en) * | 2015-08-21 | 2015-11-11 | 深圳市九洲电器有限公司 | Wireless network login verification method and system |
CN107920070A (en) * | 2017-11-15 | 2018-04-17 | 中移在线服务有限公司 | Identity identifying method, server and system |
CN107944238A (en) * | 2017-11-15 | 2018-04-20 | 中移在线服务有限公司 | Identity identifying method, server and system |
CN108495143A (en) * | 2018-03-30 | 2018-09-04 | 百度在线网络技术(北京)有限公司 | The method and apparatus of video recommendations |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108337374A (en) | A kind of message prompt method and mobile terminal | |
CN109857495A (en) | A kind of display control method and terminal device | |
CN109857494A (en) | A kind of message prompt method and terminal device | |
CN110221737A (en) | A kind of icon display method and terminal device | |
CN109543099A (en) | A kind of content recommendation method and terminal device | |
CN108595946A (en) | A kind of method and terminal of protection privacy | |
CN109600297A (en) | A kind of mark sweep-out method and terminal device | |
CN109151176A (en) | A kind of information acquisition method and terminal | |
CN110457935A (en) | A kind of authority configuring method and terminal device | |
CN109901761A (en) | A kind of content display method and mobile terminal | |
CN110049187A (en) | A kind of display methods and terminal device | |
CN108733993A (en) | A kind of method for information display and terminal | |
CN110366182A (en) | A kind of data transmission method and terminal device | |
CN110536253A (en) | A kind of group's Adding Way and mobile terminal | |
CN110069407A (en) | A kind of function test method and device of application program | |
CN109218984A (en) | A kind of method for tracing and mobile terminal | |
CN108984231A (en) | A kind of login method and mobile terminal of application program account | |
CN108540951A (en) | A kind of recharge method and mobile terminal | |
CN107704334A (en) | A kind of SDK processing method and mobile terminal | |
CN108494949B (en) | A kind of image classification method and mobile terminal | |
CN109547622A (en) | A kind of verification method and terminal device | |
CN108764927A (en) | A kind of payment verification method, server and terminal | |
CN109547330A (en) | A kind of information sharing method and device | |
CN110045898A (en) | A kind of display methods and terminal device | |
CN109582174A (en) | A kind of touch-control input response method and terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190312 |
|
RJ01 | Rejection of invention patent application after publication |