CN110245477A - A kind of Information Authentication method, apparatus, equipment and storage medium - Google Patents

A kind of Information Authentication method, apparatus, equipment and storage medium Download PDF

Info

Publication number
CN110245477A
CN110245477A CN201910471978.9A CN201910471978A CN110245477A CN 110245477 A CN110245477 A CN 110245477A CN 201910471978 A CN201910471978 A CN 201910471978A CN 110245477 A CN110245477 A CN 110245477A
Authority
CN
China
Prior art keywords
information
write
input
hard disk
sample
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910471978.9A
Other languages
Chinese (zh)
Other versions
CN110245477B (en
Inventor
过晓冰
王云浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201910471978.9A priority Critical patent/CN110245477B/en
Publication of CN110245477A publication Critical patent/CN110245477A/en
Application granted granted Critical
Publication of CN110245477B publication Critical patent/CN110245477B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • Storage Device Security (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the present application discloses a kind of Information Authentication method, and the method is applied to terminal, and the terminal includes: mechanical hard disk;The described method includes: receiving an instruction, if described instruction meets preset condition, trigger the mechanical hard disk and enter write state, obtains a write-in information;Described instruction is responded, an input is obtained and operates corresponding input information;According to said write information and the input information, detect whether the input operation passes through verifying.The embodiment of the present application also discloses a kind of Information Authentication device, equipment and storage medium.

Description

A kind of Information Authentication method, apparatus, equipment and storage medium
Technical field
The invention relates to field of computer technology, a kind of Information Authentication method, apparatus, equipment are related to, but are not limited to And storage medium.
Background technique
In the related technology, the automated log in order to prevent such as personal computer, webpage has the true behavior of a large amount of user to hand over Mutual verifying, including but not limited to: identification text, letter, picture etc.;Calculate simple mathematical problem etc..But as verifying is used The mode of the true behavior interaction in family is more and more, and corresponding intelligent algorithm also becomes increasingly complex, and implements very tired It is difficult.
Summary of the invention
The embodiment of the present application provides a kind of Information Authentication method, apparatus, equipment and storage medium.
The technical solution of the embodiment of the present application is achieved in that
In a first aspect, the embodiment of the present application provides a kind of Information Authentication method, the method is applied to terminal, the terminal It include: mechanical hard disk;The described method includes:
An instruction is received, if described instruction meets preset condition, the mechanical hard disk is triggered and enters write state, Obtain a write-in information;
Described instruction is responded, an input is obtained and operates corresponding input information;
According to said write information and the input information, detect whether the input operation passes through verifying.
Second aspect, the embodiment of the present application provide a kind of Information Authentication device, described device include: the first acquisition module, Second obtains module and detection module;Wherein,
Described first obtains module, for receiving an instruction, if described instruction meets preset condition, triggers the machine Tool hard disk enters write state, obtains a write-in information;
Described second obtains module, for responding described instruction, obtains an input and operates corresponding input information;
The detection module, for whether detecting the input operation according to said write information and the input information Pass through verifying.
The third aspect, the embodiment of the present application also provides a kind of Information Authentication equipment, comprising: mechanical hard disk, processor and For storing the memory for the computer program that can be run on a processor;Wherein, the processor by run it is described based on When calculation machine program, executes and realize above- mentioned information verification method.
Fourth aspect, the embodiment of the present application also provides a kind of storage mediums, are stored thereon with computer program, the calculating Above- mentioned information verification method is realized when machine program is executed by processor.
In the embodiment of the present application, an instruction is received, if described instruction meets preset condition, triggers the mechanical hard disk Write state is entered, a write-in information is obtained;Described instruction is responded, an input is obtained and operates corresponding input information;According to Said write information and the input information, detect whether the input operation passes through verifying;In this way, real when to Information Authentication It is existing simple and convenient, and verification result is accurate.
Detailed description of the invention
In attached drawing (it is not necessarily drawn to scale), similar appended drawing reference can describe phase in different views As component.Similar reference numerals with different letter suffix can indicate the different examples of similar component.Attached drawing with example and Unrestricted mode generally shows each embodiment discussed herein.
Fig. 1 is a kind of implementation process schematic diagram one of Information Authentication method provided by the embodiment of the present application;
Fig. 2 is a kind of implementation process schematic diagram two of Information Authentication method provided by the embodiment of the present application;
Fig. 3 is a kind of implementation process schematic diagram three of Information Authentication method provided by the embodiment of the present application;
Fig. 4 is a kind of implementation process schematic diagram four of Information Authentication method provided by the embodiment of the present application;
Fig. 5 is the schematic diagram one of Information Authentication method in the prior art provided by the embodiment of the present application;
Fig. 6 is the schematic diagram two of Information Authentication method in the prior art provided by the embodiment of the present application;
Fig. 7 is the composed structure schematic diagram of Information Authentication device provided by the embodiment of the present application;
Fig. 8 is the hardware structural diagram of Information Authentication equipment provided by the embodiment of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the specific technical solution of the application is described in further detail.Following embodiment is not for illustrating the application, but not For limiting scope of the present application.
When the embodiment of the present application is described in detail, for purposes of illustration only, indicating that the sectional view of device architecture can disobey general proportion work Partial enlargement, and the schematic diagram is example, should not limit the range of the application protection herein.In addition, in practical system It should include the three-dimensional space of length, width and depth in work.
The embodiment of the present application provides a kind of Information Authentication method, and the electronics that this method is applied to implementation information verification method is set Standby, each functional module in electronic equipment can be by the hardware resource of electronic equipment (such as terminal device, server), such as processor Etc. the detection resource, communication resource cooperative achievement such as computing resources, sensor.
Electronic equipment can be any electronic equipment with information processing capability, in one embodiment, electronic equipment It can be intelligent terminal, such as can be notebook etc. there is the mobile terminal of wireless communication ability, AR equipment.Another real It applies in example, electronic equipment can also be the inconvenient mobile terminal device with computing function, such as desktop computer, desktop electricity Brain, server etc..
Certainly, the embodiment of the present application is not limited to be provided as method and hardware, can also be there are many implementation, such as provides For storage medium (being stored with the instruction for executing Information Authentication method provided by the embodiments of the present application).
Fig. 1 is the implementation process schematic diagram of the Information Authentication method in the embodiment of the present application, the Information Authentication method application In terminal, the terminal includes: mechanical hard disk, as shown in Figure 1, method includes the following steps:
Step 101: receiving an instruction, if described instruction meets preset condition, trigger the mechanical hard disk and enter Write state obtains a write-in information;
Here, the Information Authentication method of the embodiment of the present application is applied to terminal, such as: notebook, desktop computer etc., at end An instruction is received on end, if the received instruction meets preset condition, Crush trigger hard disk enters write state, terminal Obtain the write-in information being written on mechanical hard disk.
Wherein, the instruction generated when an instruction can operate at the terminal for user, such as: in display circle of terminal The instruction clicked and generated in the input frame shown on face.In the embodiment of the present application to an instruction without limiting.
Here, preset condition can be to store in the terminal in advance, or when terminal receives an instruction from It is obtained in server, the embodiment of the present application is to preset condition without limiting.
When the received instruction of terminal meets preset condition, such as: it is wrapped in the content of the corresponding display interface of instruction of generation When having included specified content, Crush trigger hard disk enters write state.
Here, the function as microphone sensor may be implemented in mechanical hard disk, records to sound.There is sound In the case where generation, such as: the sound that keyboard generates is tapped, or leads to the physical shock sound of keyboard area by key itself The mechanical wave of sound is transmitted to hard drive internal by sound, when mechanical hard disk is in write state, the mechanical wave of sound is written hard Inside disk.After hard drive internal is written in the mechanical wave of sound, the available write-in information for being written to mechanical hard disk of terminal.
Here, write-in information can show as the variation of the sector of mechanical hard disk.
In practical applications, input frame is shown on the display interface of terminal, user clicks generation one in input frame and refers to It enabling, terminal receives the instruction generated, and whether detect in the content of the corresponding display interface of the instruction includes specified content, when When including specified content in the content of display interface, Crush trigger hard disk enters write state;Enter in mechanical hard disk and writes After entering state, being operated on the keyboard of user at the terminal, the operation based on user on keyboard at this time generates vibration sound, The mechanical wave of vibration sound is transmitted to hard drive internal, obtains a write-in information.Such as: tap the sound that A, B, C key generate in keyboard Sound is transmitted to hard drive internal, and obtained write-in information is " XXX ".
Step 102: response described instruction obtains an input and operates corresponding input information;
Here, when terminal receives instruction, user carries out input operation at the terminal, responds the instruction received, eventually End obtains the input and operates corresponding input information.
Such as: terminal receives the instruction clicked and generated in the input frame shown on the display interface of terminal, user Input operation input character " ABC " is carried out in the input frame, responds above-mentioned clicking operation, and terminal obtains input operation pair The input information " ABC " answered.
Step 103: according to said write information and the input information, detecting whether the input operation passes through verifying.
Here, after obtaining write-in information and input information, terminal can be to write-in information and input information progress Match, to detect whether input operation passes through verifying.
Wherein it is possible to which storage sample write-in information and sample input the corresponding relationship between information in advance, closed according to corresponding System matches write-in information and input information;If information and input information matches is written, operation is inputted by testing Card;If information is written and input information mismatches, it is unverified to input operation.
Such as: the corresponding relationship between the sample write-in information and sample input information of storage are as follows: " XXX " correspondence " ABC "; When write-in information is " XXX ", input information is " ABC ", then the two matching, passes through verifying;When write-in information is " XXX1 ", input Information is " ABC ", then the two mismatches, unverified.
It should be noted that the corresponding relationship between sample write-in information and sample input information not only can be in the terminal It stores, can also be obtained from server when detecting in advance.
In practical applications, it in the case that above- mentioned information verification method can be used for detecting identifying code, determines in advance Corresponding relationship between the identifying code of input and the write-in information that mechanical hard disk is written;When inputting identifying code, input behaviour is obtained Make the write-in information of identifying code and mechanical hard disk inputted, according to above-mentioned corresponding relationship to the identifying code of input and mechanical hard disk Write-in information is matched;If the identifying code of input and the write-in information of mechanical hard disk can match, above-mentioned input operation is logical Cross verifying;If the identifying code of input and the write-in information of mechanical hard disk cannot match, above-mentioned input operation is unverified.
Information Authentication method provided by the embodiments of the present application receives an instruction, if described instruction meets preset condition, It triggers the mechanical hard disk and enters write state, obtain a write-in information;Described instruction is responded, an input operation is obtained and corresponds to Input information;According to said write information and the input information, detect whether the input operation passes through verifying;In this way, Realized when to Information Authentication simple and convenient, and verification result is accurate.
A kind of Information Authentication method is provided in the embodiment of the present application, as shown in Fig. 2, method includes the following steps:
Step 201: receiving an instruction, obtain the content of the corresponding display interface of described instruction;
Here, when terminal receives an instruction, the content of the corresponding display interface of the instruction is obtained.Such as: work as terminal Receive click in the input frame shown on the display interface of terminal and generate instruction when, obtain and shown on display interface Content.
Step 202: if including specified content in the content of the corresponding display interface of described instruction, determining described instruction Meet preset condition;
Wherein, specified content can be identifying code, verification operation, verifying picture etc..
Here, after obtaining the content shown on display interface, whether terminal determines in the content of the display interface and wraps Specified content is included, if including specified content in the content of display interface, determine instruction meets preset condition.Such as: it is aobvious Show in the content at interface to include specified content: identifying code " ABC ", it is determined that the instruction meets preset condition.
If in the content of display interface not including specified content, determine instruction is unsatisfactory for preset condition, then continues to examine It surveys and whether receives an instruction.
Wherein, specified content can be to be set in advance, and the embodiment of the present application does not limit this.
Step 203: if described instruction meets preset condition, triggering the mechanical hard disk and enter write state, obtain Obtain a write-in information;
Step 204: response described instruction obtains an input and operates corresponding input information;
Step 205: according to said write information and the input information, detecting whether the input operation passes through verifying.
Wherein, step 203 is to step 205 respectively referring to the step 101 in above-described embodiment to step 103.
Information Authentication method provided by the embodiments of the present application can include in the content for instructing corresponding display interface When specified content, determine instruction meets preset condition, so that Crush trigger hard disk enters write state, obtains a write-in letter Breath.
A kind of Information Authentication method is provided in the embodiment of the present application, as shown in figure 3, method includes the following steps:
Step 301: receiving an instruction, if described instruction meets preset condition, the disk write-in of shutoff operation system is slow It deposits operation or enables direct write mode;
Here, when terminal receives an instruction, if described instruction meets preset condition, mechanical hard disk enters write-in State, before mechanical hard disk enters write state, caching is written in the disk of terminal shutoff operation system.
Here, it should be noted that if the disk of operating system write-in caching is not turned off, mechanical disk Immediately it does not read and write, write-in information can cache in the disk of operating system, and mechanical hard disk can not record the key at current time Disk taps and the sound of generation.
When the central processing unit in terminal uses cache, direct write write-through mode can also be enabled, i.e., It can be directly written to mechanical hard disk, without being written to the disk of operating system.
Step 302: the case where the disk for closing the operating system is written caching or enables the direct write mode Under, it triggers the mechanical hard disk and enters write state, obtain a write-in information;
Here, in the case where the disk of shutoff operation system is written caching or enables write-through mode, Crush trigger hard disk enters write state.
It when mechanical hard disk enters write state, operates on the keyboard of user at the terminal, is existed at this time based on user Operation on keyboard generates vibration sound, and the mechanical wave for shaking sound is directly transferred to inside mechanical hard disk, obtains write-in letter Breath, without being cached in the disk of operating system.
In one embodiment, the triggering mechanical hard disk enters after write state, the method also includes: it will The mechanical hard disk is written in the input time of the input operation, and establishes between the input time and said write information Incidence relation;
Wherein, the input time is used to for said write information and input operation being associated.
Here, Crush trigger hard disk enters after write state, input operation write-in information of the terminal based on user Meanwhile mechanical hard disk is written into the input time of input operation, and establish foundation association between input time and write-in information and close System.
Such as: input based on user operation, obtained write-in information are " XXX ", and the input time of input operation Are as follows: 19 divide 26 seconds when 15 days 14 November in 2019, then terminal establishes input time and the incidence relation between information is written are as follows: 19 divide 26 seconds when " XXX " corresponds to 15 days 14 November in 2019.
In this way, obtaining input time while the input operation based on user obtains write-in information, inputted in subsequent detection Whether operation when passing through verifying, can use input time and determines the input time corresponding write-in information, utilizes write-in letter It ceases and is matched with the input information of input operation, to detect whether input operation passes through verifying.
In one embodiment, the triggering mechanical hard disk enters write state, obtains a write-in information, comprising: It triggers the mechanical hard disk and enters write state, carry out write operation in the writing area of the blank of the mechanical hard disk, obtain Obtain said write information.
Here, Crush trigger hard disk enters after write state, when information is written based on the input operation of user in terminal, Write operation can be carried out in the writing area of the blank of mechanical hard disk, obtain said write information.
In this way, avoiding write-in information and mechanical hard disk when the writing area of the blank of mechanical hard disk carries out write operation The other information conflict of middle storage.
It should be noted that when the writing area of the blank of mechanical hard disk carries out write operation, when obtaining write-in information, The write-in information corresponding input time can also be written in the writing area of the blank of mechanical hard disk.
In practical applications, when terminal receives an instruction, if described instruction meets preset condition, terminal will be operated Write-through mode is closed or enabled to the disk write-in caching of system, is closing the caching or enabling In the case where write-through mode, trigger the mechanical hard disk and enter write state, the input based on user operate to Information is written in the writing area of the blank of mechanical hard disk, while the write-in information corresponding input time is written.
Step 303: response described instruction obtains an input and operates corresponding input information;
Step 304: according to said write information and the input information, detecting whether the input operation passes through verifying.
Wherein, step 303 is to step 304 referring to the step 102 in above-described embodiment to step 103.
Information Authentication method provided by the embodiments of the present application, can the disk of shutoff operation system be written caching or In the case where enabling write-through mode, the write-in information write time corresponding with the write-in information is written to machinery In the writing area of the blank of hard disk, realized when to Information Authentication simple and convenient, and verification result is accurate.
A kind of Information Authentication method is provided in the embodiment of the present application, as shown in figure 4, method includes the following steps:
Step 401: receiving an instruction, if described instruction meets preset condition, trigger the mechanical hard disk and enter Write state obtains a write-in information;
Step 402: response described instruction obtains an input and operates corresponding input information;
Wherein, step 401 is to step 402 respectively referring to the step 101 in above-described embodiment to step 102.
Step 403: operation being inputted to sample in the mechanical hard disk and carries out write operation, sample is obtained and information is written;
Here, sample is first being established before whether detection input operation is by verifying according to write-in information and input information The corresponding relationship between information and sample input information is written, according to corresponding relationship, write-in information and input information, determines input Whether operation passes through verifying.
In the corresponding relationship established between sample write-in information and sample input information, first in mechanical hard disk to sample Input operation carries out write operation, obtains sample and information is written.
Such as: sample input operation is taps A, B, C key on keyboard, based on sample input operation, at mechanical hard disk When write state, mechanical hard disk is written, obtains sample write-in information " XXX ".
Step 404: obtaining the sample input and operate corresponding sample input information;
Here, the sample based on user inputs operation, and terminal obtains sample input and operates corresponding sample input information.
Such as: the sample input operation of user is taps A, B, C key on keyboard, then terminal obtains sample input operation Corresponding sample input information is " ABC ".
Step 405: establishing the corresponding relationship between the sample write-in information and sample input information;
Here, the sample write-in information and sample input information be all based on user sample input operation and obtain, Therefore, there is corresponding relationship between sample write-in information and sample input information, establishes sample write-in information and sample input is believed Corresponding relationship between breath.
Such as: to tap A, B, C key on keyboard, above-mentioned sample input operates corresponding sample for the sample input operation of user This write-in information is " XXX ", and it is " ABC " that sample, which inputs information, then corresponding between sample write-in information and sample input information Relationship are as follows: " XXX " correspondence " ABC ".
It here, can be by the sample after establishing the corresponding relationship between sample write-in information and sample input information Corresponding relationship between write-in information and sample input information is stored in terminal or server, is verified to input operation When, then obtained from terminal or server.
Step 406: obtaining the corresponding relationship between sample write-in information and sample input information;
Here, when being verified to input operation, sample write-in information is obtained from terminal or server and sample is defeated Enter the corresponding relationship between information.Wherein, the corresponding relationship obtained between sample write-in information and sample input information can be deposited Storage is in terminal or the memory module of server.
Step 407: according to the corresponding relationship, said write information being matched with the input information;
Here, it after obtaining the corresponding relationship between sample write-in information and sample input information, is closed using corresponding System matches write-in information with input information.
Such as: the corresponding relationship between information and sample input information is written in sample are as follows: " XXX " correspondence " ABC ", write-in letter Breath is " XXX ", and input information is " ABC ", is " XXX " by write-in information, and input information is that " ABC " substitutes into above-mentioned corresponding relationship In, determine whether write-in information matches with input information.
Step 408: if said write information and the input information matches, determining that the input operation passes through verifying;
Here, the corresponding relationship between information and sample input information is written using sample, if write-in information and input Information matches, it is determined that input operation passes through verifying.
Such as: the corresponding relationship between information and sample input information is written in sample are as follows: " XXX " correspondence " ABC ", write-in letter Breath is " XXX ", and input information is " ABC ", it is seen then that write-in information and input information matches then input operation and pass through verifying.
Step 409: if said write information and the input information mismatch, determining the input operation not by testing Card.
Here, the corresponding relationship between information and sample input information is written using sample, if write-in information and input Information mismatches, it is determined that input operation is unverified.
Such as: the corresponding relationship between information and sample input information is written in sample are as follows: " XXX " correspondence " ABC ", write-in letter Breath is " XXD ", and input information is " ABC ", it is seen then that write-in information and input information mismatch, then it is unverified to input operation.
Information Authentication method provided by the embodiments of the present application can be written according to sample between information and sample input information Corresponding relationship, write-in information and input information, whether detection input operation realize simple by verifying when to Information Authentication It is convenient, and verification result is accurate.
Information Authentication method provided by the embodiments of the present application is illustrated with concrete scene in the embodiment of the present application.
In the prior art, Information Authentication method includes: verifying text, letter, number, picture or verifying input operation Equal verification methods.To the method that picture is verified, as shown in figure 5, including picture 501, picture 502, figure in the display interface Piece 503, picture 504, picture 505, picture 506, picture 507 and picture 508, need to select from above-mentioned picture Target Photo into Row verifying;To the method verified of operation, as shown in fig. 6, include picture 601 in the display interface, need to picture 601 into Row operation, to be verified;But the algorithm of above scheme is sufficiently complex, implements very difficult.
The embodiment of the present application uses mechanical hard disk to realize Information Authentication method provided by the embodiments of the present application, can It overcomes the deficiencies of existing technologies.
The function as microphone sensor may be implemented in precision machinery component inside mechanical hard disk, and has enough Precision extract and parse human speech.The extraneous song for perceiving and recording by this " unintentionally microphone ", fidelity Degree is high to music recognition software can be allowed to accurately identify.Perception of sound technology based on mechanical hard disk, binding operation system are realized To the detection that operator is physically entered, thus judge whether it is true man's operation, the final security level for promoting computer operation.
Information Authentication method provided by the embodiments of the present application must include that one or more is mechanical hard in system level The connecting interface of disk and mechanical hard disk can be ide interface (Integrated Drive Electronics, IDE), small-sized Computer system interface (Small Computer System Interface, SCSI), universal serial bus (Universal Serial Bus, USB) etc..
The technical solution of the embodiment of the present application is as follows:
Firstly, detecting voice input technology using above-mentioned mechanical hard disk, the mapping established between physical keyboard and sound is closed System;
This is because keyboard inputs, for notebook, either keyboard taps the sound generated, still passes through Key itself causes the final mechanical wave of the physical shock of keyboard area to be transmitted to hard drive internal, all can cause hard disk in operation Minor change, and generate the effect recorded.
When people are when inputting specific content, including but not limited to password login, specific shortcut key are used, in operating system Level can detecte user's input, and detect the content of user's input, while operating system synchronizes out when user inputs Open mechanical hard disk sector write operation, at this time it should be noted that: 1, present operating system can irregularly open disk buffering operation, need The function is closed while record;2, the operation of disk write is switched on mechanical hard disk from solid state hard disk, finally Sound on the scene at that time can be really restored by the variation read on the sector.It is pressed by the sound and corresponding physics of reduction Key establishes mapping relations.
Secondly, when needing clearly is user true man's operation keyboard input detection can be opened in system level, and close The disk buffering function of closed operation system opens mechanical hard disk sector and continues write operation, by reading the variation on the sector, Restore corresponding keypad sound;Input content is restored by above-mentioned mapping relations.
Finally, judge whether operated by true man by the detection of keyboard input content.
The embodiment of the present application also provides a kind of Information Authentication device, each module included by the Information Authentication device, each mould Each unit included by block can be realized by the processor of Information Authentication equipment;Certainly it can also pass through specific logic electricity It realizes on road;In the process of implementation, processor can be central processing unit (CPU), microprocessor (MPU), Digital Signal Processing Device (DSP) or field programmable gate array (FPGA) etc..
As shown in fig. 7, Information Authentication device 70 includes:
First obtains module 701, for receiving an instruction, if described instruction meets preset condition, triggers the machine Tool hard disk enters write state, obtains a write-in information;
Second obtains module 702, for responding described instruction, obtains an input and operates corresponding input information;
Detection module 703, for detecting whether the input operation leads to according to said write information and the input information Cross verifying.
In some embodiments, device 70 further include: third obtains module and the first determining module;Wherein,
Third obtains module, for obtaining the content of the corresponding display interface of described instruction;
First determining module, if including specified content in content for the corresponding display interface of described instruction, really Determine described instruction and meets preset condition.
In some embodiments, device 70 further include:
Second determining module, for the mechanical hard disk to be written in the input time of the input operation, and described defeated Incidence relation is established between the angle of incidence and said write information;The input time is used for said write information and the input Operation is associated.
In some embodiments, first module 701 is obtained, enters write state for triggering the mechanical hard disk, The writing area of the blank of the mechanical hard disk carries out write operation, obtains said write information.
In some embodiments, device 70 further include: control module, the disk write-in caching behaviour for shutoff operation system Make or enable direct write mode;
Correspondingly, first module 701 is obtained, in the disk write-in caching or enabling for closing the operating system In the case where the direct write mode, triggers the mechanical hard disk and enter write state.
In some embodiments, device 70 further include: the 4th obtains module, defeated for obtaining sample write-in information and sample Enter the corresponding relationship between information;
Correspondingly, detection module 703 includes: matching unit, the first determination unit and the second determination unit;Wherein,
The matching unit is used for according to the corresponding relationship, by said write information and input information progress Match;
First determination unit, if determining the input for said write information and the input information matches Operation passes through verifying;
Second determination unit determines described defeated if mismatched for said write information and the input information Enter to operate unverified.
In some embodiments, device 70 further include: the 5th acquisition module, the 6th obtain module and establish module;Wherein,
5th obtains module, carries out write operation for inputting operation to sample in the mechanical hard disk, obtains sample and write Enter information;
6th obtains module, operates corresponding sample input information for obtaining the sample input;
Module is established, the corresponding relationship for establishing between the sample write-in information and sample input information.
It should be understood that Information Authentication device provided by the above embodiment is in Information Authentication, only with above-mentioned each program The division progress of module can according to need for example, in practical application and distribute above-mentioned processing by different program moulds Block is completed, i.e., the internal structure of device is divided into different program modules, to complete all or part of place described above Reason.In addition, Information Authentication device provided by the above embodiment and Information Authentication embodiment of the method belong to same design, it is specific real Existing process is detailed in embodiment of the method, and which is not described herein again.
Information Authentication equipment 80 shown in Fig. 8 includes: at least one processor 810, memory 840, at least one network Interface 820, user interface 830 and mechanical hard disk 850.Various components in Information Authentication equipment 80 pass through 850 coupling of bus system It is combined.It is understood that bus system 850 is for realizing the connection communication between these components.It includes number that bus system 850, which is removed, It further include power bus, control bus and status signal bus in addition except bus.But for the sake of clear explanation, in fig. 8 Various buses are all designated as bus system 850.
User interface 830 may include display, keyboard, mouse, trace ball, click wheel, key, button, touch-sensitive plate or Person's touch screen etc..
Memory 840 can be volatile memory or nonvolatile memory, may also comprise volatile and non-volatile Both memories.Wherein, nonvolatile memory can be read-only memory (ROM, Read Only Memory).Volatibility is deposited Reservoir can be random access memory (RAM, Random Access Memory).The memory of the embodiment of the present application description 840 are intended to include the memory of any suitable type.
Memory 840 in the embodiment of the present application can storing data to support the operation of Information Authentication equipment 80.These The example of data includes: any computer program for operating in Information Authentication equipment 80, such as operating system and using journey Sequence.Wherein, operating system includes various system programs, such as ccf layer, core library layer, driving layer etc., for realizing various bases Plinth business and the hardware based task of processing.Application program may include various application programs.
Wherein, when processor 810 is used to run the computer program, to realize that the information provided in above-described embodiment is tested Step in card method.
As the example that method provided by the embodiments of the present application uses software and hardware combining to implement, the embodiment of the present application is provided Method can be embodied directly in and combined by the software module that processor 810 executes, such as information provided by the embodiments of the present application Device is verified, the software module of Information Authentication device can store in memory 840, and processor 810 reads soft in memory 840 The executable instruction that part module includes, in conjunction with necessary hardware (e.g., including processor 810 and its for being connected to bus 850 His component) complete Information Authentication method provided by the embodiments of the present application.
As an example, processor 810 can be a kind of IC chip, and the processing capacity with signal, for example, it is general Processor, digital signal processor (DSP, Digital Signal Processor) or other programmable logic device are divided Vertical door or transistor logic, discrete hardware components etc., wherein general processor can be microprocessor or any normal The processor etc. of rule.
It need to be noted that: information above verifies the description of apparatus embodiments item, is similar with above method description , there is with embodiment of the method identical beneficial effect, therefore do not repeat them here.For in the application Information Authentication apparatus embodiments Undisclosed technical detail, those skilled in the art please refer to the description of the application embodiment of the method and understand, to save a piece Width, which is not described herein again.
In the exemplary embodiment, the embodiment of the present application also provides a kind of storage mediums, can deposit to be computer-readable Storage media, the memory for example including storage computer program, above-mentioned computer program can be handled by processor, aforementioned to complete Step described in method.Computer readable storage medium can be FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, The memories such as magnetic surface storage, CD or CD-ROM.
The embodiment of the present application also provides a kind of computer readable storage medium, is stored thereon with computer program, the calculating Machine program realizes the step in the Information Authentication method provided in above-described embodiment when being processed by the processor.
It need to be noted that: above computer media implements the description of item, be with above method description it is similar, With the identical beneficial effect of same embodiment of the method, therefore do not repeat them here.For not disclosed in the application storage medium embodiment Technical detail, those skilled in the art please refers to the description of the application embodiment of the method and understands, to save length, here It repeats no more.
The method that above-mentioned the embodiment of the present application discloses can be applied in the processor, or real by the processor It is existing.The processor may be a kind of IC chip, the processing capacity with signal.During realization, the above method Each step can be completed by the instruction of the integrated logic circuit of the hardware in the processor or software form.Above-mentioned The processor can be general processor, DSP or other programmable logic device, discrete gate or transistor logic device Part, discrete hardware components etc..The processor may be implemented or execute disclosed each method, step in the embodiment of the present application And logic diagram.General processor can be microprocessor or any conventional processor etc..In conjunction with the embodiment of the present application institute The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with hard in decoding processor Part and software module combination execute completion.Software module can be located in storage medium, which is located at memory, described The step of processor reads the information in memory, completes preceding method in conjunction with its hardware.
It is appreciated that the memory (memory) of the embodiment of the present application can be volatile memory or non-volatile deposit Reservoir may also comprise both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (ROM, Read Only Memory), programmable read only memory (PROM, Programmable Read-Only Memory), Erasable Programmable Read Only Memory EPROM (EPROM, Erasable Programmable Read-Only Memory), electric erasable Programmable read only memory (EEPROM, Electrically Erasable Programmable Read-Only Memory), Magnetic RAM (FRAM, ferromagnetic random access memory), flash memory (Flash Memory), magnetic surface storage, CD or CD-ROM (CD-ROM, Compact Disc Read-Only Memory);Magnetic Memory surface can be magnetic disk storage or magnetic tape storage.Volatile memory can be random access memory (RAM, Random Access Memory), it is used as External Cache.By exemplary but be not restricted explanation, many forms RAM it is available, such as static random access memory (SRAM, Static Random Access Memory), synchronize it is static with Machine accesses memory (SSRAM, Synchronous Static Random Access Memory), dynamic random access memory Device (DRAM, Dynamic Random Access Memory), Synchronous Dynamic Random Access Memory (SDRAM, Synchronous Dynamic Random Access Memory), double data speed synchronous dynamic RAM It is (DDRSDRAM, Double Data Rate Synchronous Dynamic Random Access Memory), enhanced same Walk dynamic random access memory (ESDRAM, Enhanced Synchronous Dynamic Random Access Memory), synchronized links dynamic random access memory (SLDRAM, SyncLink Dynamic Random Access Memory), direct rambus random access memory (DRRAM, Direct Rambus Random Access Memory). The memory of the embodiment of the present application description is intended to include but is not limited to the memory of these and any other suitable type.
It should be understood by those skilled in the art that, other of the Information Authentication method of the embodiment of the present application constitute and make With, be all for a person skilled in the art it is known, in order to reduce redundancy, the embodiment of the present application is not repeated them here.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example " " specific example " Or the description of " some examples " etc. means particular features, structures, materials, or characteristics packet described in conjunction with this embodiment or example In at least one embodiment or example contained in the application.In the present specification, schematic expression of the above terms are not necessarily Refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any one It can be combined in any suitable manner in a or multiple embodiment or examples.
While there has been shown and described that embodiments herein, it will be understood by those skilled in the art that: not A variety of change, modification, replacement and modification can be carried out to these embodiments in the case where being detached from the principle and objective of the application, this The range of application is by claim and its equivalent limits.

Claims (10)

1. a kind of Information Authentication method, the method is applied to terminal, and the terminal includes: mechanical hard disk;The described method includes:
An instruction is received, if described instruction meets preset condition, the mechanical hard disk is triggered and enters write state, is obtained One write-in information;
Described instruction is responded, an input is obtained and operates corresponding input information;
According to said write information and the input information, detect whether the input operation passes through verifying.
2. according to the method described in claim 1, the method also includes:
Obtain the content of the corresponding display interface of described instruction;
If including specified content in the content of the corresponding display interface of described instruction, determine that described instruction meets default item Part.
3. according to the method described in claim 1, the triggering mechanical hard disk enters after write state, the method Further include:
The input time of the input operation is written into the mechanical hard disk, and the input time and said write information it Between establish incidence relation;The input time is used to for said write information and input operation being associated.
4. obtaining a write-in letter according to the method described in claim 1, the triggering mechanical hard disk enters write state Breath, comprising:
It triggers the mechanical hard disk and enters write state, carry out write-in behaviour in the writing area of the blank of the mechanical hard disk Make, obtains said write information.
5. according to the method described in claim 1, the triggering mechanical hard disk enters before write state, the method Further include:
The disk write-in caching of shutoff operation system enables direct write mode;
Correspondingly, the triggering mechanical hard disk enters write state, comprising:
In the case where closing the disk write-in caching of the operating system or enabling the direct write mode, the machine is triggered Tool hard disk enters write state.
6. detecting the input according to the method described in claim 1, described according to said write information and the input information Before whether operation is by verifying, the method also includes:
Obtain the corresponding relationship between sample write-in information and sample input information;
Correspondingly, described according to said write information and the input information, whether the input operation is detected by verifying, packet It includes:
According to the corresponding relationship, said write information is matched with the input information;
If said write information and the input information matches, determine that the input operation passes through verifying;
If said write information and the input information mismatch, determine that the input operation is unverified.
7. according to the method described in claim 6, the corresponding pass obtained between sample write-in information and sample input information Before system, the method also includes:
Operation is inputted to sample in the mechanical hard disk and carries out write operation, sample is obtained and information is written;
It obtains the sample input and operates corresponding sample input information;
Establish the corresponding relationship between the sample write-in information and sample input information.
8. a kind of Information Authentication device, described device includes: the first acquisition module, the second acquisition module and detection module;Wherein,
Described first obtains module, for receiving an instruction, if described instruction meets preset condition, triggers described mechanical hard Disk enters write state, obtains a write-in information;
Described second obtains module, for responding described instruction, obtains an input and operates corresponding input information;
The detection module, for detecting whether the input operation passes through according to said write information and the input information Verifying.
9. a kind of Information Authentication equipment, comprising: mechanical hard disk, processor and for storing the calculating that can be run on a processor The memory of machine program;Wherein, the processor is for when running the computer program, perform claim to require any one of 1 to 7 The Information Authentication method.
10. a kind of storage medium, is stored thereon with computer program, realize that right is wanted when which is executed by processor Seek any one of 1 to the 7 Information Authentication method.
CN201910471978.9A 2019-05-31 2019-05-31 Information verification method, device, equipment and storage medium Active CN110245477B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910471978.9A CN110245477B (en) 2019-05-31 2019-05-31 Information verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910471978.9A CN110245477B (en) 2019-05-31 2019-05-31 Information verification method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110245477A true CN110245477A (en) 2019-09-17
CN110245477B CN110245477B (en) 2021-06-15

Family

ID=67885750

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910471978.9A Active CN110245477B (en) 2019-05-31 2019-05-31 Information verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110245477B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113220603A (en) * 2021-05-27 2021-08-06 济南浪潮数据技术有限公司 Hard disk cache closing method, device, terminal and storage medium
CN114513345A (en) * 2021-01-29 2022-05-17 铨安智慧科技股份有限公司 Information transmission system, user device and information security hardware module

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1547688A (en) * 2001-07-27 2004-11-17 ����л����Үά�桤ŬŬ���޷� Method and device for entering computer database password
US20080028231A1 (en) * 2002-09-24 2008-01-31 Bender Steven L Key sequence trustable activation recognition system and method
CN102799833A (en) * 2012-07-02 2012-11-28 人民搜索网络股份公司 Digital encryption and decryption method based on keying rhythm or keying force conversion
CN102955908A (en) * 2011-08-31 2013-03-06 国际商业机器公司 Method and device for creating rhythm password and carrying out verification according to rhythm password
US20130326604A1 (en) * 2012-05-31 2013-12-05 Ca, Inc. Rhythm-based authentication
CN106128452A (en) * 2016-07-05 2016-11-16 深圳大学 Acoustical signal detection keyboard is utilized to tap the system and method for content
CN107133135A (en) * 2017-05-02 2017-09-05 电子科技大学 A kind of keyboard detection method positioned based on statistics and sound
CN107194219A (en) * 2017-06-16 2017-09-22 西安电子科技大学 Intelligent terminal identity identifying method based on similarity
CN108959866A (en) * 2018-04-24 2018-12-07 西北大学 A kind of lasting identity identifying method based on high frequency sound wave frequency

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1547688A (en) * 2001-07-27 2004-11-17 ����л����Үά�桤ŬŬ���޷� Method and device for entering computer database password
US20080028231A1 (en) * 2002-09-24 2008-01-31 Bender Steven L Key sequence trustable activation recognition system and method
CN102955908A (en) * 2011-08-31 2013-03-06 国际商业机器公司 Method and device for creating rhythm password and carrying out verification according to rhythm password
US20130326604A1 (en) * 2012-05-31 2013-12-05 Ca, Inc. Rhythm-based authentication
CN102799833A (en) * 2012-07-02 2012-11-28 人民搜索网络股份公司 Digital encryption and decryption method based on keying rhythm or keying force conversion
CN106128452A (en) * 2016-07-05 2016-11-16 深圳大学 Acoustical signal detection keyboard is utilized to tap the system and method for content
CN107133135A (en) * 2017-05-02 2017-09-05 电子科技大学 A kind of keyboard detection method positioned based on statistics and sound
CN107194219A (en) * 2017-06-16 2017-09-22 西安电子科技大学 Intelligent terminal identity identifying method based on similarity
CN108959866A (en) * 2018-04-24 2018-12-07 西北大学 A kind of lasting identity identifying method based on high frequency sound wave frequency

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114513345A (en) * 2021-01-29 2022-05-17 铨安智慧科技股份有限公司 Information transmission system, user device and information security hardware module
CN113220603A (en) * 2021-05-27 2021-08-06 济南浪潮数据技术有限公司 Hard disk cache closing method, device, terminal and storage medium

Also Published As

Publication number Publication date
CN110245477B (en) 2021-06-15

Similar Documents

Publication Publication Date Title
US9654977B2 (en) Contextualized access control
EP2341465B1 (en) Gesture-based signature authentication
AU2005222536B2 (en) User authentication by combining speaker verification and reverse turing test
CN104335216B (en) Expedited biometric validation
CN103140857B (en) Verification System, authentication method, authenticate device, information terminal, program and information recording carrier
CN110336797A (en) Corporate authentication, certification retroactive method, device and equipment based on block chain
KR20200073283A (en) Method and device for analyzing block chain based music originality
US20120054057A1 (en) User-touchscreen interaction analysis authentication system
CN104823198A (en) Secure identification of computing device and secure identification methods
TW200907827A (en) System and method for performing objects with bio-characteristics recognition
CN110245477A (en) A kind of Information Authentication method, apparatus, equipment and storage medium
CN105187412B (en) A kind of login authentication method based on gesture identification, apparatus and system
CN115277143B (en) Data security transmission method, device, equipment and storage medium
US20190227916A1 (en) Methods, systems, apparatuses and devices for facilitating execution of test cases
CN107589894A (en) A kind of page turning method, device and storage medium
CN107632867A (en) A kind of method, apparatus of information record, computer installation and readable storage medium storing program for executing
Alt et al. Emerging trends in usable security and privacy
CN106503065A (en) The method and system of data transfer
CN112241461B (en) Method and equipment for generating character relation graph of book
CN105359453B (en) User setting protection based on anonymous server
US11314486B2 (en) Methods, systems, apparatuses, and devices of facilitating creating a computer application based on a natural language
CN106529257B (en) A kind of information processing method and mobile terminal
CN109343985A (en) A kind of data processing method, device and storage medium
CN107958146A (en) Method, apparatus, storage medium and the electronic equipment of fingerprint authentication
Lin et al. Developing cloud-based intelligent touch behavioral authentication on mobile phones

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant