CN112395576B - Verification method and device - Google Patents

Verification method and device Download PDF

Info

Publication number
CN112395576B
CN112395576B CN202110059205.7A CN202110059205A CN112395576B CN 112395576 B CN112395576 B CN 112395576B CN 202110059205 A CN202110059205 A CN 202110059205A CN 112395576 B CN112395576 B CN 112395576B
Authority
CN
China
Prior art keywords
verification
sensor data
pointer
rotation
weight value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110059205.7A
Other languages
Chinese (zh)
Other versions
CN112395576A (en
Inventor
张言超
韩元
王在方
孙悦
郭晓鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Trusfort Technology Co ltd
Original Assignee
Beijing Trusfort Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Trusfort Technology Co ltd filed Critical Beijing Trusfort Technology Co ltd
Priority to CN202110059205.7A priority Critical patent/CN112395576B/en
Publication of CN112395576A publication Critical patent/CN112395576A/en
Application granted granted Critical
Publication of CN112395576B publication Critical patent/CN112395576B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

A verification method and apparatus are disclosed. The method is applied to the electronic equipment and comprises the following steps: generating a verification interface, wherein the verification interface comprises a prompt language and a verification area, the verification area is a turntable and comprises a pointer, a verification radian area and a confusion radian area, and the prompt language is used for prompting a user to operate the action and the target of the electronic equipment; collecting sensor data of the electronic device; converting the sensor data into a rotation angle of the pointer so as to enable the pointer to rotate according to the operation of the user; when the time for stopping the rotation of the pointer exceeds a preset first time threshold, verifying the sensor data and the rotation angle of the pointer; and if the sensor data and the rotation angle of the pointer pass the verification, confirming that the operation of the user passes the verification.

Description

Verification method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a verification method and apparatus.
Background
At present, there are many verification methods in the market, such as picture verification, slide verification, text click verification, icon click verification, spatial inference verification, and the like. These verification methods all require the user to manually touch the screen of the electronic device to complete corresponding operations for verification. The verification is completed by manually touching the screen, and such operation behavior is easy to be cracked by OCR (optical character recognition) and automation software, so that a great potential safety hazard exists through the verification.
Disclosure of Invention
In order to solve the above problems, the present invention provides a verification method and device, which do not require a user to perform verification by touching a screen, and the data used for verification is not easy to falsify and cheat, and the verification process is not easy to crack, so that the method and device are safer and more reliable.
In order to achieve the above object, in a first aspect, an embodiment of the present invention provides an authentication method, which is applied to an electronic device, and includes:
generating a verification interface, wherein the verification interface comprises a prompt language and a verification area, the verification area is a turntable and comprises a pointer, a verification radian area and a confusion radian area, and the prompt language is used for prompting a user to operate the action and the target of the electronic equipment;
collecting sensor data of the electronic device;
converting the sensor data into a rotation angle of the pointer so as to enable the pointer to rotate according to the operation of the user;
when the time for stopping the rotation of the pointer exceeds a preset first time threshold, verifying the sensor data and the rotation angle of the pointer;
and if the sensor data and the rotation angle of the pointer pass the verification, confirming that the operation of the user passes the verification.
Preferably, the method further comprises: and if the time for stopping the rotation of the pointer does not exceed the first time threshold within the preset second time threshold, updating the verification interface.
Preferably, after the verifying the sensor data and the rotation angle of the pointer, the method further comprises: and if the sensor data is not verified, closing the verification interface.
Preferably, after the verifying the sensor data and the rotation angle of the pointer, the method further comprises: and if the sensor data passes the verification and the rotation angle of the pointer does not pass the verification, updating a verification interface.
Preferably, the verifying the sensor data and the rotation angle of the pointer includes: checking whether the rotation angle of the pointer is consistent with the verification radian domain or not; verifying the validity of the sensor data.
In a second aspect, an embodiment of the present invention provides an authentication apparatus, which is applied to an electronic device, and includes:
the verification interface comprises a prompt language and a verification area, the verification area is a rotating disc and comprises a pointer, a verification radian area and a confusion radian area, and the prompt language is used for prompting a user to operate the action and the target of the electronic equipment;
the acquisition unit is used for acquiring sensor data of the electronic equipment;
the conversion unit is used for converting the sensor data into a rotation angle of the pointer so as to enable the pointer to rotate according to the operation of the user;
the verification unit is used for verifying the sensor data and the rotation angle of the pointer when the time for stopping the rotation of the pointer exceeds a preset first time threshold;
and the confirming unit is used for confirming that the operation of the user passes the verification if the sensor data and the rotating angle of the pointer pass the verification.
Preferably, the generating unit is further configured to update the verification interface if the time for stopping rotation of the pointer does not exceed the first time threshold within a preset second time threshold.
Preferably, the confirming unit is further configured to close the verification interface if the sensor data is not verified.
Preferably, the generating unit is further configured to update a verification interface if the sensor data passes verification and the rotation angle of the pointer fails verification.
Preferably, when the time for stopping the rotation of the pointer exceeds a preset first time threshold, the verification unit is specifically configured to: checking whether the rotation angle of the pointer is consistent with the verification radian domain or not; verifying the validity of the sensor data.
Preferably, the verification unit is specifically configured to: judging whether the rotation direction of the electronic equipment corresponding to the sensor data is consistent with the rotation direction of the pointer or not; if the rotation direction of the electronic equipment corresponding to the sensor data is consistent with the rotation direction of the pointer, determining that a first weight value is a first preset value; if the rotation direction of the electronic equipment corresponding to the sensor data is inconsistent with the rotation direction of the pointer, determining that the first weight value is a second preset value; judging whether the sensor data is suspected to be fake or not according to the change value of the sensor data; if the false suspicion exists, weighting a second weight value according to a preset rule, wherein the initial value of the second weight value is a third preset value; if the false suspicion does not exist, carrying out weight reduction on the second weight value according to a preset rule; calculating a sum of the first and second weight values; if the sum of the first weight value and the second weight value is smaller than a fourth preset value, confirming that the sensor data passes verification; and if the sum of the first weight value and the second weight value is not less than a fourth preset value, confirming that the sensor data is not verified.
In a third aspect, an embodiment of the present invention provides a computer-readable storage medium, where the storage medium stores a computer program, and the computer program is configured to execute the authentication method according to the first aspect.
In a fourth aspect, an embodiment of the present invention provides an electronic device, including:
a processor;
a memory for storing the processor-executable instructions;
the processor is configured to read the executable instructions from the memory and execute the instructions to implement the verification method according to the first aspect.
By using the verification method and the verification device provided by the invention, the operation of touching the screen by a finger is not adopted in the verification process, the collected sensor data of the electronic equipment is used for verification, the sensor data is not easy to counterfeit and cheat, the verification mode is simple, the verification with a back-end server is not needed, the intermediate process can be saved, and the intermediate link counterfeit is avoided, so that the verification process is not easy to crack, and the method and the device are safer and more reliable.
Drawings
The above and other objects, features and advantages of the present application will become more apparent by describing in more detail embodiments of the present application with reference to the attached drawings. The accompanying drawings are included to provide a further understanding of the embodiments of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the principles of the application. In the drawings, like reference numbers generally represent like parts or steps.
Fig. 1 is a schematic flowchart of a verification method provided in an exemplary embodiment of the present application;
FIG. 2 is a schematic diagram of a verification interface provided in an exemplary embodiment of the present application;
FIG. 3 is a schematic diagram of an electronic device according to an exemplary embodiment of the present disclosure;
FIG. 4 is a block diagram of an authentication device provided in an exemplary embodiment of the present application;
fig. 5 is a block diagram of an electronic device according to an exemplary embodiment of the present application.
Detailed Description
Hereinafter, example embodiments according to the present application will be described in detail with reference to the accompanying drawings. It should be understood that the described embodiments are only some embodiments of the present application and not all embodiments of the present application, and that the present application is not limited by the example embodiments described herein.
Fig. 1 is a schematic flowchart of a verification method according to an embodiment of the present application. The verification method is applied to electronic equipment, codes of a sensor are collected in an integrated mode when a mobile phone program applying the verification method in the electronic equipment is developed, and codes of verification interfaces with different styles are generated dynamically. When the verification method is triggered, whether the electronic equipment supports the sensor is judged firstly, and if not, the verification method is terminated. If so, executing the verification method. As illustrated in fig. 1, the method comprises:
step 101, generating a verification interface.
Wherein, the verification interface comprises a prompt and a verification area. The verification area is a turntable and comprises a pointer, a verification radian area and a confusion radian area. Wherein the number of confusion arc fields is not fixed. The prompt language is used for prompting the user to operate the action and the target of the electronic equipment.
In one example, the verification radian domain includes a correct identification corresponding to the cue, and the obfuscated radian domain may include an obfuscated identification that may be randomly generated or be blank. Preferably, the prompt may be a confusing prompt, i.e. the correct answer is not written directly in the prompt, so as to reduce the probability of cheating.
In one specific example, as shown in FIG. 2, a verification interface 200 includes a prompt 201 and a verification area 202. The prompt 201 'please slightly rotate the mobile phone left and right to point the pointer to the animal of Chinese zodiac 2020', 'please slightly rotate the mobile phone left and right' as an action, and 'point the pointer to the animal of Chinese zodiac 2020' is a target. The verification area 202 is a rotating disk, and includes pointers and 12 radian fields, of which 1 is a verification radian and 11 is a confusion radian field. The correct identification corresponding to the prompt 201, namely a picture of a mouse, is included in the verification arc domain. The 11 confusion radian fields include confusion marks or are blanks.
Step 102, collecting sensor data of the electronic device.
In one example, when the authentication method is initiated, the acquisition of sensor data, in particular gravity sensor data and gyroscope data, of the electronic device may be initiated. Preferably, the frequency is set to 60/s during data acquisition, and each piece of sensor data is time-stamped during storage.
Step 103, converting the sensor data into a rotation angle of the pointer, so that the pointer rotates according to the operation of the user.
Specifically, when the user operates the electronic device according to the prompt, the sensor data of the electronic device may change. The change data is collected, the preset algorithm sensor data is converted into the rotation angle of the pointer, and the pointer rotates clockwise or anticlockwise along with the operation of a user. Preferably, the algorithm can be optimized, and the user can select the verification angle without rotating by too large an angle, so as to improve the applicability of the verification method.
And 104, verifying the sensor data and the rotation angle of the pointer when the time for stopping the rotation of the pointer exceeds a preset first time threshold.
Specifically, the first time threshold may be 1 second. And (3) operating the electronic equipment by the user to drive the pointer to rotate, and if the time for stopping rotating the pointer reaches 1 second, determining that the user finishes the operation and verifying the sensor data and the rotating angle of the pointer.
In one example, if the time for stopping the rotation of the pointer does not exceed the first time threshold within the preset second time threshold, the verification interface is updated.
Specifically, the second time threshold may be 10 seconds. If the user is not stopped when operating the mobile phone all the time, in order to ensure the timeliness of the verification, a second time threshold value is set, and the verification time is limited. And if the time for stopping the rotation of the pointer does not exceed 1 second within 10 seconds, the user operation is not waited, the verification interface is updated, and the re-verification is carried out. The updated verification interface is different from the previous verification interface, but the verification method is not changed.
In one example, verifying the sensor data and the rotation angle of the pointer may include:
checking whether the rotation angle of the pointer is consistent with the verification radian domain;
specifically, if the two are consistent, the rotation angle of the pointer is determined to pass the verification; if not, the rotation angle of the pointer is confirmed to be not verified.
In a specific example, as shown in fig. 3, the gyroscope data in the sensor includes data in three directions x, y, and z, and acceleration values in the three directions x, y, and z change when the electronic device is moved. Since the verification method is left-right deflection, X, Y-axis gyroscope acceleration data is mainly used. The clockwise acceleration around the Y axis is a positive number, and the counterclockwise rotation acceleration is a negative number. Therefore, the initial value of the total rotating angle S of the pointer is set to be 0, and the total rotating angle S of the pointer is adjusted according to the collected Y-axis acceleration a (Y) by the following formula:
s = S + a (y) 5 x 1 ° formula one
The reason for a (y) 5 is that the calculated rotation angle is larger after the acceleration is smaller and the equal proportion is enlarged, which is beneficial to the operation of a user).
Then, the speed is converted into the rotation angle of the pointer, namely the deflection angle of the pointer on the rotating disc. And if the deflection angle is within the verification radian range, confirming that the rotation angle of the pointer is consistent with the verification radian range, otherwise, confirming that the rotation angle of the pointer is not consistent with the verification radian range.
And checking the validity of the sensor data.
Specifically, by verifying the validity of the sensor data, spurious data generated by the cheating tool may be filtered out. In one example, verifying the validity of the sensor data may include:
judging whether the rotation direction of the electronic equipment corresponding to the sensor data is consistent with the rotation direction of the pointer or not; if the rotation direction of the electronic equipment corresponding to the sensor data is consistent with the rotation direction of the pointer, determining that the first weight value is a first preset value; if the rotation direction of the electronic equipment corresponding to the sensor data is inconsistent with the rotation direction of the pointer, determining that the first weight value is a second preset value;
judging whether the sensor data is suspected to be fake or not according to the change value of the sensor data; if the false suspicion exists, weighting a second weight value according to a preset rule, wherein the initial value of the second weight value is a third preset value; if the false suspicion does not exist, carrying out weight reduction on the second weight value according to a preset rule;
calculating the sum of the first weight value and the second weight value; if the sum of the first weight value and the second weight value is smaller than a fourth preset value, confirming that the sensor data passes verification; and if the sum of the first weight value and the second weight value is not less than the fourth preset value, confirming that the sensor data is not verified.
In one specific example, the process of verifying the validity of the sensor data is as follows:
and judging whether the rotation direction of the electronic equipment corresponding to the sensor data is consistent with the rotation direction of the pointer or not. During the period from the generation of the verification interface to the rotation of the pointer according to the operation of the user and the verification of the data validity of the sensor, the values of the gyroscopes in the x direction, the y direction and the z direction are changed, and the acceleration of the y axis has positive and negative values due to the back-and-forth deflection. Based on the above, under the condition that the verification radian domain is on the right side of the turntable, if the final S is a positive value when entering the verification process, determining that the rotation direction of the electronic equipment corresponding to the sensor data is consistent with the rotation direction of the pointer; and if the final S is a negative value when the verification process is carried out, determining that the rotation direction of the electronic equipment corresponding to the sensor data is inconsistent with the rotation direction of the pointer. Under the condition that the verification radian domain is on the left side of the turntable, if the final S is a positive value when entering the verification process, determining that the rotation direction of the electronic equipment corresponding to the sensor data is inconsistent with the rotation direction of the pointer; and if the final S is a negative value when the verification process is carried out, determining that the rotation direction of the electronic equipment corresponding to the sensor data is consistent with the rotation direction of the pointer. If the rotation direction of the electronic equipment corresponding to the sensor data is consistent with the rotation direction of the pointer, the sensor data is considered to be free of suspicion of counterfeiting, and a first weight AN is set to be 0; if the rotation direction of the electronic device corresponding to the sensor data is inconsistent with the rotation direction of the pointer, the sensor data is considered to be suspected of being fake, and the first weight AN is set to be 0.8.
And (6) carrying out data difference checking. The speed of a user is high or low in the operation process, the acceleration value is changed in the whole verification time period, sometimes even the pointer rotates, so that the rotation angle of the pointer exceeds the verification radian domain and then is withdrawn, and at the moment, the withdrawal action enables the positive and negative values of the acceleration data to be opposite to the data of the sensor. Therefore, if all the obtained acceleration values are uniform, and the values of the acceleration and the deflection angle are not slowed down after the rotating angle of the pointer reaches the verification radian domain, the data is suspected to be fake. The initial value of the second weight BN is 0.3.
And accumulating data difference checking. Because local calculation has no large-scale data comparison support and the error probability of differential verification is high, an accumulative weighting verification strategy bound with a user userid is adopted. Namely, the same userid user continuously checks that the suspicion of counterfeiting is less than three times, the BN weights 0.1 each time, and the BN weights 0.2 each time when more than three times. If no suspicion of counterfeiting is judged, the BN is reduced by 0.2.
And (4) verifying the validity of the sensor data, and accumulating and calculating the weight according to the three strategies. And when the weight value AN + BN is more than or equal to 0.8, judging that the sensor data does not have validity, otherwise, passing the validity check.
And 105, if the rotation angles of the sensor data and the pointer pass the verification, confirming that the operation of the user passes the verification.
In one example, if the sensor data is not validated, the validation interface is closed.
Specifically, if the sensor data fails to pass the verification, which indicates that the sensor data is suspicious of cheating, it may be determined that the verification fails, the verification interface is closed, and no longer is a chance to repeat the verification, and the next step of other authentication modes or other operations is performed.
In one example, the verification interface is updated if the sensor data passes verification and the angle of rotation of the pointer fails verification.
Specifically, if the sensor data passes the verification, but only the rotation angle of the pointer fails the verification, it may be an error operation of the user, and may give an opportunity of re-verification, so that the verification interface is updated, and the updated verification interface is different from the previous verification interface, but the verification method is not changed.
By using the verification method provided by the embodiment of the invention, the operation of touching the screen by a finger is not adopted in the verification process, the collected sensor data of the electronic equipment is used for verification, the sensor data is not easy to counterfeit and cheat, the verification mode is simple, the verification with a back-end server is not needed, the intermediate process can be saved, and the intermediate link counterfeit is avoided, so that the verification process is not easy to crack, and is safer and more reliable.
An embodiment of the present invention provides a verification apparatus, and fig. 4 is a structural diagram of the verification apparatus. The device can be applied to electronic equipment.
As shown in fig. 4, the authentication apparatus includes:
the generation unit 401 is configured to generate a verification interface, where the verification interface includes a prompt and a verification area, the verification area is a turntable and includes a pointer, a verification radian area and a confusion radian area, and the prompt is used to prompt a user to operate an action and a target of the electronic device;
an acquisition unit 402, configured to acquire sensor data of the electronic device;
a conversion unit 403, configured to convert the sensor data into a rotation angle of the pointer, so that the pointer rotates according to the operation of the user;
a verification unit 404, configured to verify the sensor data and the rotation angle of the pointer when a time for stopping rotation of the pointer exceeds a preset first time threshold;
a confirming unit 405, configured to confirm that the operation of the user is verified if the sensor data and the rotation angle of the pointer are both verified.
Preferably, the generating unit 401 is further configured to update the verification interface if the time for stopping rotation of the pointer does not exceed the first time threshold within a preset second time threshold.
Preferably, the confirming unit 405 is further configured to close the verification interface if the sensor data is not verified.
Preferably, the generating unit 401 is further configured to update a verification interface if the sensor data passes verification and the rotation angle of the pointer does not pass verification.
Preferably, when the time for stopping the rotation of the pointer exceeds a preset first time threshold, the verification unit 404 is specifically configured to: checking whether the rotation angle of the pointer is consistent with the verification radian domain or not; verifying the validity of the sensor data.
Preferably, the verification unit 404 is specifically configured to: judging whether the rotation direction of the electronic equipment corresponding to the sensor data is consistent with the rotation direction of the pointer or not; if the rotation direction of the electronic equipment corresponding to the sensor data is consistent with the rotation direction of the pointer, determining that a first weight value is a first preset value; if the rotation direction of the electronic equipment corresponding to the sensor data is inconsistent with the rotation direction of the pointer, determining that the first weight value is a second preset value; judging whether the sensor data is suspected to be fake or not according to the change value of the sensor data; if the false suspicion exists, weighting a second weight value according to a preset rule, wherein the initial value of the second weight value is a third preset value; if the false suspicion does not exist, carrying out weight reduction on the second weight value according to a preset rule; calculating a sum of the first and second weight values; if the sum of the first weight value and the second weight value is smaller than a fourth preset value, confirming that the sensor data passes verification; and if the sum of the first weight value and the second weight value is not less than a fourth preset value, confirming that the sensor data is not verified.
By using the verification device provided by the invention, the operation of touching the screen by a finger is not adopted in the verification process, the collected sensor data of the electronic equipment is utilized for verification, the sensor data is not easy to counterfeit and cheat, the verification mode is simple, the verification with a back-end server is not needed, the intermediate process can be saved, the intermediate link counterfeit is avoided, and the verification process is not easy to crack and is safer and more reliable.
Next, an electronic apparatus 11 according to an embodiment of the present application is described with reference to fig. 5.
As shown in fig. 5, the electronic device 11 includes one or more processors 111 and memory 112.
The processor 111 may be a Central Processing Unit (CPU) or other form of processing unit having data processing capabilities and/or instruction execution capabilities, and may control other components in the electronic device 11 to perform desired functions.
Memory 112 may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, Random Access Memory (RAM), cache memory (cache), and/or the like. The non-volatile memory may include, for example, Read Only Memory (ROM), hard disk, flash memory, etc. One or more computer program instructions may be stored on the computer-readable storage medium and executed by processor 111 to implement the authentication methods of the various embodiments of the present application described above and/or other desired functions. Various contents such as an input signal, a signal component, a noise component, etc. may also be stored in the computer-readable storage medium.
In one example, the electronic device 11 may further include: an input device 113 and an output device 114, which are interconnected by a bus system and/or other form of connection mechanism (not shown).
The input device 113 may include, for example, a keyboard, a mouse, and the like.
The output device 114 may output various information including the determined distance information, direction information, and the like to the outside. The output devices 114 may include, for example, a display, speakers, a printer, and a communication network and remote output devices connected thereto, among others.
Of course, for the sake of simplicity, only some of the components of the electronic device 11 relevant to the present application are shown in fig. 5, and components such as buses, input/output interfaces, and the like are omitted. In addition, the electronic device 11 may include any other suitable components, depending on the particular application.
Exemplary computer program product and computer-readable storage Medium
In addition to the above-described methods and apparatus, embodiments of the present application may also be a computer program product comprising computer program instructions that, when executed by a processor, cause the processor to perform the steps in the authentication method according to various embodiments of the present application described in the "exemplary methods" section of this specification, supra.
The computer program product may be written with program code for performing the operations of embodiments of the present application in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the electronic device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server.
Furthermore, embodiments of the present application may also be a computer-readable storage medium having stored thereon computer program instructions that, when executed by a processor, cause the processor to perform steps in an authentication method according to various embodiments of the present application described in the "exemplary methods" section above of this specification.
The computer-readable storage medium may take any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may include, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing describes the general principles of the present application in conjunction with specific embodiments, however, it is noted that the advantages, effects, etc. mentioned in the present application are merely examples and are not limiting, and they should not be considered essential to the various embodiments of the present application. Furthermore, the foregoing disclosure of specific details is for the purpose of illustration and description and is not intended to be limiting, since the foregoing disclosure is not intended to be exhaustive or to limit the disclosure to the precise details disclosed.
The block diagrams of devices, apparatuses, systems referred to in this application are only given as illustrative examples and are not intended to require or imply that the connections, arrangements, configurations, etc. must be made in the manner shown in the block diagrams. These devices, apparatuses, devices, systems may be connected, arranged, configured in any manner, as will be appreciated by those skilled in the art. Words such as "including," "comprising," "having," and the like are open-ended words that mean "including, but not limited to," and are used interchangeably therewith. The words "or" and "as used herein mean, and are used interchangeably with, the word" and/or, "unless the context clearly dictates otherwise. The word "such as" is used herein to mean, and is used interchangeably with, the phrase "such as but not limited to".
It should also be noted that in the devices, apparatuses, and methods of the present application, the components or steps may be decomposed and/or recombined. These decompositions and/or recombinations are to be considered as equivalents of the present application.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present application. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the application. Thus, the present application is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, the description is not intended to limit embodiments of the application to the form disclosed herein. While a number of example aspects and embodiments have been discussed above, those of skill in the art will recognize certain variations, modifications, alterations, additions and sub-combinations thereof.

Claims (10)

1. An authentication method, for an electronic device, the method comprising:
generating a verification interface, wherein the verification interface comprises a prompt language and a verification area, the verification area is a turntable and comprises a pointer, a verification radian area and a confusion radian area, and the prompt language is used for prompting a user to operate the action and the target of the electronic equipment;
collecting sensor data of the user equipment;
converting the sensor data into a rotation angle of the pointer so as to enable the pointer to rotate according to the operation of the user;
when the time for stopping the rotation of the pointer exceeds a preset first time threshold, verifying the sensor data and the rotation angle of the pointer;
if the sensor data and the rotation angle of the pointer pass the verification, confirming that the operation of the user passes the verification;
wherein the verifying the sensor data and the rotation angle of the pointer comprises:
checking whether the rotation angle of the pointer is consistent with the verification radian domain or not;
verifying the validity of the sensor data;
the verifying the validity of the sensor data includes:
judging whether the rotation direction of the electronic equipment corresponding to the sensor data is consistent with the rotation direction of the pointer or not;
if the rotation direction of the electronic equipment corresponding to the sensor data is consistent with the rotation direction of the pointer, determining that a first weight value is a first preset value;
if the rotation direction of the electronic equipment corresponding to the sensor data is inconsistent with the rotation direction of the pointer, determining that the first weight value is a second preset value;
judging whether the sensor data is suspected to be fake or not according to the change value of the sensor data;
if the false suspicion exists, weighting a second weight value according to a preset rule, wherein the initial value of the second weight value is a third preset value;
if the false suspicion does not exist, carrying out weight reduction on the second weight value according to a preset rule;
calculating a sum of the first and second weight values;
if the sum of the first weight value and the second weight value is smaller than a fourth preset value, confirming that the sensor data passes verification;
and if the sum of the first weight value and the second weight value is not less than a fourth preset value, confirming that the sensor data is not verified.
2. The method of claim 1, further comprising:
and if the time for stopping the rotation of the pointer does not exceed the first time threshold within the preset second time threshold, updating the verification interface.
3. The method of claim 1, wherein after the verifying the sensor data and the angle of rotation of the pointer, the method further comprises:
and if the sensor data is not verified, closing the verification interface.
4. The method of claim 1, wherein after the verifying the sensor data and the angle of rotation of the pointer, the method further comprises:
and if the sensor data passes the verification and the rotation angle of the pointer does not pass the verification, updating a verification interface.
5. An authentication apparatus, applied to an electronic device, the apparatus comprising:
the verification interface comprises a prompt language and a verification area, the verification area is a rotating disc and comprises a pointer, a verification radian area and a confusion radian area, and the prompt language is used for prompting a user to operate the action and the target of the electronic equipment;
the acquisition unit is used for acquiring sensor data of the user equipment;
the conversion unit is used for converting the sensor data into a rotation angle of the pointer so as to enable the pointer to rotate according to the operation of the user;
the verification unit is used for verifying the sensor data and the rotation angle of the pointer when the time for stopping the rotation of the pointer exceeds a preset first time threshold;
a confirming unit, configured to confirm that the operation of the user passes verification if both the sensor data and the rotation angle of the pointer pass verification;
when the time for stopping the rotation of the pointer exceeds a preset first time threshold, the verification unit is specifically configured to:
checking whether the rotation angle of the pointer is consistent with the verification radian domain or not;
verifying the validity of the sensor data;
the verifying the validity of the sensor data includes:
judging whether the rotation direction of the electronic equipment corresponding to the sensor data is consistent with the rotation direction of the pointer or not;
if the rotation direction of the electronic equipment corresponding to the sensor data is consistent with the rotation direction of the pointer, determining that a first weight value is a first preset value;
if the rotation direction of the electronic equipment corresponding to the sensor data is inconsistent with the rotation direction of the pointer, determining that the first weight value is a second preset value;
judging whether the sensor data is suspected to be fake or not according to the change value of the sensor data;
if the false suspicion exists, weighting a second weight value according to a preset rule, wherein the initial value of the second weight value is a third preset value;
if the false suspicion does not exist, carrying out weight reduction on the second weight value according to a preset rule;
calculating a sum of the first and second weight values;
if the sum of the first weight value and the second weight value is smaller than a fourth preset value, confirming that the sensor data passes verification;
and if the sum of the first weight value and the second weight value is not less than a fourth preset value, confirming that the sensor data is not verified.
6. The apparatus according to claim 5, wherein the generating unit is further configured to update the verification interface if the time for stopping the rotation of the pointer does not exceed the first time threshold within a preset second time threshold.
7. The apparatus of claim 5, wherein the validation unit is further configured to close the verification interface if the sensor data is not verified.
8. The apparatus of claim 5, wherein the generating unit is further configured to update a verification interface if the sensor data is verified and the rotation angle of the pointer is not verified.
9. A computer-readable storage medium storing a computer program for executing the authentication method according to any one of claims 1 to 4.
10. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
the processor is used for reading the executable instructions from the memory and executing the instructions to realize the verification method of any one of the claims 1 to 4.
CN202110059205.7A 2021-01-18 2021-01-18 Verification method and device Active CN112395576B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110059205.7A CN112395576B (en) 2021-01-18 2021-01-18 Verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110059205.7A CN112395576B (en) 2021-01-18 2021-01-18 Verification method and device

Publications (2)

Publication Number Publication Date
CN112395576A CN112395576A (en) 2021-02-23
CN112395576B true CN112395576B (en) 2021-05-07

Family

ID=74624856

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110059205.7A Active CN112395576B (en) 2021-01-18 2021-01-18 Verification method and device

Country Status (1)

Country Link
CN (1) CN112395576B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113535062A (en) * 2021-07-27 2021-10-22 陈姣 Input verification method based on touch screen

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105281906A (en) * 2014-07-04 2016-01-27 腾讯科技(深圳)有限公司 Safety authentication method and device
CN106940764A (en) * 2016-01-05 2017-07-11 阿里巴巴集团控股有限公司 A kind of user authentication method and terminal device
CN107391980A (en) * 2017-07-17 2017-11-24 上海众人网络安全技术有限公司 A kind of login validation method based on device data, device, equipment and storage medium

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951439A (en) * 2010-09-14 2011-01-19 深圳市同洲电子股份有限公司 Method, device and mobile terminal for unlocking by gravity sensing
CN102905022B (en) * 2012-09-27 2015-09-09 广东欧珀移动通信有限公司 A kind of method that electronic compass unlocks and mobile intelligent terminal
CN105099677B (en) * 2014-04-21 2018-12-14 阿里巴巴集团控股有限公司 A kind of verification method and equipment based on magnetometer
CN105760728B (en) * 2016-02-25 2020-02-28 上海斐讯数据通信技术有限公司 Unlocking method of electronic equipment and mobile terminal
CN105825118A (en) * 2016-03-15 2016-08-03 上海斐讯数据通信技术有限公司 Terminal and method for unlocking based on compass and turntable
CN105898031A (en) * 2016-03-15 2016-08-24 上海斐讯数据通信技术有限公司 Compass-based terminal unlocking system and method
CN106060237A (en) * 2016-05-09 2016-10-26 北京小米移动软件有限公司 Screen unlocking method, device and apparatus
US9942768B1 (en) * 2016-09-30 2018-04-10 International Business Machines Corporation Verifying a user utilizing gyroscopic movement
CN107450708B (en) * 2017-07-28 2020-03-24 Oppo广东移动通信有限公司 Unlocking control method and related product
CN110519269B (en) * 2019-08-28 2021-09-21 中国工商银行股份有限公司 Verification method, device and system for image-text click data and mobile terminal
CN110781134A (en) * 2019-10-30 2020-02-11 泰康保险集团股份有限公司 Data processing method and device, computer storage medium and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105281906A (en) * 2014-07-04 2016-01-27 腾讯科技(深圳)有限公司 Safety authentication method and device
CN106940764A (en) * 2016-01-05 2017-07-11 阿里巴巴集团控股有限公司 A kind of user authentication method and terminal device
CN107391980A (en) * 2017-07-17 2017-11-24 上海众人网络安全技术有限公司 A kind of login validation method based on device data, device, equipment and storage medium

Also Published As

Publication number Publication date
CN112395576A (en) 2021-02-23

Similar Documents

Publication Publication Date Title
WO2019153544A1 (en) Annotation backend check method and apparatus, computer device and storage medium.
US10726423B2 (en) Method, terminal, and system for payment verification
US9213813B2 (en) Authentication device, authentication method, and recording medium
JP5868529B2 (en) Form related validation
CN104508672B (en) Program execution device and program analysis device
CN106656944B (en) Method and device for sliding verification of handheld mobile equipment
JP6238846B2 (en) Authentication apparatus and program
US11294798B2 (en) Method and system for context based testing of software application vulnerabilities
WO2016087974A1 (en) Token authentication for touch sensitive display devices
CN112395576B (en) Verification method and device
CN103714457A (en) Method for validating a transaction
WO2022146593A1 (en) Systems and methods for passive multi-factor authentication of device users
US9830599B1 (en) Human interaction detection
CN113779550A (en) Account verification method and device, electronic equipment and computer readable medium
JP2023517338A (en) ABNORMAL ACTION DETECTION METHOD, APPARATUS, ELECTRONIC DEVICE, AND COMPUTER PROGRAM
CN111583929A (en) Control method and device using offline voice and readable equipment
CN111027643A (en) Deep neural network model training method, man-machine interaction recognition method and device, electronic equipment and storage medium
US20080313472A1 (en) Method and apparatus for changing and adding activation keys for functions of digital content without having to change and recompile the digital content
KR102269174B1 (en) Appratus and method for verification of smart contracts
KR20110002967A (en) Method and system for providing authentication service by using biometrics and portable memory unit therefor
EP3924856B1 (en) Privacy preserving application and device error detection
WO2018145241A1 (en) Method and device for electronic payment based on fingerprint information
US20080001959A1 (en) System, Method and Computer Program Product for Performing Information Transfer Using a Virtual Operator
CN111681010A (en) Transaction verification method and device
CN109241742A (en) A kind of recognition methods of rogue program and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant