[go: up one dir, main page]

CN112231683A - Security authentication method, system, apparatus and computer equipment - Google Patents

Security authentication method, system, apparatus and computer equipment Download PDF

Info

Publication number
CN112231683A
CN112231683A CN202011110880.XA CN202011110880A CN112231683A CN 112231683 A CN112231683 A CN 112231683A CN 202011110880 A CN202011110880 A CN 202011110880A CN 112231683 A CN112231683 A CN 112231683A
Authority
CN
China
Prior art keywords
axis acceleration
axis
accelerometer
verified
acceleration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011110880.XA
Other languages
Chinese (zh)
Inventor
郑文伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Lingshiji Information Technology Co ltd
Original Assignee
Guangzhou Lingshiji Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Lingshiji Information Technology Co ltd filed Critical Guangzhou Lingshiji Information Technology Co ltd
Priority to CN202011110880.XA priority Critical patent/CN112231683A/en
Publication of CN112231683A publication Critical patent/CN112231683A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/0346Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor with detection of the device orientation or free movement in a 3D space, e.g. 3D mice, 6-DOF [six degrees of freedom] pointers using gyroscopes, accelerometers or tilt-sensors

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Telephone Function (AREA)

Abstract

本发明涉及一种利用加速度计的安全认证方法、系统、装置、计算机设备和存储介质,所述方法包括:接收已通过管理员信息认证的安全设备通过第一加速度计读取到的第一X轴线加速度、第一Y轴线加速度以及第一Z轴线加速度;接收待验证设备通过第二加速度计读取到的第二X轴线加速度、第二Y轴线加速度以及第二Z轴线加速度;将第一X轴线加速度与第二X轴线加速度进行对比,将第一Y轴线加速度与第二Y轴线加速度进行对比,将第一Z轴线加速度与第二Z轴线加速度进行对比;当对比结果满足预设条件时,将待验证设备设置为安全设备。上述方法无需在设备上输入信息或使用设备间数据传输完成设备安全验证,保证数据信息安全性。

Figure 202011110880

The invention relates to a security authentication method, system, device, computer equipment and storage medium using an accelerometer. The method includes: receiving a first X read by a security device that has been authenticated by administrator information through a first accelerometer The axis acceleration, the first Y axis acceleration and the first Z axis acceleration; receive the second X axis acceleration, the second Y axis acceleration and the second Z axis acceleration read by the device to be verified through the second accelerometer; The axis acceleration is compared with the second X axis acceleration, the first Y axis acceleration is compared with the second Y axis acceleration, and the first Z axis acceleration is compared with the second Z axis acceleration; when the comparison result meets the preset condition, Set the device to be verified as a secure device. The above method does not need to input information on the device or use data transmission between devices to complete the device security verification, so as to ensure the security of data information.

Figure 202011110880

Description

Security authentication method, system, device and computer equipment
Technical Field
The present invention relates to the field of device authentication technologies, and in particular, to a security authentication method, system, device, computer device, and storage medium using an accelerometer.
Background
Modern mobile phones have become essential information devices for individuals, and in many industries, mobile phones are used as devices for accessing related information systems, and authentication procedures are required to be completed on the mobile phones before accessing the information systems. Meanwhile, in many industries, information systems are usually designed as a multi-level authority system, and the authentication process of accessing the information systems by other people is usually controlled by an administrator. This requires that an authentication process for an account related to the information system is performed for another mobile phone through one mobile phone that has been authenticated as an administrator account, so as to allow the information system to log in on the mobile phone and complete related operations.
To achieve the above purpose, there are two techniques that are currently popular:
(1) the administrator assigns a password in advance when creating an account, and the user inputs the account and an initial password on his mobile phone to complete the authentication of the information system, which is the most traditional way.
(2) The mobile phone of the administrator and the mobile phone of the user carry out communication between the devices through NFC or Bluetooth communication, the device of the administrator transmits a section of instruction data sent by the information system to the device of the user, and the device of the user uses the instruction data to complete access verification of the information system.
The first technique has the advantages of mature and simple realization and wide application; the disadvantage is that if the pre-assigned password is too simple, security issues are likely to arise; if the pre-assigned password is too complicated, the user input is very cumbersome. Meanwhile, this approach cannot be applied to a scene where there is a requirement for the place where authentication occurs. For example, facilities that have associated confidential data in custody, require that users accessing the information system be inside the facilities and have the associated personnel, thereby avoiding external malicious attempts to access.
Compared with the first technology, the second technology can avoid the complex process of inputting the password by the user, and data transmission is carried out through NFC or Bluetooth communication, so that the equipment of the user is required to be within a certain range from the equipment of an administrator, and the scene of the place where authentication occurs and the scene of the requirement can be met. However, the second technique also has a very serious security problem because the administrator's device usually has a very high operation authority in the information system, and if the user's device attacks the administrator's device with malicious codes during data transmission, and steals information related to the information system stored on the administrator's device, malicious operations may be performed on the information system. In order to avoid the related safety hazard, ideally, there cannot be a way of data transmission between the administrator's device and the user's device.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a security authentication method, a system, a device, computer equipment and a storage medium by utilizing an accelerometer, which do not need to input information on the equipment or use data transmission between the equipment to complete the security verification of the equipment and ensure the security of data information.
In order to solve at least one technical problem, an embodiment of the present invention provides a security authentication method using an accelerometer, where the method includes:
receiving a first X-axis acceleration, a first Y-axis acceleration and a first Z-axis acceleration which are read by the safety equipment which passes the administrator information authentication through the first accelerometer;
receiving a second X-axis acceleration, a second Y-axis acceleration and a second Z-axis acceleration which are read by the equipment to be verified through a second accelerometer;
comparing the first X-axis acceleration to the second X-axis rate of change of angle, comparing the first Y-axis acceleration to the second Y-axis acceleration, and comparing the first Z-axis acceleration to the second Z-axis acceleration;
when the comparison result meets a preset condition, setting the equipment to be verified as safety equipment so as to complete the safety authentication of the equipment to be verified;
the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration, the second X-axis acceleration, the second Y-axis acceleration and the second Z-axis acceleration are respectively read by a first accelerometer of the safety device and a second accelerometer of the equipment to be verified after the safety device is bound with the equipment to be verified and moves in space for a preset time.
Optionally, the preset condition includes that data difference values between the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration and the second X-axis acceleration, the second Y-axis acceleration, and the second Z-axis acceleration are smaller than a preset value.
Optionally, when the comparison result meets a preset condition, setting the device to be verified as a security device includes:
calculating data difference values of the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration, the second X-axis acceleration, the second Y-axis acceleration and the second Z-axis acceleration according to the difference values determined by a data difference formula:
wherein the data difference formula is:
Figure BDA0002728544600000031
Axnrepresenting a first X-axis acceleration, BxnRepresents the second X-axis acceleration, AynRepresents the first Y-axis acceleration, BynRepresents the second Y-axis acceleration, AznRepresenting first Z-axis acceleration, BznRepresenting second Z-axis acceleration, dnRepresenting the difference;
and when the data difference value is smaller than the preset value, setting the equipment to be verified as safety equipment.
Optionally, the plurality of first X-axis accelerations, the first Y-axis accelerations, the first Z-axis accelerations and the second X-axis accelerations, the second Y-axis accelerations, and the second Z-axis accelerations are respectively read by a first accelerometer of the security device and a second accelerometer of the device to be verified after the security device and the device to be verified move in space for N seconds, where N is a positive integer;
a plurality of said first X axis accelerations are
Figure BDA0002728544600000032
A plurality of standsThe first Y-axis acceleration is
Figure BDA0002728544600000033
A plurality of said first Z axis accelerations are
Figure BDA0002728544600000034
A plurality of said second X axis accelerations are
Figure BDA0002728544600000035
A plurality of said second Y-axis accelerations are
Figure BDA0002728544600000036
A plurality of said second Z axis accelerations are
Figure BDA0002728544600000041
The calculating data difference values of the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration, the second X-axis acceleration, the second Y-axis acceleration, and the second Z-axis acceleration according to the difference values determined by the data difference formula includes:
determining the data difference value according to the accumulated value of the difference value, wherein the accumulated value of the difference value is
Figure BDA0002728544600000042
Optionally, the preset value is 3.5; when the data difference value is smaller than the preset value, setting the device to be verified as a safety device, including:
when said
Figure BDA0002728544600000043
And when theta is 3.5, setting the device to be verified as a safety device.
Optionally, the first X-axis acceleration has a data deviation from the second X-axis acceleration in the range of 0.5, the first Y-axis acceleration has a data deviation from the second Y-axis acceleration in the range of 0.5, and the first Z-axis acceleration has a data deviation from the second Z-axis acceleration in the range of 0.5;
when calculated said
Figure BDA0002728544600000044
1.7263, setting the device to be verified as a safety device.
In addition, the embodiment of the invention also provides a security authentication system using the accelerometer, wherein the security authentication system comprises security equipment which passes the authentication of the administrator information, an authentication server and equipment to be verified;
the safety device and the device to be verified are bound, after the safety device and the device to be verified move in space for a preset time, a first accelerometer of the safety device reads a first X-axis acceleration, a first Y-axis acceleration and a first Z-axis acceleration, and a second accelerometer of the device to be verified reads a second X-axis acceleration, a second Y-axis acceleration and a second Z-axis acceleration;
the security device sending the first X-axis accelerometer, the first Y-axis accelerometer and the first Z-axis accelerometer to the authentication server;
the device to be verified sends the second X-axis accelerometer, the second Y-axis accelerometer and the second Z-axis accelerometer to the authentication server;
the authentication server compares the first X-axis accelerometer with the second X-axis accelerometer, compares the first Y-axis accelerometer with the second Y-axis accelerometer, compares the first Z-axis accelerometer with the second Z-axis accelerometer, and sets the device to be verified as a safety device when a comparison result meets a preset condition so as to complete safety authentication of the device to be verified.
In addition, an embodiment of the present invention further provides a security authentication apparatus using an accelerometer, where the apparatus includes:
the first receiving module is used for receiving a first X-axis acceleration, a first Y-axis acceleration and a first Z-axis acceleration which are read by the safety equipment passing the administrator information authentication through the first accelerometer;
the second receiving module is used for receiving a second X-axis acceleration, a second Y-axis acceleration and a second Z-axis acceleration which are read by the equipment to be verified through the second accelerometer;
a comparison module for comparing the first X-axis acceleration to the second X-axis acceleration, the first Y-axis acceleration to the second Y-axis acceleration, and the first Z-axis acceleration to the second Z-axis acceleration;
the authentication module is used for setting the equipment to be verified as safety equipment when the comparison result meets a preset condition so as to complete the safety authentication of the equipment to be verified;
the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration, the second X-axis acceleration, the second Y-axis acceleration and the second Z-axis acceleration are respectively read by a first accelerometer of the safety device and a second accelerometer of the equipment to be verified after the safety device is bound with the equipment to be verified and moves in space for a preset time.
In addition, an embodiment of the present invention further provides a computer device, including: the system comprises a memory, a processor and an application program stored on the memory and capable of running on the processor, wherein the processor realizes the steps of the method of any embodiment when executing the application program.
In addition, an embodiment of the present invention further provides a computer-readable storage medium, on which an application program is stored, and when the application program is executed by a processor, the steps of any one of the above-mentioned embodiments of the method are implemented.
In the embodiment of the invention, by implementing the method, after the security device is bound with the device to be verified and moves in space for a preset time, the security device reads the first accelerometer to the server for uploading the linear accelerations of the three dimensions, meanwhile, the device to be verified reads the second accelerometer to the server for uploading the linear accelerations of the three dimensions, and after the server respectively compares the linear accelerations of the three dimensions of the two devices, the server determines whether the device to be verified is the security device according to the comparison result. And if the comparison result meets the preset condition, setting the equipment to be verified as the safety equipment. Therefore, the safety verification of the device setting to be verified is realized. In the whole verification process, the safety verification of the equipment to be verified is completed without inputting information on the safety equipment and the equipment to be verified or using data transmission between the equipment, so that the safety of data information is ensured.
Drawings
Fig. 1 is a schematic structural diagram of a security authentication system using an accelerometer according to an embodiment of the present invention;
FIG. 2 is a flow chart illustrating a method for security authentication using an accelerometer according to an embodiment of the invention;
fig. 3 is a rectangular coordinate system established with the center of mass of the mobile phone as the center in the embodiment of the present invention;
FIG. 4 is a vector diagram of a vector R of a mobile phone in a space moving with a centroid as a coordinate origin according to an embodiment of the present invention;
FIG. 5 is a graph of a change in value in an embodiment of the present invention;
FIG. 6 is a graph of the error resulting from the simulator test in an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a security authentication apparatus using an accelerometer according to an embodiment of the present invention;
fig. 8 is a schematic structural composition diagram of a computer device in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An embodiment of the present invention provides a security authentication system using an accelerometer, as shown in fig. 1, the security authentication system using an accelerometer includes a security device 10 that has been authenticated by administrator information, an authentication server 20, and a device to be verified 30;
the safety device 10 and the device to be verified 30 are bound, after the preset time of spatial motion, a first accelerometer of the safety device 10 reads a first X-axis acceleration, a first Y-axis acceleration and a first Z-axis acceleration, and a second accelerometer of the device to be verified 30 reads a second X-axis acceleration, a second Y-axis acceleration and a second Z-axis acceleration;
the secure device 10 sends the first X-axis acceleration, the first Y-axis acceleration, and the first Z-axis acceleration to the authentication server 20;
the device to be verified 30 sends the second X-axis acceleration, the second Y-axis acceleration, and the second Z-axis acceleration to the authentication server;
the authentication server 20 compares the first X axis acceleration with the second X axis acceleration, compares the first Y axis acceleration with the second Y axis acceleration, compares the first Z axis acceleration with the second Z axis acceleration, and sets the device to be verified 30 as a security device when a comparison result satisfies a preset condition, so as to complete security authentication of the device to be verified 30.
Accordingly, the authentication server 20 completes the security verification of the device to be verified 30. The device to be verified 30 as a secure device can perform information interaction with the authentication server 20 within a specified range.
The embodiment of the invention provides a security authentication method using an accelerometer, which is applied to the authentication server 20 shown in fig. 1. As shown in fig. 2, the security authentication method using an accelerometer includes the following steps:
s102, receiving a first X-axis acceleration, a first Y-axis acceleration and a first Z-axis acceleration which are read by the safety equipment passing the administrator information authentication through the first accelerometer.
In this embodiment, before S102, the method further includes: receiving an information authentication request of a security request device; and when the information authentication request passes, using the safety request device as the safety device which passes the administrator information authentication.
In this embodiment, the security device is connected to the authentication server via a network, and performs security authentication of the authentication server. The safety device can read the three-dimensional linear acceleration of the safety device in the space motion through the internal accelerometer. In particular, the security device is a mobile phone. As shown in fig. 3, a rectangular coordinate system is established with the center of mass of the mobile phone as the center. As shown in fig. 4, the vector of the movement of the mobile phone in the space with the centroid as the origin of coordinates is R. In a rectangular coordinate system, the vector R is the vector detected by the accelerometer (which may be a combination of gravity or inertial forces in the above example). RX, RY, RZ are the projections of vector R on the X, Y, Z axes, respectively. Wherein, R2 ^ RX ^2+ RY ^2+ RZ ^ 2.
An accelerometer carried in a smart phone, taking an Android system as an example, can measure the change of the distance of the mobile phone in the X axis, the Y axis and the Z axis within a period of time through the following codes:
Figure BDA0002728544600000081
assuming that the initial X, Y, and Z coordinates of the handset are [0, 0, 0], moving the handset in space, continuously recording the reading changes, sampling every 1 second, sampling 10 times, and obtaining the following table data:
Figure BDA0002728544600000082
Figure BDA0002728544600000091
wherein the values in the table have removed the gravitational acceleration effect. The motion trajectory in space obtained from the above data is shown in fig. 5.
And S104, receiving a second X-axis acceleration, a second Y-axis acceleration and a second Z-axis acceleration which are read by the equipment to be verified through the second accelerometer.
In this embodiment, the device to be verified is connected to the authentication server via a network, and the security authentication of the authentication server is not completed. And the equipment to be verified sends a security verification request to the authentication server, and uploads the second X-axis acceleration, the second Y-axis acceleration and the second Z-axis acceleration read by the second accelerometer to the authentication server so as to perform security verification on the server to be verified. In particular, the security device is a mobile phone. The way in which the device to be authenticated reads the three-dimensional linear acceleration of the spatial motion process by using the second accelerometer is as described above, and is not described in detail here.
S106, comparing the first X-axis acceleration with the second X-axis angular change rate, comparing the first Y-axis acceleration with the second Y-axis acceleration, and comparing the first Z-axis acceleration with the second Z-axis acceleration.
In this embodiment, it should be noted that the first X axis acceleration, the first Y axis acceleration, the first Z axis acceleration, the second X axis acceleration, the second Y axis acceleration, and the second Z axis acceleration are the functions that the security device is bound with the device to be verified and is read by the first accelerometer of the security device and read by the second accelerometer of the device to be verified after a preset time period of spatial motion.
Specifically, the security device is a mobile phone a, the device to be verified is a mobile phone B, both of which are equipped with an accelerometer and are connected to the authentication server through a network. The two planes of the mobile phone A and the mobile phone B are fixed, so that the positions of the two planes are consistent in space and no sliding occurs. A simple method is to use a rubber band to tighten. The administrator holds the fixed mobile phone A and the fixed mobile phone B by hands, and moves for a period of time in the space, wherein the time can be about 5 to 30 seconds, the time is recorded as N seconds, and the mobile phone A and the mobile phone B upload the readings on the accelerometers to the authentication server. The authentication server receives the reading of the mobile phone A:
Figure BDA0002728544600000101
receiving the reading of the mobile phone B:
Figure BDA0002728544600000102
Figure BDA0002728544600000103
the readings received by the authentication server are three-dimensional linear accelerations on the mobile phone A and the mobile phone B respectively. Further, the two sets of three-dimensional linear accelerations received by the authentication server are compared respectively.
S108, when the comparison result meets a preset condition, setting the equipment to be verified as safety equipment so as to complete the safety authentication of the equipment to be verified; the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration, the second X-axis acceleration, the second Y-axis acceleration and the second Z-axis acceleration are respectively read by a first accelerometer of the safety device and a second accelerometer of the equipment to be verified after the safety device is bound with the equipment to be verified and moves in space for a preset time.
In this embodiment, a preset condition is preset on the authentication server, and the preset condition is used for determining the matching degree of the comparison result. The preset condition may be that the matching degree of the comparison result reaches a preset value. And when the authentication server determines that the comparison result meets the preset condition, setting the equipment to be verified as safety equipment so as to complete the safety authentication of the equipment to be verified.
Specifically, the authentication server judges through comparison results and preset conditions
Figure BDA0002728544600000104
Figure BDA0002728544600000105
And
Figure BDA0002728544600000106
whether or not they belong to the same motion trajectory, e.g.If yes, the authorization of the mobile phone B is considered to pass.
By implementing the method, after the safety device is bound with the device to be verified and moves in space for a preset time, the safety device reads the first accelerometer to the server for uploading the linear acceleration of the three dimensions, meanwhile, the device to be verified reads the second accelerometer to the server for uploading the linear acceleration of the three dimensions, and after the server respectively compares the linear accelerations of the three dimensions of the two devices, whether the device to be verified is the safety device is determined according to the comparison result. And if the comparison result meets the preset condition, setting the equipment to be verified as the safety equipment. Therefore, the safety verification of the device setting to be verified is realized. In the whole verification process, the safety verification of the equipment to be verified is completed without inputting information on the safety equipment and the equipment to be verified or using data transmission between the equipment, so that the safety of data information is ensured.
In an embodiment, the preset condition includes that data difference values between the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration and the second X-axis acceleration, the second Y-axis acceleration, and the second Z-axis acceleration are smaller than a preset value.
Preferably, when the comparison result meets a preset condition, setting the device to be verified as a security device includes: calculating data difference values of the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration, the second X-axis acceleration, the second Y-axis acceleration and the second Z-axis acceleration according to the difference values determined by a data difference formula: wherein the data difference formula is:
Figure BDA0002728544600000111
Axnrepresenting a first X-axis acceleration, BxnRepresents the second X-axis acceleration, AynRepresents the first Y-axis acceleration, BynRepresents the second Y-axis acceleration, AznRepresenting first Z-axis acceleration, BznRepresenting second Z-axis acceleration, dnRepresenting the difference;
and when the data difference value is smaller than the preset value, setting the equipment to be verified as safety equipment.
Preferably, the plurality of first X-axis accelerations, the first Y-axis accelerations, the first Z-axis accelerations and the second X-axis accelerations, the second Y-axis accelerations, and the second Z-axis accelerations are respectively read by a first accelerometer of the security device and a second accelerometer of the device to be verified after the security device and the device to be verified move in space for N seconds, where N is a positive integer; a plurality of said first X axis accelerations are
Figure BDA0002728544600000112
A plurality of said first Y-axis accelerations are
Figure BDA0002728544600000113
A plurality of said first Z axis accelerations are
Figure BDA0002728544600000121
A plurality of said second X axis accelerations are
Figure BDA0002728544600000122
A plurality of said second Y-axis accelerations are
Figure BDA0002728544600000123
A plurality of said second Z axis accelerations are
Figure BDA0002728544600000124
The calculating data difference values of the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration, the second X-axis acceleration, the second Y-axis acceleration, and the second Z-axis acceleration according to the difference values determined by the data difference formula includes: determining the data difference value according to the accumulated value of the difference value, wherein the accumulated value of the difference value is
Figure BDA0002728544600000125
Further, the preset value is 3.5; when the data difference value is smaller than the preset value, setting the device to be verified as a safety device, including: when said
Figure BDA0002728544600000126
And when theta is 3.5, setting the device to be verified as a safety device.
Specifically, whether the mobile phone A and the mobile phone B move in the space in a consistent manner or not is judged through the gyroscope to perform authorization authentication, and whether the reading of the mobile phone A and the reading of the mobile phone B are in the same movement track or not can be judged in any way. For completeness of explanation, a practical method is described herein:
Figure BDA0002728544600000127
and
Figure BDA0002728544600000128
the difference between the sampling points of (a) is:
Figure BDA0002728544600000129
ideally there are:
Figure BDA00027285446000001210
because there will be some slight differences in accuracy between the gyroscopes of the two handsets, plus possible delays of the network, a threshold θ is set, which is:
Figure BDA00027285446000001211
in practice, θ may be set to 3.5.
Preferably, the first X-axis acceleration has a data deviation from the second X-axis acceleration in the range of 0.5, the first Y-axis acceleration has a data deviation from the second Y-axis acceleration in the range of 0.5, and the first Z-axis acceleration has a data deviation from the second Z-axis acceleration in the range of 0.5; when calculated said
Figure BDA00027285446000001212
1.7263, setting the device to be verified as a safety device.
Specifically, the codes are actually written for the verification of the present invention according to the above description, wherein the accelerometer readings of the mobile phone a and the mobile phone B have a random deviation within 0.5, the following table data is obtained:
Figure BDA0002728544600000131
according to the error formula, the above error is 1.7263, and within the error range, it can be determined as belonging to the same motion track. In addition, the results of ten thousand tests using the simulator are shown in fig. 6.
In one embodiment, the invention also provides a security authentication device using the accelerometer. As shown in fig. 7, the apparatus includes:
the first receiving module 71 is configured to receive a first X-axis acceleration, a first Y-axis acceleration, and a first Z-axis acceleration that are read by the security device that has passed the administrator information authentication through the first accelerometer.
In this embodiment, the security authentication apparatus using a terminal gyroscope further includes a setting module, configured to receive an information authentication request from a security request device; and when the information authentication request passes, using the safety request device as the safety device which passes the administrator information authentication.
In this embodiment, the security device is connected to the authentication server via a network, and performs security authentication of the authentication server. The safety device can read the three-dimensional linear acceleration of the safety device in the space motion through the internal accelerometer. In particular, the security device is a mobile phone. As shown in fig. 3, a rectangular coordinate system is established with the center of mass of the mobile phone as the center. As shown in fig. 4, the vector of the movement of the mobile phone in the space with the centroid as the origin of coordinates is R. In a rectangular coordinate system, the vector R is the vector detected by the accelerometer (which may be a combination of gravity or inertial forces in the above example). RX, RY, RZ are the projections of vector R on the X, Y, Z axes, respectively. Wherein, R2 ^ RX ^2+ RY ^2+ RZ ^ 2.
An accelerometer carried in a smart phone, taking an Android system as an example, can measure the change of the distance of the mobile phone in the X axis, the Y axis and the Z axis within a period of time through the following codes:
Figure BDA0002728544600000141
assuming that the initial X, Y, and Z coordinates of the handset are [0, 0, 0], moving the handset in space, continuously recording the reading changes, sampling every 1 second, sampling 10 times, and obtaining the following table data:
Figure BDA0002728544600000142
Figure BDA0002728544600000151
wherein the values in the table have removed the gravitational acceleration effect. The motion trajectory in space obtained from the above data is shown in fig. 5.
The second receiving module 72 is configured to receive a second X-axis acceleration, a second Y-axis acceleration, and a second Z-axis acceleration, which are read by the device to be verified through the second accelerometer.
In this embodiment, the device to be verified is connected to the authentication server via a network, and the security authentication of the authentication server is not completed. And the equipment to be verified sends a security verification request to the authentication server, and uploads the second X-axis acceleration, the second Y-axis acceleration and the second Z-axis acceleration read by the second accelerometer to the authentication server so as to perform security verification on the server to be verified. In particular, the security device is a mobile phone. The way in which the device to be authenticated reads the three-dimensional linear acceleration of the spatial motion process by using the second accelerometer is as described above, and is not described in detail here.
A comparison module 73, configured to compare the first X-axis acceleration with the second X-axis angular rate of change, compare the first Y-axis acceleration with the second Y-axis acceleration, and compare the first Z-axis acceleration with the second Z-axis acceleration.
In this embodiment, it should be noted that the first X axis acceleration, the first Y axis acceleration, the first Z axis acceleration, the second X axis acceleration, the second Y axis acceleration, and the second Z axis acceleration are the functions that the security device is bound with the device to be verified and is read by the first accelerometer of the security device and read by the second accelerometer of the device to be verified after a preset time period of spatial motion.
Specifically, the security device is a mobile phone a, the device to be verified is a mobile phone B, both of which are equipped with an accelerometer and are connected to the authentication server through a network. The two planes of the mobile phone A and the mobile phone B are fixed, so that the positions of the two planes are consistent in space and no sliding occurs. A simple method is to use a rubber band to tighten. The administrator holds the fixed mobile phone A and the fixed mobile phone B by hands, and moves for a period of time in the space, wherein the time can be about 5 to 30 seconds, the time is recorded as N seconds, and the mobile phone A and the mobile phone B upload the readings on the accelerometers to the authentication server. The authentication server receives the reading of the mobile phone A:
Figure BDA0002728544600000161
receiving the reading of the mobile phone B:
Figure BDA0002728544600000162
Figure BDA0002728544600000163
the readings received by the authentication server are three-dimensional linear accelerations on the mobile phone A and the mobile phone B respectively. Further, the two sets of three-dimensional linear accelerations received by the authentication server are compared respectively.
The authentication module 74 is configured to set the device to be verified as a security device when the comparison result meets a preset condition, so as to complete security authentication of the device to be verified; the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration, the second X-axis acceleration, the second Y-axis acceleration and the second Z-axis acceleration are respectively read by a first accelerometer of the safety device and a second accelerometer of the equipment to be verified after the safety device is bound with the equipment to be verified and moves in space for a preset time.
In this embodiment, a preset condition is preset on the authentication server, and the preset condition is used for determining the matching degree of the comparison result. The preset condition may be that the matching degree of the comparison result reaches a preset value. And when the authentication server determines that the comparison result meets the preset condition, setting the equipment to be verified as safety equipment so as to complete the safety authentication of the equipment to be verified.
Specifically, the authentication server judges through comparison results and preset conditions
Figure BDA0002728544600000164
Figure BDA0002728544600000165
And
Figure BDA0002728544600000166
and if the mobile phone B belongs to the same motion track, the authorization of the mobile phone B is considered to pass.
In an embodiment, the preset condition includes that data difference values between the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration and the second X-axis acceleration, the second Y-axis acceleration, and the second Z-axis acceleration are smaller than a preset value.
Preferably, when the comparison result meets a preset condition, setting the device to be verified as a security device includes: calculating data difference values of the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration, the second X-axis acceleration, the second Y-axis acceleration and the second Z-axis acceleration according to the difference values determined by a data difference formula: wherein the data difference formula is:
Figure BDA0002728544600000171
Axnrepresenting a first X-axis acceleration, BxnRepresents the second X-axis acceleration, AynRepresents the first Y-axis acceleration, BynRepresents the second Y-axis acceleration, AznRepresenting first Z-axis acceleration, BznRepresenting second Z-axis acceleration, dnRepresenting the difference;
and when the data difference value is smaller than the preset value, setting the equipment to be verified as safety equipment.
Preferably, the plurality of first X-axis accelerations, the first Y-axis accelerations, the first Z-axis accelerations and the second X-axis accelerations, the second Y-axis accelerations, and the second Z-axis accelerations are respectively read by a first accelerometer of the security device and a second accelerometer of the device to be verified after the security device and the device to be verified move in space for N seconds, where N is a positive integer; a plurality of said first X axis accelerations are
Figure BDA0002728544600000172
A plurality of said first Y-axis accelerations are
Figure BDA0002728544600000173
A plurality of said first Z axis accelerations are
Figure BDA0002728544600000174
A plurality of said second X axis accelerations are
Figure BDA0002728544600000175
A plurality of said second Y-axis accelerations are
Figure BDA0002728544600000176
A plurality of said second Z axis accelerations are
Figure BDA0002728544600000177
The calculating data difference values of the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration, the second X-axis acceleration, the second Y-axis acceleration, and the second Z-axis acceleration according to the difference values determined by the data difference formula includes: determining the data difference value according to the accumulated value of the difference value, wherein the accumulated value of the difference value is
Figure BDA0002728544600000178
Further, the preset value is 3.5; when the data difference value is smaller than the preset value, setting the device to be verified as a safety device, including: when said
Figure BDA0002728544600000179
And when theta is 3.5, setting the device to be verified as a safety device.
Specifically, whether the mobile phone A and the mobile phone B move in the space in a consistent manner or not is judged through the gyroscope to perform authorization authentication, and whether the reading of the mobile phone A and the reading of the mobile phone B are in the same movement track or not can be judged in any way. For completeness of explanation, a practical method is described herein:
Figure BDA00027285446000001710
and
Figure BDA00027285446000001711
the difference between the sampling points of (a) is:
Figure BDA0002728544600000181
ideally there are:
Figure BDA0002728544600000182
because there will be some slight differences in accuracy between the gyroscopes of the two handsets, plus possible delays of the network, a threshold θ is set, which is:
Figure BDA0002728544600000183
in practice, θ may be set to 3.5.
Preferably, the first X-axis acceleration has a data deviation from the second X-axis acceleration in the range of 0.5, the first Y-axis acceleration has a data deviation from the second Y-axis acceleration in the range of 0.5, and the first Z-axis acceleration has a data deviation from the second Z-axis acceleration in the range of 0.5; when calculated said
Figure BDA0002728544600000184
1.7263, setting the device to be verified as a safety device.
Specifically, the codes are actually written for the verification of the present invention according to the above description, wherein the accelerometer readings of the mobile phone a and the mobile phone B have a random deviation within 0.5, the following table data is obtained:
Figure BDA0002728544600000185
according to the error formula, the above error is 1.7263, and within the error range, it can be determined as belonging to the same motion track. In addition, the results of ten thousand tests using the simulator are shown in fig. 6.
For a specific limitation of a security authentication device using an accelerometer, reference may be made to the above limitation on a security authentication method using an accelerometer, which is not described herein again. The modules in the security authentication device using the accelerometer may be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
The computer-readable storage medium provided by the embodiments of the present invention stores an application program thereon, and when the application program is executed by a processor, the application program implements a security authentication method using an accelerometer according to any one of the embodiments. The computer-readable storage medium includes, but is not limited to, any type of disk including floppy disks, hard disks, optical disks, CD-ROMs, and magneto-optical disks, ROMs (Read-Only memories), RAMs (Random AcceSS memories), EPROMs (EraSable Programmable Read-Only memories), EEPROMs (Electrically EraSable Programmable Read-Only memories), flash memories, magnetic cards, or optical cards. That is, a storage device includes any medium that stores or transmits information in a form readable by a device (e.g., a computer, a cellular phone), and may be a read-only memory, a magnetic or optical disk, or the like.
The embodiment of the present invention further provides a computer application program, which runs on a computer, and the computer application program is configured to execute a security authentication method using an accelerometer according to any one of the above embodiments.
Fig. 8 is a schematic structural diagram of a computer device in the embodiment of the present invention.
An embodiment of the present invention further provides a computer device, as shown in fig. 8. The computer apparatus includes devices such as a processor 802, a memory 803, an input unit 804, and a display unit 805. Those skilled in the art will appreciate that the device configuration means shown in fig. 8 do not constitute a limitation of all devices and may include more or less components than those shown, or some components in combination. The memory 803 may be used to store the application program 801 and various functional modules, and the processor 802 executes the application program 801 stored in the memory 803, thereby performing various functional applications of the device and data processing. The memory may be internal or external memory, or include both internal and external memory. The memory may comprise read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), flash memory, or random access memory. The external memory may include a hard disk, a floppy disk, a ZIP disk, a usb-disk, a magnetic tape, etc. The disclosed memory includes, but is not limited to, these types of memory. The disclosed memory is by way of example only and not by way of limitation.
The input unit 804 is used for receiving input of signals and receiving keywords input by a user. The input unit 804 may include a touch panel and other input devices. The touch panel can collect touch operations of a user on or near the touch panel (for example, operations of the user on or near the touch panel by using any suitable object or accessory such as a finger, a stylus and the like) and drive the corresponding connecting device according to a preset program; other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., play control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like. The display unit 805 may be used to display information input by a user or information provided to the user and various menus of the terminal device. The display unit 805 may take the form of a liquid crystal display, an organic light emitting diode, or the like. The processor 802 is a control center of the terminal device, connects various parts of the entire device using various interfaces and lines, and performs various functions and processes data by operating or executing software programs and/or modules stored in the memory 803 and calling data stored in the memory.
As one embodiment, the computer device includes: one or more processors 802, memory 803, one or more applications 801, wherein the one or more applications 801 are stored in the memory 803 and configured to be executed by the one or more processors 802, the one or more applications 801 configured to perform a security authentication using an accelerometer in any of the above embodiments.
In addition, the security authentication method, system, apparatus, computer device and storage medium using an accelerometer according to the embodiments of the present invention are described in detail above, and specific examples are used herein to explain the principles and embodiments of the present invention, and the descriptions of the above embodiments are only used to help understand the method and the core ideas of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1.一种利用加速度计的安全认证方法,其特征在于,所述方法包括:1. a security authentication method utilizing accelerometer, is characterized in that, described method comprises: 接收已通过管理员信息认证的安全设备通过第一加速度计读取到的第一X轴线加速度、第一Y轴线加速度以及第一Z轴线加速度;receiving the first X-axis acceleration, the first Y-axis acceleration, and the first Z-axis acceleration read by the first accelerometer of the security device that has been authenticated by the administrator information; 接收待验证设备通过第二加速度计读取到的第二X轴线加速度、第二Y轴线加速度以及第二Z轴线加速度;receiving the second X-axis acceleration, the second Y-axis acceleration, and the second Z-axis acceleration read by the device to be verified through the second accelerometer; 将所述第一X轴线加速度与所述第二X轴角度变化率进行对比,将所述第一Y轴线加速度与所述第二Y轴线加速度进行对比,将所述第一Z轴线加速度与所述第二Z轴线加速度进行对比;Compare the first X-axis acceleration with the second X-axis angular rate of change, compare the first Y-axis acceleration with the second Y-axis acceleration, and compare the first Z-axis acceleration with the The second Z-axis acceleration is compared; 当对比结果满足预设条件时,将所述待验证设备设置为安全设备,以完成所述待验证设备的安全认证;When the comparison result satisfies the preset condition, the device to be verified is set as a safety device, so as to complete the safety authentication of the device to be verified; 其中,所述第一X轴线加速度、所述第一Y轴线加速度、所述第一Z轴线加速度以及所述第二X轴线加速度、所述第二Y轴线加速度、所述第二Z轴线加速度为所述安全设备与所述待验证设备绑定并在空间运动预设时长后分别由所述安全设备的第一加速度计读取到以及由所述待验证设备的第二加速度计读取到。Wherein, the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration, the second X-axis acceleration, the second Y-axis acceleration, and the second Z-axis acceleration are The security device is bound to the device to be verified, and is respectively read by the first accelerometer of the security device and by the second accelerometer of the device to be verified after spatial motion for a preset duration. 2.根据权利要求1所述的方法,其特征在于,所述预设条件包括所述第一X轴线加速度、所述第一Y轴线加速度、所述第一Z轴线加速度与所述第二X轴线加速度、所述第二Y轴线加速度、所述第二Z轴线加速度的数据差异值小于预设值。2. The method according to claim 1, wherein the preset condition comprises the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration and the second X-axis acceleration The data difference values of the axis acceleration, the second Y axis acceleration, and the second Z axis acceleration are less than a preset value. 3.根据权利要求2所述的方法,其特征在于,所述当对比结果满足预设条件时,将所述待验证设备设置为安全设备,包括:3. The method according to claim 2, wherein when the comparison result satisfies a preset condition, setting the device to be verified as a safety device, comprising: 根据数据差异公式确定的差值计算所述第一X轴线加速度、所述第一Y轴线加速度、所述第一Z轴线加速度与所述第二X轴线加速度、所述第二Y轴线加速度、所述第二Z轴线加速度的数据差异值:Calculate the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration and the second X-axis acceleration, the second Y-axis acceleration, the The data difference value of the second Z axis acceleration: 其中,所述数据差异公式为:Wherein, the data difference formula is:
Figure FDA0002728544590000011
Figure FDA0002728544590000011
Axn表示第一X轴线加速度、Bxn表示第二X轴线加速度、Ayn表示第一Y轴线加速度、Byn表示第二Y轴线加速度、Azn表示第一Z轴线加速度、Bzn表示第二Z轴线加速度,dn表示所述差值;A xn represents the first X-axis acceleration, B xn represents the second X-axis acceleration, A yn represents the first Y-axis acceleration, B yn represents the second Y-axis acceleration, A zn represents the first Z-axis acceleration, B zn represents the second Z-axis acceleration, d n represents the difference; 当所述数据差异值小于所述预设值时,将所述待验证设备设置为安全设备。When the data difference value is smaller than the preset value, the device to be verified is set as a security device.
4.根据权利要求3所述的方法,其特征在于,多个所述第一X轴线加速度、所述第一Y轴线加速度、所述第一Z轴线加速度与所述第二X轴线加速度、所述第二Y轴线加速度、所述第二Z轴线加速度根据所述安全设备与所述待验证设备在空间运动N秒后分别由所述安全设备的第一加速度计读取到以及由所述待验证设备的第二加速度计读取到,所述N为正整数;4 . The method of claim 3 , wherein a plurality of the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration and the second X-axis acceleration, the The second Y-axis acceleration and the second Z-axis acceleration are respectively read by the first accelerometer of the safety device after the safety device and the device to be verified move for N seconds in space and are read by the device to be verified. The second accelerometer of the verification device reads that the N is a positive integer; 多个所述第一X轴线加速度为
Figure FDA0002728544590000021
多个所述第一Y轴线加速度为
Figure FDA0002728544590000022
多个所述第一Z轴线加速度为
Figure FDA0002728544590000023
多个所述第二X轴线加速度为
Figure FDA0002728544590000024
多个所述第二Y轴线加速度为
Figure FDA0002728544590000025
多个所述第二Z轴线加速度为
Figure FDA0002728544590000026
A plurality of the first X-axis accelerations are
Figure FDA0002728544590000021
A plurality of the first Y-axis accelerations are
Figure FDA0002728544590000022
A plurality of the first Z-axis accelerations are
Figure FDA0002728544590000023
A plurality of the second X-axis accelerations are
Figure FDA0002728544590000024
A plurality of the second Y-axis accelerations are
Figure FDA0002728544590000025
A plurality of the second Z-axis accelerations are
Figure FDA0002728544590000026
所述根据数据差异公式确定的差值计算所述第一X轴线加速度、所述第一Y轴线加速度、所述第一Z轴线加速度与所述第二X轴线加速度、所述第二Y轴线加速度、所述第二Z轴线加速度的数据差异值,包括:The first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration, the second X-axis acceleration, and the second Y-axis acceleration are calculated according to the difference determined according to the data difference formula , the data difference value of the second Z-axis acceleration, including: 根据所述差值的累加值确定所述数据差异值,所述差值的累加值为
Figure FDA0002728544590000027
The data difference value is determined according to the accumulated value of the difference values, and the accumulated value of the difference value is
Figure FDA0002728544590000027
5.根据权利要求4所述的方法,其特征在于,所述预设值为3.5;所述当所述数据差异值小于所述预设值时,将所述待验证设备设置为安全设备,包括:5. The method according to claim 4, wherein the preset value is 3.5; when the data difference value is less than the preset value, the device to be verified is set as a safety device, include: 当所述
Figure FDA0002728544590000028
θ为3.5时,将所述待验证设备设置为安全设备。
when said
Figure FDA0002728544590000028
When θ is 3.5, the device to be verified is set as a safety device.
6.根据权利要求5所述的方法,其特征在于,所述第一X轴线加速度与所述第二X轴线加速度有0.5范围内的数据偏差,所述第一Y轴线加速度与所述第二Y轴线加速度有0.5范围内的数据偏差,所述第一Z轴线加速度与所述第二Z轴线加速度有0.5范围内的数据偏差;6 . The method according to claim 5 , wherein the first X-axis acceleration and the second X-axis acceleration have a data deviation within a range of 0.5, and the first Y-axis acceleration is different from the second X-axis acceleration. 7 . The Y-axis acceleration has a data deviation within a range of 0.5, and the first Z-axis acceleration and the second Z-axis acceleration have a data deviation within a range of 0.5; 当计算得到的所述
Figure FDA0002728544590000031
为1.7263时,将所述待验证设备设置为安全设备。
when the calculated
Figure FDA0002728544590000031
When it is 1.7263, the device to be verified is set as a security device.
7.一种利用加速度计的安全认证系统,其特征在于,所述安全认证系统包括已通过管理员信息认证的安全设备、认证服务器以及待验证设备;7. A safety authentication system utilizing an accelerometer, wherein the safety authentication system comprises a safety device, an authentication server and a device to be verified that have passed the authentication of administrator information; 所述安全设备与所述待验证设备绑定并在空间运动预设时长后所述安全设备的第一加速度计读取到第一X轴线加速度、第一Y轴线加速度以及第一Z轴线加速度,所述待验证设备的第二加速度计读取到第二X轴线加速度、第二Y轴线加速度以及第二Z轴线加速度;The security device is bound to the device to be verified, and the first accelerometer of the security device reads the first X-axis acceleration, the first Y-axis acceleration, and the first Z-axis acceleration after the spatial motion for a preset period of time, The second accelerometer of the device to be verified reads the second X-axis acceleration, the second Y-axis acceleration and the second Z-axis acceleration; 所述安全设备向所述认证服务器发送所述第一X轴加速度计、所述第一Y轴加速度计以及所述第一Z轴加速度计;sending, by the security device, the first X-axis accelerometer, the first Y-axis accelerometer, and the first Z-axis accelerometer to the authentication server; 所述待验证设备向所述认证服务器发送所述第二X轴加速度计、所述第二Y轴加速度计以及所述第二Z轴加速度计;The device to be verified sends the second X-axis accelerometer, the second Y-axis accelerometer, and the second Z-axis accelerometer to the authentication server; 所述认证服务器将所述第一X轴加速度计与所述第二X轴加速度计进行对比、将所述第一Y轴加速度计与所述第二Y轴加速度计进行对比、将所述第一Z轴加速度计与所述第二Z轴加速度计进行对比,当对比结果满足预设条件时,将所述待验证设备设置为安全设备,以完成所述待验证设备的安全认证。The authentication server compares the first X-axis accelerometer with the second X-axis accelerometer, compares the first Y-axis accelerometer with the second Y-axis accelerometer, and compares the first Y-axis accelerometer with the second Y-axis accelerometer. A Z-axis accelerometer is compared with the second Z-axis accelerometer, and when the comparison result satisfies a preset condition, the device to be verified is set as a safety device to complete the safety authentication of the device to be verified. 8.一种利用加速度计的安全认证装置,其特征在于,所述装置包括:8. A safety authentication device utilizing an accelerometer, wherein the device comprises: 第一接收模块,用于接收已通过管理员信息认证的安全设备通过第一加速度计读取到的第一X轴线加速度、第一Y轴线加速度以及第一Z轴线加速度;a first receiving module, configured to receive the first X-axis acceleration, the first Y-axis acceleration and the first Z-axis acceleration read through the first accelerometer by the security device that has passed the administrator information authentication; 第二接收模块,用于接收待验证设备通过第二加速度计读取到的第二X轴线加速度、第二Y轴线加速度以及第二Z轴线加速度;a second receiving module, configured to receive the second X-axis acceleration, the second Y-axis acceleration, and the second Z-axis acceleration read by the device to be verified through the second accelerometer; 对比模块,用于将所述第一X轴线加速度与所述第二X轴线加速度进行对比,将所述第一Y轴线加速度与所述第二Y轴线加速度进行对比,将所述第一Z轴线加速度与所述第二Z轴线加速度进行对比;A comparison module, configured to compare the first X-axis acceleration with the second X-axis acceleration, compare the first Y-axis acceleration with the second Y-axis acceleration, and compare the first Z-axis acceleration the acceleration is compared with the second Z-axis acceleration; 认证模块,用于当对比结果满足预设条件时,将所述待验证设备设置为安全设备,以完成所述待验证设备的安全认证;an authentication module, configured to set the device to be verified as a safety device when the comparison result satisfies a preset condition, so as to complete the safety authentication of the device to be verified; 其中,所述第一X轴线加速度、所述第一Y轴线加速度、所述第一Z轴线加速度以及所述第二X轴线加速度、所述第二Y轴线加速度、所述第二Z轴线加速度为所述安全设备与所述待验证设备绑定并在空间运动预设时长后分别由所述安全设备的第一加速度计读取到以及由所述待验证设备的第二加速度计读取到。Wherein, the first X-axis acceleration, the first Y-axis acceleration, the first Z-axis acceleration, the second X-axis acceleration, the second Y-axis acceleration, and the second Z-axis acceleration are The security device is bound to the device to be verified, and is respectively read by the first accelerometer of the security device and by the second accelerometer of the device to be verified after spatial motion for a preset duration. 9.一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的应用程序,其特征在于,所述处理器执行所述应用程序时实现权利要求1至7中任一项所述方法的步骤。9. A computer device comprising a memory, a processor and an application program stored on the memory and running on the processor, wherein the processor implements any of claims 1 to 7 when executing the application program. A step of the method. 10.一种计算机可读存储介质,其上存储有应用程序,其特征在于,所述应用程序被处理器执行时实现权利要求1至7中任一项所述方法的步骤。10. A computer-readable storage medium on which an application program is stored, characterized in that, when the application program is executed by a processor, the steps of the method according to any one of claims 1 to 7 are implemented.
CN202011110880.XA 2020-10-16 2020-10-16 Security authentication method, system, apparatus and computer equipment Pending CN112231683A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011110880.XA CN112231683A (en) 2020-10-16 2020-10-16 Security authentication method, system, apparatus and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011110880.XA CN112231683A (en) 2020-10-16 2020-10-16 Security authentication method, system, apparatus and computer equipment

Publications (1)

Publication Number Publication Date
CN112231683A true CN112231683A (en) 2021-01-15

Family

ID=74117721

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011110880.XA Pending CN112231683A (en) 2020-10-16 2020-10-16 Security authentication method, system, apparatus and computer equipment

Country Status (1)

Country Link
CN (1) CN112231683A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790264A (en) * 2017-02-07 2017-05-31 努比亚技术有限公司 Authentication system and method, the server for authentication and checking equipment
US9949124B1 (en) * 2017-04-24 2018-04-17 Zihan Chen Method and device for authenticating wireless pairing and/or data transfer between two or more electronic devices
CN108196762A (en) * 2017-11-30 2018-06-22 努比亚技术有限公司 A kind of terminal control method, terminal and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790264A (en) * 2017-02-07 2017-05-31 努比亚技术有限公司 Authentication system and method, the server for authentication and checking equipment
US9949124B1 (en) * 2017-04-24 2018-04-17 Zihan Chen Method and device for authenticating wireless pairing and/or data transfer between two or more electronic devices
CN108196762A (en) * 2017-11-30 2018-06-22 努比亚技术有限公司 A kind of terminal control method, terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
EP2864922B1 (en) Authenticating a user of a system via an authentication image mechanism
JP2018507461A (en) Mobile devices that provide continuous and discrete user authentication
US20160226865A1 (en) Motion based authentication systems and methods
EP2836957B1 (en) Location-based access control for portable electronic device
EP2503479B1 (en) Login method based on direction of gaze
WO2015187505A1 (en) Geo-location and biometric presence security
KR20140136350A (en) Method and apparatus for using a electronic device
KR20150046766A (en) Unlocking process mehtod, apparatus and device for terminal
CN106228054A (en) Auth method and device
CN105477854A (en) Handle control method, device and system applied in intelligent terminal
US20200366670A1 (en) A system and method for authenticating a user
US10313508B2 (en) Non-intrusive user authentication system
US11119638B2 (en) Using face detection to update user interface orientation
Chen et al. A case study of security and privacy threats from augmented reality (ar)
US20180357407A1 (en) Authentication system with motion parameters
CN108351957A (en) Method and system for performing at least one action based on a user's gesture and identity
WO2015151196A1 (en) Authentication system, authentication method, and authentication program
US9557820B2 (en) Methods and systems for commencing a process based on motion detection
CN103092519A (en) Unlocking method and unlocking device of touch screen mobile phone
CN109614787A (en) Solve lock control method, device, mobile terminal and storage medium
CN112231683A (en) Security authentication method, system, apparatus and computer equipment
CN105207783A (en) Authentication method and device for user's confidence level
Feng et al. Security after login: Identity change detection on smartphones using sensor fusion
CN108549804A (en) Mode switching method and device, computer readable storage medium, terminal
CN112231682A (en) Security authentication method, system, device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210115

RJ01 Rejection of invention patent application after publication