[go: up one dir, main page]

CN112446014A - User authentication method and mobile device - Google Patents

User authentication method and mobile device Download PDF

Info

Publication number
CN112446014A
CN112446014A CN201910815712.1A CN201910815712A CN112446014A CN 112446014 A CN112446014 A CN 112446014A CN 201910815712 A CN201910815712 A CN 201910815712A CN 112446014 A CN112446014 A CN 112446014A
Authority
CN
China
Prior art keywords
squeezing
mobile device
strength
processor
response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910815712.1A
Other languages
Chinese (zh)
Inventor
黄政霖
王金裕
吴尚璟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HTC Corp
Original Assignee
HTC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HTC Corp filed Critical HTC Corp
Priority to CN201910815712.1A priority Critical patent/CN112446014A/en
Publication of CN112446014A publication Critical patent/CN112446014A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a user authentication method and a mobile device, which are suitable for the mobile device with an edge detector. The method includes detecting, via the edge detector, a pinching action performed on the mobile device in response to determining that a particular event occurred, and performing an authentication procedure in accordance with the pinching action to obtain a user authentication result; responding to the user verification result as success, and executing a first operation; and executing a second operation in response to the user verification result being failure. Further, the validation procedure includes reading validation data corresponding to the particular event from a database; and comparing the verification data with the mode of the squeezing action to judge whether the user verification result is successful or failed.

Description

User authentication method and mobile device
Technical Field
The present invention relates to an authentication method, and more particularly, to a user authentication method suitable for a mobile device having an edge detector and the mobile device applying the same.
Background
The security protection of the mobile device is increasingly emphasized in the market, for example, the development and application of system hacking prevention, data leakage prevention, user security authentication and the like, but in reality, the terminal user mainly uses fingerprint identification and a combination of a coded lock or a pattern lock as two mechanisms for user security identification, although the fingerprint identification has the advantages of high accuracy and low risk, hackers can still unlock the mobile phone by knowing or stealing the preset password of the user to steal or randomly use all application programs on the mobile device, and thus the traditional security mechanism still has bugs.
At present, the application programs and the mobile devices in the market are mainly unlocked by fingerprint identification and combination of passwords, but the password lock has the defects of easy cracking, such as easy acquisition by hackers or acquaintances, and the passwords need to be updated regularly for the sake of safety. Even if the latest iris recognition technology is still cracked by hackers, the technology smells something, so that the prior art can not completely overcome the security loophole.
Disclosure of Invention
The invention provides a plurality of verification methods and a plurality of mobile devices, when a specific event occurs, a verification program can be executed by detecting the squeezing action executed on the mobile device, and whether to lock the mobile device is determined according to the result of the verification program.
An embodiment of the present invention provides a user authentication method for a mobile device having an edge detector. The method includes detecting, via the edge detector, a pinching action performed on the mobile device in response to determining that a particular event occurred, and performing an authentication procedure in accordance with the pinching action to obtain a user authentication result; responding to the user verification result as success, and executing a first operation; and in response to the user authentication result being a failure, performing a second operation, wherein the second operation comprises locking the mobile device. Further, the validation procedure includes reading validation data corresponding to the particular event from a database; and comparing the verification data with the mode of the squeezing action to judge whether the user verification result is successful or failed.
An embodiment of the present invention provides a user authentication method for a mobile device having a plurality of edge detectors. The method comprises the steps of responding to the fact that a specific event occurs, detecting the squeezing action applied to the mobile device through the edge detectors to obtain a plurality of squeezing intensity curves respectively corresponding to the edge detectors, wherein each squeezing intensity curve records a plurality of squeezing intensity values of the squeezing action sequentially detected by the edge detector to which the squeezing intensity curve belongs at different time points; obtaining a plurality of extrusion pressure codes respectively corresponding to the plurality of edge detectors according to the predetermined period corresponding to the specific event and the plurality of extrusion pressure curves; executing a verification program according to the extrusion pressure codes to obtain a user verification result; responding to the user verification result as success, and executing a first operation; and in response to the user authentication result being a failure, performing a second operation, wherein the second operation comprises locking the mobile device. Further, the authentication procedure includes reading a password corresponding to the specific event from a database; and determining whether the user authentication result is successful or failed by comparing the password with the plurality of squeezing strength codes.
An embodiment of the invention provides a mobile device, which includes a body, a processor, an edge detector and a storage device. Edge detectors are disposed on both sides of the body. A processor is disposed within the body and couples the edge detector and the memory device. In response to determining that a particular event occurs, the processor is to instruct the edge detector to detect a pinching action applied to the body, and the processor is to perform an authentication procedure in accordance with the pinching action to obtain a user authentication result. In response to the user authentication result being successful, the processor is configured to perform a first operation. In response to the user authentication result being a failure, the processor is configured to perform a second operation, wherein the second operation comprises locking the mobile device. The verification program includes the processor reading verification data corresponding to the particular event from a database of the storage device; and the processor judges the user authentication result to be successful or failed by comparing the authentication data with the mode of the squeezing action.
An embodiment of the invention provides a mobile device, which includes a body, a processor, a plurality of edge detectors, and a storage device. The plurality of edge detectors are disposed on both sides of the body on average. A processor is disposed within the body and couples the plurality of edge detectors and the memory device. In response to determining that a specific event occurs, the processor is configured to instruct the edge detectors to detect the squeezing action applied to the mobile device to obtain a plurality of squeezing intensity curves respectively corresponding to the edge detectors, wherein each squeezing intensity curve records a plurality of squeezing intensity values of the squeezing action sequentially detected by the edge detector to which the edge detector belongs at different time points. Then, the processor is configured to obtain a plurality of squeezing strength codes respectively corresponding to the plurality of edge detectors according to the predetermined period corresponding to the specific event and the plurality of squeezing strength curves, wherein the processor is configured to perform a verification procedure according to the plurality of squeezing strength codes to obtain a user verification result, wherein in response to the user verification result being successful, the processor is configured to perform a first operation, wherein in response to the user verification result being failed, the processor is configured to perform a second operation, wherein the second operation includes locking the mobile device. The authentication procedure includes the processor reading a password identifying the particular event from a database of the storage device; and the processor determines that the user authentication result is successful or failed by comparing the password with the plurality of squeezing strength codes.
Based on the above, an embodiment of the present invention provides a user authentication method and a mobile device, which can detect a squeezing action performed on the mobile device via the edge detector in response to a specific event, and compare a squeezing intensity value or a squeezing feature quantity of the squeezing action with authentication data to determine whether a user authentication result is successful or failed. In addition, a plurality of squeezing strength codes respectively corresponding to a plurality of edge detectors can be obtained from the detected squeezing actions, so as to judge whether the user verification result is successful or failed by comparing the password corresponding to the event with the plurality of squeezing strength codes. And finally, determining whether to execute the first operation or the second operation corresponding to the specific event according to the user authentication result.
In order to make the aforementioned and other features and advantages of the invention more comprehensible, embodiments accompanied with figures are described in detail below.
Drawings
Fig. 1 is a schematic diagram of a mobile device according to a first embodiment of the invention.
Fig. 2 is a block diagram of a mobile device according to a first embodiment of the invention.
FIG. 3 is a schematic diagram of a squeezing operation according to a first embodiment of the present invention.
Fig. 4 is a flowchart of a user authentication method according to a first embodiment of the invention.
Fig. 5 is a schematic diagram of a plurality of verification data corresponding to different specific events according to the first embodiment of the invention.
Fig. 6A is a plurality of graphs of the pressing strength respectively corresponding to a plurality of edge detectors according to the first embodiment of the invention.
FIG. 6B is a graph illustrating the pressing strength according to the pressing action detected by an edge detector according to the first embodiment of the present invention.
Fig. 7 is a flowchart of a user authentication method according to a second embodiment of the invention.
Fig. 8A is a diagram illustrating a conversion of a compression strength value into a compression strength code according to a second embodiment of the invention.
Fig. 8B is a diagram illustrating a plurality of converted extrusion strength codes respectively corresponding to a plurality of edge detectors according to a second embodiment of the invention.
Fig. 9 is a diagram illustrating a plurality of passwords corresponding to different specific events according to a second embodiment of the invention.
[ notation ] to show
1: mobile device
10: body
S1, S2, S3, S4: side edge of the body
110: processor with a memory having a plurality of memory cells
120: storage device
121: database with a plurality of databases
130: edge detector
130(1) - (130) (6): edge detector/detector
140: display device
F1, F2: force of
S41, S43, S45, S47, S49: flow steps of a user authentication method
S71, S72, S73, S74, S75, S76: flow steps of a user authentication method
T0, T1, T2, T3: time of day
700: verification data
MSSL _ A to MSSH _ A, MSSL _ B to MSSH _ B, MSSL _ Z to MSSH _ Z, MSCL _ A to MSCH _ A, MSCL _ B to MSCH _ B, MSCL _ Z to MSCH _ Z: range of
A81: arrow head
900: cipher code
PW _ A1-PW _ A6, PW _ B1-PW _ B6, PW _ Z1-PW _ Z6: code word
Detailed Description
The user authentication method provided by the invention is to use an Edge detector (Edge Sensor) configured on a mobile device to perform security authentication on a user. The habit and the strength of a user holding the mobile device when one or more specific events occur are recorded by the squeezing action detected by the edge detector, so as to obtain one or more security data respectively corresponding to the one or more specific events for verification. In this way, when a specific event occurs, the detected squeezing action can be verified by the security data corresponding to the specific event, so as to verify whether the user currently holding the mobile device is the specific user.
[ first embodiment ]
Fig. 1 is a schematic diagram of a mobile device according to a first embodiment of the invention. Fig. 2 is a block diagram of a mobile device according to a first embodiment of the invention. Referring to fig. 1 and fig. 2, in the present embodiment, the mobile device 1 includes a body 10, a display 140, an edge detector 130, a processor 110 and a storage device 120. The processor 110 and the storage device 120 are disposed inside the body 10. The display 140 is disposed on the body 10 to display information contents to a user. The edge detectors 130 may be disposed at left and right sides of the body 10, for example, the left side S1 and/or the right side S2. In other embodiments, the upper and/or lower sides S3, S4 of the body 10 may also be provided with edge detectors. The edge detector 130 may have a plurality of detectors distributed on both sides S1, S2 where the edge detector 130 is disposed, for example, may be distributed in an even manner. As shown in fig. 1, for the edge detector 130 having 6 first to sixth detectors 130(1) to 130(6), 3 detectors on each side, for example, 3 detectors 130(1) to 130(3), are disposed on the left side S1; the 3 detectors 130(4) to 130(6) are provided on the right side S2.
In the present embodiment, the mobile device 1 is an electronic device such as a smartphone, a tablet computer, and a smart wearable device. The invention is not limited to the type of application of the mobile device 1. That is, any electronic device that can be configured with an edge detector can be considered as the mobile device of the present embodiment.
The processor 110 is coupled to the edge detector 130, the storage device 120 and the display 140. The processing unit 110 is a hardware (e.g., a chipset, a processor, etc.) with computing capability, and is used for managing the overall operation of the mobile device 1. In the embodiment, the Processing Unit 110 is, for example, a Central Processing Unit (CPU) of a core or a multi-core, a microprocessor (Micro-Processor), or other Programmable Processing Unit (Programmable Processor), a Digital Signal Processor (DSP), a Programmable controller, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), or the like.
The storage 120 may be any type of Hard Disk Drive (HDD) or nonvolatile memory storage (nonvolatile memory module/circuit unit). The storage device 120 may store data as directed by the processor 110. The storage device 120 may store data in advance before shipment. The data includes data (software or firmware) for managing the mobile device 1, data for accessing other electronic devices/mobile devices, application programs, data inputted by a user, or other types of data, but the invention is not limited thereto. In addition, the storage device 120 stores a database 121, which can store/record relevant information, authentication data or password of a specific user via the direction of the processor 110.
Edge detector (Edge Sensor)130 (e.g., one of detectors 130(1) - (130 (6)) is, for example, a pressure detector, a resistance detector, a photo detector, or an acoustic detector. The edge detector is used to detect a holding action, such as a squeezing action, performed by the user on the mobile device 1 (as further described in fig. 3). In addition, the edge detector may also be used to detect other actions, such as a touch action, a slide action, a click action, and the like. In the present embodiment, the edge detector belongs to the pressure detector, and is an equalizing bridge structure composed of piezoresistors, and is installed on two sides (e.g., two sides S1, S2) of the outer frame of the mobile device 1, which are easily pressed by the palm of the user. When a user presses the outer frame of the mobile device 1 to deform the mechanism (for example, when the user performs a squeezing operation on the mobile device 1), the edge detectors 130 installed on one or both sides of the mobile device are deformed under the influence of the deformation of the outer frame, so that the resistance of the piezoresistors changes to cause the bridge to be unbalanced, and the detection signals (detection data) output by the bridge circuit change. Because the deformation of the edge detector 130 is related to the detection data outputted by the bridge circuit, through the relationship, the processor 110 can process the detection data to obtain the squeezing modes of the squeezing action at different time points, which may include single or combined squeezing intensity values, squeezing areas, squeezing positions, and squeezing numbers, to form a mode, thereby providing further functional applications.
Fig. 3 is a schematic diagram of a squeezing operation according to a first embodiment of the present invention, taking squeezing strength as an example. Referring to fig. 3, the user presses both sides S1, S2 of the mobile device 1 with finger or hand applying forces F1, F2 to grasp/hold the mobile device 1. For example, in the orthogonal coordinate system (in fig. 3, the x-axis direction extending from the left side S1 to the right side S2, the y-axis direction extending from the lower side S4 to the upper side S3, and the z-axis direction extending from the rear of the mobile device to the front) provided in the mobile device 1, the direction of the force F1 is the positive x-direction, and the direction of the force F2 is the negative x-direction. At this time, in response to the deformation caused by the forces F1, F2, the edge detector 130 may detect the "squeezing action" and the Strength (Strength) of the forces F1, F2.
In the present embodiment, when the signal level (voltage level/voltage value) of the detection signal output from the edge detector 130 exceeds the squeezing threshold, the processor 110 determines that the mobile device 1 is applied with a squeezing motion and a squeezing event occurs. In contrast, in another embodiment, when the signal level (voltage level/voltage value) of the detection signal output from the edge detector 130 does not exceed the squeezing threshold, the processor 110 determines that the mobile device 1 is not applied with the squeezing action, and the squeezing event does not occur. The signal level (voltage level/voltage value) of the detection signal may represent the intensity of the pressing action/touch action (e.g., a pressing intensity value or a touch intensity value). In addition, the pressing strength values obtained by detecting the pressing action over time can form a pressing strength curve.
Referring back to fig. 2, a display 140 is coupled to the processor 110 and is used for displaying the desktop, the played content or other visual information of the operating system of the mobile device 1. In the embodiment, the Display 140 may be a Liquid Crystal Display (LCD), a Light-Emitting Diode (LED) Display, or a Field Emission Display (FED). The display 140 may also be a touch screen composed of a display panel of other types of displays and a touch panel such as a resistive (resistive), capacitive (capacitive) or optical (optical) touch panel, and can provide both display and touch operation functions, or other displays capable of providing display functions, but the invention is not limited thereto.
Fig. 4 is a flowchart of a user authentication method according to a first embodiment of the invention. Referring to fig. 4, in step S41, in response to determining that a specific event occurs, a squeezing action performed on the mobile device 1 is detected via the edge detector 130. Specifically, in the present embodiment, the specific event may include, but is not limited to, one or a combination of the following events (1) to (6).
Event (1): the mobile device 1 receives an Incoming Call (Incoming Call). For example, when the mobile device 1 receives a call made by another mobile device, the processor 110 determines that a specific event occurs.
Event (2): the mobile device 1 receives a camera shutter operation. For example, the mobile device 1 detects that a button corresponding to a camera shutter is triggered/pressed, and the processor 110 determines that the mobile device 1 is receiving a camera shutter operation.
Event (3): the mobile device 1 receives a notification. For example, an application installed on the mobile device 1 sends a notification to the user in response to the received message; or a function of the mobile device 1 itself or an installed application program issues a notification under a specific condition to remind the user, such as an alarm clock or the like. The notification may include one of a sound notification, an image notification, a text notification, or a combination thereof.
Event (4): a predetermined program of the mobile device 1 is executed. For example, a user may trigger a function of an application installed on the mobile device (e.g., a function corresponding to a "phone" application; a function corresponding to a "camera" application) via a click/press/touch or squeeze operation; or the functions of the mobile device itself (e.g., turning on/off the display, powering off, restarting, screen shots, camera shutters, volume control, settings of the mobile device operating system, etc.) are triggered via the above-described modes of operation.
Event (5): the mobile device 1 is performed an unlocking operation. For example, the mobile device 1 is triggered to perform an unlocking operation.
Event (6): the mobile device 1 transitions from a stationary state (e.g., being stationary for a period of time) to a held state. For example, the processor 110 may detect whether the gesture of the mobile device 1 is changed from the stationary state to the held state by a detector such as an accelerometer of the mobile device 1. When the processor 110 determines that the mobile device 1 is turned from the stationary state to the gripped state (or taken up from the stationary state), the processor 110 determines that a specific event occurs. The present invention is not limited to the manner in which the processor 110 determines that the mobile device 1 is changed from the stationary state to the held state, and different determination or detection may be performed for different manners.
In response to the occurrence of the specific event, the processor 110 instructs the edge detector 130 to start detecting the squeezing action applied/executed on the mobile device 1, so as to execute an authentication procedure according to the detected squeezing action to obtain a user authentication result, thereby checking whether the user currently holding the mobile device 1 is the specific user.
Next, in step S43, the processor 110 reads the verification data corresponding to the specific event from the database 121.
In particular, database 121 may store verification data corresponding to a plurality of different specific events.
Fig. 5 is a schematic diagram of a plurality of verification data corresponding to different specific events according to the first embodiment of the invention. Referring to fig. 5, in the present embodiment, the verification data 500 may include a plurality of predetermined maximum extrusion strength value ranges and a plurality of predetermined extrusion characteristic value ranges respectively corresponding to a plurality of specific events (e.g., events A, B-Z). For example, the verification data 500 may record the predetermined maximum squeezing strength value ranges MSSL _ a to MSSH _ a and the predetermined squeezing feature value ranges MSCL _ a to MSCH _ a corresponding to the event a, where MSSH _ A, MSSL _ a is a squeezing strength value greater than zero and respectively represents upper and lower boundaries of the predetermined maximum squeezing strength value range corresponding to the event a, and MSCH _ A, MSCL _ a is a squeezing feature value greater than zero and respectively represents upper and lower boundaries of the predetermined squeezing feature value range corresponding to the event a.
In more detail, the processor 110 may obtain a plurality of maximum squeezing strength values of a plurality of squeezing actions respectively corresponding to a specific event by receiving a squeezing action corresponding to the specific event performed by a specific user. Next, the processor 110 calculates a predetermined maximum squeezing strength value range according to a predetermined percentage and the maximum squeezing strength values. In one embodiment, the predetermined percentage may be determined by a statistical method. For example, assuming that the predetermined percentage is 10% and the maximum crush strength value is 100 units, the calculated predetermined maximum crush strength range is 90 (i.e., 100+100 × 10%) to 110 (i.e., 100+100 × 10%) units. In another embodiment, the processor 110 may continuously collect the maximum squeezing strength values of the squeezing actions of the specific user at the occurrence of the specific event for a period of time (e.g. one week) in daily life, and estimate the preset maximum squeezing strength range according to a plurality of maximum squeezing strength values collected at different times, so that the estimated preset maximum squeezing strength range may include all the maximum squeezing strength values corresponding to the same specific event as possible.
Next, in step S45, the processor 110 determines whether the user authentication result is successful or failed by comparing the authentication data with the pattern of the squeezing action. Specifically, the processor 110 may obtain the intensity of the squeezing action (i.e., the squeezing strength value) according to the squeezing action detected by the edge detector 130, and verify whether the user holding the mobile device 1 is the specific user when the current specific event occurs by comparing the obtained squeezing strength value with the verification data. That is, the processor 110 executes the authentication program according to the squeeze action to determine whether the user authentication result of the corresponding authentication program is successful or failed.
In more detail, in response to a pinching motion being detected, the edge detector may continuously output a pinching intensity value to the processor 110 over time. Within a first predetermined time after the squeezing action is detected, the processor 110 records a plurality of squeezing strength values of the squeezing action over time to obtain a squeezing strength curve corresponding to the squeezing action, wherein the squeezing strength curve represents the plurality of squeezing strength values of the squeezing action detected sequentially at different times within the first predetermined time.
Then, the processor 110 may identify a maximum crush strength value among the crush strength values according to the crush strength curve. For example, in the present embodiment, the processor 110 may identify the earliest ascending region in the squeezing strength curve (the ascending region reflects the initial output of the squeezing action). All crush strength values in the ascending region of the crush strength curve are greater than an initial threshold (e.g., 0 or the crush threshold described above). Then, the processor 110 may identify the largest of all the crush strength values of the ascending region as the maximum crush strength value. In short, after determining the ascending region of the crush strength curve, the processor 110 can start to search for the maximum crush strength value.
After identifying the maximum squeezing strength value, the processor 110 may compare the identified maximum squeezing strength value with a preset maximum squeezing strength range in the verification data to determine whether the maximum squeezing strength value is within the preset squeezing strength range. In response to determining that the maximum crush strength value is within the preset maximum crush strength range, the processor 110 determines that the user authentication result is successful. Next, in step S47, the processor 110 performs a first operation. In other words, when the user authentication result is determined to be successful, the processor 110 may determine that the user currently holding the mobile device 1 is consistent with a specific user, and correspondingly allow the first operation corresponding to the specific event to be performed.
In this embodiment, the first operation basically corresponds to a specific event. For example, the operation of performing the first operation includes, but is not limited to, one or a combination of the following: (1) unlocking the mobile device; (2) taking a photo or a movie, namely executing the function which is required to be executed after the shutter of the camera is triggered; (3) turning on a display/display screen of the mobile device; (4) responding to the incoming call corresponding to the specific event; (5) displaying a notification corresponding to the specific event; (6) executing a predetermined program corresponding to the specific event; and (7) performing a function of the mobile device corresponding to the specific event.
Otherwise, in response to determining that the maximum squeezing strength value is not within the preset squeezing strength range, the processor 110 determines that the user verification result is a failure. Then, the processor 110 performs a second operation.
In this embodiment, when the user authentication result is determined to be a failure, the process proceeds to step S49, and the processor 110 performs a second operation. In one embodiment, the second operation includes locking the mobile device 1. That is, when the user authentication result is determined to be a failure, the processor 110 determines that the current holding of the mobile device 1 is not a specific user, and takes security measures accordingly. The security measures may include, for example, locking the mobile device, powering off the mobile device 1, prohibiting the mobile device from performing any operations for a period of time, continuously turning off the screen of the mobile device, and not allowing the mobile device to perform any operations or other suitable security measures corresponding to an unauthorized user, but the invention is not limited thereto. It should be noted that, in another embodiment, the second operation further includes displaying a password input interface. The user can input a password for unlocking the mobile device through the password input interface.
In yet another embodiment, the second operation may include sending an alert notification to a registered user of the mobile device. The registered user may be a particular user of the mobile device or other registered user that may receive alert notifications. The alert notification is, for example, a notification transmitted by short message, telephone, instant messaging or email in the background, which indicates that the mobile device 1 is suspected to be held by a user other than the specific user. In addition, the alert notification may also include location information of the mobile device 1, such as information obtained via a GPS device or a communication device of the mobile device 1 to indicate the location of the mobile device 1, contact information, and the like. In an embodiment, the mobile device may take security measures and send an alert notification as the second operation at the same time.
In yet another embodiment, when the user authentication result is determined to be a failure, the processor 110 still performs the first operation and performs the second operation after performing the first operation.
It should be noted that, in another embodiment, in response to determining that the maximum squeezing strength value is not within the preset squeezing strength range, the processor 110 does not directly determine that the user verification result is a failure, and further performs another step to determine whether the user verification result is a success or a failure. Specifically, in response to determining that the identified maximum squeezing strength value is not within the preset squeezing feature range, the processor 110 does not first perform the second operation, but the processor 110 further reads the preset squeezing feature range corresponding to the specific event in the verification data 700 from the database 121 according to the specific event occurring currently, so as to attempt to compare the squeezing feature of the detected squeezing action with the preset squeezing feature range.
In more detail, in this embodiment, in response to the maximum squeezing strength value not being within the preset squeezing strength range, the processor 110 may calculate a squeezing feature quantity according to the identified maximum squeezing strength value and compare the squeezing feature quantity with the preset squeezing feature quantity range. In this embodiment, the processor 110 may integrate the pressing strength value with time according to the pressing strength curve located in the ascending region to obtain an integrated value, and take the integrated value as the pressing characteristic amount. In brief, the processor 110 calculates an area of the compression strength curve located in the ascending region to an abscissa axis (assuming that the compression strength curve is plotted in a graph in which an abscissa is time and an ordinate is a compression strength value), but the present invention is not limited thereto. The processor 110 may utilize other means to calculate the extrusion characteristic quantity from the maximum extrusion strength value or the rise region via other means. For example, in another embodiment, the processor 110 performs a root mean square operation on all the extrusion strength values in the ascending region according to the extrusion strength curve located in the ascending region, and uses the obtained result as the extrusion characteristic quantity. It should be noted that the preset squeezing feature range is set (or obtained) in a manner similar to the preset squeezing strength range (e.g., receiving a specific event corresponding to a specific user to perform a squeezing action on a mobile device or recording the squeezing action performed by the specific user when the specific event occurs in daily life to record a squeezing strength curve, and then obtaining a squeezing feature according to the squeezing strength curve), except that the step of "calculating/obtaining/recording the maximum squeezing strength value of the squeezing action corresponding to the specific event by the specific user" is changed to "calculating/obtaining/recording the squeezing feature of the squeezing action corresponding to the specific event by the specific user". The following description is given by way of example with reference to fig. 6A and 6B.
Then, in response to the calculated squeezing feature amount being within the preset squeezing feature amount range, the processor 110 determines that the user authentication result is successful without determining that the user authentication result is failed. Otherwise, in response to the calculated squeezing feature quantity not being within the preset squeezing feature quantity range, the processor 110 determines that the user authentication result is a failure. Next, the processor 110 performs the first operation or the second operation corresponding to the successful or failed user authentication result, as described above.
Fig. 6A is a plurality of graphs of the pressing strength respectively corresponding to a plurality of edge detectors according to the first embodiment of the invention. Referring to fig. 6A, in the present embodiment, the verification data corresponding to a specific event may also include a plurality of preset squeeze strength curves corresponding to different edge detectors 130(1) -130 (6). It is assumed that a plurality of pressing strength curve graphs corresponding to the first to sixth detectors 130(1) to 130(6) are shown in fig. 6A, wherein the preset pressing strength curves corresponding to the verification data of the first to sixth detectors are thicker curves. It is assumed that a plurality of squeeze intensity curves corresponding to squeeze operations detected by the first to sixth detectors 130(1) to 130(6) of the respective detectors of the specific event occurred at present are recorded as thin curves in the above-described squeeze intensity curve diagram. For a detector, the processor 110 may compare the preset pressing strength curve in the pressing strength curve corresponding to the detector with the pressing strength curve corresponding to the detected pressing action, so as to execute the verification procedure by the pressing action detected by the detector. In other words, it can be considered that corresponding verification procedures are respectively performed on the plurality of detectors to obtain a detector verification result of each detector.
FIG. 6B is a graph illustrating the pressing strength according to the pressing action detected by an edge detector according to the first embodiment of the present invention. Referring to fig. 6B (e.g., the pressing strength curve diagram of the third detector), for example, referring to the pressing strength curve (thicker curve) corresponding to the specific event, the mobile device 1 is determined to be in the stationary state (e.g., time T0-T1) at first, then, the processor 110 determines that the specific event occurs (e.g., is picked up from the stationary state), the user performs a pressing action on the mobile device 1 to pick up the mobile device, and during this period (e.g., time T1-T2) (i.e., during the pressing action), the pressing strength curve starts to rise (i.e., a rising region). During the pressing action, the processor 110 may determine that the highest point of the pressing strength curve in the pressing action is the maximum pressing strength value (e.g., 400). In addition, during the pressing action, the processor 110 may determine that the maximum pressing strength value (e.g., 800) is located at the highest point of the predetermined pressing strength curve (thinner curve) in the pressing action, and the corresponding predetermined pressing strength range is 720-880. Note that the period from time T2 to time T3 is, for example, a period in which the mobile device 1 is held.
According to the verification procedure, the maximum squeezing strength value is not within the preset squeezing strength range according to the squeezing action detected by the third detector. Based on this, the processor 110 may directly determine that the verification result corresponding to the third detector (i.e., the third detector verification result) is a failure. Alternatively, the processor 110, as described above, calculates the extrusion characteristic (e.g., calculates the area of the extrusion intensity curve in the ascending region and the abscissa axis), and performs further verification by comparing with the predetermined extrusion characteristic range.
It should be noted that the processor 110 may perform the verification procedure on the pressing intensity curve of the pressing action detected by each detector to obtain the verification result corresponding to each single detector. In this embodiment, in the case of multiple detectors, when the verification results corresponding to all the detectors are successful, or the verification results corresponding to a certain proportion or more than a certain number of detectors are successful, the processor 110 will determine that the user verification result is successful, thereby indicating that the user currently performing the squeeze operation is the specific user. For example, in one embodiment, when the number of detectors with successful verification results is greater than a predetermined threshold, the processor performs a first operation; otherwise, when the number of the detectors with successful verification results is not greater than the preset threshold value, the processor executes a second operation. The predetermined threshold may be predetermined by the system or may be user settable, and may be less than or equal to the number of all detectors.
Other verification procedures using the crush strength curve are described below with respect to a second embodiment. The corresponding component numbers and functions of the hardware of the second embodiment are the same as those of the hardware of the first embodiment, and are not described herein again.
[ second embodiment ]
Compared with the first embodiment, in the second embodiment, for a specific event, the processor 110 converts the analog squeezing strength value (squeezing strength curve) detected by each detector into a digital squeezing strength code in the detected squeezing action, and compares the digital squeezing strength code with the password corresponding to the specific event by using a plurality of squeezing strength codes respectively corresponding to a plurality of detectors to obtain a user authentication result, thereby determining whether the user is a specific user.
Fig. 7 is a flowchart of a verification method according to a second embodiment of the invention. Referring to fig. 7, in step S71, when it is determined that a specific event occurs, the processor 110 detects a pressing action applied to the mobile device through a plurality of edge detectors of the device to obtain a plurality of pressing strength curves respectively corresponding to the edge detectors (e.g., a plurality of pressing strength curves respectively corresponding to the first to sixth detectors as shown in fig. 6A).
In step S72, a plurality of compression strength codes respectively corresponding to the plurality of edge detectors are obtained according to the predetermined period corresponding to the specific event and the plurality of compression strength curves. The details of converting the squeeze intensity value into a squeeze intensity code are described below with reference to fig. 8A.
Fig. 8A is a diagram illustrating a conversion of a compression strength value into a compression strength code according to a second embodiment of the invention. Referring to fig. 8A, for example, assume that the left side of fig. 8A is a squeeze intensity curve according to a squeeze detected by a detector, which is formed by simulated squeeze intensity values detected at different time points. In the conversion process, the processor 110 divides the plurality of first extrusion strength values into a plurality of intervals according to the detected extrusion strength curve, also called the first extrusion strength curve, and the recorded extrusion strength values, also called the first extrusion strength values. The total number of the intervals may be set according to the safety intensity of the verification procedure, for example, the total number of the intervals may be increased if the safety intensity is required to be higher, and the plurality of intervals each have a corresponding compression intensity code.
For example, as shown in fig. 8A, the processor 110 divides the compression strength curve into three sections, such as a first section and a third section, according to the longitudinal distribution area of the compression strength curve. The first interval has an extrusion intensity code of "2"; the second interval has an extrusion intensity code of "1"; the third section has a squeezing pressure code of "0". That is, the processor 110 converts the extrusion strength values of the extrusion strength curves in different intervals into the extrusion strength codes of the intervals in which the extrusion strength values are located, as shown by the arrow a81, to obtain the extrusion strength codes at different time points, i.e., the first extrusion strength code, and further obtain the digital extrusion strength code map, as shown in the right side of fig. 8A.
For example, at time T0-T1, the squeezing strength curve is in the first interval, and the squeezing strength value in this interval is converted into a squeezing strength code "2"; at time T1-T2, i.e., the predetermined period, the compression strength curve is in the second interval, the compression strength value in this interval is converted into the compression strength code "1"; at time T2-T3, the squeezing strength curve is in the third interval, and the squeezing strength value in this interval is converted into the squeezing strength code "0". The predetermined period is a period of time, for example, 2 seconds, after the occurrence of the specific event is determined. It should be noted that the present invention does not limit the length of the predetermined period.
Fig. 8B is a diagram illustrating a plurality of compression strength codes respectively corresponding to a plurality of edge detectors after conversion according to a second embodiment of the invention. For example, referring to fig. 8B, after the compression strength curves corresponding to all the detectors are converted, a plurality of compression strength code maps respectively corresponding to the plurality of detectors can be obtained, as shown in fig. 8B.
Then, the processor 110 identifies a second compression strength code within the predetermined period and uses the second compression strength code as the compression strength code corresponding to the first edge detector. For example, in the compression strength code maps corresponding to the first to sixth detectors, the second compression strength codes in the predetermined period are "0", "2", "0", "1", "2", respectively. That is, the plurality of extrusion pressure codes obtained by the processor 110 respectively corresponding to the first to sixth detectors are "0, 2, 0, 1, 2".
After obtaining the plurality of squeezing strength codes respectively corresponding to the plurality of detectors, the processor 110 reads a password corresponding to the specific event from the database 121 in step S73.
Fig. 9 is a diagram illustrating a plurality of passwords corresponding to different specific events according to a second embodiment of the invention. Referring to fig. 9, the database 121 may store a plurality of passwords corresponding to a plurality of specific events, each password recording a plurality of code words (Unicode) corresponding to different detectors. For example, in the present embodiment, the password corresponding to the event a records codewords PW _ a1, PW _ a2, PW _ A3, PW _ a4, PW _ a5, and PW _ a6 corresponding to the first to sixth detectors, respectively; the ciphers corresponding to the event B record codewords PW _ B1, PW _ B2, PW _ B3, PW _ B4, PW _ B5, and PW _ B6 … corresponding to the first to sixth detectors, respectively, and the ciphers corresponding to the event Z record codewords PW _ Z1, PW _ Z2, PW _ Z3, PW _ Z4, PW _ Z5, and PW _ Z6 corresponding to the first to sixth detectors, respectively. For convenience of description, it is assumed that the specific event is event a, and the password read by the processor 110 is "PW _ a1, PW _ a2, PW _ A3, PW _ a4, PW _ a5, and PW _ a 6".
Next, in step S74, the processor 110 determines whether the user verification result is successful or failed by comparing the password with the plurality of squeezing strength codes.
Specifically, the processor 110 recognizes a plurality of codewords in the password respectively corresponding to the plurality of edge detectors. Further, the processor 110 also obtains the extrusion pressure codes respectively corresponding to the plurality of detectors in step S72. That is, the plurality of code words may correspond to the plurality of extrusion strength codes, respectively, by association with a plurality of detectors. Next, the processor 110 may determine whether the plurality of extrusion pressure codes conform to the corresponding plurality of codewords based on the plurality of detectors.
In this embodiment, in response to the squeezing strength codes of more than or equal to a predetermined number of detectors being determined not to correspond to the corresponding code words, the user authentication result is determined to be a failure. In response to fewer than a predetermined number of the crush strength codes of the detector being determined to not correspond to the corresponding code word, the user authentication result is determined to be successful. The predetermined number is set to, for example, a difference obtained by subtracting a predetermined threshold from the total number of all the detectors.
For example, assume that the predetermined number is 2, and the numerical values of the passwords "PW _ a1, PW _ a2, PW _ A3, PW _ a4, PW _ a5, PW _ a 6" read by the processor 110 are "0, 2, 0, 1", respectively, and the processor 110 compares them with the obtained plurality of squeezing intensity codes "0, 2, 0, 1, 2", respectively. In this example, the processor 110 determines that only the compression strength codeword "2" corresponding to the sixth detector does not correspond to the codeword PW _ A6, i.e., that only one compression strength code is determined not to correspond to the codeword. That is, less than the predetermined number 2 of crush strength codes are determined to not correspond to the corresponding code word. In this case, the processor 110 determines that the user authentication result is successful. Then, in response to the user authentication result being successful, proceeding to step S75, the processor 110 performs a first operation.
For another example, assume that the predetermined number is 2, and the numerical values of the passwords "PW _ a1, PW _ a2, PW _ A3, PW _ a4, PW _ a5, PW _ a 6" read by the processor 110 are "0, 2, 0, 1", respectively, and the processor 110 compares them with the obtained plurality of squeezing strength codes "0, 2, 0, 1, 2", respectively. In this example, the processor 110 determines that the compression strength codeword "1" corresponding to the fifth detector does not correspond to the codeword PW _ A5 "0" and the compression strength codeword "2" corresponding to the sixth detector does not correspond to the codeword PW _ A6 "1", i.e., the two compression strength codes are determined not to correspond to the corresponding codewords, indicating that up to a predetermined number 2 of compression strength codes are determined not to correspond to the corresponding codewords. In this case, the processor 110 determines that the user authentication result is a failure. Then, in response to the user authentication result being a failure, proceeding to step S77, the processor 110 performs a second operation.
In an embodiment, the predetermined number may be set according to a security strength. A lower security strength will use a higher predetermined number. In another embodiment, a predetermined number of matches may be determined, and the user authentication result is determined to be successful only if the predetermined number of matches is reached, otherwise the user authentication result is determined to be unsuccessful.
In summary, the user authentication method and the mobile device provided in the above embodiments of the invention can detect the squeezing action performed on the mobile device through the edge detector in response to determining that the specific event occurs, and compare the squeezing strength value or the squeezing feature quantity of the squeezing action with the authentication data to determine whether the user authentication result is successful or failed. In addition, a plurality of squeezing strength codes respectively corresponding to a plurality of edge detectors can be obtained from the detected squeezing actions, so as to judge whether the user verification result is successful or failed by comparing the password corresponding to the event with the plurality of squeezing strength codes. Finally, whether a first operation corresponding to a specific event or a second operation can be performed is determined according to the user authentication result.
Although the present invention has been described with reference to the above embodiments, it should be understood that various changes and modifications can be made therein by those skilled in the art without departing from the spirit and scope of the invention.

Claims (20)

1.一种用户验证方法,适用于具有边缘检测器的移动装置,所述方法包括:1. A user authentication method, applicable to a mobile device with an edge detector, the method comprising: 响应于判定特定事件发生,经由该边缘检测器检测对该移动装置所执行的挤压动作,in response to determining that a specific event occurs, detecting a squeezing action performed on the mobile device via the edge detector, 根据该挤压动作以执行验证程序以获得用户验证结果;according to the squeeze action to execute the verification procedure to obtain the user verification result; 响应于该用户验证结果为成功,执行第一操作;In response to the user verification result being successful, perform a first operation; 响应于该用户验证结果为失败,执行第二操作,其中该第二操作包括上锁该移动装置,in response to the user authentication being a failure, performing a second operation, wherein the second operation includes locking the mobile device, 其中该验证程序包括:Among them, the verification procedure includes: 从数据库读取对应该特定事件的验证数据;以及read validation data from the database corresponding to that particular event; and 经由比较该验证数据与该挤压动作的模式以判断该用户验证结果为成功或失败。By comparing the verification data with the mode of the squeezing action, it is determined whether the user verification result is success or failure. 2.如权利要求1所述的方法,其中该验证数据包括对应该特定事件的预设挤压强度范围,其中上述经由比较该验证数据与该挤压动作的该模式以判断该用户验证结果为成功或失败的步骤包括:2 . The method of claim 1 , wherein the verification data includes a preset squeezing intensity range corresponding to the specific event, wherein the user verification result is determined by comparing the verification data with the mode of the squeezing action. 3 . Success or failure steps include: 响应于该挤压动作被检测,在第一预定时间内,随着时间记录以获得对应该挤压动作的挤压强度曲线,其中该挤压强度曲线用以表示该第一预定时间内在不同时间依序所检测的该挤压动作的多个挤压强度值;In response to the squeezing action being detected, within the first predetermined time, recording over time to obtain a squeezing intensity curve corresponding to the squeezing action, wherein the squeezing intensity curve is used to represent the first predetermined time at different times a plurality of squeeze intensity values of the squeeze action detected in sequence; 根据该挤压强度曲线辨识这些挤压强度值中的最大挤压强度值;Identify the maximum crush strength value among the crush strength values according to the crush strength curve; 判断该最大挤压强度值是否在该预设挤压强度范围内;Determine whether the maximum extrusion strength value is within the preset extrusion strength range; 响应于判定该最大挤压强度值在该预设挤压强度范围内,判定该用户验证结果为成功;以及In response to determining that the maximum squeezing intensity value is within the preset squeezing intensity range, determining that the user authentication result is successful; and 响应于判定该最大挤压强度值不在该预设挤压强度范围内,判定该用户验证结果为失败。In response to determining that the maximum crush strength value is not within the preset crush strength range, it is determined that the user authentication result is a failure. 3.如权利要求2所述的方法,其中上述根据该挤压强度曲线辨识这些挤压强度值中的该最大挤压强度值的步骤包括:3. The method of claim 2, wherein the step of identifying the maximum crush strength value among the crush strength values according to the crush strength curve comprises: 辨识该挤压强度曲线中最早的上升区域,其中该上升区域中所有的挤压强度值皆大于初始阈值;以及identifying the earliest rising region in the crush strength curve, wherein all crush strength values in the rising region are greater than the initial threshold; and 辨识该上升区域的所有的挤压强度值中的最大者为该最大挤压强度值。The largest of all the squeezing strength values identifying the rising region is the maximum squeezing strength value. 4.如权利要求1所述的方法,其中上述该验证数据包括对应该特定事件的预设挤压特征量范围,其中上述经由比较该验证数据与该挤压动作的该模式以判断该用户验证结果为成功或失败的步骤包括:4 . The method of claim 1 , wherein the verification data includes a predetermined squeezing feature range corresponding to the specific event, and the user verification is determined by comparing the verification data with the mode of the squeezing action. 5 . Steps that result in success or failure include: 响应于该挤压动作被检测,在第一预定时间内,随着时间记录以获得对应该挤压动作的挤压强度曲线,其中该挤压强度曲线用以表示该第一预定时间内在不同时间依序所检测的该挤压动作的多个挤压强度值;In response to the squeezing action being detected, within the first predetermined time, recording over time to obtain a squeezing intensity curve corresponding to the squeezing action, wherein the squeezing intensity curve is used to represent the first predetermined time at different times a plurality of squeeze intensity values of the squeeze action detected in sequence; 根据该挤压强度曲线辨识这些挤压强度值中的最大挤压强度值;Identify the maximum crush strength value among the crush strength values according to the crush strength curve; 响应于判定该最大挤压强度值不在该预设挤压强度范围内,根据该最大挤压强度值以计算挤压特征量,并且比较该挤压特征量与该预设挤压特征量范围;In response to determining that the maximum extrusion strength value is not within the preset extrusion strength range, calculating an extrusion feature amount according to the maximum extrusion strength value, and comparing the extrusion feature amount with the preset extrusion feature amount range; 响应于该挤压特征量不在该预设挤压特征量范围内,判定该用户验证结果为失败;以及In response to the extrusion feature not being within the preset extrusion feature range, determining that the user authentication result is a failure; and 响应于该挤压特征量在该预设挤压特征量范围内,判定该用户验证结果为成功。In response to the extrusion feature amount being within the preset extrusion feature amount range, it is determined that the user authentication result is successful. 5.如权利要求4所述的方法,其中上述根据该最大挤压强度值以计算该挤压特征量的步骤包括:5. The method of claim 4, wherein the step of calculating the extrusion feature according to the maximum extrusion strength value comprises: 根据该上升区域的该挤压强度曲线,将挤压强度值对时间进行积分运算,以获得积分值,并且将该积分值作为该挤压特征量。According to the squeezing intensity curve of the rising region, the squeezing intensity value is integrated with time to obtain an integrated value, and the integrated value is used as the squeezing feature quantity. 6.如权利要求4所述的方法,其中上述根据该最大挤压强度值以计算该挤压特征量的步骤包括:6. The method of claim 4, wherein the step of calculating the extrusion feature according to the maximum extrusion strength value comprises: 根据该上升区域的该挤压强度曲线,对该上升区域中所有的挤压强度值进行均方根运算,以获得该挤压特征量。According to the squeezing intensity curve of the ascending area, a root mean square operation is performed on all squeezing intensity values in the ascending area to obtain the squeezing feature quantity. 7.如权利要求1所述的方法,其中该特定事件包括:7. The method of claim 1, wherein the specific event comprises: 该移动装置接收来电;the mobile device receives an incoming call; 该移动装置接收相机快门操作;the mobile device receives a camera shutter operation; 该移动装置接收通知;the mobile device receives the notification; 该移动装置的预定程序被执行;A predetermined program of the mobile device is executed; 该移动装置被执行解锁操作;或the mobile device is unlocked; or 判定该移动装置从静止状态转变或被持握状态。It is determined that the mobile device transitions from a stationary state or a held state. 8.如权利要求1所述的方法,其中上述执行该第一操作的步骤包括下列步骤的其中之一或其组合:8. The method of claim 1, wherein the step of performing the first operation comprises one or a combination of the following steps: 解锁该移动装置;unlock the mobile device; 拍摄相片;take photos; 开启该移动装置的显示屏幕;turn on the display screen of the mobile device; 响应对应该特定事件的来电;Respond to incoming calls corresponding to that specific event; 显示对应该特定事件的通知;Display a notification for that specific event; 执行对应于该特定事件的预定程序;以及execute a predetermined procedure corresponding to the particular event; and 执行对应于该特定事件的该移动装置的功能。A function of the mobile device corresponding to the specific event is performed. 9.如权利要求1所述的方法,其中该第二操作还包括发送警示通知给该移动装置的注册用户。9. The method of claim 1, wherein the second operation further comprises sending an alert notification to a registered user of the mobile device. 10.如权利要求1所述的方法,其中该第二操作还包括显示密码输入界面。10. The method of claim 1, wherein the second operation further comprises displaying a password input interface. 11.如权利要求1所述的方法,其中该边缘检测器包括多个检测器,11. The method of claim 1, wherein the edge detector comprises a plurality of detectors, 其中上述经由该边缘检测器检测对该移动装置所执行的该挤压动作的步骤包括:这些检测器分别检测对该移动装置所执行的多个挤压动作;Wherein the above-mentioned step of detecting the pressing action performed on the mobile device via the edge detector includes: the detectors respectively detect a plurality of pressing actions performed on the mobile device; 其中上述根据该挤压动作执行该验证程序以获得该用户验证结果的步骤包括:这些检测器各自执行验证程序以获得检测器验证结果;Wherein the above-mentioned steps of executing the verification procedure according to the pressing action to obtain the user verification result include: each of the detectors executes the verification procedure to obtain the detector verification result; 其中上述响应于该用户验证结果为成功,执行该第一操作的步骤包括:响应于这些检测器检测的挤压动作的这些检测器验证结果中成功的检测器验证结果个数大于预定阈值,执行该第一操作;Wherein the above-mentioned step of performing the first operation in response to the user verification result being successful includes: in response to the detector verification results of the squeeze action detected by the detectors, the number of successful detector verification results is greater than a predetermined threshold, and executing the first operation; 其中上述当该用户验证结果为失败时,执行该第二操作的步骤包括:响应于这些检测器检测的挤压动作的这些检测器验证结果中所述成功的检测器验证结果个数不大于该预定阈值,执行该第二操作。Wherein, when the user verification result is a failure, the step of performing the second operation includes: the number of successful detector verification results in the detector verification results in response to the squeeze action detected by the detectors is not greater than the number of the detector verification results. A predetermined threshold value, the second operation is performed. 12.如权利要求1所述的方法,其中响应于该用户验证结果为失败,执行该第二操作的步骤还包括:12. The method of claim 1, wherein in response to the user authentication result being a failure, the step of performing the second operation further comprises: 执行该第一动作。Perform the first action. 13.一种用户验证方法,适用于具有多个边缘检测器的一行移动装置,所述方法包括:13. A user authentication method applicable to a line of mobile devices having a plurality of edge detectors, the method comprising: 响应于判定特定事件发生,经由这些边缘检测器检测对该移动装置所施加的挤压动作以获得分别对应这些边缘检测器的多个挤压强度曲线,其中每一个挤压强度曲线记录其所属的边缘检测器在不同时间点所依序检测的该挤压动作的多个挤压强度值;In response to determining that a specific event occurs, the pressing action applied to the mobile device is detected via the edge detectors to obtain a plurality of pressing intensity curves corresponding to the edge detectors, wherein each pressing intensity curve records the corresponding a plurality of squeezing intensity values of the squeezing action sequentially detected by the edge detector at different time points; 根据对应该特定事件的预定期间与这些挤压强度曲线获得分别对应这些边缘检测器的多个挤压强度码;Obtaining a plurality of squeezing intensity codes corresponding to the edge detectors respectively according to the predetermined period corresponding to the specific event and the squeezing intensity curves; 根据这些挤压强度码以执行验证程序以获得用户验证结果;According to these squeeze strength codes to perform verification procedures to obtain user verification results; 响应于该用户验证结果为成功,执行第一操作;In response to the user verification result being successful, perform a first operation; 响应于该用户验证结果为失败,执行第二操作,其中该第二操作包括上锁该移动装置,in response to the user authentication being a failure, performing a second operation, wherein the second operation includes locking the mobile device, 其中该验证程序包括:Among them, the verification procedure includes: 从数据库读取对应该特定事件的密码;以及read the password corresponding to that particular event from the database; and 经由比较该密码与这些挤压强度码以判断该用户验证结果为成功或失败。The user authentication result is determined as success or failure by comparing the password with the squeeze strength codes. 14.如权利要求13所述的方法,其中这些挤压强度曲线包括第一挤压强度曲线,其中该第一挤压强度曲线对应这些边缘检测器中的第一边缘检测器,其中上述根据对应该特定事件的该预定期间与这些挤压强度曲线获得分别对应这些边缘检测器的这些挤压强度码的步骤包括:14. The method of claim 13, wherein the crush strength curves comprise a first crush strength curve, wherein the first crush strength curve corresponds to a first edge detector of the edge detectors, wherein the above is based on the pair The step of obtaining the squeeze intensity codes corresponding to the edge detectors respectively during the predetermined period of the specific event and the squeeze intensity curves includes: 根据该第一挤压强度曲线所记录的多个第一挤压强度值的大小,将这些第一挤压强度值划分至多个区间,其中这些区间各自具有对应的挤压强度码;According to the magnitude of the plurality of first pressing strength values recorded by the first pressing strength curve, the first pressing strength values are divided into a plurality of intervals, wherein each of the intervals has a corresponding pressing strength code; 将这些第一挤压强度值转换为这些第一挤压强度值所属的区间的挤压强度码,以获得分别对应这些第一挤压强度值的多个第一挤压强度码;以及converting the first squeezing strength values into squeezing strength codes of the interval to which the first squeezing strength values belong, to obtain a plurality of first squeezing strength codes corresponding to the first squeezing strength values respectively; and 辨识这些第一挤压强度码中位于该预定期间内的第二挤压强度码,并且将该第二挤压强度码作为对应该第一边缘检测器的挤压强度码。Identifying the second squeezing strength code within the predetermined period among the first squeezing strength codes, and using the second squeezing strength code as the squeezing strength code corresponding to the first edge detector. 15.如权利要求14所述的方法,其中上述经由比较该密码与这些挤压强度码以判断该用户验证结果为成功或失败的步骤包括:15. The method of claim 14, wherein the step of judging whether the user authentication result is a success or a failure by comparing the password with the squeeze strength codes comprises: 辨识该密码中分别对应这些边缘检测器的多个码字,其中这些码字分别对应这些挤压强度码;Identifying a plurality of code words corresponding to the edge detectors in the password, wherein the code words respectively correspond to the squeeze strength codes; 基于这些边缘检测器以判断这些挤压强度码是否相符所对应的这些码字,Based on these edge detectors, it is determined whether the squeeze strength codes match the corresponding code words, 其中响应于多于或等于预定数目以上的挤压强度码被判定不相符于所对应的码字,该用户验证结果被判定为失败,Wherein, in response to more than or equal to more than a predetermined number of squeezing intensity codes being determined not to match the corresponding code words, the user verification result is determined to be a failure, 其中响应于少于该预定数目的挤压强度码被判定不相符于所对应的码字,该用户验证结果被判定为成功。The user authentication result is determined to be successful in response to the compression strength codes less than the predetermined number being determined not to match the corresponding code words. 16.如权利要求13所述的方法,其中该特定事件包括:16. The method of claim 13, wherein the specific event comprises: 该移动装置接收来电;the mobile device receives an incoming call; 该移动装置接收相机快门操作;the mobile device receives a camera shutter operation; 该移动装置接收通知;the mobile device receives the notification; 该移动装置的预定程序被执行;A predetermined program of the mobile device is executed; 该移动装置被执行解锁操作;或the mobile device is unlocked; or 判定该移动装置从静止状态转变为被持握状态。It is determined that the mobile device transitions from a stationary state to a held state. 17.如权利要求13所述的方法,其中上述执行该第一操作的步骤包括下列步骤的其中之一或其组合:17. The method of claim 13, wherein the step of performing the first operation comprises one or a combination of the following steps: 解锁该移动装置;unlock the mobile device; 拍摄相片;take photos; 开启该移动装置的显示屏幕;turn on the display screen of the mobile device; 响应对应该特定事件的来电;Respond to incoming calls corresponding to that specific event; 显示对应该特定事件的通知;Display a notification for that specific event; 执行对应于该特定事件的预定程序;以及execute a predetermined procedure corresponding to the particular event; and 执行对应于该特定事件的该移动装置的功能。A function of the mobile device corresponding to the specific event is performed. 18.如权利要求13所述的方法,其中该第二操作还包括发送警示通知给该移动装置的注册用户。18. The method of claim 13, wherein the second operation further comprises sending an alert notification to a registered user of the mobile device. 19.一种移动装置,包括:19. A mobile device comprising: 本体,其中处理器被设置在该本体内;a body, wherein the processor is disposed within the body; 边缘检测器,设置在该本体的两侧;edge detectors, arranged on both sides of the body; 存储装置;以及storage device; and 处理器,耦接该边缘检测器与该存储装置,a processor coupled to the edge detector and the storage device, 其中响应于判定特定事件发生,该处理器用以指示该边缘检测器检测对该本体所施加的挤压动作,并且该处理器用以根据该挤压动作以执行验证程序以获得用户验证结果,wherein in response to determining that a specific event occurs, the processor is used for instructing the edge detector to detect a pressing action applied to the body, and the processor is used for executing a verification procedure according to the pressing action to obtain a user verification result, 其中响应于该用户验证结果为成功,该处理器用以执行第一操作,wherein in response to the user verification result being successful, the processor is configured to perform the first operation, 其中响应于该用户验证结果为失败,该处理器用以执行第二操作,其中该第二操作包括上锁该移动装置,wherein in response to the user verification result being a failure, the processor is configured to perform a second operation, wherein the second operation includes locking the mobile device, 其中该验证程序包括:Among them, the verification procedure includes: 该处理器从该存储装置的数据库中读取对应该特定事件的验证数据;以及the processor reads authentication data corresponding to the particular event from a database in the storage device; and 该处理器经由比较该验证数据与该挤压动作的模式以判断该用户验证结果为成功或失败。The processor determines whether the user authentication result is success or failure by comparing the authentication data with the mode of the pressing action. 20.一种移动装置,包括:20. A mobile device comprising: 本体,其中处理器被设置在该本体内;a body, wherein the processor is disposed within the body; 多个边缘检测器,平均地被设置在该本体的两侧;a plurality of edge detectors, arranged on both sides of the body on average; 存储装置;以及storage device; and 处理器,耦接这些边缘检测器与该存储装置,a processor coupled to the edge detectors and the storage device, 其中响应于判定特定事件发生,该处理器用以指示这些边缘检测器检测对该移动装置所施加的挤压动作以获得分别对应这些边缘检测器的多个挤压强度曲线,其中每一个挤压强度曲线记录其所属的边缘检测器在不同时间点所依序检测的该挤压动作的多个挤压强度值,Wherein, in response to determining that a specific event occurs, the processor is configured to instruct the edge detectors to detect the squeezing action applied to the mobile device to obtain a plurality of squeezing intensity curves corresponding to the edge detectors, wherein each squeezing intensity The curve records multiple squeezing intensity values of the squeezing action sequentially detected by the edge detector to which it belongs at different time points, 其中该处理器用以根据对应该特定事件的预定期间与这些挤压强度曲线获得分别对应这些边缘检测器的多个挤压强度码,The processor is configured to obtain a plurality of squeezing intensity codes corresponding to the edge detectors according to the predetermined period corresponding to the specific event and the squeezing intensity curves, respectively, 其中该处理器用以根据这些挤压强度码以执行验证程序以获得用户验证结果,Wherein the processor is used to execute the verification procedure to obtain the user verification result according to the squeeze strength codes, 其中响应于该用户验证结果为成功,该处理器用以执行第一操作,wherein in response to the user verification result being successful, the processor is configured to perform the first operation, 其中响应于该用户验证结果为失败,该处理器用以执行第二操作,其中该第二操作包括上锁该移动装置,wherein in response to the user verification result being a failure, the processor is configured to perform a second operation, wherein the second operation includes locking the mobile device, 其中该验证程序包括:Among them, the verification procedure includes: 该处理器从该存储装置的数据库中读取辨识对应该特定事件的密码;以及The processor reads the password identifying the specific event from the database of the storage device; and 该处理器经由比较该密码与这些挤压强度码以判断该用户验证结果为成功或失败。The processor determines whether the user authentication result is success or failure by comparing the password with the squeeze strength codes.
CN201910815712.1A 2019-08-30 2019-08-30 User authentication method and mobile device Pending CN112446014A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910815712.1A CN112446014A (en) 2019-08-30 2019-08-30 User authentication method and mobile device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910815712.1A CN112446014A (en) 2019-08-30 2019-08-30 User authentication method and mobile device

Publications (1)

Publication Number Publication Date
CN112446014A true CN112446014A (en) 2021-03-05

Family

ID=74733937

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910815712.1A Pending CN112446014A (en) 2019-08-30 2019-08-30 User authentication method and mobile device

Country Status (1)

Country Link
CN (1) CN112446014A (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130290229A1 (en) * 2011-02-21 2013-10-31 Ntt Docomo, Inc. Gripping-feature learning authentication system and gripping-feature learning authentication method
US20140375582A1 (en) * 2013-06-20 2014-12-25 Samsung Electronics Co., Ltd. Electronic device and method of controlling electronic device using grip sensing
CN104992109A (en) * 2015-06-12 2015-10-21 努比亚技术有限公司 Method and device for password setting and method and device for password matching
US20150346893A1 (en) * 2013-01-08 2015-12-03 Elo Touch Solutions, Inc. Gesture Event Determination
CN105468952A (en) * 2015-11-17 2016-04-06 腾讯科技(深圳)有限公司 Authentication method and apparatus
CN106096351A (en) * 2016-06-17 2016-11-09 宇龙计算机通信科技(深圳)有限公司 A kind of mobile terminal unlocking method, device and mobile terminal
CN106599649A (en) * 2016-11-10 2017-04-26 Tcl数码科技(深圳)有限责任公司 Camera-based terminal device user identity verification method and system
CN107194213A (en) * 2016-03-14 2017-09-22 阿里巴巴集团控股有限公司 A kind of personal identification method and device
CN107506129A (en) * 2016-06-14 2017-12-22 三星电子株式会社 For handling the method and its electronic installation of user's input
CN107563168A (en) * 2017-09-05 2018-01-09 广东欧珀移动通信有限公司 Unlocking method, device and the mobile terminal of mobile terminal
CN107809500A (en) * 2016-09-09 2018-03-16 宏达国际电子股份有限公司 Portable electronic device, operation method thereof and recording medium using the method
US20190050128A1 (en) * 2017-08-10 2019-02-14 Lg Electronics Inc. Mobile terminal and method for controlling the same
CN109428969A (en) * 2017-08-25 2019-03-05 中兴通讯股份有限公司 Edge touch control method, device and the computer readable storage medium of double screen terminal
US20190220582A1 (en) * 2016-06-29 2019-07-18 Zwipe As Biometrically authorisable device
CN110032322A (en) * 2018-01-11 2019-07-19 宏达国际电子股份有限公司 Electronic apparatus, operating method and non-transient computer memory medium capable of reading

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130290229A1 (en) * 2011-02-21 2013-10-31 Ntt Docomo, Inc. Gripping-feature learning authentication system and gripping-feature learning authentication method
US20150346893A1 (en) * 2013-01-08 2015-12-03 Elo Touch Solutions, Inc. Gesture Event Determination
US20140375582A1 (en) * 2013-06-20 2014-12-25 Samsung Electronics Co., Ltd. Electronic device and method of controlling electronic device using grip sensing
CN104992109A (en) * 2015-06-12 2015-10-21 努比亚技术有限公司 Method and device for password setting and method and device for password matching
CN105468952A (en) * 2015-11-17 2016-04-06 腾讯科技(深圳)有限公司 Authentication method and apparatus
CN107194213A (en) * 2016-03-14 2017-09-22 阿里巴巴集团控股有限公司 A kind of personal identification method and device
CN107506129A (en) * 2016-06-14 2017-12-22 三星电子株式会社 For handling the method and its electronic installation of user's input
CN106096351A (en) * 2016-06-17 2016-11-09 宇龙计算机通信科技(深圳)有限公司 A kind of mobile terminal unlocking method, device and mobile terminal
US20190220582A1 (en) * 2016-06-29 2019-07-18 Zwipe As Biometrically authorisable device
CN107809500A (en) * 2016-09-09 2018-03-16 宏达国际电子股份有限公司 Portable electronic device, operation method thereof and recording medium using the method
CN107807751A (en) * 2016-09-09 2018-03-16 宏达国际电子股份有限公司 Portable electronic device, operation method thereof and recording medium using the method
CN106599649A (en) * 2016-11-10 2017-04-26 Tcl数码科技(深圳)有限责任公司 Camera-based terminal device user identity verification method and system
US20190050128A1 (en) * 2017-08-10 2019-02-14 Lg Electronics Inc. Mobile terminal and method for controlling the same
CN109428969A (en) * 2017-08-25 2019-03-05 中兴通讯股份有限公司 Edge touch control method, device and the computer readable storage medium of double screen terminal
CN107563168A (en) * 2017-09-05 2018-01-09 广东欧珀移动通信有限公司 Unlocking method, device and the mobile terminal of mobile terminal
CN110032322A (en) * 2018-01-11 2019-07-19 宏达国际电子股份有限公司 Electronic apparatus, operating method and non-transient computer memory medium capable of reading

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NICHOLAS D. LANE等: "Squeezing Deep Learning into Mobile and Embedded Devices", 《IEEE PERVASIVE COMPUTING》, vol. 16, no. 3, 27 July 2017 (2017-07-27), pages 82 - 88, XP011657768, DOI: 10.1109/MPRV.2017.2940968 *
乔雪迎: "基于指纹识别技术的电力信息管理身份认证系统研究", 《中国优秀硕士学位论文全文数据库》, 31 March 2018 (2018-03-31), pages 138 - 1825 *

Similar Documents

Publication Publication Date Title
US9646146B2 (en) Utilization of biometric data
WO2017032085A1 (en) Method for preventing unintended touch input of terminal, and terminal
CN105487797B (en) A screen display mode control method and terminal device
CN106599716A (en) Method, device and mobile terminal for protecting message content
EP2766795B1 (en) Biometric apparatus and method for touch-sensitive devices
WO2019101096A1 (en) Method and device for security verification and mobile terminal
CN107329862A (en) Detection method, device and the terminal of keyboard
CN105335730A (en) Fingerprint identification method, fingerprint identification device and terminal equipment
CN106570370A (en) User identity identification method and device
CN106326708A (en) Mobile terminal control method and device
WO2019179451A1 (en) Application message viewing method, mobile terminal, and readable storage medium
CN108090340A (en) Face recognition processing method, face recognition processing device and intelligent terminal
CN106991311A (en) A kind of information processing method and mobile terminal
CN107087075B (en) Prompting method based on screen fingerprint identification and mobile terminal
CN104318185A (en) Application control method, application control equipment and mobile terminal
US8112631B2 (en) Password input device, computer security system using the same and method thereof
CN106709307B (en) Unlocking method and device
CN105912158A (en) Method and device for taking pictures with a touch screen of a mobile terminal, and the mobile terminal
CN105187654A (en) A recording method and device when a terminal is in standby
TWI545495B (en) System and method for operating touch screens
KR102065912B1 (en) Apparatus and method for obtaining image for user authentication using sensing pressure
CN108052269A (en) Unlocking screen optimization method, terminal device and computer-readable medium
TWI670629B (en) Portable electronic device, operating method for the same, and non-transitory computer readable recording medium
TWI744680B (en) User verification method and mobile device
CN112446014A (en) User authentication method and mobile device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210305