WO2017124444A1 - 应用程序的登录密码的输入方法、装置和终端 - Google Patents
应用程序的登录密码的输入方法、装置和终端 Download PDFInfo
- Publication number
- WO2017124444A1 WO2017124444A1 PCT/CN2016/071786 CN2016071786W WO2017124444A1 WO 2017124444 A1 WO2017124444 A1 WO 2017124444A1 CN 2016071786 W CN2016071786 W CN 2016071786W WO 2017124444 A1 WO2017124444 A1 WO 2017124444A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- password
- voice
- semantics
- user
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/70—Multimodal biometrics, e.g. combining information from different biometric modalities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Definitions
- the present invention relates to the field of terminals, and in particular, to a method, an apparatus, and a terminal for inputting a login password of an application in a terminal field.
- the traditional authentication method is to manage the user's usage rights through passwords.
- various spy programs such as Trojans
- simple passwords are easily stolen, greatly endangering users' privacy. And property security.
- users typically use long and complex password strings for encryption, including letters, numbers, and special symbols.
- the user needs to set different passwords for different applications. For example, a user may have both a QQ account and a password, a WeChat account and password, and an Alipay account and password. The user needs to remember different passwords for different accounts. This invisibly increases the burden on the user, and because the password is too long, the user enters the password with a high error rate.
- the present invention provides a method, an apparatus, and a terminal for inputting a login password of an application, which can reduce an error rate of password information input.
- the first aspect provides a method for inputting a login password of an application, the method comprising: acquiring biometric information of a user; determining, according to the biometric information, whether the user has login authority; acquiring voice information of the user; After determining that the user has the login permission, the password information corresponding to the voice information is determined according to the voice information, and the password information is input into the password input box of the application.
- the password information corresponding to the voice information is determined, and combined with the biometric information of the user, the error rate of the password information input can be reduced under the premise of ensuring the security of the password information input, and the operation is simple and convenient.
- determining, according to the voice information of the user, the password information corresponding to the voice information including: when determining that the user has the login right, according to the obtained Voice information, obtaining semantics of the voice information; determining, according to the semantics of the voice information, the password information that matches the semantics of the voice information in the voice password database, the voice password database including the voice password pair of the user, the voice password
- the semantics of the voice information are in one-to-one correspondence with the password information.
- the user By pre-storing a plurality of voice password pairs, and matching the semantics of the voice information in the voice password pair with the password information, the user only needs to identify in the pre-stored voice password database including multiple voice password pairs in subsequent use.
- the password information corresponding to the semantics of the user's voice information can be used to input various password information.
- the voice cipher pair further includes biometric information of the user, the biometric information and the semantics of the voice information.
- biometric information of the user corresponds to the password information; determining that the user has the login right, determining the password information matching the semantics of the voice information in the voice password database according to the semantics of the voice information, including: determining that the user has the login right And determining, according to the biometric information and the semantics of the voice information, password information matching the biometric information and the semantics of the voice information in the voice password database.
- the semantics of the biometric information in the voice password pair and the semantics of the voice information are in one-to-one correspondence with the password information, so that the user only needs to include a plurality of voice passwords in the pre-existing use.
- the password information corresponding to both the biometric information of the user and the semantics of the voice information is recognized in the pair of voice password databases, and the input of various password information can be completed.
- the user's voice password database can be entered by voice password, or it can be a voice password database sent by other terminal equipment.
- Combining cloud backup or local backup provides convenience for users to replace terminal devices.
- the voice password pair may also be a one-to-one correspondence between the voice and the password information of the voice information or the voice information of the biometric information and the voice information, and the voice information includes the tone syllable and the audio. , sound quality and so on.
- the voice password pair is encrypted by a trusted string encryption algorithm, which greatly ensures the security of the voice password storage.
- a third possible implementation in the first aspect The method further includes: starting a password setting interface of the application; receiving semantic and password information of the voice information input by the user; saving the semantics of the voice information and the password information to the voice password database, the voice information The semantics correspond one-to-one with the password information.
- the method further includes: starting a password setting interface of the application; receiving semantics and passwords of the voice information input by the user Information and biometric information; the semantic, cryptographic information and biometric information of the speech information are saved to the speech cipher database, and both the biometric information and the semantics of the speech information are in one-to-one correspondence with the cryptographic information.
- the security of the voice password database establishment may also be ensured by the user's biometric authentication.
- the biometric information includes fingerprint feature information, iris feature information, voiceprint feature information, and a person At least one of face feature information, vein feature information, and retina feature information.
- biometrics are not only simple and fast, but also uses it to identify the identity, safe, reliable and accurate.
- the semantic information and the password information of the voice information in the voice password pair are different.
- the method before the acquiring the biometric information of the user, the method further includes: generating prompt information, where The prompt information is used to prompt the user to input biometric information and voice information to complete the password input.
- an input device for a login password of an application for performing the method of any of the above first aspect or any of the possible implementations of the first aspect.
- the apparatus comprises means for performing the method of any of the above-described first aspect or any of the possible implementations of the first aspect.
- a terminal comprising: a receiver, a memory, a processor, a sensor, a microphone, and a bus system.
- the receiver, the memory, the processor, the sensor, and the microphone are connected by the bus system, the receiver is configured to receive data, the sensor is configured to acquire biometric information, and the microphone is configured to acquire voice information of a user.
- This memory is used to store instructions.
- the processor is operative to execute the instructions stored by the memory, and when the processor executes the instructions stored by the memory, the executing causes the processor to perform the method of the first aspect or any of the possible implementations of the first aspect.
- an embodiment of the present invention provides a computer storage medium for storing computer software instructions for use in the above method, including a program designed to perform the above aspects.
- FIG. 1 is a schematic diagram of an application scenario according to an embodiment of the present invention.
- FIG. 2 is a schematic flowchart of a method for inputting a login password of an application according to an embodiment of the present invention.
- FIG. 3 is another schematic flowchart of a method for inputting a login password of an application according to an embodiment of the present invention.
- FIG. 4 is a schematic flowchart of a method for establishing a voice password database according to an embodiment of the present invention.
- FIG. 5 is a schematic flowchart of an input device of a login password of an application according to an embodiment of the present invention.
- FIG. 6 is a schematic flowchart of a terminal according to an embodiment of the present invention.
- FIG. 1 is a schematic diagram of an application scenario of an embodiment of the present invention.
- the application scenario includes, but is not limited to, scenarios in which QQ, WeChat, webpage, email, or other third-party applications require password input.
- the present invention uses login QQ as an example for description.
- FIG. 2 shows a schematic flow chart of a method 100 for inputting a login password of an application according to an embodiment of the present invention. As shown in FIG. 2, the method may be performed by a terminal device, for example, by a mobile terminal, and the method 100 includes:
- S120 Determine, according to the biometric information, whether the user has login authority.
- the mobile terminal may acquire biometric information of the user through a biometric identification module such as a fingerprint recognition chip, and determine whether the user has login permission. .
- the mobile terminal may acquire the voice information of the user while acquiring the biometric information, or obtain the voice information of the user within a certain time after determining that the user has the login right, and the certain time may be 1s, 2s or other time intervals. It can be determined by the configuration of the mobile terminal, so that the mobile terminal can determine the password information corresponding thereto according to the voice information of the user, and input the password information into the password input box of the application.
- the method of the embodiment of the present invention determines the password information corresponding to the voice information by acquiring the voice information of the user, and combines the biometric information of the user to improve the password information input under the premise of ensuring the security of the password information input.
- the accuracy is simple and convenient, and the burden on the user can be reduced.
- the mobile terminal may further decrypt the password information corresponding to the voice information by using a decryption algorithm, and then obtain corresponding password information according to the voice information input by the user.
- determining whether the user has the login authority according to the biometric information in the embodiment of the present invention may be a fingerprint recognition and a hand shape recognition that are relatively mature in the current market, and may also be a person who has attracted attention and developed rapidly at the present stage. Face recognition, and possibly iris recognition, finger vein recognition, voiceprint recognition, signature recognition, gait recognition, keyboard tapping habit recognition, deoxyribose
- biometric technologies such as nucleic acid (Deoxyribonucleic acid, DNA) recognition, may even be used to authenticate users' identity in the future using biometric fusion or multimodal biometrics.
- the mobile terminal uses fingerprint identification technology to determine whether the user has login authority. For example, when the user needs to log in to QQ, after the mobile terminal determines that the user selects the password input box of QQ in FIG. 1 , the mobile terminal runs the input method control, and can prompt the user in text mode on the input method control, for example, inputting a fingerprint. And voice information can complete the password input.
- the prompt may appear on the input method control interface, or may appear in the form of a floating element, or may not appear on the mobile phone interface; the mobile terminal may also prompt the user by vibration or voice, and the present invention is not limited.
- the mobile terminal acquires the fingerprint feature information input by the user through the fingerprint button.
- the fingerprint button such as the home button of the mobile phone, can also obtain the voice information input by the user at the same time, or obtain the voice information of the user after determining the user inputting the fingerprint feature information.
- the semantic "QQ password" of the voice information and the real password "12345678" are in one-to-one correspondence, and the mobile terminal obtains the semantics of the "QQ password” input by the user after the user has the login authority through the fingerprint identification chip. Then, the real password "12345678" corresponding to the voice is determined according to the semantics.
- the mobile terminal may input the password information into the password input box of the QQ; after the mobile terminal determines that the user does not have the login right through the fingerprint identification chip, the mobile terminal may prompt the user to fail the authentication, and the prompt may be a vibration. Mode, text mode or voice mode, any way to prompt the user can be.
- the voiceprint feature information may be used to determine whether the user has login rights. For example, after the QQ is started, the mobile terminal can obtain the voice information of the user, such as “hello”, and the terminal device can perform authentication according to factors such as the syllable, audio, and sound strength of the “hello”, and determine that the user has the login. After the authority, the mobile terminal can continue to obtain the voice information of the user, and determine the password information corresponding to the voice information. It should be understood that the voice information used for authentication and the voice information used to determine the password information acquired by the mobile terminal may be the same or different.
- the password information of QQ can be determined according to the voice information "hello” input again or according to the voice information "hello” for authentication, and the semantic "hello" of the voice information is
- the password information of QQ corresponds one by one.
- the mobile terminal may further search for the password information that matches the voice information input by the user in the voice password database, where the voice password database includes at least the voice information and the password information associated with the application that the user needs to enter.
- the voice password database includes at least the voice information and the password information associated with the application that the user needs to enter.
- determining the password information corresponding to the voice information according to the voice information including:
- S142 Determine, according to the semantics of the voice information, password information that matches the semantics of the voice information in the voice password database.
- the mobile terminal may first acquire a voice password database including a voice password pair of the user, where the voice password database includes at least a voice password pair associated with the application that the user needs to enter.
- the voice password library includes at least a voice password pair of user A's login QQ.
- the voice password pair includes semantic and cryptographic information of the voice information.
- the mobile terminal When determining that the user has the login right, the mobile terminal first acquires the semantics of the voice information according to the voice recognition algorithm, and then determines the voice according to the semantics of the voice information.
- the password information corresponding to the semantics of the information, and the storage manner of the voice password pair can be as shown in Table 1.
- the real password "12345678abc?” corresponding to the "QQ password” can be determined in the voice password database; when the mobile terminal recognizes the user input When the "WeChat password” is used, the real password “87654321abc?” corresponding to the "WeChat password” can be determined in the voice password database; when the mobile terminal recognizes that the user inputs the "Alipay password”, the voice password can be used.
- the real password "Z87654321abc?” corresponding to the "Alipay password” is determined in the database; when the mobile terminal recognizes that the user inputs the "Jingdong password”, the real password corresponding to the "Jingdong password” can be determined in the voice password database. J123456abc?”.
- the acquisition of the voice password database may be established in the terminal device, or may receive a voice password database sent by other terminal devices.
- the voice password database can pass After adding the new entry in the security settings of the mobile phone to enter; after the voice password data in the mobile phone is established, when the user needs to log in to the same application on the computer, the mobile phone can be sent to the computer through Bluetooth or the like, so as to facilitate the user. You do not need to re-enter the voice password database on your computer.
- the semantic and password information of the voice information in the voice password pair may be the same or different.
- the semantics of the voice information are different from the password, thereby ensuring the security of the user when entering the password.
- the voice password pair can also be encrypted by a trusted string encryption algorithm including Data Encryption Standard (DES), Digital Signature Algorithm (DSA), and Advanced Encryption Standard (Advanced Encryption Standard). , AES) and other encryption algorithms, greatly guarantee the security of voice password storage.
- DES Data Encryption Standard
- DSA Digital Signature Algorithm
- AES Advanced Encryption Standard
- the voice password pair further includes the biometric information, and the biometric information and the semantics of the voice information are in one-to-one correspondence with the password information;
- cryptographic information that matches both the biometric information and the semantics of the speech information is determined in the speech cryptosystem.
- the voice password pair can be stored as shown in Table 2.
- the voice password pair in the voice password database may be a one-to-one correspondence between the semantics of the voice information and the password information, or the semantics of the biometric information and the voice information may be one-to-one corresponding to the password information, or may be the voice information.
- the one-to-one correspondence with the password information or the voice of the biometric information and the voice information corresponds to the password information.
- the mobile terminal can recognize the semantic "QQ password" according to the voice of the "QQ password" input by the user.
- the password "12345678" corresponding to the semantic "QQ password” is determined; the password “12345678” corresponding to the voice may also be determined according to the voice input by the user, and the voice may include the user's pitch syllable, sound quality, frequency, and the like.
- the voice information in the voice password pair is the semantic of the voice information.
- the method of the embodiment of the present invention pre-stores a plurality of voice password pairs, and correspondingly pairs the semantics of the voice information in the voice password pair with the password information or the semantics of the biometric information and the voice information in the voice password pair.
- the two correspond to the password information one by one, so that the user only needs to identify the password information corresponding to the semantics of the user's voice information or the user's creature in the pre-stored voice password database including multiple voice password pairs in subsequent use.
- the password information corresponding to the semantic information of the feature information and the voice information can complete the input of various password information; on the other hand, the combination of cloud backup or local backup provides convenience for the user to replace the terminal device.
- the method 100 further includes: starting a password setting interface of the application; receiving semantic and password information of the voice information input by the user; saving the semantic information of the voice information and the password information to the voice password database, The semantics of the voice information correspond one-to-one with the password information.
- the method 100 further includes: starting a password setting interface of the application; receiving biometric information input by the user, semantic and password information of the voice information; and the biometric information, semantics of the voice information, and the password
- the information is saved to the voice password database, and both the biometric information and the semantics of the voice information are in one-to-one correspondence with the password information.
- the biometric information of the user may be acquired; determining whether the user has the operation authority according to the biometric information; and receiving the voice information input by the user after determining that the user has the operation authority Voice and password information.
- the biometric information used by the user for authentication may be bound to the semantic and password information of the input voice information, that is, the semantic information and the password information of the voice information are associated by the biometric information to form a matching. Voice password pair and secure storage.
- the biometric information of the user may be acquired again, and the biometric information may be the same as or different from the biometric information used for the authentication input.
- the security of the voice password database is ensured by means of biometric authentication.
- the manner in which the biometric information is bound to the voice password is selected according to the classification of the terminal device. For example, when the voice password pair of various applications is established on the terminal device such as the mobile phone or the pad, the fingerprint feature information of the user and the user are selected. The semantics and password information of the input voice information are bound; when the voice password pair of various applications is established on a terminal device such as a smart TV or a large game machine, the face feature information of the user and the gait feature information of the user are set. Bind with the semantic and password information of the voice information entered by the user.
- the method 400 includes:
- step S420 The user identity is authenticated according to the fingerprint feature information. If the authentication is passed, the process proceeds to step S430. If the authentication fails, the process returns to step S410 to re-acquire the fingerprint feature information of the user.
- the fingerprint feature information of the user may be input again, and the semantic and password information of the voice information input in step S410 and step S450 may be directly bound without directly inputting the fingerprint feature information acquired in step S410. That is, the semantic and cryptographic information of the voice information is associated with the fingerprint feature information to form a matching voice password pair and securely stored.
- step S470 it is determined whether the two passwords input in step S450 and step S460 are the same. If they are the same, the voice password database is successfully established. If not, the process returns to step S450 to re-enter the real password.
- the semantic and password information of the voice information input by the user in step S440 and step S450 may be the same or different.
- the semantics of the voice information and the password are different, thereby ensuring the user when entering the password. safety.
- FIG. 5 shows a schematic block diagram of an input device 500 for a login password of an application according to an embodiment of the present invention.
- the apparatus 500 includes:
- a biometric acquisition module 510 configured to acquire biometric information of the user
- the authentication module 520 is configured to determine, according to the biometric information acquired by the biometric acquiring module 510, whether the user has the login authority;
- the voice obtaining module 530 is configured to obtain voice information of the user.
- the determining module 540 is configured to: when the authentication module 520 determines that the user has the login right, determine the password information corresponding to the voice information according to the voice information acquired by the voice acquiring module 530;
- the input module 550 is configured to input the password information determined by the determining module 540 into a password input box of the application.
- the device of the embodiment of the present invention determines the password information corresponding to the voice information by acquiring the voice information of the user, and combines the biometric information of the user to improve the password information input under the premise of ensuring the security of the password information input.
- the accuracy is simple and convenient, and the burden on the user can be reduced.
- the biometric feature acquisition module 510 and the authentication module 520 may be a fingerprint recognition chip on a hardware, a face recognition chip, and possibly an iris recognition chip, a voiceprint recognition chip, and a finger vein. Identify a variety of biometric chips such as chips.
- the device provided by the embodiment of the present invention is a terminal device, including but not limited to a mobile phone, a computer, a multimedia machine, and a game machine.
- the input password device 500 of the application password may correspond to the mobile terminal in the embodiment of the present invention, and the above-described and other operations and/or functions of the respective modules in the device 500 are respectively implemented in order to implement FIG. 2 to FIG.
- the corresponding flow of the method 100 in FIG. 4 is not repeated here for brevity.
- FIG. 6 shows a terminal 600 in accordance with an embodiment of the present invention.
- the terminal 600 includes a receiver 610, a memory 620, a processor 630, a microphone 640, a sensor 650, and a bus system 660.
- the receiver 610, the memory 620, the processor 630, the microphone 640, and the sensor 650 are connected by the bus system 660, the receiver 610 is configured to receive data, and the memory 620 is configured to store instructions, the processor 630 for executing instructions stored in the memory, the sensor 650 is for Obtaining biometric information of the user, and the microphone 640 is configured to acquire the voice information of the user.
- the processor is configured to: determine, according to the biometric information acquired by the sensor, whether the user has the login authority; and when determining that the user has the login permission, determine the password information corresponding to the voice information according to the voice information acquired by the microphone, The password information is entered into the password entry box of the application.
- the terminal of the embodiment of the present invention determines the password information corresponding to the voice information by acquiring the voice information of the user, and combines the biometric information of the user to improve the password information input under the premise of ensuring the security of the password information input.
- the accuracy is simple and convenient, and the memory burden of the user can be alleviated.
- the processor 630 may be a central processing unit (“CPU"), and the processor 630 may also be other general-purpose processors, digital signal processors (DSPs). , an application specific integrated circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, and the like.
- the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
- the microphone 640 may be a microphone including a microphone such as an aluminum belt, a moving coil, etc., and a condenser microphone and an electret microphone which are currently widely used.
- the sensor 650 can be a fingerprint sensor, a face recognition camera, a finger vein authentication sensor, an iris recognition sensor, a voiceprint recognition sensor, etc., and can be other sensors that can be used for authentication.
- the bus system 660 may include a power bus, a control bus, a status signal bus, and the like in addition to the data bus. However, for clarity of description, various buses are labeled as bus system 660 in the figure.
- each step of the foregoing method may be completed by an integrated logic circuit of hardware in the processor 630 or an instruction in a form of software.
- the steps of the method disclosed in the embodiments of the present invention may be directly implemented as a hardware processor, or may be performed by a combination of hardware and software modules in the processor.
- the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
- the storage medium is located in the memory 620, and the processor 630 reads the information in the memory 620 and completes the steps of the above method in combination with its hardware. To avoid repetition, it will not be described in detail here.
- the disclosed systems, devices, and methods may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, or an electrical, mechanical or other form of connection.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the embodiments of the present invention.
- each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
- the technical solution of the present invention contributes in essence or to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium.
- a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), A variety of media that can store program code, such as a disk or an optical disk.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
语音信息的语义 | 真实密码 |
QQ密码 | 12345678abc? |
微信密码 | 87654321abc? |
支付宝密码 | Z87654321abc? |
京东密码 | J123456abc? |
关联指纹 | 语音信息的语义 | 真实密码 |
指纹1 | QQ密码 | 12345678abc? |
指纹2 | 微信密码 | 87654321abc? |
指纹2 | 支付宝密码 | Z87654321abc? |
指纹1 | 京东密码 | J123456abc? |
Claims (21)
- 一种应用程序的登陆密码的输入方法,其特征在于,包括:获取用户的生物特征信息;根据所述生物特征信息,确定所述用户是否具有登录权限;获取所述用户的语音信息;在确定所述用户具有所述登录权限后,根据所述语音信息,确定与所述语音信息对应的密码信息;将所述密码信息输入到所述应用程序的密码输入框中。
- 根据权利要求1所述的方法,其特征在于,所述在确定所述用户具有所述登录权限后,根据所述语音信息,确定与所述语音信息对应的所述密码信息,包括:在确定所述用户具有所述登录权限后,根据所述语音信息,获取所述语音信息的语义;根据所述语音信息的语义,在语音密码数据库中确定与所述语音信息的语义匹配的所述密码信息,所述语音密码数据库包括所述用户的语音密码对,所述语音密码对包括所述语音信息的语义和所述密码信息,所述语音信息的语义与所述密码信息一一对应。
- 根据权利要求2所述的方法,其特征在于,所述语音密码对还包括所述生物特征信息,所述生物特征信息和所述语音信息的语义这两者与所述密码信息一一对应;其中,所述根据所述语音信息的语义,在所述语音密码数据库中确定与所述语音信息的语义匹配的所述密码信息,包括:根据所述生物特征信息和所述语音信息的语义,在所述语音密码数据库中确定与所述生物特征信息和所述语音信息的语义匹配的所述密码信息。
- 根据权利要求2所述的方法,其特征在于,所述方法还包括:启动所述应用程序的密码设置界面;接收所述用户输入的所述语音信息的语义和所述密码信息;将所述语音信息的语义和所述密码信息保存至所述语音密码数据库,所述语音信息的语义与所述密码信息一一对应。
- 根据权利要求3所述的方法,其特征在于,所述方法还包括:启动所述应用程序的密码设置界面;接收所述用户输入的所述语音信息的语义、所述密码信息和所述生物特征信息;将所述语音信息的语义、所述密码信息和所述生物特征信息保存至所述语音密码数据库,所述生物特征信息和所述语音信息的语义这两者与所述密码信息一一对应。
- 根据权利要求1至5中任一项所述的方法,其特征在于,所述生物特征信息包括指纹特征信息、虹膜特征信息、人脸特征信息、声纹特征信息、静脉特征信息和视网膜特征信息中的至少一种。
- 根据权利要求2至6中任一项所述的方法,其特征在于,所述语音密码对中的语音信息的语义和密码信息不同。
- 根据权利要求1至7中任一项所述的方法,其特征在于,在获取用户的生物特征信息之前,所述方法还包括:生成提示信息,所述提示信息用于提示用户输入生物特征信息和语音信息完成密码输入。
- 一种应用程序的登录密码的输入装置,其特征在于,包括:生物特征获取模块,用于获取用户的生物特征信息;鉴权模块,用于根据所述生物特征获取模块获取的所述生物特征信息,确定所述用户是否具有登录权限;语音获取模块,用于获取所述用户的语音信息;确定模块,用于在所述鉴权模块确定所述用户具有所述登录权限后,根据所述语音获取模块获取的语音信息,确定与所述语音信息对应的密码信息;输入模块,用于将所述确定模块确定的所述密码信息输入到所述应用程序的密码输入框中。
- 根据权利要求9所述的装置,其特征在于,所述确定模块包括:获取单元,用于在确定所述用户具有所述登录权限后,根据所述语音信息,获取所述语音信息的语义;确定单元,用于根据所述语音信息的语义,在语音密码数据库中确定与所述语音信息的语义匹配的所述密码信息,所述语音密码数据库包括所述用户的语音密码对,所述语音密码对包括所述语音信息的语义和所述密码信息,所述语音信息的语义与所述密码信息一一对应。
- 根据权利要求10所述的装置,其特征在于,所述语音密码对还包括所述生物特征信息,所述生物特征信息和所述语音信息的语义这两者与所述密码信息一一对应;其中,所述确定单元具体用于:根据所述生物特征信息和所述语音信息的语义,在所述语音密码数据库中确定与所述生物特征信息和所述语音信息的语义匹配的所述密码信息。
- 根据权利要求10所述的装置,其特征在于,所述装置还包括:第一启动模块,用于启动所述应用程序的密码设置界面;第一接收模块,用于接收所述用户输入的所述语音信息的语义和所述密码信息;第一保存模块,用于将所述语音信息的语义和所述密码信息保存至所述语音密码数据库,所述语音信息的语义与所述密码信息一一对应。
- 根据权利要求11所述的装置,其特征在于,所述装置还包括:第二启动模块,用于启动所述应用程序的密码设置界面;第二接收模块,用于接收所述用户输入的所述语音信息的语义、所述密码信息和所述生物特征信息;第二保存模块,用于将所述语音信息的语义、所述密码信息和所述生物特征信息保存至所述语音密码数据库,所述生物特征信息和所述语音信息的语义这两者与所述密码信息一一对应。
- 根据权利要求10至13中任一项所述的装置,其特征在于,所述语音密码对中的语音信息的语义和密码信息不同。
- 根据权利要求9至14中任一项所述的装置,其特征在于,所述装置为终端设备。
- 一种终端,其特征在于,包括:接收器、传感器、传声器、存储器、处理器和总线系统,所述接收器、所述存储器、所述处理器、所述传感器和所述传声器通过所述总线系统相连,所述传感器用于获取用户的生物特征信息;所述传声器用于获取所述用户的语音信息;所述存储器用于存储指令;所述处理器用于执行所述存储器存储的指令,执行如下操作:根据所述传感器获取的所述生物特征信息,确定所述用户是否具有登录 权限;在确定所述用户具有所述登录权限后,根据所述传声器获取的所述用户的语音信息,确定与所述语音信息对应的密码信息;将所述密码信息输入到所述应用程序的密码输入框中。
- 根据权利要求16所述的终端,其特征在于,所述处理器具体用于:在确定所述用户具有所述登录权限后,根据所述语音信息,获取所述语音信息的语义;根据所述语音信息的语义,在语音密码数据库中确定与所述语音信息的语义匹配的所述密码信息,所述语音密码数据库包括所述用户的语音密码对,所述语音密码对包括所述语音信息的语义和所述密码信息,所述语音信息的语义与所述密码信息一一对应。
- 根据权利要求16所述的终端,其特征在于,所述语音密码对还包括所述生物特征信息,所述生物特征信息和所述语音信息的语义这两者与所述密码信息一一对应,所述处理器具体用于:根据所述生物特征信息和所述语音信息的语义,在所述语音密码数据库中确定与所述生物特征信息和所述语音信息的语义匹配的所述密码信息。
- 根据权利要求17所述的终端,其特征在于,所述处理器还用于:启动所述应用程序的密码设置界面;接收所述用户输入的所述语音信息的语义和所述密码信息;将所述语音信息的语义和所述密码信息保存至所述语音密码数据库,所述语音信息的语义与所述密码信息一一对应。
- 根据权利要求18所述的终端,其特征在于,所述处理器还用于:启动所述应用程序的密码设置界面;接收所述用户输入的所述语音信息的语义、所述密码信息和所述生物特征信息;将所述生物特征信息、所述语音信息的语义和所述密码信息保存至所述语音密码数据库,所述生物特征信息和所述语音信息这两者与所述密码信息一一对应。
- 根据权利要求17至20中任一项所述的终端,其特征在于,所述语音密码对中的语音信息的语义和密码信息不同。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/072,107 US11126702B2 (en) | 2016-01-22 | 2016-01-22 | Application login password input method and apparatus, and terminal |
KR1020187023423A KR102124445B1 (ko) | 2016-01-22 | 2016-01-22 | 애플리케이션의 로그인 패스워드를 입력하기 위한 방법, 디바이스 및 단말기 |
EP16885717.5A EP3399452B1 (en) | 2016-01-22 | 2016-01-22 | Method, device and terminal for inputting login password of an application |
CN201680025899.XA CN107533598B (zh) | 2016-01-22 | 2016-01-22 | 应用程序的登录密码的输入方法、装置和终端 |
PCT/CN2016/071786 WO2017124444A1 (zh) | 2016-01-22 | 2016-01-22 | 应用程序的登录密码的输入方法、装置和终端 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2016/071786 WO2017124444A1 (zh) | 2016-01-22 | 2016-01-22 | 应用程序的登录密码的输入方法、装置和终端 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017124444A1 true WO2017124444A1 (zh) | 2017-07-27 |
Family
ID=59361258
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/071786 WO2017124444A1 (zh) | 2016-01-22 | 2016-01-22 | 应用程序的登录密码的输入方法、装置和终端 |
Country Status (5)
Country | Link |
---|---|
US (1) | US11126702B2 (zh) |
EP (1) | EP3399452B1 (zh) |
KR (1) | KR102124445B1 (zh) |
CN (1) | CN107533598B (zh) |
WO (1) | WO2017124444A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108694314A (zh) * | 2018-05-15 | 2018-10-23 | 安徽天卓信息技术有限公司 | 一种计算机安全登录管理系统及方法 |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021040132A1 (ko) | 2019-08-29 | 2021-03-04 | 최희찬 | 히든 패스워드 입력시스템 및 이를 이용한 패스워드 입력방법 |
KR20190107607A (ko) | 2019-08-29 | 2019-09-20 | 최희찬 | 히든 패스워드 입력시스템 및 이를 이용한 패스워드 입력방법 |
US11521607B2 (en) * | 2019-10-01 | 2022-12-06 | Lenovo (Singapore) Pte. Ltd. | Login based command activation |
CN112287317B (zh) * | 2020-10-26 | 2024-03-22 | 深圳市创智成科技股份有限公司 | 一种用户信息输入方法及电子设备 |
CN112231693A (zh) * | 2020-11-03 | 2021-01-15 | 深兰科技(上海)有限公司 | 管理系统的权限切换方法、权限切换装置 |
CN117057797A (zh) * | 2023-08-15 | 2023-11-14 | 东风汽车集团股份有限公司 | 一种汽车支付方法、装置及车辆 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090133117A1 (en) * | 2007-11-19 | 2009-05-21 | Avaya Inc. | Authentication Frequency And Challenge Type Based On Application Usage |
CN103390123A (zh) * | 2012-05-08 | 2013-11-13 | 腾讯科技(深圳)有限公司 | 用户认证方法、用户认证装置及智能终端 |
CN103606047A (zh) * | 2013-11-22 | 2014-02-26 | 深圳市亚略特生物识别科技有限公司 | 密码管理系统 |
CN104331652A (zh) * | 2014-10-08 | 2015-02-04 | 无锡指网生物识别科技有限公司 | 指纹和语音识别的电子设备的动态密码生成方法 |
CN104331654A (zh) * | 2014-10-27 | 2015-02-04 | 深圳市汇顶科技股份有限公司 | 基于生物特征识别的操作方法和装置 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103310339A (zh) | 2012-03-15 | 2013-09-18 | 凹凸电子(武汉)有限公司 | 身份识别装置和方法以及支付系统和方法 |
US20150056951A1 (en) * | 2013-08-21 | 2015-02-26 | GM Global Technology Operations LLC | Vehicle telematics unit and method of operating the same |
CN103902872A (zh) * | 2014-04-10 | 2014-07-02 | 宫雅卓 | 基于虹膜识别的密码管理系统及方法 |
US20160246953A1 (en) * | 2015-02-19 | 2016-08-25 | Maria Wentzell | User fingerprint authentication system |
-
2016
- 2016-01-22 CN CN201680025899.XA patent/CN107533598B/zh active Active
- 2016-01-22 US US16/072,107 patent/US11126702B2/en active Active
- 2016-01-22 KR KR1020187023423A patent/KR102124445B1/ko not_active Expired - Fee Related
- 2016-01-22 EP EP16885717.5A patent/EP3399452B1/en active Active
- 2016-01-22 WO PCT/CN2016/071786 patent/WO2017124444A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090133117A1 (en) * | 2007-11-19 | 2009-05-21 | Avaya Inc. | Authentication Frequency And Challenge Type Based On Application Usage |
CN103390123A (zh) * | 2012-05-08 | 2013-11-13 | 腾讯科技(深圳)有限公司 | 用户认证方法、用户认证装置及智能终端 |
CN103606047A (zh) * | 2013-11-22 | 2014-02-26 | 深圳市亚略特生物识别科技有限公司 | 密码管理系统 |
CN104331652A (zh) * | 2014-10-08 | 2015-02-04 | 无锡指网生物识别科技有限公司 | 指纹和语音识别的电子设备的动态密码生成方法 |
CN104331654A (zh) * | 2014-10-27 | 2015-02-04 | 深圳市汇顶科技股份有限公司 | 基于生物特征识别的操作方法和装置 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108694314A (zh) * | 2018-05-15 | 2018-10-23 | 安徽天卓信息技术有限公司 | 一种计算机安全登录管理系统及方法 |
Also Published As
Publication number | Publication date |
---|---|
EP3399452B1 (en) | 2020-03-25 |
US20190073459A1 (en) | 2019-03-07 |
KR20180104657A (ko) | 2018-09-21 |
EP3399452A1 (en) | 2018-11-07 |
CN107533598B (zh) | 2021-08-20 |
CN107533598A (zh) | 2018-01-02 |
KR102124445B1 (ko) | 2020-06-18 |
EP3399452A4 (en) | 2018-12-19 |
US11126702B2 (en) | 2021-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017124444A1 (zh) | 应用程序的登录密码的输入方法、装置和终端 | |
JP6882254B2 (ja) | 生体特徴に基づく安全性検証方法、クライアント端末、及びサーバ | |
US10255425B2 (en) | Secure authentication protocol systems and methods | |
US9716593B2 (en) | Leveraging multiple biometrics for enabling user access to security metadata | |
US11038684B2 (en) | User authentication using a companion device | |
JP2017530457A (ja) | アイデンティティ認証方法ならびに装置、端末及びサーバ | |
US20180294965A1 (en) | Apparatus, method and computer program product for authentication | |
US11930116B2 (en) | Securely communicating service status in a distributed network environment | |
US11075758B2 (en) | Access security system and method | |
CN108171033A (zh) | 智能终端的混合身份验证方法、装置、存储介质和终端 | |
KR102317598B1 (ko) | 서버, 서버의 제어 방법 및 단말 장치 | |
US11120120B2 (en) | Method and system for secure password storage | |
TWI584146B (zh) | 基於人臉識別的整合登錄系統及方法 | |
US20180285539A1 (en) | Multifactor strong authentication | |
WO2016150363A1 (zh) | 一种管理分级密码的方法和装置 | |
WO2017071498A1 (zh) | 一种身份验证方法和装置 | |
WO2017185683A1 (zh) | 基于生物识别信息的认证方法和认证系统、电子设备 | |
WO2016112792A1 (zh) | 身份认证方法及装置 | |
Nugroho et al. | Iris recognition for authentication: development on a lighter computing platform | |
CN110084014A (zh) | 信息输入方法、装置、计算机设备和存储介质 | |
CN114826585B (zh) | 一种利用用户识别设备来启动计算机设备的方法 | |
US9405891B1 (en) | User authentication | |
WO2016183910A1 (zh) | 一种无线连接方法、装置和终端 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16885717 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2016885717 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2016885717 Country of ref document: EP Effective date: 20180802 |
|
ENP | Entry into the national phase |
Ref document number: 20187023423 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020187023423 Country of ref document: KR |