[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105072611A - Verification method and terminal - Google Patents

Verification method and terminal Download PDF

Info

Publication number
CN105072611A
CN105072611A CN201510398897.2A CN201510398897A CN105072611A CN 105072611 A CN105072611 A CN 105072611A CN 201510398897 A CN201510398897 A CN 201510398897A CN 105072611 A CN105072611 A CN 105072611A
Authority
CN
China
Prior art keywords
terminal
user
hotspot
access pin
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510398897.2A
Other languages
Chinese (zh)
Inventor
曾元清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510398897.2A priority Critical patent/CN105072611A/en
Publication of CN105072611A publication Critical patent/CN105072611A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention provides a verification method and terminals. The method includes the steps: receiving, by the first terminal, a wireless hot spot starting instruction input by a user, and establishing a wireless hot spot; detecting the parameter with which the user shakes or knocks the first terminal, and generating an access password of the wireless hot spot; receiving a verification password generated by the second terminal through shake or knock, and determining whether the verification password is the same with the access password; and allowing the second terminal to access the wireless hot spot if the verification password is the same with the access password. According to the embodiment of the invention, the access password of the wireless hot spot can be generated by detecting the parameter with which the user shakes or knocks the first terminal, so convenience and interest of password memory access can be improved, and the usability of the terminals is improved.

Description

A kind of method of checking and terminal
Technical field
The present invention relates to communication technical field, be specifically related to a kind of method and terminal of checking.
Background technology
Along with the development of electronic technology and terminal technology, market there is various terminal equipment, such as mobile phone, panel computer, notebook computer, Intelligent bracelet etc.Utilize these terminal equipments, user not only can work, amusement, can also and other users carry out file transfer, voice-enabled chat, Video chat even move flow share etc. various communication activity.
Network traffics are carried out when sharing between terminal, prior art is manually inputted the access pin of hotspot by a terminal open wireless focus usually by user, other-end open wireless fidelity (Wireless-Fidelity, be called for short Wi-Fi) function, search hotspot also accesses after inputting access pin, thus the flow of the terminal of hotspot can be used as to surf the Net.Access pin can be arranged by user or system generates, and for access side, need to remember oneself unfamiliar access pin, easily make mistakes, Consumer's Experience is not good.
Summary of the invention
Embodiments provide a kind of method and terminal of checking, not easily remember to solve access pin, the problem of easily makeing mistakes during access.
Embodiment of the present invention first aspect provides a kind of method of checking, comprising:
First terminal receives the hotspot enabled instruction of user's input, sets up hotspot;
Detect user to rock described first terminal or knock the parameter of described first terminal, generate the access pin of described hotspot;
Receive the second terminal by rocking or knock the authentication password of generation, judge that whether described authentication password is identical with access pin;
If described authentication password is identical with described access pin, then described second terminal is allowed to access described hotspot.
Wherein, described detection user rocks the parameter of described first terminal, generates the access pin of described hotspot, comprising:
Detect direction and number of times that user rocks described first terminal;
When user stops rocking after described first terminal reaches Preset Time, rock according to the user detected the access pin that the direction of described first terminal and number of times generate described hotspot.
Wherein, described detection user knocks the parameter of described first terminal, generates the access pin of described hotspot, comprising:
Detect the number of times that user knocks described first terminal zones of different successively;
When user stops knocking after described first terminal reaches Preset Time, knock according to the user detected the access pin that the region of described first terminal and number of times generate described hotspot.
Wherein, described detection user knocks the parameter of described first terminal, generates the access pin of described hotspot, comprising:
Within the continuous print time interval, detect the number of times that user knocks described first terminal in each time interval successively;
When user stops knocking after described first terminal reaches Preset Time, the number of times knocking described first terminal according to the user detected within each time interval generates the access pin of described hotspot.
Wherein, described second terminal is identical with the mode that described first terminal generates access pin by rocking or knock the mode generating authentication password.
Correspondingly, embodiment of the present invention second aspect provides a kind of terminal, can comprise:
Focus sets up module, for receiving the hotspot enabled instruction of user's input, sets up hotspot;
Detecting generation module, for detecting the parameter that user rocks described first terminal or knocks described first terminal, generating the access pin of described hotspot;
Password judge module, for receiving the second terminal by rocking or knock the authentication password of generation, judges that whether described authentication password is identical with access pin;
Access module, if identical with described access pin for described authentication password, then allows described second terminal to access described hotspot.
Wherein, described detection generation module specifically for:
Detect direction and number of times that user rocks described first terminal;
When user stops rocking after described first terminal reaches Preset Time, rock according to the user detected the access pin that the direction of described first terminal and number of times generate described hotspot.
Wherein, described detection generation module specifically for:
Detect the number of times that user knocks described first terminal zones of different successively;
When user stops knocking after described first terminal reaches Preset Time, knock according to the user detected the access pin that the region of described first terminal and number of times generate described hotspot.
Wherein, described detection generation module specifically for:
Within the continuous print time interval, detect the number of times that user knocks described first terminal in each time interval successively;
When user stops knocking after described first terminal reaches Preset Time, the number of times knocking described first terminal according to the user detected within each time interval generates the access pin of described hotspot.
Wherein, described second terminal is identical with the mode that described first terminal generates access pin by rocking or knock the mode generating authentication password.
First terminal is after setting up hotspot, the parameter of rocking or knocking first terminal by detecting user generates access pin, receive the second terminal by rocking or knock the authentication password of generation, after judgement two passwords are identical, allow the second terminal access hotspot.Thus realize the object that the second terminal uses the mobile flow online of first terminal.Because access pin is by rocking or knocking generation, user, without the need to remembering complicated password, is beneficial to user's memory, improves the ease for use of terminal, improve interest and the Consumer's Experience of password authentification.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the first embodiment schematic flow sheet of the method for a kind of checking that the embodiment of the present invention provides;
Fig. 2 is the second embodiment schematic flow sheet of the method for a kind of checking that the embodiment of the present invention provides;
Fig. 3 is the 3rd embodiment schematic flow sheet of the method for a kind of checking that the embodiment of the present invention provides;
Fig. 4 is the 4th embodiment schematic flow sheet of the method for a kind of checking that the embodiment of the present invention provides;
Fig. 5 is the first embodiment composition schematic diagram of a kind of terminal that the embodiment of the present invention provides;
Fig. 6 is the second embodiment composition schematic diagram of a kind of terminal that the embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Terminal in the embodiment of the present invention can comprise possess camera function smart mobile phone (as Android phone, iOS mobile phone, WindowsPhone mobile phone etc.), panel computer, digital camera, palmtop PC, notebook computer, mobile internet device (MID, or Wearable etc. MobileInternetDevices), above-mentioned terminal is only citing, and non exhaustive, including but not limited to above-mentioned terminal.
Refer to Fig. 1, the first embodiment schematic flow sheet of the method for a kind of checking provided for the embodiment of the present invention.The method of the checking described in the present embodiment, comprises the following steps:
S101, first terminal receive the hotspot enabled instruction of user's input, set up hotspot.
S102, detection user rock described first terminal or knock the parameter of described first terminal, generate the access pin of described hotspot.
Wherein, when detecting the parameter of rocking or knocking, detect by the 3-axis acceleration sensor of terminal, gravity sensor, inertial sensor, gyroscope, range sensor or displacement transducer etc.
Alternatively, the parameter of rocking herein can include but not limited to that the direction of rocking is as up and down etc., the number of times rocked as once, two inferior.
Can generate specific password by the combination of direction and number of times, this password can be numeral also can be letter, and the embodiment of the present invention is not limited in any way.
Such as, user rocks mobile phone 1 time towards a left side, then rocks mobile phone towards the right 2 times, then rocks 3 times towards a left side, rock 4 times towards the right again, user rocks mobile phone 5 times towards a left side, then rocks mobile phone towards the right 6 times, rock 7 times towards a left side again, then rock 8 times towards the right, then the password that can generate pure digi-tal is 12345678.
Or, 26 English alphabets can also be mapped according to direction and number of times, as left rolling 1-13 difference corresponding A-N, right rolling 1-13 corresponding O-Z of difference, then user rocks mobile phone 1 time towards a left side, mobile phone is rocked 2 times again towards the right, 3 times are rocked again towards a left side, 4 times are rocked again towards the right, user rocks mobile phone 5 times towards a left side, mobile phone is rocked 6 times again towards the right, 7 times are rocked again towards a left side, 8 times are rocked again towards the right, by generating cipher APCRETGV, certainly, in order to reduce the number of times rocked, more direction can be introduced, such as introduce 4 directions up and down, each direction is maximum configures 6 to 7 times rock respectively.
Or, can also numeral combine with letter with the fail safe improving access pin, the corresponding numeral of the number of times that can rock in some directions, and the number of times correspondence letter rocked on other directions.The mapping class of concrete principle and above-mentioned letter seemingly, repeats no more herein.
And the parameter of knocking can include but not limited to the region of knocking and the number of times knocked.
Such as, knock terminal screen on along 3 times, then to knock under terminal screen along 2 times, then can generate numerical ciphers 32, or also can by letter or numbers corresponding different with different number of times for zones of different, concrete configuration process to rock similar, repeat no more herein.
Or, only can also knock the effect that the same area or setting knock arbitrary region identical, but the such as 3 seconds identical time interval was set, count within each time interval, then knocking in series of time intervals is counted and numeral or alphabetical corresponding, thus obtain access pin.Such as, in each 3 seconds, knock 1,2,3,4,5,6,7,8 time successively, and set point number is corresponding with numeral, then by the access pin of generation 12345678, if set point number is corresponding with lexicographic order, then will generates the access pin of ABCDEFGH.
Alternatively, can sound production prompt user at the end of each time interval, so that user is knocking accurately.
It should be noted that, after access pin generates, user can be shown in the form of text and check so that whether user confirms the access pin that generates correctly or whether be the access pin that user wants; Or also can directly be stored on first terminal in an encrypted form, the authentication password sent for first terminal and the second terminal be carried out bottom and is compared, and the present invention is not limited in any way.
S103, receive the second terminal by rocking or knock the authentication password of generation, judge that whether described authentication password is identical with access pin.If so, then perform step S104, otherwise perform step S105.
Alternatively, described second terminal is identical with the mode that described first terminal generates access pin by rocking or knock the mode generating authentication password.
S104, described second terminal is allowed to access described hotspot.
After the second terminal accesses described hotspot, the mobile flow of first terminal just can be used to surf the Net.
S105, refuse described second terminal access request and point out described second terminal access pin mistake.
Now, want that the user accessing hotspot again can rock the second terminal or knock the second terminal, attempt again accessing, and for first terminal, for the second terminal of continuous several times input error password, the access request of the second terminal no longer can be received within a certain period of time.
First terminal is after setting up hotspot, the parameter of rocking or knocking first terminal by detecting user generates access pin, receive the second terminal by rocking or knock the authentication password of generation, after judgement two passwords are identical, allow the second terminal access hotspot.Thus realize the object that the second terminal uses the mobile flow online of first terminal.Because access pin is by rocking or knocking generation, user, without the need to remembering complicated password, is beneficial to user's memory, improves the ease for use of terminal, improve interest and the Consumer's Experience of password authentification.
Refer to Fig. 2, the second embodiment schematic flow sheet of the method for a kind of checking provided for the embodiment of the present invention.The method of the checking described in the present embodiment, comprises the following steps:
S201, first terminal receive the hotspot enabled instruction of user's input, set up hotspot.
S202, detection user rock direction and the number of times of described first terminal.
Wherein, when detecting the direction of rocking and number of times, detect by the 3-axis acceleration sensor of terminal, gravity sensor, inertial sensor, gyroscope, range sensor or displacement transducer etc.
S203, stop rocking after described first terminal reaches Preset Time as user, rock according to the user detected the access pin that the direction of described first terminal and number of times generate described hotspot.
Can generate specific password by the combination of direction and number of times, this password can be numeral also can be letter, and the embodiment of the present invention is not limited in any way.
Such as, user rocks mobile phone 1 time towards a left side, then rocks mobile phone towards the right 2 times, then rocks 3 times towards a left side, rock 4 times towards the right again, user rocks mobile phone 5 times towards a left side, then rocks mobile phone towards the right 6 times, rock 7 times towards a left side again, then rock 8 times towards the right, then the password that can generate pure digi-tal is 12345678.
Or, 26 English alphabets can also be mapped according to direction and number of times, as left rolling 1-13 difference corresponding A-N, right rolling 1-13 corresponding O-Z of difference, then user rocks mobile phone 1 time towards a left side, mobile phone is rocked 2 times again towards the right, 3 times are rocked again towards a left side, 4 times are rocked again towards the right, user rocks mobile phone 5 times towards a left side, mobile phone is rocked 6 times again towards the right, 7 times are rocked again towards a left side, 8 times are rocked again towards the right, by generating cipher APCRETGV, certainly, in order to reduce the number of times rocked, more direction can be introduced, such as introduce 4 directions up and down, each direction is maximum configures 6 to 7 times rock respectively.
Or, can also numeral combine with letter with the fail safe improving access pin, the corresponding numeral of the number of times that can rock in some directions, and the number of times correspondence letter rocked on other directions.The mapping class of concrete principle and above-mentioned letter seemingly, repeats no more herein.
S204, receive the second terminal by rocking or knock the authentication password of generation, judge that whether described authentication password is identical with access pin.If so, then perform step S205, otherwise perform step S206.
Alternatively, described second terminal is identical with the mode that described first terminal generates access pin by rocking or knock the mode generating authentication password.
S205, described second terminal is allowed to access described hotspot.
After the second terminal accesses described hotspot, the mobile flow of first terminal just can be used to surf the Net.
S206, refuse described second terminal access request and point out described second terminal access pin mistake.
Now, want that the user accessing hotspot again can rock the second terminal or knock the second terminal, attempt again accessing, and for first terminal, for the second terminal of continuous several times input error password, the access request of the second terminal no longer can be received within a certain period of time.
The access pin that the direction of first terminal and number of times generate hotspot is rocked by detecting user, simple and practical, be beneficial to user's memory.
Refer to Fig. 3, the 3rd embodiment schematic flow sheet of the method for a kind of checking provided for the embodiment of the present invention.The method of the checking described in the present embodiment, comprises the following steps:
S301, first terminal receive the hotspot enabled instruction of user's input, set up hotspot.
S302, successively detection user knock the number of times of described first terminal zones of different.
Wherein, when detecting the parameter of knocking, detect by the 3-axis acceleration sensor of terminal, gravity sensor, inertial sensor, gyroscope, range sensor or displacement transducer etc.
S303, stop knocking after described first terminal reaches Preset Time as user, knock according to the user detected the access pin that the region of described first terminal and number of times generate described hotspot.
The parameter of knocking can include but not limited to the region of knocking and the number of times knocked.
Such as, knock terminal screen on along 3 times, then to knock under terminal screen along 2 times, then can generate numerical ciphers 32, or also can by letter or numbers corresponding different with different number of times for zones of different, concrete configuration process to rock similar, repeat no more herein.
Alternatively, can sound production prompt user at the end of each time interval, so that user is knocking accurately.
It should be noted that, after access pin generates, user can be shown in the form of text and check so that whether user confirms the access pin that generates correctly or whether be the access pin that user wants; Or also can directly be stored on first terminal in an encrypted form, the authentication password sent for first terminal and the second terminal be carried out bottom and is compared, and the present invention is not limited in any way.
S304, receive the second terminal by rocking or knock the authentication password of generation, judge that whether described authentication password is identical with access pin.If so, then perform step S205, otherwise perform step S206.
Alternatively, described second terminal is identical with the mode that described first terminal generates access pin by rocking or knock the mode generating authentication password.
S305, described second terminal is allowed to access described hotspot.
After the second terminal accesses described hotspot, the mobile flow of first terminal just can be used to surf the Net.
S306, refuse described second terminal access request and point out described second terminal access pin mistake.
Now, want that the user accessing hotspot again can rock the second terminal or knock the second terminal, attempt again accessing, and for first terminal, for the second terminal of continuous several times input error password, the access request of the second terminal no longer can be received within a certain period of time.
The number of times knocking first terminal zones of different by detecting user generates the access pin of hotspot, simple and practical, is beneficial to user's memory.
Refer to Fig. 4, the 4th embodiment schematic flow sheet of the method for a kind of checking provided for the embodiment of the present invention.The method of the checking described in the present embodiment, comprises the following steps:
S401, first terminal receive the hotspot enabled instruction of user's input, set up hotspot.
S402, within the continuous print time interval, detect user successively in each time interval, knock the number of times of described first terminal.
Wherein, when detecting the parameter of rocking or knocking, detect by the 3-axis acceleration sensor of terminal, gravity sensor, inertial sensor, gyroscope, range sensor or displacement transducer etc.
S403, stop knocking after described first terminal reaches Preset Time as user, the number of times knocking described first terminal according to the user detected within each time interval generates the access pin of described hotspot.
Only can knock the effect that the same area or setting knock arbitrary region identical, but the such as 3 seconds identical time interval was set, count within each time interval, then knocking in series of time intervals is counted and numeral or alphabetical corresponding, thus obtain access pin.Such as, in each 3 seconds, knock 1,2,3,4,5,6,7,8 time successively, and set point number is corresponding with numeral, then by the access pin of generation 12345678, if set point number is corresponding with lexicographic order, then will generates the access pin of ABCDEFGH.
Alternatively, can sound production prompt user at the end of each time interval, so that user is knocking accurately.
It should be noted that, after access pin generates, user can be shown in the form of text and check so that whether user confirms the access pin that generates correctly or whether be the access pin that user wants; Or also can directly be stored on first terminal in an encrypted form, the authentication password sent for first terminal and the second terminal be carried out bottom and is compared, and the present invention is not limited in any way.
S404, receive the second terminal by rocking or knock the authentication password of generation, judge that whether described authentication password is identical with access pin.If so, then perform step S205, otherwise perform step S206.
Alternatively, described second terminal is identical with the mode that described first terminal generates access pin by rocking or knock the mode generating authentication password.
S405, described second terminal is allowed to access described hotspot.
After the second terminal accesses described hotspot, the mobile flow of first terminal just can be used to surf the Net.
S406, refuse described second terminal access request and point out described second terminal access pin mistake.
Now, want that the user accessing hotspot again can rock the second terminal or knock the second terminal, attempt again accessing, and for first terminal, for the second terminal of continuous several times input error password, the access request of the second terminal no longer can be received within a certain period of time.
The number of times knocking first terminal by detecting user generates the access pin of hotspot, simple and practical, is beneficial to user's memory.
Referring to Fig. 5, is the first example structure schematic diagram of a kind of terminal that the embodiment of the present invention provides.Terminal described in the present embodiment, comprising: focus is set up module 100, detected generation module 200, password judge module 300 and access module 400, wherein,
Focus sets up module 100, for receiving the hotspot enabled instruction of user's input, sets up hotspot;
Detecting generation module 200, for detecting the parameter that user rocks described first terminal or knocks described first terminal, generating the access pin of described hotspot;
Wherein, when detecting the parameter of rocking or knocking, detect by the 3-axis acceleration sensor of terminal, gravity sensor, inertial sensor, gyroscope, range sensor or displacement transducer etc.
Alternatively, the parameter of rocking herein can include but not limited to that the direction of rocking is as up and down etc., the number of times rocked as once, two inferior.
Can generate specific password by the combination of direction and number of times, this password can be numeral also can be letter, and the embodiment of the present invention is not limited in any way.
Such as, user rocks mobile phone 1 time towards a left side, then rocks mobile phone towards the right 2 times, then rocks 3 times towards a left side, rock 4 times towards the right again, user rocks mobile phone 5 times towards a left side, then rocks mobile phone towards the right 6 times, rock 7 times towards a left side again, then rock 8 times towards the right, then the password that can generate pure digi-tal is 12345678.
Or, 26 English alphabets can also be mapped according to direction and number of times, as left rolling 1-13 difference corresponding A-N, right rolling 1-13 corresponding O-Z of difference, then user rocks mobile phone 1 time towards a left side, mobile phone is rocked 2 times again towards the right, 3 times are rocked again towards a left side, 4 times are rocked again towards the right, user rocks mobile phone 5 times towards a left side, mobile phone is rocked 6 times again towards the right, 7 times are rocked again towards a left side, 8 times are rocked again towards the right, by generating cipher APCRETGV, certainly, in order to reduce the number of times rocked, more direction can be introduced, such as introduce 4 directions up and down, each direction is maximum configures 6 to 7 times rock respectively.
Or, can also numeral combine with letter with the fail safe improving access pin, the corresponding numeral of the number of times that can rock in some directions, and the number of times correspondence letter rocked on other directions.The mapping class of concrete principle and above-mentioned letter seemingly, repeats no more herein.
And the parameter of knocking can include but not limited to the region of knocking and the number of times knocked.
Such as, knock terminal screen on along 3 times, then to knock under terminal screen along 2 times, then can generate numerical ciphers 32, or also can by letter or numbers corresponding different with different number of times for zones of different, concrete configuration process to rock similar, repeat no more herein.
Or, only can also knock the effect that the same area or setting knock arbitrary region identical, but the such as 3 seconds identical time interval was set, count within each time interval, then knocking in series of time intervals is counted and numeral or alphabetical corresponding, thus obtain access pin.Such as, in each 3 seconds, knock 1,2,3,4,5,6,7,8 time successively, and set point number is corresponding with numeral, then by the access pin of generation 12345678, if set point number is corresponding with lexicographic order, then will generates the access pin of ABCDEFGH.
Alternatively, can sound production prompt user at the end of each time interval, so that user is knocking accurately.
It should be noted that, after access pin generates, user can be shown in the form of text and check so that whether user confirms the access pin that generates correctly or whether be the access pin that user wants; Or also can directly be stored on first terminal in an encrypted form, the authentication password sent for first terminal and the second terminal be carried out bottom and is compared, and the present invention is not limited in any way.
Password judge module 300, for receiving the second terminal by rocking or knock the authentication password of generation, judges that whether described authentication password is identical with access pin;
Access module 400, if identical with described access pin for described authentication password, then allows described second terminal to access described hotspot.
Optionally, described detection generation module 200 specifically for:
Detect direction and number of times that user rocks described first terminal;
When user stops rocking after described first terminal reaches Preset Time, rock according to the user detected the access pin that the direction of described first terminal and number of times generate described hotspot.
Alternatively, described detection generation module 200 specifically for:
Detect the number of times that user knocks described first terminal zones of different successively;
When user stops knocking after described first terminal reaches Preset Time, knock according to the user detected the access pin that the region of described first terminal and number of times generate described hotspot.
Alternatively, described detection generation module 200 specifically for:
Within the continuous print time interval, detect the number of times that user knocks described first terminal in each time interval successively;
When user stops knocking after described first terminal reaches Preset Time, the number of times knocking described first terminal according to the user detected within each time interval generates the access pin of described hotspot.
Alternatively, described second terminal is identical with the mode that described first terminal generates access pin by rocking or knock the mode generating authentication password.
Referring to Fig. 5, is the second example structure schematic diagram of a kind of terminal that the embodiment of the present invention provides.Terminal described in the present embodiment, comprising:
At least one input equipment 1000; At least one output equipment 2000; At least one processor 3000, such as CPU; With memory 4000, above-mentioned input equipment 1000, output equipment 2000, processor 3000 are connected by bus 5000 with memory 4000.
Wherein, above-mentioned input equipment 1000 specifically can be screen or the keyboard of terminal, for receiving the hotspot enabled instruction of user's input.
Above-mentioned output equipment 2000 specifically can be the wireless module of terminal, for setting up hotspot, and broadcast.
Above-mentioned memory 4000 can be high-speed RAM memory, also can be non-labile memory (non-volatilememory), such as magnetic disc store.Above-mentioned memory 4000 is for storing batch processing code, and above-mentioned processor 3000, for calling the program code stored in memory 4000, performs and operates as follows:
Detect user to rock described first terminal or knock the parameter of described first terminal, generate the access pin of described hotspot;
Receive the second terminal by rocking or knock the authentication password of generation, judge that whether described authentication password is identical with access pin;
If described authentication password is identical with described access pin, then described second terminal is allowed to access described hotspot.
In the execution mode that some are feasible, above-mentioned processor 3000 specifically for:
Detect direction and number of times that user rocks described first terminal;
When user stops rocking after described first terminal reaches Preset Time, rock according to the user detected the access pin that the direction of described first terminal and number of times generate described hotspot.
In the execution mode that some are feasible, above-mentioned processor 3000 specifically for:
Detect the number of times that user knocks described first terminal zones of different successively;
When user stops knocking after described first terminal reaches Preset Time, knock according to the user detected the access pin that the region of described first terminal and number of times generate described hotspot.
In the execution mode that some are feasible, above-mentioned processor 3000 specifically for:
Within the continuous print time interval, detect the number of times that user knocks described first terminal in each time interval successively;
When user stops knocking after described first terminal reaches Preset Time, the number of times knocking described first terminal according to the user detected within each time interval generates the access pin of described hotspot.
In the execution mode that some are feasible, described second terminal is identical with the mode that described first terminal generates access pin by rocking or knock the mode generating authentication password.
In specific implementation, input equipment 1000 described in the embodiment of the present invention, output equipment 2000 and processor 3000 can perform the first embodiment of the method for a kind of shared file that the embodiment of the present invention provides, the second embodiment, the 3rd embodiment and the implementation described in the 4th embodiment, also can perform the implementation of the terminal described in the first embodiment of a kind of terminal that the embodiment of the present invention provides, not repeat them here.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory is called for short ROM) or random access memory (RandomAccessMemory is called for short RAM) etc.
Above the method for a kind of checking that the embodiment of the present invention provides and terminal are described in detail, apply specific case herein to set forth principle of the present invention and execution mode, the explanation of above embodiment just understands method of the present invention and core concept thereof for helping; Meanwhile, for one of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.

Claims (10)

1. a method for checking, is characterized in that, comprising:
First terminal receives the hotspot enabled instruction of user's input, sets up hotspot;
Detect user to rock described first terminal or knock the parameter of described first terminal, generate the access pin of described hotspot;
Receive the second terminal by rocking or knock the authentication password of generation, judge that whether described authentication password is identical with access pin;
If described authentication password is identical with described access pin, then described second terminal is allowed to access described hotspot.
2. method according to claim 1, is characterized in that, described detection user rocks the parameter of described first terminal, generates the access pin of described hotspot, comprising:
Detect direction and number of times that user rocks described first terminal;
When user stops rocking after described first terminal reaches Preset Time, rock according to the user detected the access pin that the direction of described first terminal and number of times generate described hotspot.
3. method according to claim 1, is characterized in that, described detection user knocks the parameter of described first terminal, generates the access pin of described hotspot, comprising:
Detect the number of times that user knocks described first terminal zones of different successively;
When user stops knocking after described first terminal reaches Preset Time, knock according to the user detected the access pin that the region of described first terminal and number of times generate described hotspot.
4. method according to claim 1, is characterized in that, described detection user knocks the parameter of described first terminal, generates the access pin of described hotspot, comprising:
Within the continuous print time interval, detect the number of times that user knocks described first terminal in each time interval successively;
When user stops knocking after described first terminal reaches Preset Time, the number of times knocking described first terminal according to the user detected within each time interval generates the access pin of described hotspot.
5. the method according to any one of claim 1-4, is characterized in that, described second terminal is identical with the mode that described first terminal generates access pin by rocking or knock the mode generating authentication password.
6. a terminal, is characterized in that, comprising:
Focus sets up module, for receiving the hotspot enabled instruction of user's input, sets up hotspot;
Detecting generation module, for detecting the parameter that user rocks described first terminal or knocks described first terminal, generating the access pin of described hotspot;
Password judge module, for receiving the second terminal by rocking or knock the authentication password of generation, judges that whether described authentication password is identical with access pin;
Access module, if identical with described access pin for described authentication password, then allows described second terminal to access described hotspot.
7. terminal according to claim 6, is characterized in that, described detection generation module specifically for:
Detect direction and number of times that user rocks described first terminal;
When user stops rocking after described first terminal reaches Preset Time, rock according to the user detected the access pin that the direction of described first terminal and number of times generate described hotspot.
8. terminal according to claim 6, is characterized in that, described detection generation module specifically for:
Detect the number of times that user knocks described first terminal zones of different successively;
When user stops knocking after described first terminal reaches Preset Time, knock according to the user detected the access pin that the region of described first terminal and number of times generate described hotspot.
9. terminal according to claim 6, is characterized in that, described detection generation module specifically for:
Within the continuous print time interval, detect the number of times that user knocks described first terminal in each time interval successively;
When user stops knocking after described first terminal reaches Preset Time, the number of times knocking described first terminal according to the user detected within each time interval generates the access pin of described hotspot.
10. the terminal according to any one of claim 6-9, is characterized in that, described second terminal is identical with the mode that described first terminal generates access pin by rocking or knock the mode generating authentication password.
CN201510398897.2A 2015-07-08 2015-07-08 Verification method and terminal Pending CN105072611A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510398897.2A CN105072611A (en) 2015-07-08 2015-07-08 Verification method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510398897.2A CN105072611A (en) 2015-07-08 2015-07-08 Verification method and terminal

Publications (1)

Publication Number Publication Date
CN105072611A true CN105072611A (en) 2015-11-18

Family

ID=54501863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510398897.2A Pending CN105072611A (en) 2015-07-08 2015-07-08 Verification method and terminal

Country Status (1)

Country Link
CN (1) CN105072611A (en)

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635801A (en) * 2015-12-25 2016-06-01 深圳Tcl数字技术有限公司 Wireless network hotspot connection method and device
CN105847303A (en) * 2016-06-12 2016-08-10 深圳益强信息科技有限公司 Verification method and system of intelligent access control unit
CN105872104A (en) * 2016-06-12 2016-08-17 深圳益强信息科技有限公司 Method and system for managing intelligent entrance guard by combining mobile terminal
CN105869255A (en) * 2016-06-12 2016-08-17 深圳益强信息科技有限公司 Intelligent access control method and system based on mobile terminal
CN106097500A (en) * 2016-06-12 2016-11-09 深圳益强信息科技有限公司 A kind of method and system responding user's entrance
CN106507291A (en) * 2016-12-16 2017-03-15 上海斐讯数据通信技术有限公司 A kind of WIFI authentication methods and its system, a kind of mobile terminal
CN106507356A (en) * 2016-12-16 2017-03-15 上海斐讯数据通信技术有限公司 A kind of wireless authentication method and its system
CN106714165A (en) * 2016-12-16 2017-05-24 上海斐讯数据通信技术有限公司 WIFI authentication method and system
CN107466039A (en) * 2017-09-01 2017-12-12 深圳回收宝科技有限公司 A kind of method of wireless network authentication, terminal reclaimer and storage medium
WO2018006337A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Intelligent entrance guard management method and system based on optical communication
WO2018006348A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for response based on ultrasonic wave
WO2018006336A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Identity card-based response method and system
WO2018006321A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Response method and system
WO2018006326A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for verification based on intelligent entrance guard by means of mobile terminal and picture password
WO2018006350A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Image password-based access grant acquisition method and system for intelligent access control
WO2018006319A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Alarm method and system
WO2018006318A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for using intelligent entrance guard on basis of mobile terminal
WO2018006333A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Mobile terminal-based authentication method and system for intelligent access control
WO2018006325A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for verifying user entrance
WO2018006323A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Mobile terminal-based verification method and system
WO2018006332A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Intelligent entrance guard management method and system based on mobile terminal
WO2018006352A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for managing intelligent entrance guard based on mobile terminal
WO2018006338A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Optical communications-based operation method and system for intelligent access control
WO2018006322A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Mobile terminal-based alarm method and system
WO2018006344A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Ultrasound-based operation method and system for intelligent access control
WO2018006353A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system of using intelligent entrance guard based on mobile terminal and picture password
WO2018006328A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method for managing intelligent entrance guard and intelligent entrance guard system
WO2018006324A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Mobile terminal-based response method and system
WO2018006345A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for verifying intelligent entrance guard based on ultrasonic wave
WO2018006329A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Verification method and system based on identity card
WO2018006334A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Identity card-based control method and system for intelligent access control
WO2018006346A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Police calling method and system based on mobile terminal and ultrasound
WO2018006347A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Verification method and system based on ultrasonic wave
CN113240432A (en) * 2021-06-16 2021-08-10 中国银行股份有限公司 Method and system for payment verification based on screen knock time delay

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100097320A1 (en) * 2008-10-22 2010-04-22 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. Electronic device for entering password
CN101789862A (en) * 2010-01-25 2010-07-28 中兴通讯股份有限公司 Encryption and decryption device and method based on gravity acceleration
CN102455842A (en) * 2010-10-21 2012-05-16 北京创新方舟科技有限公司 Method and equipment for unlocking screen according to knocking operation of user
CN102981737A (en) * 2012-10-30 2013-03-20 北京小米科技有限责任公司 File operation method and device
WO2015081875A1 (en) * 2013-12-04 2015-06-11 北京奇虎科技有限公司 Method and apparatus for sharing files between terminal devices

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100097320A1 (en) * 2008-10-22 2010-04-22 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. Electronic device for entering password
CN101729649A (en) * 2008-10-22 2010-06-09 鸿富锦精密工业(深圳)有限公司 Mobile terminal and method for authenticating identity of user using same
CN101789862A (en) * 2010-01-25 2010-07-28 中兴通讯股份有限公司 Encryption and decryption device and method based on gravity acceleration
CN102455842A (en) * 2010-10-21 2012-05-16 北京创新方舟科技有限公司 Method and equipment for unlocking screen according to knocking operation of user
CN102981737A (en) * 2012-10-30 2013-03-20 北京小米科技有限责任公司 File operation method and device
WO2015081875A1 (en) * 2013-12-04 2015-06-11 北京奇虎科技有限公司 Method and apparatus for sharing files between terminal devices

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635801A (en) * 2015-12-25 2016-06-01 深圳Tcl数字技术有限公司 Wireless network hotspot connection method and device
CN105635801B (en) * 2015-12-25 2019-03-12 深圳Tcl数字技术有限公司 Wireless network hotspot connection method and device
CN105847303A (en) * 2016-06-12 2016-08-10 深圳益强信息科技有限公司 Verification method and system of intelligent access control unit
CN105872104A (en) * 2016-06-12 2016-08-17 深圳益强信息科技有限公司 Method and system for managing intelligent entrance guard by combining mobile terminal
CN105869255A (en) * 2016-06-12 2016-08-17 深圳益强信息科技有限公司 Intelligent access control method and system based on mobile terminal
CN106097500A (en) * 2016-06-12 2016-11-09 深圳益强信息科技有限公司 A kind of method and system responding user's entrance
CN106097500B (en) * 2016-06-12 2018-07-06 深圳益强信息科技有限公司 A kind of method and system for responding user and entering
WO2018006325A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for verifying user entrance
WO2018006338A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Optical communications-based operation method and system for intelligent access control
WO2018006337A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Intelligent entrance guard management method and system based on optical communication
WO2018006348A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for response based on ultrasonic wave
WO2018006336A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Identity card-based response method and system
WO2018006321A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Response method and system
WO2018006326A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for verification based on intelligent entrance guard by means of mobile terminal and picture password
WO2018006350A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Image password-based access grant acquisition method and system for intelligent access control
WO2018006319A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Alarm method and system
WO2018006318A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for using intelligent entrance guard on basis of mobile terminal
WO2018006333A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Mobile terminal-based authentication method and system for intelligent access control
WO2018006347A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Verification method and system based on ultrasonic wave
WO2018006323A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Mobile terminal-based verification method and system
WO2018006332A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Intelligent entrance guard management method and system based on mobile terminal
WO2018006352A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for managing intelligent entrance guard based on mobile terminal
WO2018006346A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Police calling method and system based on mobile terminal and ultrasound
WO2018006322A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Mobile terminal-based alarm method and system
WO2018006344A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Ultrasound-based operation method and system for intelligent access control
WO2018006353A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system of using intelligent entrance guard based on mobile terminal and picture password
WO2018006328A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method for managing intelligent entrance guard and intelligent entrance guard system
WO2018006324A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Mobile terminal-based response method and system
WO2018006345A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for verifying intelligent entrance guard based on ultrasonic wave
WO2018006329A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Verification method and system based on identity card
WO2018006334A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Identity card-based control method and system for intelligent access control
CN106714165A (en) * 2016-12-16 2017-05-24 上海斐讯数据通信技术有限公司 WIFI authentication method and system
CN106507356A (en) * 2016-12-16 2017-03-15 上海斐讯数据通信技术有限公司 A kind of wireless authentication method and its system
CN106507291A (en) * 2016-12-16 2017-03-15 上海斐讯数据通信技术有限公司 A kind of WIFI authentication methods and its system, a kind of mobile terminal
CN107466039A (en) * 2017-09-01 2017-12-12 深圳回收宝科技有限公司 A kind of method of wireless network authentication, terminal reclaimer and storage medium
CN113240432A (en) * 2021-06-16 2021-08-10 中国银行股份有限公司 Method and system for payment verification based on screen knock time delay

Similar Documents

Publication Publication Date Title
CN105072611A (en) Verification method and terminal
EP3148225B1 (en) Bluetooth connection-based audio playback method and apparatus
CN109996234B (en) Network connection method, hotspot terminal and management terminal
CN107643977B (en) Anti-addiction method and related product
EP3225008B1 (en) User-authentication-based approval of a first device via communication with a second device
CN106685978B (en) Method and device for controlling access authority among multiple devices and mobile terminal
CN103634107A (en) Authentication method, password setting method and authentication system for electronic device
CN104967997A (en) Wireless network accessing method, Wi-Fi equipment, terminal equipment and system
CN104318186B (en) A kind of password changing method, equipment and terminal
KR20170058991A (en) Verification information transmission method and terminal
CN103927466A (en) Method and device for controlling mobile terminal
CN110113744A (en) Communication means, device, equipment and storage medium
US10614201B2 (en) Method and device for identity authentication
TWI680687B (en) Communication method and device
US20160323331A1 (en) Electronic share server, screen sharing method, and program for electronic share server
CN103747013A (en) Cloud terminal login verification method and device
CN106255102B (en) Terminal equipment identification method and related equipment
CN104836777B (en) Identity verification method and system
TW201519126A (en) Mobile payment method and system
US20180349580A1 (en) Information processing method and device, and electronic equipment
US20180357404A1 (en) Information processing method and apparatus, and electronic device
US20190159111A1 (en) Method for Wireless Fidelity Network Scanning and Terminal Device
CN106487754A (en) Authentication method
CN107005558B (en) Location-based user disambiguation
CN105307078B (en) A kind of speaker management method and user terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151118