[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN101770572A - Method for authentication and device therefor - Google Patents

Method for authentication and device therefor Download PDF

Info

Publication number
CN101770572A
CN101770572A CN201010001674A CN201010001674A CN101770572A CN 101770572 A CN101770572 A CN 101770572A CN 201010001674 A CN201010001674 A CN 201010001674A CN 201010001674 A CN201010001674 A CN 201010001674A CN 101770572 A CN101770572 A CN 101770572A
Authority
CN
China
Prior art keywords
information
touch
touch information
effective
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201010001674A
Other languages
Chinese (zh)
Other versions
CN101770572B (en
Inventor
罗黎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Device Co Ltd
Original Assignee
Huawei Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Device Co Ltd filed Critical Huawei Device Co Ltd
Priority to CN201010001674.5A priority Critical patent/CN101770572B/en
Priority to CN201510487393.8A priority patent/CN105160234B/en
Publication of CN101770572A publication Critical patent/CN101770572A/en
Application granted granted Critical
Publication of CN101770572B publication Critical patent/CN101770572B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the invention discloses a method for authentication and a device therefor. In the method, an inductance part receives touch information input by a user, and the touch information comprises shape information and position information of a touch pattern; and the touch information is compared with the stored pre-set touch information, if the touch information is consistent with the stored pre-set touch information, the authentication is successful, if not, the authentication fails. With the adoption of the touch information identification mode, the influence of light and other environmental factors can be eliminated, the trouble of multi-character password input is eliminated, and the usability is strong. The touch pattern information comprises the position information, thereby being more close to the individual requirement of the user and improving the security.

Description

A kind of method and apparatus of authentication
Technical field
The present invention relates to communication technical field, particularly a kind of method and apparatus of authentication.
Background technology
Authentication is meant the authentication of carrying out identity on various device.Authentication techniques are by extensive studies and application now.For ease for use, the security that improves authentication, reduce simultaneously and realize cost, the technician has carried out deep research.Present authentication mode comprises: authentications such as cipher authentication mode, recognition of face mode.Cipher authentication needs user's memory cipher, and is cumbersome; And the recognition of face mode needs equipment to have camera union adult face identification software, realizes that cost is higher, and is subjected to the influence of illumination bigger.
Summary of the invention
The technical matters that the embodiment of the invention will solve provides a kind of method and apparatus of authentication, and this method and apparatus possesses ease for use and security preferably.
For solving the problems of the technologies described above, the method embodiment of authentication provided by the present invention can be achieved through the following technical solutions:
Receive the touch information that the user imports by inductive means, described touch information comprises the shape information and the positional information of the figure of touch;
The touch information that presets of described touch information and storage is compared, if unanimity then determine that authentication passes through, otherwise would determine authentification failure.
A kind of device of authentication comprises:
The figure receiving element is used for receiving the touch information that the user imports by inductive means, and described touch information comprises the shape information and the positional information of the figure of touch;
Authentication ' unit is used for the touch information that presets of described touch information and storage is compared, if unanimity then determine that authentication passes through, otherwise would determine authentification failure.
Technique scheme has following beneficial effect: adopt the touch information identification mode, got rid of Effect of Environmental such as light, got rid of the trouble of multiword symbol password input, ease for use is strong.The information of the figure that touches has comprised positional information, the individual demand of can more being close to the users, and improved security.
Description of drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the invention, the accompanying drawing of required use is done to introduce simply in will describing embodiment below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is an embodiment of the invention method flow synoptic diagram;
Fig. 2 is an embodiment of the invention method flow synoptic diagram;
Fig. 3 is an embodiment of the invention touch-screen synoptic diagram;
Fig. 4 is an embodiment of the invention apparatus structure synoptic diagram;
Fig. 5 is an embodiment of the invention apparatus structure synoptic diagram;
Fig. 6 is an embodiment of the invention apparatus structure synoptic diagram;
Fig. 7 is an embodiment of the invention apparatus structure synoptic diagram.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
A kind of method of authentication comprises:
101: the touch information that receives user's input by inductive means;
The means of above-mentioned touch can also can be to touch with instrument (for example: pen, seal etc.) for touching with hand; The mode that touches can also can be to draw to produce by pushing generation; Will not limit this embodiment of the invention.
Above-mentioned touch information can be by touching any information of input, can comprise in embodiments of the present invention: the shape information of the figure of touch and positional information, the information that other can also be arranged for the figure that touches certainly, for example: generation time T, the pressure N etc. that form each point of figure, if with (X, Y) position of expression point, can use (X so, Y, T) represent the time that the point of this position produces, with (X, Y, T N) represents that this position and generation point that should the time have great pressure.The figure that a plurality of points that touch are formed, if for point adds new parameter, for example the time then can be embodied track; If add pressure then pressure when embodying picture shape.Certainly, the parameter that can also increase other embodies the information of figure, will not limit this embodiment of the invention.In follow-up enforcement, the point of figure all is that example describes with the position.
Above-mentioned touch information by inductive means reception user input comprises: the touch information that receives user's input by touch-screen.(for example: scanner etc.) input that receives touch information also is fine, and touch-screen is as a qualification that should not be construed as for example the embodiment of the invention to be understandable that inductive means by other.
Particularly, in order further to improve the reliability of figure input, also comprise after the touch information of above-mentioned reception user input: the rule that employing is scheduled to is carried out efficiency analysis to the figure of the touch of user's input, if above-mentioned figure be effectively, then with the shape information of above-mentioned effective figure and positional information as effective touch information.
Particularly, above-mentioned predetermined rule can comprise one of following or combination: whether the coordinate figure of the figure of the predetermined number that receives has surpassed threshold value continuously, then invalid if surpass, otherwise effectively; What perhaps, the frequency of the figure of the predetermined number that receives continuously appearance was the highest is effective; Perhaps, the user keeps the time of input continuously whether to reach the setting-up time value, if, then effective, otherwise invalid.Particularly: the user's tablet pattern that in official hour, receives predetermined number continuously, analyze the location coordinate information of each figure, if exist the difference of the maximum X coordinate figure (or maximum Y coordinate figure, minimum X coordinate figure, minimum Y coordinate figure) of certain two figure to surpass the threshold values of setting, then invalid, otherwise effectively; Perhaps, in the figure of the predetermined number that receives, whether the number that the identical figure of position coordinates and shape occurs reaches the threshold values requirement of setting, reaches then effective, otherwise invalid continuously; Perhaps, the user keeps the time (for example pushing the time of inductive means) of continuously input whether to reach the setting-up time value, and user's tablet pattern remains unchanged always, and is then effective if all satisfy, otherwise invalid.Certainly above several modes are not to judge whether effective scheme exhaustive of tablet pattern, should not be construed as the qualification to the embodiment of the invention.
May two or more be arranged effective figure in the above by way of example, present embodiment also provides the solution under this scene, and above-mentioned shape information and positional information with above-mentioned effective figure comprises as effective touch information: the shape information that will above-mentioned two or more active graphicals and the common factor of positional information or intersection are as effective touch information.
102: the touch information that presets of above-mentioned touch information and storage is compared, if unanimity then determine that authentication passes through, otherwise would determine authentification failure.
If after 101, carried out efficiency analysis, then in 102 with above-mentioned touch information and storage preset touch information compare for: the touch information that presets of above-mentioned effective touch information and storage is compared
Particularly, because the recognition capability of inductive means and the influence of environmental variance, the presetting touch information and may be difficult to accomplish in full accord of touch information and storage, present embodiment also provides the implementation of the situation of permissible error, if it is above-mentioned consistent then determine that authentication passes through, otherwise determine that authentification failure comprises: also determine to authenticate to pass through if the deviation that presets touch information of above-mentioned touch information and storage within preset threshold, then thinks consistent, otherwise determine authentification failure.
The executive agent of above embodiment can be the equipment that may use authentication arbitrarily, among the above embodiment, adopts the touch information identification mode, has got rid of Effect of Environmental such as light, has got rid of the trouble of multiword symbol password input, and ease for use is strong.The information of the figure that touches has comprised positional information, the individual demand of can more being close to the users, and improved security.
Below will provide a concrete applied scene method that authenticates is further detailed, as shown in Figure 2, wherein touch information is that example describes with the graphical information, comprises step:
201 (touch-screen carries out the position of multiple point touching identification and identification touch): touch-screen adopts multi-point touch whole district input (multi-touch all-point) technology, carry out the position that multiple point touching identification, identification touches, the information such as zone of touch, with the touch location that recognizes and touch area information graphical information as user's input; Whether touch-screen starts the function of obtaining user's input information, can be controlled by equipment, also can be from after powering on, obtaining automatically, and the embodiment of the invention will not limit.
As the example of Fig. 3, be the touch-screen of a support 10 * 10 resolution, the variation that touch-screen is gone up each point of crossing capacitance information by scanning senses touch screen is discerned user's touch action, and is converted to numerical information.By X, the combination of Y coordinate, and multiple spot information combination can identify the position of user's multiple point touching when touching and the area information of concrete touch, with this graphical information as user's input.Following illustrated example is supposed the touch input that circle A partly gives touch-screen for the user by finger, and then can to identify user's touch location and area information (being the graphical information that the user imports) be [(X7 to touch-screen, Y5), (X8, Y5), (X7, Y6), (X8, Y6), (X7, Y7), (X8, Y7)]; The user also can touch input with two fingers simultaneously, supposes to give the touch of touch-screen to be input as circle A and two zones of circle B, then the touch-screen graphical information that can identify user's input for [(X2, Y7), (X3, Y7), (X2, Y8), (X3, Y8)], [(X7, Y5), (X8, Y5), (X7, Y6), (X8, Y6), (X7, Y7), (X8, Y7)] }.Different equipment is realized, can adopt the different touch-screen of resolution, and in general, the resolution that touch-screen is supported is high more, and the degree of accuracy of the graphical information of the user's input that then identifies is high more.
202: obtain the information of active graphical, be specifically as follows regularly the information that (receiving once as per 0.1 second) touch-screen obtains that receives.Here regularly receiving can be that obtaining of active also can be passive reception, will not limit this embodiment of the invention.The information of obtaining is carried out comprehensive analysis processing obtain effective graphical information, by judging the situation of change of (as 2 seconds) user's input information (has input information 20 times in 2 seconds) in the continuous time of one section specified length, whether draw user's input information effective, if in specified length in continuous time, in 20 input informations of user, maximum X coordinate figure (or the maximum Y coordinate figure that has certain twice input information, minimum X coordinate figure, minimum Y coordinate figure) difference surpasses the threshold values of setting, think that then 20 input informations of epicycle are all invalid, otherwise think that information is effective, and this continuous 20 times user's input information of analysis-by-synthesis, draw active graphical information; Specific analytical method can have multiple implementation, as select information is identical and the frequency of occurrences is a highest user's input information as active graphical information, perhaps the part (common factor of content) that the content of these 20 user's input informations is intersected is as active graphical information, and the intersection of content of perhaps getting 20 user's input informations is as active graphical information.Can also require the content of all 20 user's input informations to keep in full accord, could be with this as active graphical information.
203: authenticate by comparison.Equipment can require the user at first to preset (input mode is imported by touch-screen) active graphical information, and the graphical information that presets as the user is promptly as the foundation of judging that active graphical information that subsequent user is newly imported is whether legal.The graphical information that the effective graphical information obtained and user are preset compares, and realizes the user validation authentication function, and determination methods is to check whether two graphical informations are consistent, and unanimity then authenticates to be passed through, otherwise does not pass through.Whether two graphical informations are consistent, can realize flexibly by software algorithm, can require two information in full accord, also can allow certain deviation range, position coordinates integral body as graphical information slightly is offset, perhaps the whole size of figure slightly increases or reduces, and can think consistent.
The executive agent of above embodiment can be the equipment that may use authentication arbitrarily, among the above embodiment, adopts the mode of Figure recognition, has got rid of Effect of Environmental such as light, has got rid of the trouble of multiword symbol password input, and ease for use is strong.Touch graphical information and comprised positional information, the individual demand of can more being close to the users, and improved security.
A kind of device of authentication as shown in Figure 4, comprising:
Figure receiving element 401 is used for receiving the touch information that the user imports by inductive means, and above-mentioned touch information comprises the shape information and the positional information of the figure of touch;
Authentication ' unit 402 is used for the touch information that presets of above-mentioned touch information and storage is compared, if unanimity then determine that authentication passes through, otherwise would determine authentification failure.
Further, above-mentioned figure receiving element 401 is used to receive the touch information that the user imports, and comprising: being used for the time of setting is the figure of cycle reception predetermined number;
As shown in Figure 5, also comprise: efficiency analysis unit 501, be used to adopt predetermined rule that the figure of the touch of above-mentioned user's input is carried out efficiency analysis, if above-mentioned figure be effectively, then with the shape information of above-mentioned effective figure and positional information as effective touch information;
Above-mentioned authentication ' unit 402 is compared the touch information that presets of above-mentioned effective touch information and storage.
Further, as shown in Figure 6, said apparatus also comprises:
Touch information generation unit 601 is used for if effectively figure has two or more, and the shape information that then will above-mentioned two or more active graphicals and the common factor of positional information or intersection are as effective touch information.
Further, as shown in Figure 7, said apparatus also comprises:
Error control unit 701 is used to judge that the deviation that presets touch information of above-mentioned touch information and storage is within preset threshold;
Above-mentioned authentication ' unit 402 also is used for the deviation that presets touch information in above-mentioned touch information and storage within preset threshold the time, then think above-mentioned touch information and storage to preset touch information consistent and determine that authentication passes through, otherwise determine authentification failure.
Among the above embodiment, adopt the touch information identification mode, got rid of Effect of Environmental such as light, got rid of the trouble of multiword symbol password input, ease for use is strong.The information of the figure that touches has comprised positional information, the individual demand of can more being close to the users, and improved security.
One of ordinary skill in the art will appreciate that all or part of step that realizes in the foregoing description method is to instruct relevant hardware to finish by program, above-mentioned program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium of mentioning can be a ROM (read-only memory), disk or CD etc.
More than the method and apparatus of a kind of authentication that the embodiment of the invention provided is described in detail, used specific case herein principle of the present invention and embodiment are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the part that all can change in specific embodiments and applications, to sum up, this description should not be construed as limitation of the present invention.

Claims (10)

1. the method for an authentication is characterized in that, comprising:
Receive the touch information that the user imports by inductive means, described touch information comprises the shape information and the positional information of the figure of touch;
The touch information that presets of described touch information and storage is compared, if unanimity then determine that authentication passes through, otherwise would determine authentification failure.
2. according to the described method of claim 1, it is characterized in that, also comprise after the touch information of described reception user input:
Adopt predetermined rule that the figure of the touch of user's input is carried out efficiency analysis, if described figure be effectively, then with the shape information of described effective figure and positional information as effective touch information;
The described touch information that presets with described touch information and storage is compared and is comprised:
The touch information that presets of described effective touch information and storage is compared.
3. according to the described method of claim 2, it is characterized in that described predetermined rule comprises one of following or combination:
Whether the coordinate figure of the figure of the predetermined number that receives has surpassed threshold value continuously, then invalid if surpass, otherwise effectively; Or
What the frequency of the figure of the predetermined number that receives appearance was the highest continuously is effective; Or
The user keeps the time of input continuously whether to reach the setting-up time value, if, then effective, otherwise invalid.
4. according to the described method of claim 2, it is characterized in that if effectively figure has two or more, then shape information and the positional information with described effective figure comprises as effective touch information:
With the common factor of the shape information of described two or more active graphicals and positional information or intersection as effective touch information.
5. according to any described method of claim 1 to 4, it is characterized in that described touch information by inductive means reception user input comprises: receive the touch information of user in the touch-screen input by touch-screen.
6. according to the described method of claim 1, it is characterized in that,, then determine to authenticate to pass through, otherwise determine that authentification failure comprises if described consistent:
If the deviation that presets touch information of described touch information and storage within preset threshold, is then thought consistent and is determined to authenticate and pass through, otherwise determines authentification failure.
7. the device of an authentication is characterized in that, comprising:
The figure receiving element is used for receiving the touch information that the user imports by inductive means, and described touch information comprises the shape information and the positional information of the figure of touch;
Authentication ' unit is used for the touch information that presets of described touch information and storage is compared, if unanimity then determine that authentication passes through, otherwise would determine authentification failure.
8. according to the described device of claim 7, it is characterized in that, also comprise:
The efficiency analysis unit is used to adopt predetermined rule that the figure of the touch of user's input is carried out efficiency analysis, if described figure be effectively, then with the shape information of described effective figure and positional information as effective touch information;
Described authentication ' unit is compared the touch information that presets of described effective touch information and storage.
9. described according to Claim 8 device is characterized in that, also comprises:
The touch information generation unit is used for when effectively figure has two or more, and the shape information that then will described two or more active graphicals and the common factor of positional information or intersection are as effective touch information.
10. according to the described device of claim 7, it is characterized in that, also comprise:
The error judgment unit is used to judge that the deviation that presets touch information of described touch information and storage is within preset threshold;
Described authentication ' unit also is used for the deviation that presets touch information in described touch information and storage within preset threshold the time, then think described touch information and storage to preset touch information consistent and determine that authentication passes through, otherwise determine authentification failure.
CN201010001674.5A 2010-01-21 2010-01-21 Method for authentication and device therefor Active CN101770572B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201010001674.5A CN101770572B (en) 2010-01-21 2010-01-21 Method for authentication and device therefor
CN201510487393.8A CN105160234B (en) 2010-01-21 2010-01-21 A kind of method and apparatus of certification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010001674.5A CN101770572B (en) 2010-01-21 2010-01-21 Method for authentication and device therefor

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201510487393.8A Division CN105160234B (en) 2010-01-21 2010-01-21 A kind of method and apparatus of certification

Publications (2)

Publication Number Publication Date
CN101770572A true CN101770572A (en) 2010-07-07
CN101770572B CN101770572B (en) 2015-07-22

Family

ID=42503424

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201010001674.5A Active CN101770572B (en) 2010-01-21 2010-01-21 Method for authentication and device therefor
CN201510487393.8A Active CN105160234B (en) 2010-01-21 2010-01-21 A kind of method and apparatus of certification

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201510487393.8A Active CN105160234B (en) 2010-01-21 2010-01-21 A kind of method and apparatus of certification

Country Status (1)

Country Link
CN (2) CN101770572B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103034429A (en) * 2011-10-10 2013-04-10 北京千橡网景科技发展有限公司 Identity authentication method and device for touch screen
CN103116750A (en) * 2013-03-14 2013-05-22 深圳市共进电子股份有限公司 Pattern identification authentication method capable of faintly matching
CN103856326A (en) * 2012-11-30 2014-06-11 中国电信股份有限公司 Safety authentication method and device
CN103858378A (en) * 2011-10-06 2014-06-11 三星电子株式会社 Method and apparatus for determining input
CN104283877A (en) * 2014-09-30 2015-01-14 腾讯科技(深圳)有限公司 Identity authentication method and device
CN105378753A (en) * 2013-04-24 2016-03-02 麦斯杰公司 Permanent synchronisation system for handwriting input
CN105930065A (en) * 2015-12-08 2016-09-07 中国银联股份有限公司 Operating command input method, background device and terminal

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100401197B1 (en) * 1998-11-20 2003-11-15 삼성전자주식회사 Character recognition device with improved character recognition speed and method
US20060075250A1 (en) * 2004-09-24 2006-04-06 Chung-Wen Liao Touch panel lock and unlock function and hand-held device
KR100942081B1 (en) * 2005-02-17 2010-02-12 오쎈테크, 인코포레이티드 Finger sensor apparatus using image resampling and associated methods
CN101192259A (en) * 2006-11-20 2008-06-04 鸿富锦精密工业(深圳)有限公司 Electronic device and method for opening same
JP5238297B2 (en) * 2008-03-04 2013-07-17 シャープ株式会社 Authentication method and input device
CN101296457A (en) * 2008-06-25 2008-10-29 深圳华为通信技术有限公司 Screen operation method and device
CN101344825A (en) * 2008-07-31 2009-01-14 华为技术有限公司 Method and terminal for inceptive cipher setting and cipher validation based on touch screen
CN101436239A (en) * 2008-11-28 2009-05-20 上海凌锐信息技术有限公司 Personal computer with handwriting recognition identification affirmation function and implementing method thereof
CN101604223B (en) * 2009-04-20 2012-05-23 宇龙计算机通信科技(深圳)有限公司 Unlocking method and system of touch screen and touch screen device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103858378A (en) * 2011-10-06 2014-06-11 三星电子株式会社 Method and apparatus for determining input
US9495536B2 (en) 2011-10-06 2016-11-15 Samsung Electronics Co., Ltd Method and apparatus for determining input
CN103034429A (en) * 2011-10-10 2013-04-10 北京千橡网景科技发展有限公司 Identity authentication method and device for touch screen
CN103856326A (en) * 2012-11-30 2014-06-11 中国电信股份有限公司 Safety authentication method and device
CN103116750A (en) * 2013-03-14 2013-05-22 深圳市共进电子股份有限公司 Pattern identification authentication method capable of faintly matching
CN105378753A (en) * 2013-04-24 2016-03-02 麦斯杰公司 Permanent synchronisation system for handwriting input
CN105378753B (en) * 2013-04-24 2019-12-10 麦斯杰公司 apparatus, method and computer-readable data medium for handwriting input
CN104283877A (en) * 2014-09-30 2015-01-14 腾讯科技(深圳)有限公司 Identity authentication method and device
CN104283877B (en) * 2014-09-30 2018-11-09 腾讯科技(深圳)有限公司 Auth method and device
CN105930065A (en) * 2015-12-08 2016-09-07 中国银联股份有限公司 Operating command input method, background device and terminal

Also Published As

Publication number Publication date
CN105160234A (en) 2015-12-16
CN101770572B (en) 2015-07-22
CN105160234B (en) 2019-02-05

Similar Documents

Publication Publication Date Title
CN101770572A (en) Method for authentication and device therefor
CN202120246U (en) Recognition device for multi-point rotating movement
US9349035B1 (en) Multi-factor authentication sensor for providing improved identification
EP3066605B1 (en) Directional touch unlocking for electronic devices
US8953853B2 (en) Sensing characteristics of adjacent fingers for user authentication
US10831874B2 (en) Information processing apparatus, information processing method and program
US20140189604A1 (en) Method and system for unlocking a touchscreen of an electronic device
US20140181962A1 (en) Application executing method using fingerprint recognition, device therefor, and computer readable recording medium therefor
CN106445363B (en) Payment interface starting method and mobile terminal
KR20160132761A (en) Fingerprint recognition method and structure for full screen
CN103324897B (en) Safety certification method and user terminal based on multi-point touch
CN105446451A (en) Fingerprint identification device, mobile terminal and rousing method of fingerprint identification device
CA2916555A1 (en) Improvements in or relating to user authentication
CN103069363A (en) Methods and apparatus for interacting with an electronic device application by moving an object in the air over an electronic device display
CN106648245B (en) Control command generation method and information input device
CN105447447A (en) Fingerprint identification method and fingerprint identification system of terminal
GB2511814A (en) A method, apparatus and system of encoding content and an image
US20190080065A1 (en) Dynamic interface for camera-based authentication
CN105678147B (en) Touch operation method and device
CN103942477A (en) Smart phone authentication method based on touch screen pressure sensing
CN102736838A (en) Method and device for identifying multi-point rotation motion
US20140168125A1 (en) Application executing method using fingerprint recognition, device therefor, and computer readable recording medium therefor
CN101436239A (en) Personal computer with handwriting recognition identification affirmation function and implementing method thereof
GB2543323A (en) Secure biometric authentication
US9870071B2 (en) Method and apparatus for user authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20171027

Address after: Metro Songshan Lake high tech Industrial Development Zone, Guangdong Province, Dongguan City Road 523808 No. 2 South Factory (1) project B2 -5 production workshop

Patentee after: HUAWEI terminal (Dongguan) Co., Ltd.

Address before: 518129 Longgang District, Guangdong, Bantian HUAWEI base B District, building 2, building No.

Patentee before: Huawei Device Co., Ltd.

CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 523808 Southern Factory Building (Phase I) Project B2 Production Plant-5, New Town Avenue, Songshan Lake High-tech Industrial Development Zone, Dongguan City, Guangdong Province

Patentee after: Huawei Device Co., Ltd.

Address before: 523808 Southern Factory Building (Phase I) Project B2 Production Plant-5, New Town Avenue, Songshan Lake High-tech Industrial Development Zone, Dongguan City, Guangdong Province

Patentee before: HUAWEI terminal (Dongguan) Co., Ltd.