Disclosure of Invention
The embodiment of the invention provides an authentication method and an authentication device, aiming at improving the diversity and safety of authentication.
A first aspect of an embodiment of the present invention provides an authentication method, including:
acquiring touch parameters of touch operation aiming at a preset area of a terminal, wherein the touch parameters comprise touch strength and a touch track, and the touch operation aims at a preset account identifier;
determining password information based on the touch trajectory;
determining handwriting information based on the touch trajectory and the touch strength;
and generating an authentication result based on the password information and the handwriting information.
Optionally, the handwriting information includes handwriting outline characteristics, handwriting sequence characteristics and handwriting strength characteristics;
determining handwriting information based on the touch trajectory and the touch strength includes:
determining the handwriting outline characteristics and the handwriting sequence characteristics based on the touch trajectory;
and determining the handwriting strength characteristic based on the touch strength.
Optionally, before the obtaining of the touch parameter of the touch operation for the preset area of the terminal, the method further includes:
acquiring an account identifier input by a user and account information associated with the account identifier;
acquiring authentication touch parameters of authentication touch operation associated with the account identifier, wherein the authentication touch parameters comprise authentication strength and an authentication track;
and determining authentication password information based on the authentication track, and determining authentication handwriting information based on the authentication track and the authentication strength.
Optionally, the generating an authentication result based on the password information and the handwriting information includes:
detecting whether the password information is matched with pre-stored authentication password information or not;
when the password information is detected not to be matched with the pre-stored authentication password information, an authentication result of authentication failure is generated;
or,
detecting whether the touch control strength is matched with a pre-stored authentication strength;
and when the touch control strength is detected not to be matched with the pre-stored authentication strength, generating an authentication result of authentication failure.
Optionally, the generating an authentication result based on the password information and the handwriting information includes:
detecting whether the password information and the handwriting information are matched with prestored authentication password information and authentication handwriting information;
and when the password information is detected to be matched with the pre-stored authentication password information and the handwriting information is detected to be matched with the pre-stored authentication handwriting information, generating an authentication result with successful authentication.
A second aspect of the embodiments of the present invention provides an authentication apparatus, including: .
The terminal comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring touch parameters of touch operation aiming at a preset area of the terminal, the touch parameters comprise touch strength and a touch track, and the touch operation aims at a preset account identifier;
the first determining module is used for determining password information based on the touch track;
a second determining module, configured to determine handwriting information based on the touch trajectory and the touch strength;
and the authentication module is used for generating an authentication result based on the password information and the handwriting information.
Optionally, the handwriting information includes handwriting outline characteristics, handwriting sequence characteristics and handwriting strength characteristics;
the second determining module is specifically configured to determine the handwriting outline characteristics and the handwriting sequence characteristics based on the touch trajectory; and determining the handwriting strength characteristic based on the touch strength.
Optionally, the apparatus further comprises:
the registration module is used for acquiring an account identifier input by a user and account information associated with the account identifier before the acquisition module acquires the touch parameter of the touch operation aiming at the preset area of the terminal; acquiring authentication touch parameters of authentication touch operation associated with the account identifier, wherein the authentication touch parameters comprise authentication strength and an authentication track; and determining authentication password information based on the authentication track, and determining authentication handwriting information based on the authentication track and the authentication strength.
Optionally, the authentication module is specifically configured to detect whether the password information matches pre-stored authentication password information; when the password information is detected not to be matched with the pre-stored authentication password information, an authentication result of authentication failure is generated;
or detecting whether the touch control strength is matched with a pre-stored authentication strength; and when the touch control strength is detected not to be matched with the pre-stored authentication strength, generating an authentication result of authentication failure.
Optionally, the authentication module is specifically configured to detect whether the password information and the handwriting information are matched with pre-stored authentication password information and authentication handwriting information;
and when the password information is detected to be matched with the pre-stored authentication password information and the handwriting information is detected to be matched with the pre-stored authentication handwriting information, generating an authentication result with successful authentication.
It can be seen that, in the technical solution of the embodiment of the present invention, firstly, a terminal or a server obtains a touch parameter of a touch operation for a preset area of the terminal, where the touch parameter includes a touch strength and a touch trajectory, the touch operation is directed at a preset account identifier, secondly, the terminal or the server determines password information based on the touch trajectory, determines handwriting information based on the touch trajectory and the touch strength, and finally, the terminal or the server generates an authentication result based on the password information and the handwriting information. The terminal or the server authenticates the legality of the user through two modes of password information and touch track, so that the diversity of authentication is favorably improved, and the safety and the reliability of the authentication are further improved.
The terms "first," "second," and the like in the description and claims of the present invention and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Referring to fig. 1, fig. 1 is a schematic flow chart of an authentication method according to a first embodiment of the present invention, where the authentication method in the embodiment of the present invention may be applied to a mobile terminal or a corresponding server. As shown in fig. 1, the authentication method in the embodiment of the present invention includes the following steps:
s101, obtaining touch parameters of touch operation aiming at a preset area of a terminal, wherein the touch parameters comprise touch strength and a touch track, and the touch operation aims at a preset account identifier.
It can be understood that the authentication method in the embodiment of the present invention may be applied to a mobile terminal, or may be applied to a corresponding server, and when the authentication method is applied to the server, the server obtains a touch parameter for a touch operation in a preset area of the terminal, which is sent by the terminal; when the authentication method is applied to the terminal, the terminal directly acquires the touch parameters of the user aiming at the touch operation of the preset area of the terminal.
The terminal can be various general electronic devices including a touch display screen, such as a smart phone, a tablet computer, a notebook computer, wearable devices (e.g., a smart watch), and the like. The touch display screen is an integration of the touch screen and the display screen, a pressure sensor array may be disposed in the touch display screen, and the mobile terminal may detect a pressure parameter through the pressure sensor array, where the pressure sensor may be, for example, a resistance strain gauge pressure sensor, a semiconductor strain gauge pressure sensor, a piezoresistive pressure sensor, an inductive pressure sensor, a capacitive pressure sensor, a resonant pressure sensor, and the like.
For example, the touch display screen may include: a panel; an indium tin oxide pattern disposed below the screen; a touch sensor disposed under the indium tin oxide pattern; an indium tin oxide substrate disposed below the touch sensor; the pressure sensor is arranged on the upper surface or the lower surface of the indium tin oxide substrate; or
By way of further example, the touch display screen may include: a panel; an indium tin oxide pattern disposed below the screen; a touch sensor disposed under the indium tin oxide pattern; and a pressure sensor disposed below the touch sensor.
Before obtaining the touch parameter of the touch operation for the preset area of the terminal, the method further includes:
acquiring an account identifier input by a user and account information associated with the account identifier;
acquiring authentication touch parameters of authentication touch operation associated with the account identifier, wherein the authentication touch parameters comprise authentication strength and an authentication track;
and determining authentication password information based on the authentication track, and determining authentication handwriting information based on the authentication track and the authentication strength.
And S102, determining password information based on the touch track.
It can be understood that, when the authentication method in the embodiment of the present invention is applied to a terminal, the terminal determines password information based on obtaining a touch trajectory of a touch operation of a user for a preset area of a display screen, and a specific implementation manner of the terminal determining the password information based on obtaining the touch trajectory of the touch operation of the user for the preset area of the display screen may be that the terminal extracts the password information from the touch trajectory based on an image recognition algorithm, where the password information may be characters, numbers, chinese characters, and the like.
Or, when the authentication method in the embodiment of the present invention is applied to a server, the server determines the password information based on a touch trajectory of a touch operation sent by a terminal and directed to a preset area of the terminal.
S103, determining handwriting information based on the touch track and the touch strength.
The handwriting information comprises handwriting outline characteristics, handwriting sequence characteristics and handwriting strength characteristics.
The specific implementation manner of determining the handwriting information based on the touch trajectory and the touch strength may be:
determining the handwriting outline characteristics and the handwriting sequence characteristics based on the touch trajectory;
and determining the handwriting strength characteristic based on the touch strength.
The method comprises the steps that when the authentication method is applied to a terminal, the terminal determines handwriting information based on the touch track and the touch strength of the touch operation of a user in a preset area of the terminal; when the authentication method in the embodiment of the invention is applied to the server, the server determines handwriting information based on the touch track and the touch strength of the touch operation of the preset area of the terminal sent by the user.
And S104, generating an authentication result based on the password information and the handwriting information.
It can be understood that, the specific implementation manner of generating the authentication result based on the password information and the handwriting information may be:
detecting whether the password information is matched with pre-stored authentication password information or not;
when the password information is detected not to be matched with the pre-stored authentication password information, an authentication result of authentication failure is generated;
or,
detecting whether the touch control strength is matched with a pre-stored authentication strength;
and when the touch control strength is detected not to be matched with the pre-stored authentication strength, generating an authentication result of authentication failure.
Optionally, the specific implementation manner of generating the authentication result based on the password information and the handwriting information may also be:
detecting whether the password information and the handwriting information are matched with prestored authentication password information and authentication handwriting information;
and when the password information is detected to be matched with the pre-stored authentication password information and the handwriting information is detected to be matched with the pre-stored authentication handwriting information, generating an authentication result with successful authentication.
It can be seen that, in the technical solution of the embodiment of the present invention, firstly, a terminal or a server obtains a touch parameter of a touch operation for a preset area of the terminal, where the touch parameter includes a touch strength and a touch trajectory, the touch operation is directed at a preset account identifier, secondly, the terminal or the server determines password information based on the touch trajectory, determines handwriting information based on the touch trajectory and the touch strength, and finally, the terminal or the server generates an authentication result based on the password information and the handwriting information. The terminal or the server authenticates the legality of the user through two modes of password information and touch track, so that the diversity of authentication is favorably improved, and the safety and the reliability of the authentication are further improved.
Referring to fig. 2, fig. 2 is a schematic flowchart of an authentication method according to a second embodiment of the present invention, as shown in fig. 2, including the following steps:
s201, the terminal acquires an account identifier input by a user and account information associated with the account identifier.
S202, the terminal obtains authentication touch parameters of authentication touch operation associated with the account identification, wherein the authentication touch parameters comprise authentication strength and an authentication track.
S203, the terminal determines authentication password information based on the authentication track and determines authentication handwriting information based on the authentication track and the authentication strength.
S204, the terminal obtains touch parameters of touch operation aiming at a preset area of the terminal, wherein the touch parameters comprise touch strength and a touch track, and the touch operation aims at a preset account identifier.
S205, the terminal determines password information based on the touch track.
S206, the terminal determines handwriting information based on the touch track and the touch strength.
The handwriting information comprises handwriting outline characteristics, handwriting sequence characteristics and handwriting strength characteristics.
The specific implementation manner of determining the handwriting information based on the touch trajectory and the touch strength may be:
and determining the handwriting outline characteristics and the handwriting sequence characteristics based on the touch track.
And determining the handwriting strength characteristic based on the touch strength.
And S207, the terminal generates an authentication result based on the password information and the handwriting information.
It can be understood that the specific implementation manner of the terminal generating the authentication result based on the password information and the handwriting information may be:
the terminal detects whether the password information is matched with pre-stored authentication password information or not;
when the password information is detected not to be matched with the pre-stored authentication password information, the terminal generates an authentication result of authentication failure;
or,
the terminal detects whether the touch control strength is matched with the prestored authentication strength;
and when the touch control strength is detected not to be matched with the pre-stored authentication strength, the terminal generates an authentication result of authentication failure.
Optionally, a specific implementation manner of the terminal generating the authentication result based on the password information and the handwriting information may also be:
the terminal detects whether the password information and the handwriting information are matched with pre-stored authentication password information and authentication handwriting information;
and when the password information is detected to be matched with the pre-stored authentication password information and the handwriting information is detected to be matched with the pre-stored authentication handwriting information, the terminal generates an authentication result with successful authentication.
It can be seen that, in the technical solution of the embodiment of the present invention, firstly, a terminal or a server obtains a touch parameter of a touch operation for a preset area of the terminal, where the touch parameter includes a touch strength and a touch trajectory, the touch operation is directed at a preset account identifier, secondly, the terminal or the server determines password information based on the touch trajectory, determines handwriting information based on the touch trajectory and the touch strength, and finally, the terminal or the server generates an authentication result based on the password information and the handwriting information. The terminal or the server authenticates the legality of the user through two modes of password information and touch track, so that the diversity of authentication is favorably improved, and the safety and the reliability of the authentication are further improved.
Referring to fig. 3, fig. 3 is a schematic flowchart of an authentication method according to a third embodiment of the present invention, and as shown in fig. 3, the authentication method according to the embodiment of the present invention includes the following steps:
s301, the terminal acquires an account identifier input by a user and account information associated with the account identifier, and sends the account information to a server which establishes communication connection with the terminal.
It is understood that the communication connection between the terminal and the server may be a wireless communication connection including WI-FI, bluetooth, or a mobile network (2G, 3G, or 4G, etc.).
S302, the terminal obtains authentication touch parameters of authentication touch operation associated with the account identification, wherein the authentication touch parameters comprise authentication strength and an authentication track.
S303, the terminal determines authentication password information based on the authentication track, determines authentication handwriting information based on the authentication track and the authentication strength, and sends the authentication password information and the authentication handwriting information to a server.
It can be understood that the terminal sends the authentication password information and the authentication handwriting information to the server, so that the authentication password information and the authentication handwriting information are stored in the server, and the phenomenon that the authentication password information and the authentication handwriting information are stolen by people when stored in the terminal can be prevented, thereby further improving the safety and reliability in the authentication process.
S304, the terminal obtains touch parameters of touch operation aiming at a preset area of the terminal, wherein the touch parameters comprise touch strength and a touch track, and the touch operation aims at a preset account identifier.
S305, the terminal determines password information based on the touch track and sends the password information to the server.
S306, the terminal determines handwriting information based on the touch track and the touch strength and sends the note information to the server.
The handwriting information comprises handwriting outline characteristics, handwriting sequence characteristics and handwriting strength characteristics;
the specific implementation manner of the terminal for determining the handwriting information based on the touch trajectory and the touch strength may be as follows:
the terminal determines the handwriting outline characteristics and the handwriting sequence characteristics based on the touch track;
and the terminal determines the handwriting strength characteristic based on the touch strength.
S307, the server generates an authentication result based on the password information and the handwriting information.
It can be understood that a specific implementation manner of the server generating the authentication result based on the password information and the handwriting information may be:
the server detects whether the password information is matched with pre-stored authentication password information or not;
the server generates an authentication result of authentication failure when detecting that the password information is not matched with the pre-stored authentication password information;
or,
the server detects whether the touch control strength is matched with a pre-stored authentication strength;
and the server generates an authentication result of authentication failure when detecting that the touch control strength is not matched with the pre-stored authentication strength.
Optionally, a specific implementation manner of the server generating the authentication result based on the password information and the handwriting information may also be:
the server detects whether the password information and the handwriting information are matched with pre-stored authentication password information and authentication handwriting information;
and the server generates an authentication result with successful authentication when detecting that the password information is matched with the pre-stored authentication password information and detecting that the handwriting information is matched with the pre-stored authentication handwriting information.
It can be seen that, in the technical solution of the embodiment of the present invention, firstly, a terminal or a server obtains a touch parameter of a touch operation for a preset area of the terminal, where the touch parameter includes a touch strength and a touch trajectory, the touch operation is directed at a preset account identifier, secondly, the terminal or the server determines password information based on the touch trajectory, determines handwriting information based on the touch trajectory and the touch strength, and finally, the terminal or the server generates an authentication result based on the password information and the handwriting information. The terminal or the server authenticates the legality of the user through two modes of password information and touch track, so that the diversity of authentication is favorably improved, and the safety and the reliability of the authentication are further improved.
For convenience of description, only the relevant parts of the embodiments of the present invention are shown, and specific technical details are not disclosed, please refer to the first to third embodiments of the present invention.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an authentication apparatus according to a fourth embodiment of the present invention, and as shown in fig. 4, the authentication apparatus according to the embodiment of the present invention includes the following modules:
an obtaining module 401, configured to obtain a touch parameter of a touch operation for a preset area of a terminal, where the touch parameter includes a touch strength and a touch trajectory, and the touch operation is for a preset account identifier;
a first determining module 402, configured to determine password information based on the touch trajectory;
a second determining module 403, configured to determine handwriting information based on the touch trajectory and the touch strength;
an authentication module 404, configured to generate an authentication result based on the password information and the handwriting information.
Optionally, the handwriting information includes handwriting outline characteristics, handwriting sequence characteristics and handwriting strength characteristics;
the second determining module 403 is specifically configured to determine the handwriting outline features and the handwriting sequence features based on the touch trajectory; and determining the handwriting strength characteristic based on the touch strength.
Optionally, the apparatus may further include:
a registration module 405, configured to, before the obtaining module obtains the touch parameter of the touch operation for the preset area of the terminal, obtain an account identifier input by the user and account information associated with the account identifier; acquiring authentication touch parameters of authentication touch operation associated with the account identifier, wherein the authentication touch parameters comprise authentication strength and an authentication track; and determining authentication password information based on the authentication track, and determining authentication handwriting information based on the authentication track and the authentication strength.
Optionally, the authentication module 404 is specifically configured to detect whether the password information matches with pre-stored authentication password information; when the password information is detected not to be matched with the pre-stored authentication password information, an authentication result of authentication failure is generated;
or detecting whether the touch control strength is matched with a pre-stored authentication strength; and when the touch control strength is detected not to be matched with the pre-stored authentication strength, generating an authentication result of authentication failure.
Optionally, the authentication module 404 is specifically configured to detect whether the password information and the handwriting information are matched with pre-stored authentication password information and authentication handwriting information;
and when the password information is detected to be matched with the pre-stored authentication password information and the handwriting information is detected to be matched with the pre-stored authentication handwriting information, generating an authentication result with successful authentication.
Specifically, the detailed implementation of each module may refer to the description of the relevant steps in the embodiments corresponding to fig. 1 to fig. 3, which is not repeated herein.
It can be seen that, in the technical solution of the embodiment of the present invention, firstly, a terminal or a server obtains a touch parameter of a touch operation for a preset area of the terminal, where the touch parameter includes a touch strength and a touch trajectory, the touch operation is directed at a preset account identifier, secondly, the terminal or the server determines password information based on the touch trajectory, determines handwriting information based on the touch trajectory and the touch strength, and finally, the terminal or the server generates an authentication result based on the password information and the handwriting information. The terminal or the server authenticates the legality of the user through two modes of password information and touch track, so that the diversity of authentication is favorably improved, and the safety and the reliability of the authentication are further improved.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an authentication apparatus according to an embodiment of the present invention. As shown in fig. 5, the authentication apparatus in the embodiment of the present invention includes: at least one processor 501, e.g. a CPU, at least one receiver 503, at least one memory 504, at least one transmitter 505, at least one communication bus 502. Wherein a communication bus 502 is used to enable connective communication between these components. The receiver 503 and the transmitter 505 of the apparatus in the embodiment of the present invention may be wired transmission ports, or may also be wireless devices, for example, including an antenna apparatus, for performing signaling or data communication with other node devices. The memory 504 may be a high-speed RAM memory or a non-volatile memory (e.g., at least one disk memory). The memory 504 may optionally be at least one storage device located remotely from the processor 501. A set of program codes is stored in the memory 504 and the processor 501 can invoke the codes stored in the memory 504 to perform related functions through the communication bus 502.
The processor 501 is configured to obtain touch parameters of a touch operation for a preset area of a terminal, where the touch parameters include touch strength and a touch trajectory, and the touch operation is for a preset account identifier; determining password information based on the touch trajectory; determining handwriting information based on the touch trajectory and the touch strength; and generating an authentication result based on the password information and the handwriting information.
Optionally, the handwriting information includes handwriting outline characteristics, handwriting sequence characteristics and handwriting strength characteristics; the processor 501, when configured to determine handwriting information based on the touch trajectory and the touch strength, is specifically configured to determine the handwriting outline characteristic and the handwriting sequence characteristic based on the touch trajectory; and determining the handwriting strength characteristic based on the touch strength.
Optionally, the processor 501 is further configured to, before being configured to obtain a touch parameter of a touch operation for a preset area of a terminal, obtain an account identifier input by a user and account information associated with the account identifier; acquiring authentication touch parameters of authentication touch operation associated with the account identifier, wherein the authentication touch parameters comprise authentication strength and an authentication track; and determining authentication password information based on the authentication track, and determining authentication handwriting information based on the authentication track and the authentication strength.
Optionally, the processor 501 is specifically configured to detect whether the password information matches with pre-stored authentication password information when the processor 501 is configured to generate an authentication result based on the password information and the handwriting information; when the password information is detected not to be matched with the pre-stored authentication password information, an authentication result of authentication failure is generated;
or detecting whether the touch control strength is matched with a pre-stored authentication strength; and when the touch control strength is detected not to be matched with the pre-stored authentication strength, generating an authentication result of authentication failure.
Optionally, the processor 501 is specifically configured to detect whether the password information and the handwriting information are matched with pre-stored authentication password information and authentication handwriting information when the processor 501 is configured to generate an authentication result based on the password information and the handwriting information; and when the password information is detected to be matched with the pre-stored authentication password information and the handwriting information is detected to be matched with the pre-stored authentication handwriting information, generating an authentication result with successful authentication.
The authentication device can be applied to a mobile terminal and can also be applied to a server. When applied to a mobile terminal, the mobile terminal method may be any device having a storage function and a touch screen, for example: the mobile terminal comprises terminals such as a tablet computer, a mobile phone, an electronic reader, a remote controller, a Personal Computer (PC), a notebook computer, a vehicle-mounted device, a network television, and a wearable device. The mobile terminal comprises a touch display screen, the touch display screen is an integration of the touch screen and the display screen, a pressure sensor array can be arranged in the touch display screen, and the mobile terminal can detect a pressure parameter through the pressure sensor array, wherein the pressure sensor can be, for example, a resistance strain gauge pressure sensor, a semiconductor strain gauge pressure sensor, a piezoresistive pressure sensor, an inductive pressure sensor, a capacitive pressure sensor, a resonant pressure sensor and the like.
For example, the touch display screen may include: a panel; an indium tin oxide pattern disposed below the screen; a touch sensor disposed under the indium tin oxide pattern; an indium tin oxide substrate disposed below the touch sensor; the pressure sensor is arranged on the upper surface or the lower surface of the indium tin oxide substrate; or
By way of further example, the touch display screen may include: a panel; an indium tin oxide pattern disposed below the screen; a touch sensor disposed under the indium tin oxide pattern; and a pressure sensor disposed below the touch sensor.
Specifically, the specific execution operation of the processor 501 may refer to the description of the relevant steps in the embodiments corresponding to fig. 1 to fig. 3, which is not repeated herein.
It can be seen that, in the technical solution of the embodiment of the present invention, firstly, a terminal or a server obtains a touch parameter of a touch operation for a preset area of the terminal, where the touch parameter includes a touch strength and a touch trajectory, the touch operation is directed at a preset account identifier, secondly, the terminal or the server determines password information based on the touch trajectory, determines handwriting information based on the touch trajectory and the touch strength, and finally, the terminal or the server generates an authentication result based on the password information and the handwriting information. The terminal or the server authenticates the legality of the user through two modes of password information and touch track, so that the diversity of authentication is favorably improved, and the safety and the reliability of the authentication are further improved.
An embodiment of the present invention further provides a computer storage medium, where the computer storage medium may store a program, and when the program is executed, the program includes some or all of the steps of any one of the service process monitoring methods described in the above method embodiments.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-only memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable storage medium, and the storage medium may include: flash memory disks, Read-only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above detailed description is provided for an authentication method and an authentication device provided in the embodiments of the present invention, and the principle and the implementation of the present invention are explained in the present document by applying specific examples, and the description of the above embodiments is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.