Method and device for identity authentication

ABSTRACT

Disclosed in the application are a method and device for identity authentication. The method comprises: when the terminal is in the specified stress state, action attribute information of the terminal is collected; the action attribute information is processed by matching with preset sample information; if the action attribute information is matched with the sample information, the authentication is successful, and if the action attribute information is not matched with the sample information, the authentication is failed. By the above method, the terminal can automatically collect the corresponding action attribute information in the process that users perform certain specified operation, and then match and compare with the preset standard information to authenticate the identity of the current user using the terminal. Therefore, the terminal can collect the action attribute information and set up or authenticate it without entering a specific acquisition mode in the process that the user operates and uses the terminal. It avoids interfering with the use of users, and also effectively improves the convenience of operation.

CROSS REFERENCE TO RELATED APPLICATION

The present application is a continuation of U.S. Patent ApplicationSER. No. 15/327,965 filed on Jan. 20, 2017, entitled “METHOD AND DEVICEFOR IDENTITY AUTHENTICATION,” which is a National Phase entryapplication of the International Patent Application No.PCT/CN2015/084302, filed on Jul. 17, 2015, and titled “METHOD AND DEVICEFOR IDENTITY AUTHENTICATION,” which claims priority to Chinese PatentApplication No. 201410386942.8, filed on Aug. 7, 2014. The entirecontents of all of the above applications are incorporated herein byreference in their entirety.

TECHNICAL FIELD

The present application relates to the field of computer technologies,and in particular, to a method and device for identity authentication.

BACKGROUND ART

As the information technology develops, terminals have become anindispensable part of people's life and work. By using a terminal, auser can exchange and share data with other terminals, and can displaythe data.

In the prior art, a terminal used by a user generally includes a largevolume of data (such as transactional data and identity data) of theuser, and in order to ensure the security of the data in the terminal,generally the terminal is encrypted and authenticated by using abiometric identification technology having higher security, and theprocess includes: a user sets encryption information including abiological feature (including a fingerprint, a palm print, a voice, andthe like), after the setting is finished, the terminal may use theencryption information to implement self-protection, and only when theuser provides a correct biological feature, can the terminal pass theauthentication to be operated and used by the user. Since the biologicalfeature is unique, the encryption information using the biometricidentification technology is difficult to modify, and is also difficultto leak, thus having strong security.

However, no matter during setting or authentication, the terminal needsto enter a corresponding acquisition mode to collect a biologicalfeature of the user such as a fingerprint, a palm print, and a voice.The collection process is complicated, and meanwhile, the collection ofthe biological feature will interrupt the current operation of the user.In the process of collection, the user cannot conduct other operations,which interferes with the use of the user, and causes low convenience ofoperation.

SUMMARY

Embodiments of the present application provide a method and device foridentity authentication, for solving the problem that the process of aterminal collecting a biological feature is complicated, interferes witha use state of a user, and has low operation convenience.

A method for identity authentication according to an embodiment of thepresent application includes:

collecting, by a terminal when a user performs a specified operation,action attribute information of the user in the process of the specifiedoperation;

determining, according to preset standard information, whether theaction attribute information is matched with the standard information;

if yes, the authentication being successful, performing correspondingprocessing according to the specified operation; and

otherwise, the authentication being failed, refusing to perform thecorresponding processing according to the specified operation.

A device for identity authentication according to an embodiment of thepresent application includes: a collection module, a determinationmodule, and a processing module, where

the collection module is configured to collect action attributeinformation of a user in the process of a specified operation when theuser performs the specified operation;

the determination module is configured to determine, according to presetstandard information, whether the action attribute information ismatched with the standard information; and

the processing module is configured to: when the determination moduledetermines that there is a matching, the authentication is successful,perform corresponding processing according to the specified operation;and when the determination module determines that there is no matching,the authentication is failed, refuse to perform the correspondingprocessing according to the specified operation.

The embodiments of the present application provide a method and devicefor identity authentication. In the method, a terminal collects actionattribute information of a user in the process of a specified operationwhen the user performs the specified operation; and determines,according to preset standard information, whether the action attributeinformation is matched with the standard information; if yes, theauthentication is successful, and the terminal performs correspondingprocessing according to the specified operation; otherwise, theauthentication is failed, and terminal refuses to perform thecorresponding processing according to the specified operation. By theabove method, the terminal may automatically collect correspondingaction attribute information in the process that a user performs somespecified operations, match and compare the action attribute informationwith the preset standard information to authenticate the identity of thecurrent user of the terminal; therefore, the terminal can collect theaction attribute information and set up or authenticate it withoutentering a specific acquisition mode in the process that the useroperates and uses the terminal, thereby avoiding interfering with theuse of users, and also effectively improving the convenience ofoperation.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings described herein, which constitute a part ofthe present application, are used to provide further understanding ofthe present application, and exemplary embodiments of the presentapplication and illustrations thereof are used to explain the presentapplication, and are not intended to constitute any improper limitationon the present application. In the accompanying drawings:

FIG. 1 is a process of identity authentication according to anembodiment of the present application;

FIG. 2 is a process of identity authentication in an actual applicationscenario according to an embodiment of the present application;

FIG. 3a is a group of tap strength values collected by a cell phone inthe process of setting action attribute information according to anembodiment of the present application;

FIG. 3b is a schematic diagram of a standard tap strength value rangeaccording to an embodiment of the present application;

FIG. 4 is a schematic diagram of matching a group of tap strength valuescollected by a cell phone with a standard tap strength value rangeaccording to an embodiment of the present application;

FIG. 5 is a schematic diagram of acceleration information at multiplemoments collected by a cell phone according to an embodiment of thepresent application; and

FIG. 6 is a schematic structural diagram of a device for identityauthentication according to an embodiment of the present application.

DETAILED DESCRIPTION

To make objectives, technical solutions and advantages of the presentapplication more comprehensible, technical solutions of the presentapplication are described clearly and completely through specificembodiments of the present application and corresponding accompanyingdrawings. Apparently, the described embodiments are merely a part ofembodiments rather than all embodiments of the present application.Based on the embodiments of the present application, all otherembodiments derived by persons of ordinary skill in the art without anycreative effort shall fall within the protection scope of the presentapplication.

FIG. 1 is a process of identity authentication according to anembodiment of the present application, and the process specificallyincludes the following steps:

S101: A terminal collects, when a user performs a specified operation,action attribute information of the user in the process of the specifiedoperation.

The terminal includes, but not limited to: a mobile terminal such as acell phone, a tablet computer, a smart band, and smart glasses, as wellas a computer terminal, an external input device (such as a mouse and akeyboard) matching the computer terminal, and the like.

In the present application, in order to avoid interfering with using ofthe terminal by the user, when the terminal authenticates the identityof the user, the terminal will not enter a specific acquisition mode toacquire a biological feature of the user, and in this way, otherfeatures of the user need to be collected at the background. Consideringthat when using the terminal, the user always operates the terminalthrough corresponding actions, for example, in some actual applicationscenarios, the user operates a tablet computer or a cell phone bytapping a touch screen with a finger or sliding with a finger; or, whenanswering a call using a cell phone, the user may raise the cell phoneto the ear for conversation. Then, the terminal may collectcorresponding action attribute information from the actions generated bythe user performing these operations on the terminal.

Specifically, when the user taps the touch screen or slides on the touchscreen of the terminal, a force applied to the screen by the finger maybe collected by the terminal. When the user answers a call, theacceleration of the terminal in the process of moving with the hand ofthe user may be collected by the terminal itself. The above informationcollected by the terminal is the action attribute information in thepresent application, that is, the action attribute information includesone or more of information about a force applied to the terminal by theuser, and acceleration information. In an actual application, differentusers have different action attribute information, that is, the actionattribute information, the same as other types of biological features ofthe user, is unique.

By means of the action attribute information, the terminal may not enterthe corresponding acquisition mode but carry out collection at thebackground, and therefore, the terminal may not interfere with theprocess that the user uses the terminal. Definitely, the actionattribute information may be collected by a collection process set inthe terminal by invoking an element such as a gravity sensor, agyroscope, and a pressure sensor, and the present application is notlimited thereto.

It should be noted that, if the terminal is in a locked state, someapplications and system functions inside the terminal may be in asuspended state, for example, works of the screen and sensor of themobile terminal are both suspended. In such a state, even if the usertaps on the terminal, the terminal will not collect the action attributeinformation. Therefore, in the step S101, only when the user performs aspecified operation, can the terminal collect action attributeinformation during the operation. The specified operation includes, butis not limited to: an operation of inputting by the user with a virtualkeyboard in a mobile terminal, an operation of sliding to unlock by theuser on a lock-screen interface of a mobile terminal, an operation ofsliding to answer a call by the user when there is an incoming call, andthe like. By setting the specified operation, the user may use theterminal normally, and at the same time, the terminal may collect theaction attribute information at the background.

S102: Determine, according to preset standard information, whether theaction attribute information is matched with the standard information;if yes, perform step S103; otherwise, perform step S104.

In the embodiment of the present application, the action attributeinformation is equivalent to identity information of the user, and forthe terminal used by the user, various types of identity informationneed to be entered in advance to serve as a verification standard fordetermining whether subsequently input identity information is correct;therefore, in the step S102, corresponding standard information may bepreset.

The setting process of the standard information is specifically: eachtime when the user performs the specified operation, collecting inadvance the action attribute information in each process of performingthe specified operation, to serve as sample information, determining anaction attribute value range according to the sample information, andsetting the action attribute value range as the standard information.

When the user uses the terminal, the specified operation may beperformed for multiple times, for example, when the user uses a cellphone, the user may frequently use a virtual keyboard in the cell phoneto edit short messages, input texts, and the like. At this point, theuser tapping the virtual keyboard is a specified operation beingperformed by the user, then, the user may collect tapping strength ofthe user in advance in the process that the user taps the virtualkeyboard, to serve as the sample information.

Generally, to facilitate calculation, for such a specified operationthat the user taps the virtual keyboard, the number of collected tapoperations may be preset, for example, 10 tap operations are collected,that is, once the user uses the virtual keyboard on the mobile terminal,the collection process running at the background of the mobile terminalcollects tap strengths of the 10 tap operations of the user. Definitely,the number of times of collection may be adjusted and set according torequirements of an actual application, for example, when the user startsan application on the mobile terminal, the user taps an icon of theapplication only once, and in this case, the number of times ofcollection may be set to 1.

In an actual application scenario, for the same user, each time the userperforms an identical action, action attribute information thereof isnot completely identical, for example, the user's strength of tapping atouch screen may vary, and therefore, it is not accurate to collect theaction attribute information only once, and in the present application,action attribute information during the specified operation performed bythe user may be collected for multiple times, thus obtaining multiplegroups of sample information respectively.

After the multiple groups of sample information are obtained, actionattribute values corresponding to the action attribute information maybe determined. It should be noted that, the action attribute informationgenerally corresponds to a specific action attribute value. For example,the operation of the user tapping a screen of the mobile terminalspecifically corresponds to the magnitude of the tap strength; and theoperation of the user raising the mobile terminal specificallycorresponds a value of acceleration and a direction of the accelerationin the displacement process of the mobile terminal. The sizes of theaction attribute values corresponding to the multiple groups of sampleinformation may be different, and a minimum action attribute value and amaximum action attribute value may be determined according to all theaction attribute values, thus forming an action attribute value range.

The action attribute value range reflects a difference range of actionattribute information collected by the terminal, and as the actionattribute value range is determined by collecting multiple groups ofsample information, the action attribute value range can substantiallyaccurately reflect the action attribute information when the userperforms the specified operation.

In the present application, the determining the action attribute valuerange according to the sample information specifically includes:determining a first average value of the sample information according tothe sample information; determining a second average value of sampleinformation greater than the first average value; determining a thirdaverage value of sample information not greater than the first averagevalue; and determining a numerical range from the third average value tothe second average value as the action attribute value range.

The first average value reflects an average level of the actionattribute values corresponding to the sample information, and comparedwith the first average value, some action attribute values in the sampleinformation are greater than the first average value, and some are lessthan the first average value. Therefore, after the first average valueis determined, all action attribute values greater than the firstaverage value are averaged to obtain the second average value, and thesecond average value reflects an average level of all action attributevalues greater than the first average value, that is, an average levelof maximum values of all action attribute values in the sampleinformation. Likewise, all action attribute values less than the firstaverage value are averaged to obtain the third average value, and thethird average value reflects an average level of all action attributevalues less than the first average value, that is, an average level ofminimum values of all action attribute values in the sample information.Therefore, the numerical range from the third average value to thesecond average value is determined as the action attribute value range,that is, the standard information.

After setting of the standard information is finished, the standardinformation may be compared and matched with action attributeinformation subsequently collected by the terminal, to determine thatthe user of the terminal is still the current user. The action attributevalue range corresponding to the standard information determined in theabove steps reflects the average level of the action attributeinformation of the user. In other words, when the user uses theterminal, all action attribute values corresponding to the actionattribute information collected by the terminal basically fall withinthe action attribute value range. Therefore, the determining whether theaction attribute information is matched with the standard information inthe step S102 is determining whether attribute values included in theaction attribute information fall within the action attribute valuerange.

S103: If the authentication is successful, perform correspondingprocessing according to the specified operation.

If the attribute values included in the action attribute informationfall within the action attribute value range, it is determined that theaction attribute information is matched with the standard information,indicating that the action attribute information complies with the user;in other words, the current user of the terminal is not changed, and isstill the original user; therefore, the terminal may performcorresponding processing according to the operation of the user.

S104: If the authentication is failed, refuse to perform thecorresponding processing according to the specified operation.

If the action attribute values included in the action attributeinformation do not fall within the action attribute value range, it isdetermined that the action attribute information is not matched with thestandard information, indicating that the action attribute informationis not sent by the user, and may be sent by another user; therefore, toensure the security of data in the terminal, the terminal mayautomatically enter a locked state to prevent from being operated by thecurrent user.

It should be noted that, the action attribute information of the user inthe process of the specified operation may also not match with thestandard information. For example, when the user uses the virtualkeyboard in the mobile terminal to input texts, the strength of a tapmay exceed the action attribute value range corresponding to thestandard information. Then, in this case, if it is directly determinedas not matching with the standard information, the normal use of theuser may be affected. Therefore, in another scenario of the presentapplication, the determining whether the action attribute information ismatched with the standard information may specifically be determiningaccording to a set similarity percentage.

In addition, in the present application, the terminal collects, formultiple times, the action attribute information in the process that theuser performs the specified operation, and may continuously update theaction attribute value range by using an optimization algorithm such asa Particle Swarm Optimization (PSO) algorithm, to improve the precisionof matching.

By means of the above steps, the terminal may automatically collectcorresponding action attribute information in the process that the userperforms some specified operations, match and compare the actionattribute information with the preset standard information toauthenticate the identity of a current user of the terminal; therefore,the terminal can collect the action attribute information and set up orauthenticate it without entering a specific acquisition mode in theprocess that the user operates and uses the terminal, thereby avoidinginterfering with the use of users, and also effectively improving theconvenience of operation.

As shown in FIG. 2, an application for identity authentication in theembodiment of the present application is as follows:

In this scenario, the terminal is a cell phone having a touch screenfunction, and it is set that user A is a frequent user of the cellphone, the specified operation is inputting texts with a virtualkeyboard, the action attribute information is a tap strength value of afinger on the screen of the cell phone when the user A inputs texts, andwhen collecting tap strength values of the user, the cell phone maycollect 10 tap actions successively. Then:

Steps S201 to S205 are a process of setting the standard information,and steps S206 to S208 are a process of performing authenticationaccording to the standard information.

S201: When the user A inputs texts with the virtual keyboard in the cellphone, the cell phone may collect tap strength values of the user A inthe process that the user A inputs texts with the virtual keyboard.

The cell phone may collect the tap strength values for multiple timeswhen the user A inputs texts with the virtual keyboard, to form n groupsof sample information: X₁, X₂, . . . , X_(n). FIG. 3a shows the sampleinformation X₁ of a group of tap strength values collected by the cellphone, in which the ordinate indicates the tap strength, in the unit ofN (that is, the mechanical unit Newton), and the abscissa indicates thenumber of taps. In FIG. 3a , the group of sample information X₁ isformed by ten tap strength values, that is, x₁₀, x₁₁, . . . , x₁₉ (thesize of each tap strength value is shown in FIG. 3a ). Likewise, each ofthe remaining multiple groups of sample information X_(i) also includesten tap strength values x_(i0), x_(i1), . . . , x_(i9), i=2, . . . , n(but the remaining multiple groups of sample information X are not shownin the figure). Each tap strength value is precise to the hundredths,and in an actual application, to improve the precision, the cell phonemay collect the tap strength values precise to the thousandths or tenthousandths.

The tap strength values of the user A are collected by a pressure sensorinside the cell phone, and the pressure sensor may convert an externalpressure into an electrical signal on the basis of the piezoelectriceffect and send the electrical signal to a processor inside the cellphone, thereby determining the tap strength value applied to the screenof the cell phone. Definitely, the present application is not limited tothe above manner of collecting the tap strength values.

S202: The cell phone determines, according to collected multiple groupsof sample information, a first average value of the multiple groups ofsample information.

The first average value is represented as X, and X is obtained byaveraging the tap strength values of the sample information, that is:

$\overset{\_}{X} = {\frac{X_{1} + X_{2} + {\cdots \mspace{14mu} X_{n}}}{10n} = \frac{x_{10} + \cdots + x_{19} + x_{20} + \cdots + x_{29} + \cdots + x_{n\; 0} + \cdots + x_{n\; 9}}{10n}}$

Therefore, the first average value reflects the average magnitude of tapstrengths when the user A inputs texts with the virtual keyboard on thecell phone. In this scenario, X=0.14.

S203: The cell phone conducts statistics on all tap strength valuesgreater than the first average value in the multiple groups of sampleinformation, and determines a second average value according to thesetap strength values.

The second average value is represented as H, that is, all tap strengthvalues greater than 0.14 in the multiple groups of sample informationare averaged. For ease of representation, it is set herein that thereare a total of h tap strength values greater than 0.14, and these tapstrength values are represented as H_(ij), wherein (i=1, 2, . . . , h;j=0, 1, . . . , 9); then, H is expressed as follows:

${\overset{\_}{H} = \frac{\Sigma \mspace{14mu} H_{ij}}{h}},$

wherein (x=1, 2, . . . , h;j=0,1, . . . , 9), and

in this scenario, H=0.15.

S204: The cell phone conducts statistics on all tap strength values lessthan the first average value in the multiple groups of sampleinformation, and determines a third average value according to these tapstrength values.

The third average value is represented as L, that is, all tap strengthvalues less than 0.14 in the multiple groups of sample information areaveraged. For ease of representation, it is set herein that there are atotal of l tap strength values less than 0.14, and the tap strengthvalues are represented as L_(i,j), wherein (i=1, 2, . . . , l; j=0, 1, .. . , 9); then, L is expressed as follows:

${\overset{\_}{L} = \frac{\Sigma \mspace{14mu} L_{ij}}{h}},$

wherein (i=1, 2, . . . , l; j=0, 1, . . . , 9), and

in this scenario, L=0.13.

The second average value H and the third average value L determinedthrough the steps S203 and S204 reflect an average maximum value and anaverage minimum value of tap strengths of the user A using the cellphone, respectively, such that an upper limit and a lower limit of thetap strength values are obtained, thereby determining a range of tapstrength values when the user A operates the cell phone, that is, stepS205.

S205: Determine a numerical range from the third average value L to thesecond average value H as a standard tap strength value range of theuser A.

The standard tap strength value range is represented as [L, H], wherein,as shown in FIG. 3b , the standard tap strength value range is shown onthe sample information X₁ of the tap strength values, shown in FIG. 3a ,and the shadow area in FIG. 3b is the standard tap strength value range.

Here, referring to FIG. 3b , the standard tap strength value range ofthe user A is determined as [0.13, 0.15], and it can be seen from FIG.3b that, even if a tap action is performed by the user A, acorresponding tap strength value thereof does not always fall within thestandard tap strength value range, and in FIG. 3b , there are three tapstrength values less than the third average value L=0.13, and there isone tap strength value greater than the second average value H=0.15.Therefore, in this scenario, the tap strength value of the user does notneed to completely match with the standard tap strength value range;instead, matching authentication is conducted by setting a similaritythreshold.

Specifically, by using the 10 tap actions of the user A shown in FIG. 3bas an example, tap strength values generated by 4 taps do not fallwithin the standard tap strength value range, then, the number of tapactions falling in the standard tap strength value range accounts for60% of the total number of tap actions, and here, the similaritythreshold is set to 60%.

S206: When a user inputs texts again with the virtual keyboard in thecell phone, the cell phone may determine whether a tap strength value ofthe user is matched with the standard tap strength value range, and ifyes, performs step S207; otherwise, performs step S208.

During authentication, tap strength values of the 10 tap actions of theuser collected by the cell phone are shown in FIG. 4, wherein tapstrength values generated by 3 taps do not fall within the standard tapstrength value range, then, the number of tap actions falling within thestandard tap strength value range accounts for 70% of the total numberof tap actions, which is higher than the preset similarity threshold60%, that is, the tap strength value when the user inputs texts with thevirtual keyboard is matched with the standard tap strength value range.Therefore, it is considered that the user A is using the cell phone, andthus step S207 is performed.

S207: The authentication is successful, and input texts according totaps of the user.

S208: The authentication is failed, and the cell phone is locked toreject text input from the user.

If the number of times that the tap strength values corresponding to the10 tap actions collected by the cell phone fall within the standard tapstrength value range is less than 6, that is, a percentage of the numberof tap actions falling within the standard tap strength value range tothe total number of tap actions is less than the preset similaritythreshold (60%), it is considered that it is not the user A who is usingthe cell phone, and step S208 is performed.

In an actual application scenario, the sample information x_(i)approximately complies with normal distribution, that is x_(i)˜(μ, σ²),and therefore, in addition to presetting the action attribute valuerange by using the first, second, and third average values, the actionattribute value range may also be preset by using characteristics of thenormal distribution. Now, still taking the values in FIG. 3a as anexample, in FIG. 3a , the first average value X=0.14, that is, μ of thenormal distribution is 0.14, and a standard deviation σ² is afluctuation range of deviation from the average value μ, that is:

$\sigma = \sqrt{\frac{1}{N}{\sum\limits_{i = 1}^{N}\; ( {x_{i} - \mu} )^{2}}}$

wherein, N is the number of samples, that is, 10n, x_(i) is each actionattribute value, and here, σ=0.1, and a distribution interval (μ−σ, μ+σ)of the normal distribution is (0.13, 0.15), that is, the upper and lowerlimits of the action attribute value range may be determined accordingto the average value and the standard deviation, thereby determining theaction attribute value range.

It should be noted that, the application scenario is not used to limitthe present application. The application for identity authentication inthe present application is not only applicable to an operation of theuser inputting texts with the virtual keyboard of the cell phone, butalso applicable to user operations such as tapping an application of themobile terminal and sliding on a screen to unlock.

In another application scenario, it is still set that the terminal is acell phone, while the specified operation performed by the user is acall answering process of the user, and the action attribute informationis acceleration information. In this process, the cell phone starts acollection thread when the user slides on the screen to answer or taps adial key, and records acceleration information in the process that theuser raises the cell phone from a certain height to the ear forconversation, wherein, the acceleration information includes: anacceleration value and an acceleration direction.

As the process that the user raises the cell phone includes successiveactions, the cell phone may divide the process into multiple moments,and collect acceleration information at the multiple momentsrespectively. As shown in FIG. 5, the cell phone may conduct collectionfor 4 times in the whole process, that is, collect at x₁˜x₄, to obtainacceleration information {right arrow over (α₁)} of the positionsrespectively, wherein (i=1, 2, 3, 4).

The acceleration information {right arrow over (α₁)} includes anacceleration value and motion direction information. In the cell phone,the acceleration value and the motion direction information of the cellphone are both determined by a three-axis gyroscope. The motiondirection is determined by the three-axis gyroscope according to a spacecoordinate system, and the three-axis gyroscope converts the motiondirection information of the cell phone into motion direction angleinformation in the space coordinate system, and therefore, theacceleration information {right arrow over (α₁)} may be represented as(|{right arrow over (α₁)}|, θ_(i)), wherein |{right arrow over (α₁)}|represents a value of the acceleration information {right arrow over(α₁)}, θ_(i) represents an angle value corresponding to the direction ofthe acceleration information {right arrow over (α₁)}. According to(|{right arrow over (α₁)}|, θ_(i)), first average values thereof may bedetermined respectively. Here, |{right arrow over (α₁ )}| is used torepresent the first average value of |{right arrow over (α₁)}|, and θ_(i) is used to represent the first average value of θ_(i). Then,|{right arrow over (α₁)}| and θ_(i) that are greater than respectivefirst average values and less than respective first average values areaveraged, to obtain respective second and third average values of|{right arrow over (α₁)}| and θ_(i), here, |{right arrow over (α₁)}|_(H) and |α{right arrow over (α₁ )}|_(L) are used to represent thesecond and third average values of |{right arrow over (α₁)}|respectively, and {tilde over (θ)}₁ _(H) and {tilde over (θ)}₁ _(L) areused to present the second and third average values of θ_(i)respectively, such that an acceleration value range [|{right arrow over(α₁ )}|_(L), |{right arrow over (α₁ )}|_(H)] and a motion directionangle value range [θ _(i) _(L) , {tilde over (θ)}_(i) _(H) ] aredetermined, and are used as sample information to match withsubsequently collected acceleration information. It should be notedthat, for |{right arrow over (α₁)}| and θ_(i), matching andauthentication are performed by setting a similarity threshold.

During matching, matching of |{right arrow over (α₁)}| is emphasized,that is, a greater weight is granted to |{right arrow over (α₁)}|. Thisis because |{right arrow over (α₁)}| reflects the magnitude of anapplied force and the speed of an action in the process that the userraises the phone. Here, F(|{right arrow over (α₁)}|)w₁+F(θ₁)w₂ is usedfor matching, wherein, w₁ represents a weight of |{right arrow over(α₁)}|, w₂ represents a weight of θ₁, F(|{right arrow over (α₁)}|)represents a proportion of the collected |{right arrow over (α₁)}|falling within the acceleration value range [|{right arrow over (α₁)}|_(L), |{right arrow over (α₁ )}|_(H)], and F(θ₁) represents aproportion of the collected θ₁ falling within the motion direction anglevalue range [θ ₁ _(L) , θ ₁ _(H) ]. Therefore, if the proportion valuedetermined by the weighting process is greater than the presetsimilarity threshold, the authentication is successful; otherwise, theauthentication is failed.

Definitely, reference can be made to the content of the above actualapplication for the specific process, which is not repeated herein.

It should be noted that, for the process of identity authentication inthe embodiment of the present application, in the case where theauthentication is failed, in addition to that the terminal directlyrejects the operation of the user, action attribute information afterthe authentication is failed may be sent to a risk control systemrunning at the background of the terminal for further judgment, and thisdoes not constitute a limitation to the present application.

The method for identity authentication according to the embodiment ofthe present application is described in the foregoing, and based on thesame idea, an embodiment of the present application further provides adevice for identity authentication, as shown in FIG. 6.

The device for identity authentication in FIG. 6 is set in a terminal,and the device includes: a collection module 601, a determination module602, and a processing module 603.

The collection module 601 is configured to collect, when a user performsa specified operation, action attribute information of the user in theprocess of the specified operation, wherein the action attributeinformation includes one or more of applied force information andacceleration information.

The determination module 602 is configured to determine, according topreset standard information, whether the action attribute information ismatched with the standard information.

The processing module 603 is configured to: when the determinationmodule 602 determines that the action attribute information is matchedwith the standard information, the authentication being successful,perform corresponding processing according to the specified operation;and when the determination module determines that the action attributeinformation is not matched with the standard information, theauthentication being failed, refuse to perform the correspondingprocessing according to the specified operation.

The determination module 602 is specifically configured to: generatesample information according to the action attribute information in eachprocess of performing the specified operation, the action attributeinformation in each process of performing the specified operation beingcollected by the collection module 601 in advance each time when theuser performs the specified operation, determine an action attributevalue range according to the sample information, and set the actionattribute value range as the standard information.

The process of setting the standard information is also implemented bythe determination module 602, that is, the determination module 602 isspecifically configured to: determine a first average value of thesample information according to the sample information; determine asecond average value of sample information greater than the firstaverage value; determine a third average value of sample information notgreater than the first average value; and determine a numerical rangefrom the third average value to the second average value as the actionattribute value range.

The determination module 602 is specifically configured to: determinewhether an attribute value included in the action attribute informationfalls in the action attribute value range; if yes, determine that theaction attribute information is matched with the standard information;otherwise, determine that the action attribute information is notmatched with the standard information.

In a typical configuration, a computer device includes one or moreprocessors (CPU), an input/output interface, a network interface, and amemory.

The memory may include a volatile memory, a random access memory (RAM)and/or a non-volatile memory or the like in a computer readable medium,for example, a read only memory (ROM) or a flash RAM. The memory is anexample of the computer readable medium.

The computer readable medium includes non-volatile and volatile media aswell as movable and non-movable media, and can implement informationstorage by means of any method or technology. Information may be acomputer readable instruction, a data structure, a module of a programor other data. A storage medium of a computer includes, for example, butis not limited to, a phase change memory (PRAM), a static random accessmemory (SRAM), a dynamic random access memory (DRAM), other types ofRAMs, a ROM, an electrically erasable programmable read-only memory(EEPROM), a flash memory or other memory technologies, a compact diskread-only memory (CD-ROM), a digital versatile disc (DVD) or otheroptical storages, a cassette tape, a magnetic tape/magnetic disk storageor other magnetic storage devices, or any other non-transmission medium,and can be used to store information accessible to the computing device.According to the definition of this text, the computer readable mediumdoes not include transitory media, such as a modulated data signal and acarrier.

It should be further noted that, the term “include”, “comprise” or othervariations thereof are intended to cover non-exclusive inclusion, sothat a process, method, product or device including a series of elementsnot only includes the elements, but also includes other elements notclearly listed, or further includes inherent elements of the process,method, product or device. In a case without any more limitations, anelement defined by “including a...” does not exclude that the process,method, product or device including the element further has otheridentical elements.

Persons skilled in the art should understand that, the embodiments ofthe present application may be provided as a method, a system, or acomputer program product. Therefore, the present application may beimplemented as a completely hardware embodiment, a completely softwareembodiment, or an embodiment combing software and hardware. Moreover,the present application may be a computer program product implemented onone or more computer usable storage media (including, but not limitedto, a magnetic disk memory, a CD-ROM, an optical memory, and the like)including computer usable program code.

The above descriptions are merely embodiments of the presentapplication, and are not intended to limit the present application. Forpersons skilled in the art, the present application may have variousmodifications and variations. Any modification, equivalent replacement,improvement or the like made without departing from the spirit andprinciple of the present application should all fall within the scope ofclaims of the present application.

1. A method, comprising: collecting a plurality of actions of a userperformed on a terminal; determining whether a threshold percentage ofthe plurality of actions falls within a standard value range; inresponse to determining that a threshold percentage of the plurality ofactions falls within the standard value range, performing a specifiedoperation corresponding to the standard value range; and in response todetermining that a threshold percentage of the plurality of actions doesnot fall within the standard value range, refusing to perform thespecified operation corresponding to the standard value range.
 2. Themethod according to claim 1, wherein determining whether a thresholdpercentage of the plurality of actions falls within the standard valuerange comprises: determining acceleration information based on theplurality of actions of the user; determining whether a thresholdpercentage of the acceleration information falls within a standardacceleration value range.
 3. The method according to claim 1, whereinthe standard value range comprises a standard motion value range and astandard pressure value range; and wherein determining whether athreshold percentage of the plurality of actions falls within thestandard value range comprises: determining motion information andpressure information based on the plurality of actions of the user;determining whether a threshold percentage of the motion informationfalls within the standard motion value range; and determining whether athreshold percentage of the pressure information falls within thestandard pressure value range.
 4. The method according to claim 1,wherein collecting the plurality of actions of the user performed on theterminal comprises: collecting a predetermined number of actions as theplurality of actions of the user.
 5. The method according to claim 1,wherein the specified operation corresponding to the standard valuerange is determined based on the plurality of actions of a user.
 6. Themethod according to claim 5, wherein the plurality of actions of theuser comprise sliding to unlock a lock-screen interface of the terminal;and wherein the specified operation corresponding to the standard valuerange comprises unlocking the terminal.
 7. The method according to claim1, wherein the specified operation corresponding to the standard valuerange comprises answering a call on the terminal.
 8. The methodaccording to claim 1, wherein the specified operation corresponding tothe standard value range comprises starting an application on theterminal.
 9. The method according to claim 1, wherein the specifiedoperation corresponding to the standard value range comprisesauthenticating the user.
 10. A system, comprising one or more processorsand one or more non-transitory computer-readable memories coupled to theone or more processors and configured with instructions executable bythe one or more processors to cause the system to perform operationscomprising: collecting a plurality of actions of a user performed on aterminal; determining whether a threshold percentage of the plurality ofactions falls within a standard value range; in response to determiningthat a threshold percentage of the plurality of actions falls within thestandard value range, performing a specified operation corresponding tothe standard value range; and in response to determining that athreshold percentage of the plurality of actions does not fall withinthe standard value range, refusing to perform the specified operationcorresponding to the standard value range.
 11. The system of claim 10,wherein determining whether a threshold percentage of the plurality ofactions falls within the standard value range comprises: determiningacceleration information based on the plurality of actions of the user;determining whether a threshold percentage of the accelerationinformation falls within a standard acceleration value range.
 12. Thesystem of claim 10, wherein the standard value range comprises astandard motion value range and a standard pressure value range; andwherein determining whether a threshold percentage of the plurality ofactions falls within the standard value range comprises: determiningmotion information and pressure information based on the plurality ofactions of the user; determining whether a threshold percentage of themotion information falls within the standard motion value range; anddetermining whether a threshold percentage of the pressure informationfalls within the standard pressure value range.
 13. The system of claim10, wherein collecting the plurality of actions of the user performed onthe terminal comprises: collecting a predetermined number of actions asthe plurality of actions of the user.
 14. The system of claim 10,wherein the specified operation corresponding to the standard valuerange is determined based on the plurality of actions of a user.
 15. Thesystem of claim 14, wherein the plurality of actions of the usercomprise sliding to unlock a lock-screen interface of the terminal; andwherein the specified operation corresponding to the standard valuerange comprises unlocking the terminal.
 16. The system of claim 10,wherein the specified operation corresponding to the standard valuerange comprises answering a call on the terminal.
 17. A non-transitorycomputer-readable storage medium configured with instructions executableby one or more processors to cause the one or more processors to performoperations comprising: collecting a plurality of actions of a userperformed on a terminal; determining whether a threshold percentage ofthe plurality of actions falls within a standard value range; inresponse to determining that a threshold percentage of the plurality ofactions falls within the standard value range, performing a specifiedoperation corresponding to the standard value range; and in response todetermining that a threshold percentage of the plurality of actions doesnot fall within the standard value range, refusing to perform thespecified operation corresponding to the standard value range. 18.Non-transitory computer-readable storage medium of claim 17, whereindetermining whether a threshold percentage of the plurality of actionsfalls within the standard value range comprises: determiningacceleration information based on the plurality of actions of the user;determining whether a threshold percentage of the accelerationinformation falls within a standard acceleration value range. 19.Non-transitory computer-readable storage medium of claim 17, wherein thestandard value range comprises a standard motion value range and astandard pressure value range; and wherein determining whether athreshold percentage of the plurality of actions falls within thestandard value range comprises: determining motion information andpressure information based on the plurality of actions of the user;determining whether a threshold percentage of the motion informationfalls within the standard motion value range; and determining whether athreshold percentage of the pressure information falls within thestandard pressure value range.
 20. The non-transitory computer-readablestorage medium of claim 17, wherein collecting the plurality of actionsof the user performed on the terminal comprises: collecting apredetermined number of actions as the plurality of actions of theuser..