[go: up one dir, main page]

WO2018040045A1 - Monitoring method, apparatus and electronic device - Google Patents

Monitoring method, apparatus and electronic device Download PDF

Info

Publication number
WO2018040045A1
WO2018040045A1 PCT/CN2016/097745 CN2016097745W WO2018040045A1 WO 2018040045 A1 WO2018040045 A1 WO 2018040045A1 CN 2016097745 W CN2016097745 W CN 2016097745W WO 2018040045 A1 WO2018040045 A1 WO 2018040045A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
information
feature information
electronic device
illegal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2016/097745
Other languages
French (fr)
Chinese (zh)
Inventor
江秀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cloudminds Shenzhen Robotics Systems Co Ltd
Original Assignee
Cloudminds Shenzhen Robotics Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cloudminds Shenzhen Robotics Systems Co Ltd filed Critical Cloudminds Shenzhen Robotics Systems Co Ltd
Priority to CN201680002703.5A priority Critical patent/CN106716429A/en
Priority to PCT/CN2016/097745 priority patent/WO2018040045A1/en
Publication of WO2018040045A1 publication Critical patent/WO2018040045A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present disclosure relates to the field of electronic device security monitoring, and in particular to a monitoring method, device, and electronic device.
  • an electronic device when an electronic device performs some sensitive operations, it is required to authenticate the user identity.
  • the electronic device performs this operation when it is confirmed that the user identity is legal.
  • the electronic device does not perform the operation.
  • This mechanism can prevent illegal users from illegally using electronic devices to a certain extent.
  • an illegal user forges the identity authentication information of the legitimate user, the illegal user can perform the illegal operation on the electronic device through the authentication of the electronic device. In this way, it is easy to cause problems such as leakage of user information and damage to user property.
  • the present disclosure provides a monitoring method, apparatus, computer program product, non-transitory computer readable storage medium, and electronic device.
  • a monitoring method applied to an electronic device includes: acquiring user feature information when the user is not aware, the user feature information being used to confirm whether the current user is Is an illegal user; in the authentication information entered according to the user When the user is determined to be legal, the current user is confirmed as an illegal user according to the user characteristic information, and the identity authentication information is used to confirm whether the target authentication operation is allowed; and the current user is confirmed to be illegal according to the user feature information.
  • the specified security action is performed when the user is on.
  • a monitoring apparatus applied to an electronic device, and the apparatus includes: an acquisition module configured to acquire user characteristic information without a user's perception, the user characteristic information
  • the confirmation module is configured to: when determining that the user is legal according to the identity authentication information input by the user, confirming whether the current user is an illegal user according to the user feature information, and the identity authentication information For confirming whether the target authentication operation is allowed; the execution module is configured to perform the specified security operation when confirming that the current user is an illegal user according to the user characteristic information.
  • a computer program product comprising a computer program executable by a programmable device, the computer program having when executed by the programmable device The code portion of the above monitoring method is executed.
  • a non-transitory computer readable storage medium comprising one or more programs for performing The above monitoring method.
  • an electronic device comprising: the non-transitory computer readable storage medium described above; and one or more processors for executing the non-transitory computer Read the program in the storage medium.
  • the technical solution provided by the embodiment of the present disclosure may include the following beneficial effects: by the above technical solution, even if an illegal user breaks or falsifies the identity authentication information of the legitimate user and successfully enters the electronic device, the electronic device may obtain the current user by acquiring the current user. User feature information to perform secondary verification of the identity of the user. When the secondary verification result indicates that the user is an illegal user, the specified security operation is performed, thereby improving the security of use of the electronic device, effectively reducing leakage of user information and damage to user property caused by illegal operation of the electronic device. And so on.
  • the child device acquires the user feature information without the user's perception, so that the current user is not aware of the situation, thereby reducing the possibility that the user feature information is intentionally imitated or forged by the illegal user, thereby further improving the identity of the current user.
  • the accuracy of the certification is a measure of the accuracy of the certification.
  • FIG. 1A is a schematic diagram of an implementation environment, according to an exemplary embodiment.
  • FIG. 1B is a schematic diagram of an implementation environment, according to another exemplary embodiment.
  • FIG. 2A is a flow chart of a monitoring method, according to an exemplary embodiment.
  • FIG. 2B is a flowchart of a monitoring method according to another exemplary embodiment.
  • FIG. 3 is a schematic diagram of applying the above monitoring method to a screen unlocking scene according to an exemplary embodiment.
  • FIG. 4 is a schematic diagram of a method for applying the above monitoring method to an access unlocking scene according to an exemplary embodiment.
  • FIG. 5 is a schematic diagram of applying the foregoing monitoring method to a payment application scenario according to an exemplary embodiment.
  • FIG. 6 is a block diagram of a monitoring apparatus, according to an exemplary embodiment.
  • FIG. 7 is a block diagram of a monitoring apparatus, according to an exemplary embodiment.
  • FIG. 1A is a schematic diagram of an implementation environment, according to an exemplary embodiment.
  • the implementation environment can include an electronic device 100.
  • the electronic device 100 may be, for example, an intelligent robot, a smart phone, a tablet, a personal digital assistant (PDA), a PC, a notebook computer, an access control unlocking device, or the like.
  • the electronic device 100 is a smart phone as an example.
  • FIG. 1B is a schematic diagram of an implementation environment, according to another exemplary embodiment.
  • the implementation environment may include an electronic device 100 and a cloud server 200.
  • the electronic device 100 and the cloud server 200 can communicate through various wired or wireless modes.
  • the electronic device 100 communicates with the cloud server 200 via WiFi, Bluetooth, 2G, 3G, 4G, and the like.
  • the electronic device 100 can upload data to the cloud server 200 so that the cloud server 200 performs operations such as data storage, data processing, and the like.
  • FIG. 2A is a flowchart of a monitoring method, which may be applied to an electronic device, such as the electronic device 100 illustrated in FIG. 1A or FIG. 1B, according to an exemplary embodiment. As shown in FIG. 2A, the method can include:
  • step 201 user feature information is acquired without the user's perception, and the user feature information is used to confirm whether the current user is an illegal user.
  • the electronic device acquires user feature information in a silent manner, and the user feature information may be used to confirm whether the current user is an illegal user.
  • the user feature information may include biometric information of the current user, wherein the biometric information may include, for example but not limited to, at least one of the following: facial feature information, iris feature information, and voiceprint feature. Information, fingerprint feature information, etc.
  • the electronic device may acquire the image information of the current user in a silent manner by configuring the camera thereon, and analyze the image to obtain the face feature information and the iris feature information. .
  • the electronic device can acquire the sound information of the current user in a silent manner through a microphone disposed thereon, and analyze the sound information to obtain voiceprint feature information.
  • the electronic device can collect the fingerprint information of the current user in a silent manner through the fingerprint sensor configured thereon, and analyze the fingerprint information to obtain fingerprint feature information.
  • the user feature information may further include current user operation feature information, wherein the user operation feature information may include, for example but not limited to, at least one of the following: the user is implementing The location at the time of operation, the time when the user performed the operation, the network information of the network to which the electronic device is connected when the user performs the operation, and the like.
  • step 201 the user feature information of the current user can be obtained without the user's perception, and the user does not need to interact with the user. In this way, the illegal user does not know this in advance, and it is not easy to forge the user characteristic information of the legitimate user.
  • step 202 when it is determined that the user is legal according to the identity authentication information input by the user, it is confirmed according to the user feature information whether the current user is an illegal user, wherein the identity authentication information is used to confirm whether the target authentication operation is allowed.
  • the target authentication operation refers to any of the operations in the electronic device that require the user to perform identity authentication and can be performed after the authentication is passed.
  • the target authentication operation may include, for example but not limited to, at least one of a screen unlocking operation, an access unlocking operation, an application login or payment operation, and the like.
  • the application may include a social application, an address book application, a financial application, an application with a payment function, and the like.
  • the identity authentication information can be used to confirm whether the target authentication operation is allowed.
  • the identity authentication information may include, but is not limited to, at least one of the following: digital cryptographic information, graphical cryptographic information, biometric cryptographic information, and the like.
  • the biometric cryptographic information may include, for example but not limited to, at least one of the following: face feature information, iris feature information, fingerprint feature information, voiceprint feature information, and the like.
  • the electronic device When the user wants to perform the target authentication operation, the electronic device prompts the user to input the identity authentication information. After the electronic device receives the identity authentication information input by the user, the electronic device may match the received identity authentication information with the identity authentication information that is preset in the electronic device and belongs to the legal user. When the identity authentication information received by the electronic device matches the preset identity authentication information belonging to the legitimate user, it is determined that the current user is legal. When the identity authentication information received by the electronic device does not match the preset identity authentication information that belongs to the legal user, it is determined that the current user is illegal. At this time, the electronic device may prohibit the current user from performing the target authentication operation.
  • the electronic device may send the received identity authentication information to the cloud server, to determine whether the user is legal by the cloud server.
  • the manner in which the cloud server determines whether the user is legal according to the received identity authentication information is similar to the manner described above on the electronic device side, and details are not described herein again.
  • the cloud server may return an authentication result to the electronic device, where the authentication result may indicate whether the user is legal. In this way, by analyzing the authentication result, the electronic device can know whether the current user is legal.
  • the electronic device may confirm whether the current user is an illegal user according to the user feature information acquired in step 201 to implement secondary authentication of the user identity.
  • the electronic device may match the acquired user feature information with a pre-stored user feature (the pre-stored user feature is a user feature of a legitimate user), and confirm whether the current user is based on the matching result. It is an illegal user. For example, when the acquired user feature information does not match the user feature pre-stored in the electronic device, the electronic device may confirm that the current user is an illegal user; when the acquired user feature information matches the user feature pre-stored in the electronic device, the electronic The device can confirm that the current user is a legitimate user.
  • the pre-stored user feature is a user feature of a legitimate user
  • the electronic device may send the acquired user feature information to the cloud server, to confirm, by the cloud server, whether the current user is an illegal user according to the user feature information.
  • the cloud server determines whether the user is illegal according to the received user characteristic information. The manner is similar to the manner described above on the electronic device side, and details are not described herein again.
  • the cloud server may send an indication message to the electronic device to characterize whether the current user is an illegal user. In this way, the electronic device can confirm whether the current user is an illegal user according to the indication message.
  • the user feature information acquired in step 201 may include biometric information of the current user.
  • the electronic device or the cloud server confirms whether the current user is an illegal user by matching the acquired biometric information with a pre-stored biometric that belongs to the legal user.
  • the user feature information acquired in step 201 may include current user operation feature information.
  • the electronic device or the cloud server can confirm whether the current user is an illegal user by matching the current user operation feature information with the previously stored historical user operation feature information. The embodiment is based on the current user operation feature information and the historical user operation feature information to determine whether the current user's use of the electronic device conforms to the usage habit of the legitimate user of the electronic device, and thereby confirms whether the current user is an illegal user. .
  • the current user is an illegal user: the current user's location does not belong to the historical user's location; the current user operation time does not belong to the historical user operation time; The network that the device is currently accessing does not belong to the network that the electronic device has historically accessed.
  • step 203 when it is confirmed that the current user is an illegal user according to the user characteristic information, the specified security operation is performed.
  • the electronic device may perform an alarm operation, for example, an alarm sound to alert the current user or other persons around the current user.
  • the electronic device may send the alarm information to the designated user to notify the designated user that the electronic device is currently being illegally operated.
  • the electronic device can send the alarm information by sending an email, a short message, a social application message, and the like to the designated user.
  • the designated user may include a legitimate user of the electronic device, and may also include any user specified by the legitimate user, for example, a relative of the legitimate user, a friend, and the like.
  • the electronic device may perform the permission control operation according to the preset permission rule. For example, if the user successfully logs in to an application by using the identity authentication information, when the electronic device confirms that the user is an illegal user through the secondary authentication process, the user may be controlled to use the current login application. Or all features. For example, the authority of the user is controlled such that the user data under the application cannot be browsed, the message cannot be sent out through the application, the payment, transfer, remittance, and the like involve financial transactions, and the like.
  • the electronic device may send the identity authentication information and/or the user feature information to the cloud server, so that the cloud server is illegal.
  • the identity authentication information used by the user and/or the user feature information of the illegal user are archived, which facilitates real identity confirmation, location tracking, and the like for the illegal user.
  • the electronic device can obtain the identity of the user by acquiring the user characteristic information of the current user. Secondary verification.
  • the secondary verification result indicates that the user is an illegal user
  • the specified security operation is performed, thereby improving the security of use of the electronic device, effectively reducing leakage of user information and damage to user property caused by illegal operation of the electronic device. And so on.
  • the electronic device acquires user feature information without the user's perception, so that the current user is not aware of the situation, thereby reducing the possibility that the user feature information is intentionally imitated or forged by the illegal user, thereby further improving the current user.
  • the accuracy of the identity authentication is based on which the user is an illegal user.
  • FIG. 2B is a flowchart of a monitoring method, which may be applied to an electronic device, such as the electronic device 100 illustrated in FIG. 1A or FIG. 1B, according to another exemplary embodiment. As shown in FIG. 2B, the foregoing monitoring method may further include:
  • step 204 when it is determined that the user is legitimate according to the identity authentication information input by the user, the user is allowed to perform the target authentication operation.
  • the user when the illegal user breaks or falsifies the identity authentication information and successfully enters the electronic device, the user is allowed to perform the target authentication operation, thereby reducing the alertness of the illegal user, making it difficult to detect, so that it is not perceived. In the case of successful acquisition of its user feature information, the monitoring is more concealed.
  • the electronic device may acquire user feature information when the user inputs the identity authentication information without the user's perception.
  • the electronic device acquires the user feature information in a silent manner while inputting the identity authentication information, and the electronic device can perform two-factor authentication on the identity authentication information and the user feature information to determine that the current user is a legitimate user. . Even if the electronic device is later used by others, these other persons are not judged to be illegal users, and thus the specified security operation is not performed, thereby improving the practicability of the above scheme.
  • FIG. 3 is a schematic diagram of applying the above monitoring method to a screen unlocking scene according to an exemplary embodiment.
  • the user successfully unlocks by entering a numeric password and enters the interface of the electronic device.
  • the camera 102 of the electronic device 100 can acquire the user face feature information in a silent manner.
  • the user operation authority is controlled at this time. For example, when a user clicks on an app, the electronic device does not respond and the user cannot use any application.
  • FIG. 4 is a schematic diagram of a method for applying the above monitoring method to an access unlocking scene according to an exemplary embodiment.
  • the user successfully opens the access lock through the forged fingerprint sleeve 401.
  • the access unlocking device 400 acquires the iris characteristic information of the user in a silent manner through the camera 402.
  • the access control unlocking device 400 controls the alarm 403 to perform an alarm, and can send an alarm information to the administrator to notify the administrator.
  • FIG. 5 is a schematic diagram of applying the foregoing monitoring method to a payment application scenario according to an exemplary embodiment.
  • the user successfully logs in to the payment application by inputting the username and the login password.
  • the fingerprint sensor built in the electronic device acquires the fingerprint feature information of the user in a silent manner.
  • the functions of the financial transaction such as transfer, remittance, and payment, of the application are disabled.
  • FIG. 6 is a block diagram of a monitoring device 600, which may be applied to an electronic device, such as the electronic device 100 illustrated in FIG. 1A or FIG. 1B, according to an exemplary embodiment.
  • the apparatus 600 may include: an obtaining module 601 configured to acquire user feature information when the user is not aware, the user feature information is used to confirm whether the current user is an illegal user; and the confirmation module 602, When it is determined that the user is legal according to the identity authentication information input by the user, whether the current user is an illegal user is confirmed according to the user feature information acquired by the obtaining module 601, and the identity authentication information is used to confirm the target. Whether the authentication operation is permitted; the execution module 603 is configured to perform the specified security operation when it is confirmed that the current user is an illegal user according to the user characteristic information.
  • the apparatus 600 may further include: a target authentication operation permitting module configured to allow the user to perform a target authentication operation when determining that the user is legal according to the identity authentication information input by the user.
  • a target authentication operation permitting module configured to allow the user to perform a target authentication operation when determining that the user is legal according to the identity authentication information input by the user.
  • the confirmation module 602 may include: a first confirmation submodule configured to match the user feature information with a pre-stored user feature, and confirm the current use according to the matching result. Whether the user is an illegal user; or the confirmation module 402 may include: a first sending submodule configured to send the user feature information to a cloud server, to confirm, by the cloud server, the current user profile information Whether the user is an illegal user; the second confirmation sub-module is configured to receive an indication message sent by the cloud server for characterizing whether the current user is an illegal user, and confirm, according to the indication message, whether the current user is an illegal user.
  • the first confirmation submodule is configured to match the current user operation feature information with the stored history user operation feature information, wherein the user operation feature information may include at least one of the following The location of the user, the operation time of the user, and the network information of the network accessed by the electronic device.
  • the execution module 603 may include at least one of: an alarm sub-module configured to perform an alarm operation; an alarm information transmission sub-module configured to send alarm information to a designated user; and an authority control sub-module,
  • the second transmission sub-module is configured to send the identity authentication information and/or the user feature information to the cloud server.
  • the obtaining module 601 may be configured to acquire user feature information when the user inputs the identity authentication information without the user being aware.
  • FIG. 7 is a block diagram of a monitoring device 700, which may be an electronic device, according to an exemplary embodiment.
  • the apparatus 700 can include a processor 701, a memory 702, a multimedia component 703, an input/output (I/O) interface 704, and a communication component 705.
  • the processor 701 is configured to control the overall operation of the apparatus 700 to complete all or part of the above monitoring methods.
  • Memory 702 is used to store various types of data to support operations at the device 700, such as may include instructions for any application or method operating on the device 700, as well as application related data, such as Contact data, receipt Send messages, pictures, audio, videos, and more.
  • the memory 702 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as a static random access memory (SRAM), an electrically erasable programmable read only memory ( Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read Only Read-Only Memory (ROM), magnetic memory, flash memory, disk or optical disk.
  • the multimedia component 703 can include a screen and an audio component.
  • the screen may be, for example, a touch screen, and the audio component is used to output and/or input an audio signal.
  • the audio component can include a microphone for receiving an external audio signal.
  • the received audio signal may be further stored in memory 702 or transmitted via communication component 705.
  • the audio component also includes at least one speaker for outputting an audio signal.
  • the I/O interface 704 provides an interface between the processor 701 and other interface modules.
  • the other interface modules may be keyboards, mice, buttons, and the like. These buttons can be virtual buttons or physical buttons.
  • Communication component 705 is used for wired or wireless communication between the device 500 and other devices. Wireless communication, such as Wi-Fi, Bluetooth, Near Field Communication (NFC), 2G, 3G or 4G, or a combination of one or more of them, so the corresponding communication component 705 can include: Wi-Fi module, Bluetooth module, NFC module.
  • the device 700 may be configured by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), and digital signal processing devices (Digital Signal Processors).
  • ASICs Application Specific Integrated Circuits
  • DSPs Digital Signal Processors
  • Digital Signal Processors Digital Signal Processors
  • DSPD Processing Device
  • PLD Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • controller microcontroller, microprocessor or other electronic components Used to perform the above monitoring method.
  • a computer program product comprising a computer program executable by a programmable device, the computer program having when executed by the programmable device The code portion used to perform the monitoring method described above.
  • non-transitory computer readable storage medium comprising instructions, such as a memory 702 comprising instructions executable by processor 701 of apparatus 700 to perform the monitoring method described above.
  • the non-transitory computer readable storage medium can be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present disclosure relates to a monitoring method, apparatus and an electronic device. The method comprises: acquiring user characteristic information without a user's perception; when determining the user's validity according to the identity authentication information input by the user, confirming whether the current user is an invalid user according to the user characteristic information, the identity authentication information being used for confirming whether a target authentication operation is permitted or not; and performing a designated security operation when it is confirmed, based on the user characteristic information, that the current user is an invalid user. Therefore, even if the invalid user gets access to the electronic device successfully by cracking or forging the identity authentication information of the valid user, the electronic device can perform secondary verification on the identity of the user by acquiring the user characteristic information of the current user. When the secondary verification result indicates that the user is an invalid user, the designated security operation is performed, thereby enhancing usage security of the electronic device and avoiding problems such as user information disclosure and user property loss etc.

Description

监控方法、装置及电子设备Monitoring method, device and electronic device 技术领域Technical field

本公开涉及电子设备安全监控领域,具体地,涉及一种监控方法、装置及电子设备。The present disclosure relates to the field of electronic device security monitoring, and in particular to a monitoring method, device, and electronic device.

背景技术Background technique

随着技术的不断发展,电子设备越来越智能化。例如,人们不仅可以通过智能手机进行通话、发短信等基础操作,还可以在智能手机上安装各种类型的应用程序(例如,视频类应用程序、社交类应用程序、购物类应用程序、金融类应用程序等等),从而满足各自不同的使用需求。不过,随着智能化水平的提高,对电子设备的安全性能也提出了较高的要求。With the continuous development of technology, electronic devices are becoming more and more intelligent. For example, people can not only perform basic operations such as calling and texting through a smart phone, but also install various types of applications on a smart phone (for example, video applications, social applications, shopping applications, financials). Applications, etc.) to meet different usage needs. However, with the improvement of the level of intelligence, high requirements are also placed on the security performance of electronic devices.

相关技术中,在电子设备执行一些敏感操作时,需要对用户身份进行认证。当确认用户身份合法时,电子设备才执行该操作。当确认用户身份非法时,电子设备不执行该操作。这一机制能够在一定程度上防止非法用户对电子设备的非法使用。不过,如果非法用户伪造了合法用户的身份认证信息,那么该非法用户可以通过电子设备的认证,进而对电子设备进行非法操作。这样,容易造成用户信息泄露、用户财产受损等问题。In the related art, when an electronic device performs some sensitive operations, it is required to authenticate the user identity. The electronic device performs this operation when it is confirmed that the user identity is legal. When it is confirmed that the user identity is illegal, the electronic device does not perform the operation. This mechanism can prevent illegal users from illegally using electronic devices to a certain extent. However, if an illegal user forges the identity authentication information of the legitimate user, the illegal user can perform the illegal operation on the electronic device through the authentication of the electronic device. In this way, it is easy to cause problems such as leakage of user information and damage to user property.

发明内容Summary of the invention

为克服相关技术中存在的问题,本公开提供一种监控方法、装置、计算机程序产品、非临时性计算机可读存储介质及电子设备。To overcome the problems in the related art, the present disclosure provides a monitoring method, apparatus, computer program product, non-transitory computer readable storage medium, and electronic device.

根据本公开实施例的第一方面,提供一种监控方法,应用于电子设备,并且所述方法包括:在用户无感知的情况下获取用户特征信息,所述用户特征信息用于确认当前用户是否为非法用户;在根据用户输入的身份认证信息 判断用户合法时,根据所述用户特征信息确认所述当前用户是否为非法用户,所述身份认证信息用于确认目标认证操作是否被允许;在根据所述用户特征信息确认所述当前用户为非法用户时,执行指定的安全操作。According to a first aspect of the embodiments of the present disclosure, there is provided a monitoring method applied to an electronic device, and the method includes: acquiring user feature information when the user is not aware, the user feature information being used to confirm whether the current user is Is an illegal user; in the authentication information entered according to the user When the user is determined to be legal, the current user is confirmed as an illegal user according to the user characteristic information, and the identity authentication information is used to confirm whether the target authentication operation is allowed; and the current user is confirmed to be illegal according to the user feature information. The specified security action is performed when the user is on.

根据本公开实施例的第二方面,提供一种监控装置,应用于电子设备,并且所述装置包括:获取模块,被配置为在用户无感知的情况下获取用户特征信息,所述用户特征信息用于确认当前用户是否为非法用户;确认模块,被配置为在根据用户输入的身份认证信息判断用户合法时,根据所述用户特征信息确认所述当前用户是否为非法用户,所述身份认证信息用于确认目标认证操作是否被允许;执行模块,被配置为在根据所述用户特征信息确认所述当前用户为非法用户时,执行指定的安全操作。According to a second aspect of the embodiments of the present disclosure, there is provided a monitoring apparatus applied to an electronic device, and the apparatus includes: an acquisition module configured to acquire user characteristic information without a user's perception, the user characteristic information The confirmation module is configured to: when determining that the user is legal according to the identity authentication information input by the user, confirming whether the current user is an illegal user according to the user feature information, and the identity authentication information For confirming whether the target authentication operation is allowed; the execution module is configured to perform the specified security operation when confirming that the current user is an illegal user according to the user characteristic information.

根据本公开实施例的第三方面,提供一种计算机程序产品,所述计算机程序产品包含能够由可编程的装置执行的计算机程序,所述计算机程序具有当由所述可编程的装置执行时用于执行上述的监控方法的代码部分。According to a third aspect of an embodiment of the present disclosure, a computer program product is provided, the computer program product comprising a computer program executable by a programmable device, the computer program having when executed by the programmable device The code portion of the above monitoring method is executed.

根据本公开实施例的第四方面,提供一种非临时性计算机可读存储介质,所述非临时性计算机可读存储介质中包括一个或多个程序,所述一个或多个程序用于执行上述的监控方法。According to a fourth aspect of the embodiments of the present disclosure, there is provided a non-transitory computer readable storage medium comprising one or more programs for performing The above monitoring method.

根据本公开实施例的第五方面,提供一种电子设备,所述电子设备包括:上述的非临时性计算机可读存储介质;以及一个或者多个处理器,用于执行所述非临时性计算机可读存储介质中的程序。According to a fifth aspect of the embodiments of the present disclosure, there is provided an electronic device comprising: the non-transitory computer readable storage medium described above; and one or more processors for executing the non-transitory computer Read the program in the storage medium.

本公开的实施例提供的技术方案可以包括以下有益效果:通过上述技术方案,即便是非法用户破解或伪造了合法用户的身份认证信息而成功进入该电子设备,电子设备也可以通过获取当前用户的用户特征信息来对该用户的身份进行二次验证。当二次验证结果表示该用户为非法用户时,执行指定的安全操作,由此提升了电子设备的使用安全性,有效减少了因电子设备被非法操作而造成的用户信息泄露、用户财产受损等问题的出现。另外,电 子设备是在用户无感知的情况下获取用户特征信息的,使得当前用户不易察觉到这一情况,从而降低了用户特征信息被非法用户故意模仿或伪造的可能性,进一步提高对当前用户的身份认证的准确性。The technical solution provided by the embodiment of the present disclosure may include the following beneficial effects: by the above technical solution, even if an illegal user breaks or falsifies the identity authentication information of the legitimate user and successfully enters the electronic device, the electronic device may obtain the current user by acquiring the current user. User feature information to perform secondary verification of the identity of the user. When the secondary verification result indicates that the user is an illegal user, the specified security operation is performed, thereby improving the security of use of the electronic device, effectively reducing leakage of user information and damage to user property caused by illegal operation of the electronic device. And so on. In addition, electricity The child device acquires the user feature information without the user's perception, so that the current user is not aware of the situation, thereby reducing the possibility that the user feature information is intentionally imitated or forged by the illegal user, thereby further improving the identity of the current user. The accuracy of the certification.

本公开的其他特征和优点将在随后的具体实施方式部分予以详细说明。Other features and advantages of the present disclosure will be described in detail in the detailed description which follows.

附图说明DRAWINGS

附图是用来提供对本公开的进一步理解,并且构成说明书的一部分,与下面的具体实施方式一起用于解释本公开,但并不构成对本公开的限制。在附图中:The drawings are intended to provide a further understanding of the disclosure, and are in the In the drawing:

图1A是根据一示例性实施例示出的一种实施环境的示意图。FIG. 1A is a schematic diagram of an implementation environment, according to an exemplary embodiment.

图1B是根据另一示例性实施例示出的一种实施环境的示意图。FIG. 1B is a schematic diagram of an implementation environment, according to another exemplary embodiment.

图2A是根据一示例性实施例示出的一种监控方法的流程图。2A is a flow chart of a monitoring method, according to an exemplary embodiment.

图2B是根据另一示例性实施例示出的一种监控方法的流程图。FIG. 2B is a flowchart of a monitoring method according to another exemplary embodiment.

图3是根据一示例性实施例示出的一种将上述监控方法应用于屏幕解锁场景时的示意图。FIG. 3 is a schematic diagram of applying the above monitoring method to a screen unlocking scene according to an exemplary embodiment.

图4是根据一示例性实施例示出的一种将上述监控方法应用于门禁解锁场景时的示意图。FIG. 4 is a schematic diagram of a method for applying the above monitoring method to an access unlocking scene according to an exemplary embodiment.

图5是根据一示例性实施例示出的一种将上述监控方法应用于支付应用场景时的示意图。FIG. 5 is a schematic diagram of applying the foregoing monitoring method to a payment application scenario according to an exemplary embodiment.

图6是根据一示例性实施例示出的一种监控装置的框图。FIG. 6 is a block diagram of a monitoring apparatus, according to an exemplary embodiment.

图7是根据一示例性实施例示出的一种监控装置的框图。FIG. 7 is a block diagram of a monitoring apparatus, according to an exemplary embodiment.

具体实施方式detailed description

以下结合附图对本公开的具体实施方式进行详细说明。应当理解的 是,此处所描述的具体实施方式仅用于说明和解释本公开,并不用于限制本公开。The specific embodiments of the present disclosure will be described in detail below with reference to the accompanying drawings. Should be understood The specific embodiments described herein are for illustrative purposes only and are not intended to limit the disclosure.

图1A是根据一示例性实施例示出的一种实施环境的示意图。如图1A所示,该实施环境可以包括电子设备100。在本公开中,电子设备100可以例如是智能机器人、智能手机、平板电脑、个人数字助理(PDA)、PC机、笔记本电脑、门禁解锁装置等等。图1A中以电子设备100是智能手机为例来示意。FIG. 1A is a schematic diagram of an implementation environment, according to an exemplary embodiment. As shown in FIG. 1A, the implementation environment can include an electronic device 100. In the present disclosure, the electronic device 100 may be, for example, an intelligent robot, a smart phone, a tablet, a personal digital assistant (PDA), a PC, a notebook computer, an access control unlocking device, or the like. In FIG. 1A, the electronic device 100 is a smart phone as an example.

图1B是根据另一示例性实施例示出的一种实施环境的示意图。如图1B所示,该实施环境可以包括电子设备100及云服务器200。其中,电子设备100与云服务器200之间可以通过各种有线或无线方式进行通信。示例地,电子设备100与云服务器200之间通过WiFi、蓝牙、2G、3G、4G等方式进行通信。电子设备100可以向云服务器200上传数据,以便云服务器200进行数据存储、数据处理等操作。FIG. 1B is a schematic diagram of an implementation environment, according to another exemplary embodiment. As shown in FIG. 1B, the implementation environment may include an electronic device 100 and a cloud server 200. The electronic device 100 and the cloud server 200 can communicate through various wired or wireless modes. For example, the electronic device 100 communicates with the cloud server 200 via WiFi, Bluetooth, 2G, 3G, 4G, and the like. The electronic device 100 can upload data to the cloud server 200 so that the cloud server 200 performs operations such as data storage, data processing, and the like.

图2A是根据一示例性实施例示出的一种监控方法的流程图,其中,该方法可以应用于电子设备,例如,图1A或图1B所示的电子设备100。如图2A所示,该方法可以包括:2A is a flowchart of a monitoring method, which may be applied to an electronic device, such as the electronic device 100 illustrated in FIG. 1A or FIG. 1B, according to an exemplary embodiment. As shown in FIG. 2A, the method can include:

在步骤201中,在用户无感知的情况下获取用户特征信息,该用户特征信息用于确认当前用户是否为非法用户。In step 201, user feature information is acquired without the user's perception, and the user feature information is used to confirm whether the current user is an illegal user.

在本公开中,电子设备以静默的方式获取用户特征信息,该用户特征信息可以用于确认当前用户是否为非法用户。在一种实施方式中,用户特征信息可以包括当前用户的生物特征信息,其中,该生物特征信息可以例如包括但不限于以下中的至少一者:人脸特征信息、虹膜特征信息、声纹特征信息、指纹特征信息等。示例地,针对人脸特征信息和虹膜特征信息,电子设备可以通过配置其上的摄像头、以静默方式采集当前用户的图像信息,并通过对该图像进行分析以获得人脸特征信息和虹膜特征信息。针对声纹特征信息, 电子设备可以通过配置在其上的麦克风、以静默方式采集当前用户的声音信息,并通过对该声音信息进行分析以获得声纹特征信息。针对指纹特征信息,电子设备可以通过配置在其上的指纹传感器、以静默方式采集当前用户的指纹信息,并通过对该指纹信息进行分析以获得指纹特征信息。In the present disclosure, the electronic device acquires user feature information in a silent manner, and the user feature information may be used to confirm whether the current user is an illegal user. In an embodiment, the user feature information may include biometric information of the current user, wherein the biometric information may include, for example but not limited to, at least one of the following: facial feature information, iris feature information, and voiceprint feature. Information, fingerprint feature information, etc. For example, for the face feature information and the iris feature information, the electronic device may acquire the image information of the current user in a silent manner by configuring the camera thereon, and analyze the image to obtain the face feature information and the iris feature information. . For voiceprint feature information, The electronic device can acquire the sound information of the current user in a silent manner through a microphone disposed thereon, and analyze the sound information to obtain voiceprint feature information. For the fingerprint feature information, the electronic device can collect the fingerprint information of the current user in a silent manner through the fingerprint sensor configured thereon, and analyze the fingerprint information to obtain fingerprint feature information.

可替换地或附加地,在另一种实施方式中,用户特征信息还可以包括当前的用户操作特征信息,其中,用户操作特征信息可以例如包括但不限于以下中的至少一者:用户在实施操作时所在位置、用户实施操作的时间、在用户实施操作时电子设备接入的网络的网络信息等。Alternatively or additionally, in another embodiment, the user feature information may further include current user operation feature information, wherein the user operation feature information may include, for example but not limited to, at least one of the following: the user is implementing The location at the time of operation, the time when the user performed the operation, the network information of the network to which the electronic device is connected when the user performs the operation, and the like.

通过步骤201,在用户无感知的情况下便可以获取到当前用户的用户特征信息,无需与用户进行交互。这样,非法用户不会提前知晓这一情况,并且不容易伪造合法用户的用户特征信息。Through step 201, the user feature information of the current user can be obtained without the user's perception, and the user does not need to interact with the user. In this way, the illegal user does not know this in advance, and it is not easy to forge the user characteristic information of the legitimate user.

在步骤202中,在根据用户输入的身份认证信息判断用户合法时,根据用户特征信息确认当前用户是否为非法用户,其中,该身份认证信息用于确认目标认证操作是否被允许。In step 202, when it is determined that the user is legal according to the identity authentication information input by the user, it is confirmed according to the user feature information whether the current user is an illegal user, wherein the identity authentication information is used to confirm whether the target authentication operation is allowed.

在本公开中,目标认证操作是指电子设备中,需要用户进行身份认证、并在认证通过后才能执行的操作中的任一操作。例如,该目标认证操作可以例如包括但不限于以下中的至少一者:屏幕解锁操作、门禁解锁操作、应用登录或支付操作等等。例如,该应用可以包括社交类应用、通讯录应用、金融类应用、带支付功能的应用等等。In the present disclosure, the target authentication operation refers to any of the operations in the electronic device that require the user to perform identity authentication and can be performed after the authentication is passed. For example, the target authentication operation may include, for example but not limited to, at least one of a screen unlocking operation, an access unlocking operation, an application login or payment operation, and the like. For example, the application may include a social application, an address book application, a financial application, an application with a payment function, and the like.

身份认证信息可以用于确认目标认证操作是否被允许。在本公开中,该身份认证信息可以包括但不限于以下中的至少一者:数字密码信息、图形密码信息、生物特征密码信息等等。其中,生物特征密码信息可以例如包括但不限于以下中的至少一者:人脸特征信息、虹膜特征信息、指纹特征信息、声纹特征信息等等。The identity authentication information can be used to confirm whether the target authentication operation is allowed. In the present disclosure, the identity authentication information may include, but is not limited to, at least one of the following: digital cryptographic information, graphical cryptographic information, biometric cryptographic information, and the like. The biometric cryptographic information may include, for example but not limited to, at least one of the following: face feature information, iris feature information, fingerprint feature information, voiceprint feature information, and the like.

当用户要进行目标认证操作时,电子设备提示用户输入身份认证信息。 当电子设备接收到用户输入的身份认证信息后,电子设备可以将接收到的身份认证信息与该电子设备内预置的、属于合法用户的身份认证信息进行匹配。当电子设备接收到的身份认证信息与预置的、属于合法用户的身份认证信息相匹配时,判定当前用户合法。当电子设备接收到的身份认证信息与预置的、属于合法用户的身份认证信息不匹配时,判定当前用户非法,此时,电子设备可以禁止当前用户进行该目标认证操作。When the user wants to perform the target authentication operation, the electronic device prompts the user to input the identity authentication information. After the electronic device receives the identity authentication information input by the user, the electronic device may match the received identity authentication information with the identity authentication information that is preset in the electronic device and belongs to the legal user. When the identity authentication information received by the electronic device matches the preset identity authentication information belonging to the legitimate user, it is determined that the current user is legal. When the identity authentication information received by the electronic device does not match the preset identity authentication information that belongs to the legal user, it is determined that the current user is illegal. At this time, the electronic device may prohibit the current user from performing the target authentication operation.

或者,在另一个实施方式中,当电子设备接收到用户输入的身份认证信息后,该电子设备可以将接收到身份认证信息发送至云服务器,以由该云服务器来判断该用户是否合法。其中,云服务器根据接收到的身份认证信息来判断用户是否合法的方式与上面描述的在电子设备侧进行判断的方式相类似,此处不再赘述。云服务器可以在完成身份认证后,向电子设备返回认证结果,其中,该认证结果可以表征用户是否合法。这样,电子设备通过解析该认证结果,便可获知当前用户是否合法。Alternatively, in another embodiment, after the electronic device receives the identity authentication information input by the user, the electronic device may send the received identity authentication information to the cloud server, to determine whether the user is legal by the cloud server. The manner in which the cloud server determines whether the user is legal according to the received identity authentication information is similar to the manner described above on the electronic device side, and details are not described herein again. After completing the identity authentication, the cloud server may return an authentication result to the electronic device, where the authentication result may indicate whether the user is legal. In this way, by analyzing the authentication result, the electronic device can know whether the current user is legal.

当根据用户输入的身份认证信息判断用户合法时,电子设备可以根据在步骤201中获取到的用户特征信息确认当前用户是否为非法用户,以实现对用户身份的二次认证。When determining that the user is legal according to the identity authentication information input by the user, the electronic device may confirm whether the current user is an illegal user according to the user feature information acquired in step 201 to implement secondary authentication of the user identity.

示例地,在一种实施方式中,电子设备可以将获取的用户特征信息与预先存储的用户特征(该预先存储的用户特征为合法用户的用户特征)进行匹配,并根据匹配结果确认当前用户是否为非法用户。例如,当获取的用户特征信息与电子设备内预先存储的用户特征不匹配时,电子设备可以确认当前用户为非法用户;当获取的用户特征信息与电子设备内预先存储的用户特征匹配时,电子设备可以确认当前用户为合法用户。For example, in an implementation manner, the electronic device may match the acquired user feature information with a pre-stored user feature (the pre-stored user feature is a user feature of a legitimate user), and confirm whether the current user is based on the matching result. It is an illegal user. For example, when the acquired user feature information does not match the user feature pre-stored in the electronic device, the electronic device may confirm that the current user is an illegal user; when the acquired user feature information matches the user feature pre-stored in the electronic device, the electronic The device can confirm that the current user is a legitimate user.

或者,在另一种实施方式中,电子设备可以将获取的用户特征信息发送至云服务器,以由该云服务器根据该用户特征信息确认当前用户是否为非法用户。其中,云服务器根据接收到的用户特征信息来判断用户是否非法的方 式与上面描述的在电子设备侧进行判断的方式相类似,此处不再赘述。云服务器可以向电子设备发送用于表征当前用户是否为非法用户的指示消息。这样,电子设备可以根据该指示消息,确认当前用户是否为非法用户。Alternatively, in another implementation manner, the electronic device may send the acquired user feature information to the cloud server, to confirm, by the cloud server, whether the current user is an illegal user according to the user feature information. The cloud server determines whether the user is illegal according to the received user characteristic information. The manner is similar to the manner described above on the electronic device side, and details are not described herein again. The cloud server may send an indication message to the electronic device to characterize whether the current user is an illegal user. In this way, the electronic device can confirm whether the current user is an illegal user according to the indication message.

如上所述,在步骤201中获取的用户特征信息可以包括当前用户的生物特征信息。在这种情况下,电子设备或者云服务器通过将获取到的生物特征信息与预先存储的、属于合法用户的生物特征进行匹配的方式,来确认当前用户是否为非法用户。可替换地或附加地,在步骤201中获取的用户特征信息可以包括当前的用户操作特征信息。在这种情况下,电子设备或云服务器可以通过将该当前的用户操作特征信息与之前存储的、历史的用户操作特征信息进行匹配的方式,来确认当前用户是否为非法用户。该实施方式主要基于当前的用户操作特征信息和历史的用户操作特征信息,来判断当前用户对电子设备的使用是否符合该电子设备的合法用户的使用习惯,并以此确认当前用户是否为非法用户。例如,在满足以下条件中的任一者或多者时,确认当前用户为非法用户:当前的用户所在位置不属于历史的用户所在位置;当前的用户操作时间不属于历史的用户操作时间;电子设备当前接入的网络不属于电子设备历史接入的网络。As described above, the user feature information acquired in step 201 may include biometric information of the current user. In this case, the electronic device or the cloud server confirms whether the current user is an illegal user by matching the acquired biometric information with a pre-stored biometric that belongs to the legal user. Alternatively or additionally, the user feature information acquired in step 201 may include current user operation feature information. In this case, the electronic device or the cloud server can confirm whether the current user is an illegal user by matching the current user operation feature information with the previously stored historical user operation feature information. The embodiment is based on the current user operation feature information and the historical user operation feature information to determine whether the current user's use of the electronic device conforms to the usage habit of the legitimate user of the electronic device, and thereby confirms whether the current user is an illegal user. . For example, when any one or more of the following conditions are met, it is confirmed that the current user is an illegal user: the current user's location does not belong to the historical user's location; the current user operation time does not belong to the historical user operation time; The network that the device is currently accessing does not belong to the network that the electronic device has historically accessed.

在步骤203中,在根据用户特征信息确认当前用户为非法用户时,执行指定的安全操作。In step 203, when it is confirmed that the current user is an illegal user according to the user characteristic information, the specified security operation is performed.

在一种实施方式中,在根据所述用户特征信息确认当前用户为非法用户时,电子设备可以执行报警操作,例如,发出警报声,以警示当前用户或当前用户周边的其他人员。In an embodiment, when it is confirmed according to the user characteristic information that the current user is an illegal user, the electronic device may perform an alarm operation, for example, an alarm sound to alert the current user or other persons around the current user.

可替换地或附加地,在另一种实施方式中,在根据用户特征信息确认当前用户为非法用户时,电子设备可以向指定用户发送告警信息,以通知该指定用户电子设备当前正在被非法操作。其中,电子设备可以通过向指定用户发送电子邮件、短信、社交应用消息等方式来发出告警信息。在本公开中, 指定用户可以包括电子设备的合法用户,也可以包括由该合法用户所指定的任意用户,例如,该合法用户的亲人、朋友等。Alternatively or additionally, in another implementation manner, when the current user is confirmed as an illegal user according to the user feature information, the electronic device may send the alarm information to the designated user to notify the designated user that the electronic device is currently being illegally operated. . The electronic device can send the alarm information by sending an email, a short message, a social application message, and the like to the designated user. In the present disclosure, The designated user may include a legitimate user of the electronic device, and may also include any user specified by the legitimate user, for example, a relative of the legitimate user, a friend, and the like.

可替换地或附加地,在另一种实施方式中,在根据用户特征信息确认当前用户为非法用户时,电子设备可以按照预设的权限规则执行权限控制操作。示例地,假设用户利用身份认证信息成功登录某个应用,那么当电子设备通过二次认证过程确认该用户为非法用户时,可以对该用户进行权限控制,使其无法使用当前登录的应用的一些或全部功能。例如,控制该用户的权限使其无法浏览该应用下的用户数据、无法通过该应用向外发送消息、无法进行支付、转账、汇款等涉及金融交易的操作,等等。Alternatively or additionally, in another embodiment, when the current user is confirmed as an illegal user according to the user feature information, the electronic device may perform the permission control operation according to the preset permission rule. For example, if the user successfully logs in to an application by using the identity authentication information, when the electronic device confirms that the user is an illegal user through the secondary authentication process, the user may be controlled to use the current login application. Or all features. For example, the authority of the user is controlled such that the user data under the application cannot be browsed, the message cannot be sent out through the application, the payment, transfer, remittance, and the like involve financial transactions, and the like.

可替换地或附加地,在又一种实施方式中,在根据用户特征信息确认当前用户为非法用户时,电子设备可以向云服务器发送身份认证信息和/或用户特征信息,以便云服务器对非法用户所使用的身份认证信息和/或非法用户的用户特征信息进行存档,便于对非法用户进行真实身份确认、位置追踪等等。Alternatively, or in addition, in another embodiment, when the current user is confirmed as an illegal user according to the user feature information, the electronic device may send the identity authentication information and/or the user feature information to the cloud server, so that the cloud server is illegal. The identity authentication information used by the user and/or the user feature information of the illegal user are archived, which facilitates real identity confirmation, location tracking, and the like for the illegal user.

综上所述,通过上述技术方案,即便是非法用户破解或伪造了合法用户的身份认证信息而成功进入该电子设备,电子设备也可以通过获取当前用户的用户特征信息来对该用户的身份进行二次验证。当二次验证结果表示该用户为非法用户时,执行指定的安全操作,由此提升了电子设备的使用安全性,有效减少了因电子设备被非法操作而造成的用户信息泄露、用户财产受损等问题的出现。另外,电子设备是在用户无感知的情况下获取用户特征信息的,使得当前用户不易察觉到这一情况,从而降低了用户特征信息被非法用户故意模仿或伪造的可能性,进一步提高对当前用户的身份认证的准确性。In summary, according to the above technical solution, even if an illegal user successfully hacks or falsifies the identity authentication information of the legitimate user and successfully enters the electronic device, the electronic device can obtain the identity of the user by acquiring the user characteristic information of the current user. Secondary verification. When the secondary verification result indicates that the user is an illegal user, the specified security operation is performed, thereby improving the security of use of the electronic device, effectively reducing leakage of user information and damage to user property caused by illegal operation of the electronic device. And so on. In addition, the electronic device acquires user feature information without the user's perception, so that the current user is not aware of the situation, thereby reducing the possibility that the user feature information is intentionally imitated or forged by the illegal user, thereby further improving the current user. The accuracy of the identity authentication.

图2B是根据另一示例性实施例示出的一种监控方法的流程图,其中,该方法可以应用于电子设备,例如,图1A或图1B所示的电子设备100。如图2B所示,上述监控方法还可以包括: 2B is a flowchart of a monitoring method, which may be applied to an electronic device, such as the electronic device 100 illustrated in FIG. 1A or FIG. 1B, according to another exemplary embodiment. As shown in FIG. 2B, the foregoing monitoring method may further include:

在步骤204中,在根据用户输入的身份认证信息判断用户合法时,允许用户执行目标认证操作。In step 204, when it is determined that the user is legitimate according to the identity authentication information input by the user, the user is allowed to perform the target authentication operation.

这样,当非法用户破解或伪造了身份认证信息而成功进入该电子设备时,允许该用户执行目标认证操作,由此可以降低非法用户的警觉性,使其不易察觉,以便于在其无感知的情况下成功获取其用户特征信息,使得监控的隐蔽性更强。In this way, when the illegal user breaks or falsifies the identity authentication information and successfully enters the electronic device, the user is allowed to perform the target authentication operation, thereby reducing the alertness of the illegal user, making it difficult to detect, so that it is not perceived. In the case of successful acquisition of its user feature information, the monitoring is more concealed.

有时,在实际使用过程中存在如下场景:当电子设备的合法用户输入自身的身份认证信息后,将其电子设备交由其他人(例如亲人、朋友等)使用。此时,当前用户的用户特征信息不符合电子设备的合法用户的用户特征信息,当前用户会被判定为非法用户,电子设备将执行指定的安全操作,比如发出报警声、发送告警信息等。显然,这不符合电子设备合法用户的期望。因此,在本公开中,为了避免出现这一问题,在执行步骤201时,电子设备可以在用户输入身份认证信息时,在用户无感知的情况下获取用户特征信息。这样,可以确保电子设备获取到的身份认证信息和用户特征信息是针对同一用户的。当用户为电子设备的合法用户时,电子设备在其输入身份认证信息的同时以静默的方式获取用户特征信息,电子设备能够对身份认证信息和用户特征信息进行双重认证,确定当前用户为合法用户。即使该电子设备之后交由其他人使用,这些其他人也不会被判定为是非法用户,进而不会执行指定的安全操作,从而提高上述方案的实用性。Sometimes, in actual use, there is a scenario in which when a legitimate user of an electronic device inputs its own identity authentication information, the electronic device is handed over to another person (for example, a relative, a friend, etc.). At this time, the user feature information of the current user does not meet the user feature information of the legitimate user of the electronic device, and the current user is determined to be an illegal user, and the electronic device performs a specified security operation, such as issuing an alarm sound, sending an alarm message, and the like. Obviously, this does not meet the expectations of legitimate users of electronic devices. Therefore, in the present disclosure, in order to avoid this problem, when performing step 201, the electronic device may acquire user feature information when the user inputs the identity authentication information without the user's perception. In this way, it can be ensured that the identity authentication information and the user feature information acquired by the electronic device are for the same user. When the user is a legitimate user of the electronic device, the electronic device acquires the user feature information in a silent manner while inputting the identity authentication information, and the electronic device can perform two-factor authentication on the identity authentication information and the user feature information to determine that the current user is a legitimate user. . Even if the electronic device is later used by others, these other persons are not judged to be illegal users, and thus the specified security operation is not performed, thereby improving the practicability of the above scheme.

图3是根据一示例性实施例示出的一种将上述监控方法应用于屏幕解锁场景时的示意图。在图3所示的屏幕解锁场景中,用户通过输入数字密码成功解锁,进入到电子设备的界面中。此时,电子设备100的摄像头102可以以静默的方式获取用户人脸特征信息。当电子设备100通过分析确认用户为非法用户时,此时对用户操作权限进行控制。例如,当用户点击某个应用时,电子设备不给予响应,用户无法使用任何应用程序。 FIG. 3 is a schematic diagram of applying the above monitoring method to a screen unlocking scene according to an exemplary embodiment. In the screen unlocking scenario shown in FIG. 3, the user successfully unlocks by entering a numeric password and enters the interface of the electronic device. At this time, the camera 102 of the electronic device 100 can acquire the user face feature information in a silent manner. When the electronic device 100 confirms that the user is an illegal user through analysis, the user operation authority is controlled at this time. For example, when a user clicks on an app, the electronic device does not respond and the user cannot use any application.

图4是根据一示例性实施例示出的一种将上述监控方法应用于门禁解锁场景时的示意图。在图4所示的门禁解锁场景中,用户通过伪造的指纹套401成功打开门禁锁。此时,门禁解锁装置400通过摄像头402以静默的方式获取用户的虹膜特征信息。当门禁解锁装置400通过分析确认用户为非法用户时,此时门禁解锁装置400控制报警器403进行报警,并可以向管理员发送告警信息以通知管理员。FIG. 4 is a schematic diagram of a method for applying the above monitoring method to an access unlocking scene according to an exemplary embodiment. In the access unlocking scenario shown in FIG. 4, the user successfully opens the access lock through the forged fingerprint sleeve 401. At this time, the access unlocking device 400 acquires the iris characteristic information of the user in a silent manner through the camera 402. When the access control unlocking device 400 confirms that the user is an illegal user by analysis, the access control unlocking device 400 controls the alarm 403 to perform an alarm, and can send an alarm information to the administrator to notify the administrator.

图5是根据一示例性实施例示出的一种将上述监控方法应用于支付应用场景时的示意图。在图5所示的支付应用场景中,用户通过输入用户名和登录密码成功登录支付应用。此时,电子设备内置的指纹传感器以静默的方式获取用户的指纹特征信息。当电子设备通过分析确认用户为非法用户后,禁用该应用的转账、汇款、支付等涉及金融交易的功能。FIG. 5 is a schematic diagram of applying the foregoing monitoring method to a payment application scenario according to an exemplary embodiment. In the payment application scenario shown in FIG. 5, the user successfully logs in to the payment application by inputting the username and the login password. At this time, the fingerprint sensor built in the electronic device acquires the fingerprint feature information of the user in a silent manner. When the electronic device confirms that the user is an illegal user through analysis, the functions of the financial transaction, such as transfer, remittance, and payment, of the application are disabled.

图6是根据一示例性实施例示出的一种监控装置600的框图,其中,该装置600可以应用于电子设备,例如,图1A或图1B所示的电子设备100。如图6所示,该装置600可以包括:获取模块601,被配置为在用户无感知的情况下获取用户特征信息,所述用户特征信息用于确认当前用户是否为非法用户;确认模块602,被配置为在根据用户输入的身份认证信息判断用户合法时,根据所述获取模块601所获取到的所述用户特征信息确认所述当前用户是否为非法用户,所述身份认证信息用于确认目标认证操作是否被允许;执行模块603,被配置为在根据所述用户特征信息确认所述当前用户为非法用户时,执行指定的安全操作。FIG. 6 is a block diagram of a monitoring device 600, which may be applied to an electronic device, such as the electronic device 100 illustrated in FIG. 1A or FIG. 1B, according to an exemplary embodiment. As shown in FIG. 6, the apparatus 600 may include: an obtaining module 601 configured to acquire user feature information when the user is not aware, the user feature information is used to confirm whether the current user is an illegal user; and the confirmation module 602, When it is determined that the user is legal according to the identity authentication information input by the user, whether the current user is an illegal user is confirmed according to the user feature information acquired by the obtaining module 601, and the identity authentication information is used to confirm the target. Whether the authentication operation is permitted; the execution module 603 is configured to perform the specified security operation when it is confirmed that the current user is an illegal user according to the user characteristic information.

可选地,所述装置600还可以包括:目标认证操作允许模块,被配置为在根据用户输入的身份认证信息判断用户合法时,允许用户执行目标认证操作。Optionally, the apparatus 600 may further include: a target authentication operation permitting module configured to allow the user to perform a target authentication operation when determining that the user is legal according to the identity authentication information input by the user.

可选地,所述确认模块602可以包括:第一确认子模块,被配置为将所述用户特征信息与预先存储的用户特征进行匹配,根据匹配结果确认当前用 户是否为非法用户;或者,所述确认模块402可以包括:第一发送子模块,被配置为将所述用户特征信息发送到云服务器,以由所述云服务器根据所述用户特征信息确认当前用户是否为非法用户;第二确认子模块,被配置为接收所述云服务器发送的用于表征当前用户是否为非法用户的指示消息,根据所述指示消息确认当前用户是否为非法用户。Optionally, the confirmation module 602 may include: a first confirmation submodule configured to match the user feature information with a pre-stored user feature, and confirm the current use according to the matching result. Whether the user is an illegal user; or the confirmation module 402 may include: a first sending submodule configured to send the user feature information to a cloud server, to confirm, by the cloud server, the current user profile information Whether the user is an illegal user; the second confirmation sub-module is configured to receive an indication message sent by the cloud server for characterizing whether the current user is an illegal user, and confirm, according to the indication message, whether the current user is an illegal user.

可选地,所述第一确认子模块被配置为将所述当前的用户操作特征信息与存储的历史的用户操作特征信息进行匹配,其中所述用户操作特征信息可以包括以下中的至少一者:用户所在位置、用户操作时间、所述电子设备接入的网络的网络信息。Optionally, the first confirmation submodule is configured to match the current user operation feature information with the stored history user operation feature information, wherein the user operation feature information may include at least one of the following The location of the user, the operation time of the user, and the network information of the network accessed by the electronic device.

可选地,所述执行模块603可以包括以下中的至少一者:报警子模块,被配置为执行报警操作;告警信息发送子模块,被配置为向指定用户发送告警信息;权限控制子模块,被配置为按照预设的权限规则执行权限控制操作;第二发送子模块,被配置为向云服务器发送所述身份认证信息和/或所述用户特征信息。Optionally, the execution module 603 may include at least one of: an alarm sub-module configured to perform an alarm operation; an alarm information transmission sub-module configured to send alarm information to a designated user; and an authority control sub-module, The second transmission sub-module is configured to send the identity authentication information and/or the user feature information to the cloud server.

可选地,所述获取模块601可以被配置为在用户输入身份认证信息时,在用户无感知的情况下获取用户特征信息。Optionally, the obtaining module 601 may be configured to acquire user feature information when the user inputs the identity authentication information without the user being aware.

关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。With regard to the apparatus in the above embodiments, the specific manner in which the respective modules perform the operations has been described in detail in the embodiment relating to the method, and will not be explained in detail herein.

图7是根据一示例性实施例示出的一种监控装置700的框图,该装置700可以是电子设备。如图7所示,该装置700可以包括:处理器701,存储器702,多媒体组件703,输入/输出(I/O)接口704,以及通信组件705。FIG. 7 is a block diagram of a monitoring device 700, which may be an electronic device, according to an exemplary embodiment. As shown in FIG. 7, the apparatus 700 can include a processor 701, a memory 702, a multimedia component 703, an input/output (I/O) interface 704, and a communication component 705.

其中,处理器701用于控制该装置700的整体操作,以完成上述的监控方法中的全部或部分步骤。存储器702用于存储各种类型的数据以支持在该装置700的操作,这些数据的例如可以包括用于在该装置700上操作的任何应用程序或方法的指令,以及应用程序相关的数据,例如联系人数据、收 发的消息、图片、音频、视频等等。该存储器702可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,例如静态随机存取存储器(Static Random Access Memory,简称SRAM),电可擦除可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,简称EEPROM),可擦除可编程只读存储器(Erasable Programmable Read-Only Memory,简称EPROM),可编程只读存储器(Programmable Read-Only Memory,简称PROM),只读存储器(Read-Only Memory,简称ROM),磁存储器,快闪存储器,磁盘或光盘。多媒体组件703可以包括屏幕和音频组件。其中屏幕例如可以是触摸屏,音频组件用于输出和/或输入音频信号。例如,音频组件可以包括一个麦克风,麦克风用于接收外部音频信号。所接收的音频信号可以被进一步存储在存储器702或通过通信组件705发送。音频组件还包括至少一个扬声器,用于输出音频信号。I/O接口704为处理器701和其他接口模块之间提供接口,上述其他接口模块可以是键盘,鼠标,按钮等。这些按钮可以是虚拟按钮或者实体按钮。通信组件705用于该装置500与其他设备之间进行有线或无线通信。无线通信,例如Wi-Fi,蓝牙,近场通信(Near Field Communication,简称NFC),2G、3G或4G,或它们中的一种或几种的组合,因此相应的该通信组件705可以包括:Wi-Fi模块,蓝牙模块,NFC模块。The processor 701 is configured to control the overall operation of the apparatus 700 to complete all or part of the above monitoring methods. Memory 702 is used to store various types of data to support operations at the device 700, such as may include instructions for any application or method operating on the device 700, as well as application related data, such as Contact data, receipt Send messages, pictures, audio, videos, and more. The memory 702 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as a static random access memory (SRAM), an electrically erasable programmable read only memory ( Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read Only Read-Only Memory (ROM), magnetic memory, flash memory, disk or optical disk. The multimedia component 703 can include a screen and an audio component. The screen may be, for example, a touch screen, and the audio component is used to output and/or input an audio signal. For example, the audio component can include a microphone for receiving an external audio signal. The received audio signal may be further stored in memory 702 or transmitted via communication component 705. The audio component also includes at least one speaker for outputting an audio signal. The I/O interface 704 provides an interface between the processor 701 and other interface modules. The other interface modules may be keyboards, mice, buttons, and the like. These buttons can be virtual buttons or physical buttons. Communication component 705 is used for wired or wireless communication between the device 500 and other devices. Wireless communication, such as Wi-Fi, Bluetooth, Near Field Communication (NFC), 2G, 3G or 4G, or a combination of one or more of them, so the corresponding communication component 705 can include: Wi-Fi module, Bluetooth module, NFC module.

在一示例性实施例中,装置700可以被一个或多个应用专用集成电路(Application Specific Integrated Circuit,简称ASIC)、数字信号处理器(Digital Signal Processor,简称DSP)、数字信号处理设备(Digital Signal Processing Device,简称DSPD)、可编程逻辑器件(Programmable Logic Device,简称PLD)、现场可编程门阵列(Field Programmable Gate Array,简称FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述的监控方法。 In an exemplary embodiment, the device 700 may be configured by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), and digital signal processing devices (Digital Signal Processors). Processing Device (DSPD), Programmable Logic Device (PLD), Field Programmable Gate Array (FPGA), controller, microcontroller, microprocessor or other electronic components Used to perform the above monitoring method.

在另一示例性实施例中,还提供了一种计算机程序产品,所述计算机程序产品包含能够由可编程的装置执行的计算机程序,所述计算机程序具有当由所述可编程的装置执行时用于执行上述的监控方法的代码部分。In another exemplary embodiment, there is also provided a computer program product comprising a computer program executable by a programmable device, the computer program having when executed by the programmable device The code portion used to perform the monitoring method described above.

在另一示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器702,上述指令可由装置700的处理器701执行以完成上述的监控方法。示例地,该非临时性计算机可读存储介质可以是ROM、随机存取存储器(Random Access Memory,简称RAM)、CD-ROM、磁带、软盘和光数据存储设备等。In another exemplary embodiment, there is also provided a non-transitory computer readable storage medium comprising instructions, such as a memory 702 comprising instructions executable by processor 701 of apparatus 700 to perform the monitoring method described above. By way of example, the non-transitory computer readable storage medium can be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.

以上结合附图详细描述了本公开的优选实施方式,但是,本公开并不限于上述实施方式中的具体细节,在本公开的技术构思范围内,可以对本公开的技术方案进行多种简单变型,这些简单变型均属于本公开的保护范围。The preferred embodiments of the present disclosure have been described in detail above with reference to the accompanying drawings. However, the present disclosure is not limited to the specific details of the above embodiments, and various simple modifications can be made to the technical solutions of the present disclosure within the scope of the technical idea of the present disclosure. These simple variations are all within the scope of the disclosure.

另外需要说明的是,在上述具体实施方式中所描述的各个具体技术特征,在不矛盾的情况下,可以通过任何合适的方式进行组合。为了避免不必要的重复,本公开对各种可能的组合方式不再另行说明。It should be further noted that the specific technical features described in the above specific embodiments may be combined in any suitable manner without contradiction. In order to avoid unnecessary repetition, the present disclosure will not be further described in various possible combinations.

此外,本公开的各种不同的实施方式之间也可以进行任意组合,只要其不违背本公开的思想,其同样应当视为本公开所公开的内容。 In addition, any combination of various embodiments of the present disclosure may be made as long as it does not deviate from the idea of the present disclosure, and should also be regarded as the disclosure of the present disclosure.

Claims (25)

一种监控方法,其特征在于,应用于电子设备,包括:A monitoring method, characterized in that it is applied to an electronic device, including: 在用户无感知的情况下获取用户特征信息,所述用户特征信息用于确认当前用户是否为非法用户;Obtaining user feature information when the user is not aware, and the user feature information is used to confirm whether the current user is an illegal user; 在根据用户输入的身份认证信息判断用户合法时,根据所述用户特征信息确认所述当前用户是否为非法用户,所述身份认证信息用于确认目标认证操作是否被允许;When it is determined that the user is legal according to the identity authentication information input by the user, whether the current user is an illegal user is confirmed according to the user feature information, and the identity authentication information is used to confirm whether the target authentication operation is allowed; 在根据所述用户特征信息确认所述当前用户为非法用户时,执行指定的安全操作。When it is confirmed according to the user characteristic information that the current user is an illegal user, the specified security operation is performed. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising: 在根据用户输入的身份认证信息判断用户合法时,允许用户执行目标认证操作。When the user is judged to be legitimate according to the identity authentication information input by the user, the user is allowed to perform the target authentication operation. 根据权利要求1所述的方法,其特征在于,所述目标认证操作包括以下中的至少一者:屏幕解锁操作、门禁解锁操作、应用登录或支付操作。The method of claim 1, wherein the target authentication operation comprises at least one of a screen unlocking operation, an access unlocking operation, an application login, or a payment operation. 根据权利要求1所述的方法,其特征在于,所述身份认证信息包括以下中的至少一者:数字密码信息、图形密码信息、生物特征密码信息。The method of claim 1, wherein the identity authentication information comprises at least one of: digital cryptographic information, graphical cryptographic information, biometric cryptographic information. 根据权利要求1所述的方法,其特征在于,所述根据所述用户特征信息确认所述当前用户是否为非法用户,包括:The method according to claim 1, wherein the confirming whether the current user is an illegal user according to the user feature information comprises: 将所述用户特征信息与预先存储的用户特征进行匹配,根据匹配结果确认当前用户是否为非法用户;或者,Matching the user feature information with a pre-stored user feature, and confirming whether the current user is an illegal user according to the matching result; or 所述根据所述用户特征信息确认所述当前用户是否为非法用户,包括: The confirming, according to the user feature information, whether the current user is an illegal user, includes: 将所述用户特征信息发送到云服务器,以由所述云服务器根据所述用户特征信息确认当前用户是否为非法用户;Sending the user feature information to the cloud server, to confirm, by the cloud server, whether the current user is an illegal user according to the user feature information; 接收所述云服务器发送的用于表征当前用户是否为非法用户的指示消息,根据所述指示消息确认当前用户是否为非法用户。Receiving an indication message sent by the cloud server to identify whether the current user is an illegal user, and confirming, according to the indication message, whether the current user is an illegal user. 根据权利要求5所述的方法,其特征在于,所述用户特征信息包括当前用户的生物特征信息。The method according to claim 5, wherein the user characteristic information comprises biometric information of the current user. 根据权利要求6所述的方法,其特征在于,所述生物特征信息包括人脸特征信息和/或虹膜特征信息。The method of claim 6, wherein the biometric information comprises facial feature information and/or iris feature information. 根据权利要求5-7中任一项所述的方法,其特征在于,所述用户特征信息包括当前的用户操作特征信息;以及,所述将所述用户特征信息与预先存储的用户特征进行匹配包括:The method according to any one of claims 5-7, wherein the user feature information includes current user operation feature information; and the matching the user feature information with a pre-stored user feature include: 将所述当前的用户操作特征信息与存储的历史的用户操作特征信息进行匹配。The current user operation feature information is matched with the stored history user operation feature information. 根据权利要求8所述的方法,其特征在于,所述用户操作特征信息包括以下中的至少一者:用户所在位置、用户操作时间、所述电子设备接入的网络的网络信息。The method according to claim 8, wherein the user operation feature information comprises at least one of: a location of the user, a user operation time, and network information of a network accessed by the electronic device. 根据权利要求1所述的方法,其特征在于,所述执行指定的安全操作包括以下中的至少一者:The method of claim 1 wherein said performing the specified security operation comprises at least one of: 执行报警操作;Perform an alarm operation; 向指定用户发送告警信息;Send alarm information to the specified user; 按照预设的权限规则执行权限控制操作; Perform permission control operations according to preset permission rules; 向云服务器发送所述身份认证信息和/或所述用户特征信息。Sending the identity authentication information and/or the user feature information to a cloud server. 根据权利要求1所述的方法,其特征在于,所述在用户无感知的情况下获取用户特征信息包括:The method according to claim 1, wherein the obtaining user characteristic information without the user's perception comprises: 在用户输入身份认证信息时,在用户无感知的情况下获取用户特征信息。When the user inputs the identity authentication information, the user feature information is acquired without the user's perception. 一种监控装置,其特征在于,应用于电子设备,包括:A monitoring device, characterized in that it is applied to an electronic device, including: 获取模块,被配置为在用户无感知的情况下获取用户特征信息,所述用户特征信息用于确认当前用户是否为非法用户;An acquiring module, configured to acquire user feature information when the user is not aware, where the user feature information is used to confirm whether the current user is an illegal user; 确认模块,被配置为在根据用户输入的身份认证信息判断用户合法时,根据所述用户特征信息确认所述当前用户是否为非法用户,所述身份认证信息用于确认目标认证操作是否被允许;The confirmation module is configured to confirm, according to the user characteristic information, whether the current user is an illegal user, and the identity authentication information is used to confirm whether the target authentication operation is permitted, when determining that the user is legal according to the identity authentication information input by the user; 执行模块,被配置为在根据所述用户特征信息确认所述当前用户为非法用户时,执行指定的安全操作。The execution module is configured to perform the specified security operation when the current user is confirmed to be an illegal user according to the user characteristic information. 根据权利要求12所述的装置,其特征在于,所述装置还包括:The device of claim 12, wherein the device further comprises: 目标认证操作允许模块,被配置为在根据用户输入的身份认证信息判断用户合法时,允许用户执行目标认证操作。The target authentication operation permitting module is configured to allow the user to perform the target authentication operation when determining that the user is legitimate according to the identity authentication information input by the user. 根据权利要求12所述的装置,其特征在于,所述目标认证操作包括以下中的至少一者:屏幕解锁操作、门禁解锁操作、应用登录或支付操作。The apparatus of claim 12, wherein the target authentication operation comprises at least one of a screen unlocking operation, an access unlocking operation, an application login or a payment operation. 根据权利要求12所述的装置,其特征在于,所述身份认证信息包括以下中的至少一者:数字密码信息、图形密码信息、生物特征密码信息。 The apparatus of claim 12, wherein the identity authentication information comprises at least one of: digital cryptographic information, graphical cryptographic information, biometric cryptographic information. 根据权利要求12所述的装置,其特征在于,所述确认模块包括:The device according to claim 12, wherein the confirmation module comprises: 第一确认子模块,被配置为将所述用户特征信息与预先存储的用户特征进行匹配,根据匹配结果确认当前用户是否为非法用户;或者,a first confirmation sub-module configured to match the user feature information with a pre-stored user feature, and confirm whether the current user is an illegal user according to the matching result; or 所述确认模块包括:The confirmation module includes: 第一发送子模块,被配置为将所述用户特征信息发送到云服务器,以由所述云服务器根据所述用户特征信息确认当前用户是否为非法用户;The first sending submodule is configured to send the user feature information to the cloud server, to confirm, by the cloud server, whether the current user is an illegal user according to the user feature information; 第二确认子模块,被配置为接收所述云服务器发送的用于表征当前用户是否为非法用户的指示消息,根据所述指示消息确认当前用户是否为非法用户。The second confirmation sub-module is configured to receive an indication message sent by the cloud server to identify whether the current user is an illegal user, and confirm, according to the indication message, whether the current user is an illegal user. 根据权利要求16所述的装置,其特征在于,所述用户特征信息包括当前用户的生物特征信息。The apparatus according to claim 16, wherein said user characteristic information comprises biometric information of a current user. 根据权利要求17所述的装置,其特征在于,所述生物特征信息包括人脸特征信息和/或虹膜特征信息。The apparatus according to claim 17, wherein said biometric information comprises face feature information and/or iris feature information. 根据权利要求16-18中任一项所述的装置,其特征在于,所述用户特征信息包括当前的用户操作特征信息;以及,所述第一确认子模块被配置为将所述当前的用户操作特征信息与存储的历史的用户操作特征信息进行匹配。The apparatus according to any one of claims 16 to 18, wherein the user characteristic information includes current user operation feature information; and the first confirmation submodule is configured to be the current user The operation feature information is matched with the stored user operation feature information of the history. 根据权利要求19所述的装置,其特征在于,所述用户操作特征信息包括以下中的至少一者:用户所在位置、用户操作时间、所述电子设备接入的网络的网络信息。The apparatus according to claim 19, wherein the user operation feature information comprises at least one of a location of the user, a user operation time, and network information of a network accessed by the electronic device. 根据权利要求12所述的装置,其特征在于,所述执行模块包括以 下中的至少一者:The apparatus of claim 12 wherein said execution module comprises At least one of the following: 报警子模块,被配置为执行报警操作;An alarm sub-module configured to perform an alarm operation; 告警信息发送子模块,被配置为向指定用户发送告警信息;The alarm information sending submodule is configured to send the alarm information to the designated user; 权限控制子模块,被配置为按照预设的权限规则执行权限控制操作;The permission control submodule is configured to perform the permission control operation according to the preset permission rule; 第二发送子模块,被配置为向云服务器发送所述身份认证信息和/或所述用户特征信息。The second sending submodule is configured to send the identity authentication information and/or the user feature information to the cloud server. 根据权利要求12所述的装置,其特征在于,所述获取模块被配置为在用户输入身份认证信息时,在用户无感知的情况下获取用户特征信息。The apparatus according to claim 12, wherein the acquisition module is configured to acquire user feature information when the user inputs the identity authentication information without the user's perception. 一种计算机程序产品,其特征在于,所述计算机程序产品包含能够由可编程的装置执行的计算机程序,所述计算机程序具有当由所述可编程的装置执行时用于执行权利要求1至11中任一项所述的方法的代码部分。A computer program product, comprising: a computer program executable by a programmable device, the computer program having instructions for performing the claims 1 to 11 when executed by the programmable device The code portion of the method of any of the preceding claims. 一种非临时性计算机可读存储介质,其特征在于,所述非临时性计算机可读存储介质中包括一个或多个程序,所述一个或多个程序用于执行权利要求1至11中任一项所述的方法。A non-transitory computer readable storage medium, characterized in that the non-transitory computer readable storage medium comprises one or more programs for performing any of claims 1 to One of the methods described. 一种电子设备,其特征在于,包括:An electronic device, comprising: 权利要求24中所述的非临时性计算机可读存储介质;以及The non-transitory computer readable storage medium of claim 24; 一个或者多个处理器,用于执行所述非临时性计算机可读存储介质中的程序。 One or more processors for executing a program in the non-transitory computer readable storage medium.
PCT/CN2016/097745 2016-08-31 2016-08-31 Monitoring method, apparatus and electronic device Ceased WO2018040045A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201680002703.5A CN106716429A (en) 2016-08-31 2016-08-31 Monitoring method and device, and electronic equipment
PCT/CN2016/097745 WO2018040045A1 (en) 2016-08-31 2016-08-31 Monitoring method, apparatus and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/097745 WO2018040045A1 (en) 2016-08-31 2016-08-31 Monitoring method, apparatus and electronic device

Publications (1)

Publication Number Publication Date
WO2018040045A1 true WO2018040045A1 (en) 2018-03-08

Family

ID=58904010

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/097745 Ceased WO2018040045A1 (en) 2016-08-31 2016-08-31 Monitoring method, apparatus and electronic device

Country Status (2)

Country Link
CN (1) CN106716429A (en)
WO (1) WO2018040045A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055472A (en) * 2021-03-11 2021-06-29 北京德风新征程科技有限公司 Internet of things data control method and device based on security authentication

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107437016B (en) * 2017-07-11 2020-05-26 Oppo广东移动通信有限公司 Application control method and related product
CN107423604B (en) * 2017-07-11 2021-03-09 Oppo广东移动通信有限公司 Application control method and related product
CN108563933A (en) * 2018-04-19 2018-09-21 Oppo广东移动通信有限公司 Application program control method and device, storage medium and mobile terminal
CN108647510A (en) * 2018-05-16 2018-10-12 阿里巴巴集团控股有限公司 Application program access method and device
KR102520199B1 (en) * 2018-07-23 2023-04-11 삼성전자주식회사 Electronic apparatus and controlling method thereof
CN110827021A (en) * 2019-10-24 2020-02-21 海南新软软件有限公司 Digital asset extraction monitoring method and device
CN113438272A (en) * 2021-05-20 2021-09-24 江苏谷德运维信息技术有限公司 Safety monitoring system based on big data
CN113886873A (en) * 2021-09-29 2022-01-04 上海市大数据股份有限公司 Large screen command system and method based on face recognition

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609695A (en) * 2012-02-14 2012-07-25 上海博物馆 Method and system for recognizing human face from multiple angles
WO2015137645A1 (en) * 2014-03-13 2015-09-17 엘지전자 주식회사 Mobile terminal and method for controlling same
CN105516961A (en) * 2015-12-09 2016-04-20 上海斐讯数据通信技术有限公司 Perception-free authentication method and system, control method and system based on same
CN105656851A (en) * 2014-11-13 2016-06-08 腾讯数码(深圳)有限公司 Information verification method, user terminal, server and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664903A (en) * 2012-05-16 2012-09-12 李明 Network user identifying method and system
CN105809005A (en) * 2016-03-29 2016-07-27 四川效率源信息安全技术股份有限公司 Method for locking or unlocking computer screen based on fingerprints

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609695A (en) * 2012-02-14 2012-07-25 上海博物馆 Method and system for recognizing human face from multiple angles
WO2015137645A1 (en) * 2014-03-13 2015-09-17 엘지전자 주식회사 Mobile terminal and method for controlling same
CN105656851A (en) * 2014-11-13 2016-06-08 腾讯数码(深圳)有限公司 Information verification method, user terminal, server and system
CN105516961A (en) * 2015-12-09 2016-04-20 上海斐讯数据通信技术有限公司 Perception-free authentication method and system, control method and system based on same

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055472A (en) * 2021-03-11 2021-06-29 北京德风新征程科技有限公司 Internet of things data control method and device based on security authentication
CN113055472B (en) * 2021-03-11 2022-09-09 北京德风新征程科技有限公司 Internet of things data control method and device based on security authentication

Also Published As

Publication number Publication date
CN106716429A (en) 2017-05-24

Similar Documents

Publication Publication Date Title
US11847199B2 (en) Remote usage of locally stored biometric authentication data
US12032668B2 (en) Identifying and authenticating users based on passive factors determined from sensor data
US12058114B2 (en) Device identification scoring
US11341475B2 (en) System and method of notifying mobile devices to complete transactions after additional agent verification
US20250298877A1 (en) Biometric authentication
WO2018040045A1 (en) Monitoring method, apparatus and electronic device
US10735412B2 (en) Use of a biometric image for authorization
CN104364794B (en) Location-based access for portable electron device controls
CN107077551B (en) Scalable Verification Process Selection Based on Sensor Input
US12475464B2 (en) Unified login biometric authentication support
CN104303483B (en) For the recognition system based on user of social networks
KR102038851B1 (en) Method and system for verifying identities
US20140230019A1 (en) Authentication to a first device using a second device
CN106030599A (en) Continuous authentication with a mobile device
US20180107813A1 (en) User Authentication Persistence
CN104933341A (en) Method and terminal for rights management
CN107145772B (en) Terminal equipment security control method and device and terminal equipment
CN105656871A (en) Secure communication method and device
Hong New Authentication Methods based on User's Behavior Big Data Analysis on Cloud
KR102633314B1 (en) method and apparatus for processing authentication information and user terminal including the same
KR101986244B1 (en) Method of telebiometric authentication based on mobile devices
CN110582771A (en) Method and device for performing authentication based on biometric information
KR102593260B1 (en) Method and device for managing seat departure using biometric template
CN116933236A (en) Application operation management and authentication
KR20170091371A (en) Server for using biometric authentication and biometric authentication method using the same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16914611

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 07/06/2019)

122 Ep: pct application non-entry in european phase

Ref document number: 16914611

Country of ref document: EP

Kind code of ref document: A1