CN105868610A - Method and system for realizing user authentication through biological characteristic information - Google Patents

Method and system for realizing user authentication through biological characteristic information Download PDF

Info

Publication number
CN105868610A
CN105868610A CN201610266144.0A CN201610266144A CN105868610A CN 105868610 A CN105868610 A CN 105868610A CN 201610266144 A CN201610266144 A CN 201610266144A CN 105868610 A CN105868610 A CN 105868610A
Authority
CN
China
Prior art keywords
user
application
value
request
security kernel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610266144.0A
Other languages
Chinese (zh)
Inventor
甘书宇
于燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Mobile Intelligent Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610266144.0A priority Critical patent/CN105868610A/en
Publication of CN105868610A publication Critical patent/CN105868610A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention discloses a method and a system for realizing user authentication through biological characteristic information. The method comprises the following steps: a user initiates an authentication request on the basis of an application of biometric identification equipment; a security kernel of the biometric identification equipment acquires the biological characteristic information of the user on the basis of the authentication request, generates a corresponding user ID value according to the biological characteristic information and returns the user ID value to the application initiating the authentication request; the application sends the user ID value returned by the security kernel to an application server, and the application server finishes user authentication according to the user ID value. One novel internet user identity authentication method is provided, so that the user does not need a user name or a password, and the login effect of the user name and the password can be finished on different sets of equipment through simple operation.

Description

Biological information is used to realize the method and system of user authentication
Technical field
The present invention relates to technical field of biometric identification, particularly relate to a kind of method and system using biological information to realize user authentication.
Background technology
Biological identification technology is the most ripe, and bio-identification also known as biological identification, is to carry out personal identification qualification by calculating the intrinsic physiological feature of equipment utilization human body or behavior characteristics.Conventional biological characteristic includes face picture, iris, fingerprint, palmmprint, sound, person's handwriting etc..Along with the fast development of biological identification technology, bio-identification function has become as the standard configuration of many smart machines, such as smart mobile phone, Smart Home, intelligent automobile, and the intelligent drawing machine with bio-identification function being likely to occur in the future etc..For as a example by smart mobile phone, fingerprint recognition and iris recognition technology have been obtained for concrete application.
Fingerprint identification technology is mapped a people with his fingerprint, is compared by the fingerprint and the fingerprint pre-saved comparing him, it is possible to verify his true identity.Everyone (including fingerprint) skin lines is different on pattern, breakpoint and cross point, say, that be unique, and the most constant.Rely on this uniqueness and stability, and then fingerprint identification technology can be realized.Currently, fingerprint recognition has been increasingly becoming the standard configuration of smart mobile phone.
Additionally, iris recognition technology also begins to use on smart mobile phone.Iris recognition technology is the one of human-body biological identification technology.The outside drawing of eye is made up of sclera, iris, pupil three part.The white portion that the i.e. eyeball of sclera is peripheral;Eye center is pupil portion;Iris, between sclera and pupil, contains the abundantest texture information.See in appearance, be made up of many gland nest, gauffer, pigmented spots etc., be one of structure unique in human body.The formation of iris is determined by gene, and people grows by about eight months, and iris is the most substantially grown and arrived sufficient size, enters metastable period.Unless the anomalous condition seldom seen, health or the biggest wound are only possible to cause outside the change on appearance of iris, iris pattern can keep many decades to be not much change.The height of iris is unique, stability and the most modifiable feature, is the iris material base that can be used as that identity differentiates.
But, in order to ensure the personal information security of intelligent movable equipment user, the above or can apply the biological identification technology on intelligent movable equipment the most only to apply the registration/certification (such as unlocked by fingerprint mobile phone etc.) in intelligent movable equipment this locality future, for network ID authentication, the most also it is to rely on traditional usemame/password mode.
The some terminal applies installed on intelligent movable equipment, in order to provide the user with the most diversified more rich Product Experience, mostly need user to carry out registering and logging, then provide on the line selected with its user for different user or service under line.But, the network ID authentication that traditional user takes on intelligent movable equipment is the most also to rely on usemame/password mode.Carry out registering and logging in usemame/password mode, easily cracked by hacker software, reveal the data of intelligent movable equipment user.The information such as such as account number cipher are once revealed and may be caused damage user.And user can regularly replace password to ensure that name in an account book/pin mode is not cracked, and easily forgets for long-time no name in an account book/password, causes and intelligent movable equipment cannot be used to apply, make troubles.
Although it addition, the fingerprint means of payment that Alipay company releases employs the biological information of user, but only can only realize contrast and certification in intelligent movable equipment this locality, the information of local comparison and certification cannot act as account number/password login server and uses.Make user that biological information cannot be used on other intelligent movable equipment to complete to use the login of software easily so that experience cannot improve.And bind the intelligent movable equipment of biotechnology feature verification, need when user switches intelligent movable equipment to re-register, use quite inconvenience.
Therefore, smart machine is how closer to the daily demand of user with more adapt to the use habit of user and also become the technical task that smart machine supplier is urgently to be resolved hurrily.
Summary of the invention
The embodiment of the present invention to solve the technical problem that and to be to provide a kind of method using biological information to realize user authentication, to provide a kind of new identification authentication mode, make user without remembering username and password, only can complete the registering and logging to application on different smart machines by shirtsleeve operation, thus promote smart machine user operation and experience, and make verification process more conveniently, safely, fast.
The embodiment of the present invention to solve the technical problem that further and be to provide a kind of system using biological information to realize user authentication, to provide a kind of new identification authentication mode, make user without remembering username and password, only can complete the registering and logging to application on different intelligent movable equipment by shirtsleeve operation, thus promote smart machine user operation and experience, and make verification process more conveniently, safely, fast.
For solving above-mentioned technical problem, present invention firstly provides a kind of method using biological information to realize user authentication, comprise the steps: that certification request is initiated in user's application based on biometric apparatus;The security kernel of this biometric apparatus biological information based on this certification acquisition request user, and carry out, according to this biological information, the ID value that calculation process generation is corresponding, then this ID value is returned to the application of this initiation certification request;The ID value that this security kernel is returned by this application mails to application server, and this application server completes user authentication according to this ID value.
This user authentication includes registration request and logging request.
Wherein, this certification request is registration request, when user initiates registration request in this application, this application initiates to extract the request of user biological characteristic information to this security kernel, this security kernel obtains the biological information of user and generates this ID value after receiving request, then this ID value returns to the application of this initiation registration request;The ID value corresponding with user returned is mail to application server and puts on record by this application, and this application server sets up user's service files based on this ID value.
In the present embodiment, this certification request is logging request, when user initiates logging request in this application, this application initiates to extract the request of user biological characteristic information to this security kernel, this security kernel obtains the biological information of user and generates this ID value after receiving request, then this ID value returns to the application of this initiation logging request;The ID value corresponding with user returned is mail to application server by this application, and this application server obtains the service files corresponding with user based on this ID value and returns to this application, and this application provides the user individual service based on service files.
As a kind of embodiment of this ID value, this ID value is the biological characteristic cryptographic Hash converted by biological information.
In order to guarantee data security, the encryption of this biological characteristic cryptographic Hash is returned to this application by this security kernel.In the present embodiment, this biological information includes finger print information and iris information.
In order to guarantee data security, the biological characteristic cryptographic Hash encryption corresponding with user received is sent to application server by this application.
On the other hand, the embodiment of the present invention also provides for a kind of system using biological information to realize user authentication, including: at least one is arranged on the application of biometric apparatus, is used for initiating certification request;It is arranged on the security kernel in this biometric apparatus, this security kernel is for the biological information according to this certification acquisition request user, and generate corresponding ID value according to this biological information, then this ID value is returned to the application of this initiation certification request;At least one application server, this application server is for receiving the ID value of this application transmission and completing user authentication according to this ID value.
This user authentication includes registration request and logging request.
Wherein, when user initiates registration request in this application, this application for initiating to extract the request of user biological characteristic information to this security kernel, this security kernel obtains the biological information of user and generates this ID value after receiving request, then this ID value returns to the application of this initiation registration request;This application is additionally operable to that the ID value corresponding with user returned is mail to application server and puts on record, and this application server is for setting up user's service files based on this ID value thing.
Additionally, when user initiates logging request in this application, this application for initiating to extract the request of user biological characteristic information to this security kernel, this security kernel obtains the biological information of user and generates this ID value after receiving request, then this ID value returns to the application of this initiation logging request;This application is additionally operable to the ID value corresponding with user returned is mail to application server, and this application server is for obtaining the service files corresponding with user according to ID value and returning to this application and provide the user individual service to realize this application according to service files.
As a kind of embodiment of this ID value, this ID value is the biological characteristic cryptographic Hash converted by biological information.
In order to guarantee data security, this security kernel is additionally operable to the encryption of this biological characteristic cryptographic Hash is returned to this application.This biological information includes finger print information and iris information.
In order to guarantee data security, this application is additionally operable to the biological characteristic cryptographic Hash encryption corresponding with user received is sent to application server.
By using technique scheme, the embodiment of the present invention at least has the advantages that and the invention provides a kind of new Internet authentication mode, biological information is used to realize user authentication, the method and system make user without using username and password, shirtsleeve operation can complete the registering and logging to application on different smart machines, on the one hand promote smart machine user operation to experience, on the other hand compared to traditional usemame/password authentication mechanism, the identity identifying method of the present embodiment makes verification process more conveniently, safely, fast.Such as: same person uses arbitrarily has the mobile phone of fingerprint identification function, after opening video player, can his account number of automated log on, enjoy the individual service being specific to user.In addition, data exchange between smart machine local security kernel and application is encryption, and, the data exchange embedded between smart machine application and the application server of new authentication mode is also encryption, further increases reliability and the safety of this identification authentication mode.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in describing below is only some embodiments of the present invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the process chart of the method that use biological information realizes user authentication in the embodiment of the present invention.
Fig. 2 is the flow chart completing verification process in the embodiment of the present invention between intelligent movable equipment and the server of the method that use biological information realizes user authentication.
Fig. 3 is the intelligent movable EM equipment module figure of the system that use biological information realizes user authentication in the embodiment of the present invention.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with the accompanying drawings the embodiment of the present invention is described in further details.Here, the schematic description and description of the present invention is used for explaining the present invention, but not as a limitation of the invention.
The specifically embodiment of the present embodiment for convenience of description, hereafter involved biological information is as a example by fingerprint collecting, and iris information collection and the conversion of ID value thereof are with fingerprint collecting in like manner.
The embodiment of the present invention provides a kind of new identification authentication mode being different from traditional usemame/password mode, it may be assumed that use biological information to realize the method and system of user authentication.
Refer to shown in Fig. 1, the method that this use biological information realizes user authentication comprises the steps:
Step 101: certification request is initiated in user's application based on biometric apparatus;
Step 102: the security kernel of this biometric apparatus biological information based on this certification acquisition request user;In the present embodiment, this biometric apparatus is intelligent movable equipment, it is to be understood that non-moving type but have within the smart machine of bio-identification function is included in technical scheme too.
Step 103: this security kernel carries out calculation process according to this biological information and generates corresponding ID value, then this biological characteristic ID value returns to the application of this initiation certification request;
Step 104: the biological characteristic ID value that this security kernel is returned by this application mails to application server;
Step 105: this application server completes user authentication according to this biological characteristic ID value.
Present embodiment user authen method makes user without remembering username and password, on smart machine, shirtsleeve operation i.e. may be implemented in the registering and logging completed on different smart machines application, promoting Consumer's Experience, verification process is more conveniently, safely, fast simultaneously.
In an embodiment of the invention, this ID value can be the biological characteristic cryptographic Hash converted by biological information.It will of course be appreciated that, cryptographic Hash is only the one of ID value, thus, in other embodiments, naturally may be used without other kinds of biological characteristic ID value to replace biological characteristic cryptographic Hash.
Refer to Fig. 3, for convenience of description, the biological information involved by the present embodiment is as a example by fingerprint collecting, and iris information collection and the conversion of ID value are with fingerprint collecting in like manner.
Wherein, in this operating system 320, security kernel 340 is set.System 320 has been separated into the environment of two executed in parallel by security kernel 324: non-security conventional environment;The security context that secure and trusted is appointed, security monitor (Monitor) controls the conversion between safety and " commonly " environment.The data of security kernel 340 are stored in the security kernel region of system kernel chip, this region and operating system and other hardware environment " completely isolated ".Operating system 320 is provided with some application programs, including application program 1, application program 2 and the secure data acquisition application 326 that can associate with security kernel 340.
This secure data obtains the application that application 326 namely can communicate with security kernel.Security context is entered from conventional environment in order to make this secure data obtain application 326, in present embodiment, this secure data obtains application 326 and drives 324 to call SMC via security kernel to enter the security monitor (monitor) of security context and switch to monitor pattern, then calls the corresponding finger print information ID value modular converter 350 of security kernel 340 by security kernel manager and complete the conversion of the ID value to finger print information.Finger print information ID value after conversion drives 324 to be back to send secure data by security monitor 346 and security kernel and obtains the application 326 of request.
Please also refer to Fig. 2, smart machine application needs the link of user authentication to include registration request 220 and logging request 260.
In oneainstance, this certification request is registration request 220, when user initiates registration request in this application, this application initiates to extract the request of user biological characteristic information to this security kernel, this security kernel obtains the biological information of user and generates this biological characteristic ID value after receiving request, then this biological characteristic ID value returns to the application of this initiation registration request;The biological characteristic ID value corresponding with user returned is mail to application server and puts on record by this application.
In registration request 220 link of user authentication, it is that this application server sets up user's service files 230 based on biological characteristic ID value with log in link difference.
In the case of another kind, in the present embodiment, this certification request is logging request 260, when user initiates logging request in this application, this application initiates to extract the request of user biological characteristic information to this security kernel, this security kernel obtains the biological information of user and generates this biological characteristic ID value after receiving request, then this biological characteristic ID value returns to the application of this initiation logging request;The biological characteristic ID value corresponding with user returned is mail to application server by this application.
In logging request 260 link of user authentication, this application server obtains the service files corresponding with user based on biological characteristic ID value and returns to this application unlike registration link.The application of smart machine provides the user individual service 270 based on service files.
In the present embodiment, for ensureing the safety of system data, the ID value encryption of this biological characteristic is returned to this application 326 by this security kernel 340.In the present embodiment, for the data transmission security in being further ensured that smart machine and between smart machine and application server, the biological characteristic ID value encryption corresponding with user received is sent to application server by this application.Concrete encryption method can include DES algorithm, aes algorithm, RSA Algorithm, MD5 algorithm etc..
In the present embodiment, this biological information may refer to stricture of vagina information can also use iris information, the performance of concrete intelligence equipment and user depending on selecting.Following example illustrate as a example by fingerprint collecting.
Please also refer to Fig. 3, the present embodiment further relates to a kind of system using biological information to realize user authentication.
This system includes that at least one secure data being arranged on operating system obtains application 326, for initiating certification request, the security kernel 340 being arranged in operating system 320, this security kernel 340 is for the biological information according to this certification acquisition request user, and generate corresponding biological characteristic ID value according to this biological information, this biological characteristic ID value is returned to the application 326 of this initiation certification request again, and at least one application server, this application server is for receiving the biological characteristic ID value of this application 326 transmission and completing user authentication according to this biological characteristic ID value.
Wherein, this customer certification system is when registration request 220 is initiated in this application 326, and this application 326 drives 324 to initiate to extract the request of user biological characteristic information to security kernel 340 by security kernel.The corresponding finger print information ID value modular converter 350 that the security monitor 346 of security kernel 340 calls security kernel 340 by security kernel manager 348 again completes the conversion of the ID value to finger print information.Finger print information ID value after conversion drives 324 to be back to send secure data by security monitor 346 and security kernel and obtains the application 326 of request.
During authentication registration, completing after smart machine biological characteristic ID value gathers, the biological characteristic ID value corresponding with user returned is mail to application server and puts on record by this application 326, and this application server is used for setting up user's service files based on biological characteristic ID value.
Another kind of situation, when user initiates logging request 260 on any one the smart machine being provided with application 326, this application 326 initiates to extract the request of user biological characteristic information to this security kernel 340.The corresponding finger print information ID value modular converter 350 that the security monitor 346 of security kernel 340 calls security kernel 340 by security kernel manager 348 again completes the conversion of the ID value to finger print information.Finger print information ID value after conversion drives 324 to be back to send secure data by security monitor 346 and security kernel and obtains the application 326 of request.
During login authentication, after completing the collection of smart machine biological characteristic ID value, the biological characteristic ID value corresponding with user returned is mail to application server by this application 326, and this application server is for obtaining the service files corresponding with user according to biological characteristic ID value.Then, this service files is returned to this application 326 thus realizes this application 326 and provide the user individual service according to service files by this application server.
In order to guarantee data security, the ID value encryption of this biological characteristic is returned to this application by this security kernel 340.This biological information includes finger print information and iris information.Equally, the biological characteristic ID value corresponding with user received also is encrypted and is sent to application server by this application.
Concrete encryption method can include DES algorithm, aes algorithm, RSA Algorithm, MD5 algorithm etc..
The present embodiment provides a kind of method and system new, that use biological information to realize user authentication, the method and system make user without remembering username and password, shirtsleeve operation can complete the registering and logging to application on different smart machines, on the one hand promote user operation to experience, on the other hand compared to traditional usemame/password authentication mechanism, the identity identifying method of the present embodiment makes verification process more conveniently, safely, fast.Such as: same person uses arbitrarily has the mobile phone of fingerprint identification function, after opening video player, can his account number of automated log on, enjoy the individual service being specific to user.In the present invention, data exchange between smart machine local security kernel and application is encryption, and, the data exchange embedded between smart machine application and the application server of new authentication mode is also encryption, further increases reliability and the safety of this identification authentication mode.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or terminal program product.Therefore, the form of the embodiment in terms of the present invention can use complete hardware embodiment, complete software implementation or combine software and hardware.And, the present invention can use the form at one or more upper terminal program products implemented of terminal usable storage medium (including but not limited to disk memory, CD-ROM, optical memory etc.) wherein including terminal usable program code.
The present invention is to describe with reference to method, equipment (system) and the flow chart of terminal program product according to embodiments of the present invention and/or block diagram.It should be understood that can be by the flow process in each flow process in terminal program instruction flowchart and/or block diagram and/or square frame and flow chart and/or block diagram and/or the combination of square frame.The processor that these terminal programs instruct general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device can be provided to produce a machine so that the instruction performed by the processor of computer or other programmable data processing device is produced for realizing the device of function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame.
The instruction of these terminal programs may be alternatively stored in can be in the terminal readable memory that works in a specific way of guiding terminal or other programmable data processing device, the instruction making to be stored in this terminal readable memory produces the manufacture including command device, and this command device realizes the function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame.
The instruction of these terminal programs also can be loaded in computer or other programmable data processing device, make to perform sequence of operations step on computer or other programmable devices to produce computer implemented process, thus the instruction performed on computer or other programmable devices provides the step of the function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame for realization.
Particular embodiments described above; the purpose of the present invention, technical scheme and beneficial effect are further described; it is it should be understood that; the foregoing is only the specific embodiment of the present invention; the protection domain being not intended to limit the present invention; all within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. done, should be included within the scope of the present invention.

Claims (10)

1. one kind uses the method that biological information realizes user authentication, it is characterised in that including:
Certification request is initiated in user's application based on biometric apparatus;
The security kernel of described biometric apparatus biological information based on described certification acquisition request user, and carry out, according to described biological information, the ID value that calculation process generation is corresponding, more described ID value is returned to the application of described initiation certification request;
The ID value that described security kernel is returned by described application mails to application server, and described application server completes user authentication according to described ID value.
2. the method for claim 1, it is characterized in that, described certification request is registration request, when user initiates registration request in described application, described application initiates to extract the request of user biological characteristic information to described security kernel, described security kernel obtains the biological information of user and generates described ID value after receiving request, more described ID value returns to the application of described initiation registration request;
The ID value of return is mail to application server and puts on record by described application, and described application server sets up user's service files based on described ID value.
3. the method for claim 1, it is characterized in that, described certification request is logging request, when user initiates logging request in described application, described application initiates to extract the request of user biological characteristic information to described security kernel, described security kernel obtains the biological information of user and generates described ID value after receiving request, more described ID value returns to the application of described initiation logging request;
The ID value of return is mail to application server by described application, and described application server obtains the service files corresponding with user based on described ID value and returns to described application, and described application provides the user individual service based on service files.
4. the method as described in claim 1-3 any one, it is characterized in that, described ID value is the biological characteristic cryptographic Hash converted by biological information, the encryption of described biological characteristic cryptographic Hash is returned to described application by described security kernel, and described biological information includes finger print information and iris information.
5. method as claimed in claim 4, it is characterised in that the biological characteristic cryptographic Hash encryption corresponding with user received is sent to application server by described application.
6. one kind uses the system that biological information realizes user authentication, it is characterised in that including:
At least one application being arranged on biometric apparatus, is used for initiating certification request;
It is arranged on the security kernel in described biometric apparatus, described security kernel is for the biological information according to described certification acquisition request user, and generate corresponding ID value according to described biological information, more described ID value is returned to the application of described initiation certification request;
At least one application server, described application server is for receiving the ID value of described application transmission and completing user authentication according to described ID value.
7. system as claimed in claim 6, it is characterized in that, when user initiates registration request in described application, described application for initiating to extract the request of user biological characteristic information to described security kernel, described security kernel obtains the biological information of user and generates described ID value after receiving request, more described ID value returns to the application of described initiation registration request;
Described application is additionally operable to that the ID value corresponding with user returned is mail to application server and puts on record, and described application server is for setting up user's service files based on ID value.
8. system as claimed in claim 7, it is characterized in that, when user initiates logging request in described application, described application for initiating to extract the request of user biological characteristic information to described security kernel, described security kernel obtains the biological information of user and generates described ID value after receiving request, more described ID value returns to the application of described initiation logging request;
Described application is additionally operable to the ID value corresponding with user returned is mail to application server, and described application server is for obtaining the service files corresponding with user according to described ID value and returning to described application and provide the user individual service to realize described application according to service files.
9. the system as described in claim 6-8 any one, it is characterized in that, described ID value is the biological characteristic ID value converted by biological information, described security kernel is additionally operable to described biological characteristic ID value encryption is returned to described application, and described biological information includes finger print information and iris information.
10. system as claimed in claim 9, it is characterised in that described application is additionally operable to the biological characteristic ID value encryption corresponding with user received is sent to application server.
CN201610266144.0A 2016-04-26 2016-04-26 Method and system for realizing user authentication through biological characteristic information Pending CN105868610A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610266144.0A CN105868610A (en) 2016-04-26 2016-04-26 Method and system for realizing user authentication through biological characteristic information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610266144.0A CN105868610A (en) 2016-04-26 2016-04-26 Method and system for realizing user authentication through biological characteristic information

Publications (1)

Publication Number Publication Date
CN105868610A true CN105868610A (en) 2016-08-17

Family

ID=56628456

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610266144.0A Pending CN105868610A (en) 2016-04-26 2016-04-26 Method and system for realizing user authentication through biological characteristic information

Country Status (1)

Country Link
CN (1) CN105868610A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778091A (en) * 2016-12-21 2017-05-31 北京奇虎科技有限公司 the fingerprint control method and device of application program
CN107395563A (en) * 2017-06-15 2017-11-24 中科创达软件科技(深圳)有限公司 A kind of multi-user management method and device
CN107896226A (en) * 2017-12-13 2018-04-10 北京无线电计量测试研究所 A kind of network identification system based on iris recognition
CN108989015A (en) * 2017-05-31 2018-12-11 北京京东尚科信息技术有限公司 A kind of method and apparatus of encryption
CN110392181A (en) * 2018-04-18 2019-10-29 京瓷办公信息系统株式会社 Customer certification system and user authen method
CN111935816A (en) * 2020-09-23 2020-11-13 广州市玄武无线科技股份有限公司 Application program registration method and device of terminal and electronic equipment
WO2022022743A1 (en) * 2020-07-31 2022-02-03 华为技术有限公司 Method for identifying user on public device, and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859095A (en) * 2005-10-18 2006-11-08 华为技术有限公司 Method for verifying user's identity by biology identification
CN1951326A (en) * 2006-11-03 2007-04-25 北京飞天诚信科技有限公司 Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal
CN103237030A (en) * 2013-04-25 2013-08-07 深圳市中兴移动通信有限公司 Biological recognition-based user authentication method and system
CN103310142A (en) * 2013-05-22 2013-09-18 复旦大学 Man-machine fusion security authentication method based on wearable equipment
CN104598793A (en) * 2015-01-08 2015-05-06 百度在线网络技术(北京)有限公司 Fingerprint authentication method and fingerprint authentication device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859095A (en) * 2005-10-18 2006-11-08 华为技术有限公司 Method for verifying user's identity by biology identification
CN1951326A (en) * 2006-11-03 2007-04-25 北京飞天诚信科技有限公司 Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal
CN103237030A (en) * 2013-04-25 2013-08-07 深圳市中兴移动通信有限公司 Biological recognition-based user authentication method and system
CN103310142A (en) * 2013-05-22 2013-09-18 复旦大学 Man-machine fusion security authentication method based on wearable equipment
CN104598793A (en) * 2015-01-08 2015-05-06 百度在线网络技术(北京)有限公司 Fingerprint authentication method and fingerprint authentication device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BURNELLLIU: ""关于使用指纹登录网站的不成熟猜想"", 《HTTP://BBS.CSDN.NET/TOPICS/391813489?LIST=LZ》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778091A (en) * 2016-12-21 2017-05-31 北京奇虎科技有限公司 the fingerprint control method and device of application program
CN108989015A (en) * 2017-05-31 2018-12-11 北京京东尚科信息技术有限公司 A kind of method and apparatus of encryption
CN107395563A (en) * 2017-06-15 2017-11-24 中科创达软件科技(深圳)有限公司 A kind of multi-user management method and device
CN107896226A (en) * 2017-12-13 2018-04-10 北京无线电计量测试研究所 A kind of network identification system based on iris recognition
CN107896226B (en) * 2017-12-13 2021-07-06 北京无线电计量测试研究所 Network identity authentication system based on iris recognition
CN110392181A (en) * 2018-04-18 2019-10-29 京瓷办公信息系统株式会社 Customer certification system and user authen method
WO2022022743A1 (en) * 2020-07-31 2022-02-03 华为技术有限公司 Method for identifying user on public device, and electronic device
CN111935816A (en) * 2020-09-23 2020-11-13 广州市玄武无线科技股份有限公司 Application program registration method and device of terminal and electronic equipment
CN111935816B (en) * 2020-09-23 2021-03-12 广州市玄武无线科技股份有限公司 Application program registration method and device of terminal and electronic equipment

Similar Documents

Publication Publication Date Title
CN105868610A (en) Method and system for realizing user authentication through biological characteristic information
CN107172008B (en) A kind of system and method carrying out multisystem certification and synchronization in a mobile device
US10205711B2 (en) Multi-user strong authentication token
CN105429761B (en) A kind of key generation method and device
US9165130B2 (en) Mapping biometrics to a unique key
KR102132507B1 (en) Resource management based on biometric data
CN103856472B (en) A kind of method and device of Account Logon
Gupta et al. Demystifying authentication concepts in smartphones: Ways and types to secure access
CN107113315A (en) Identity authentication method, terminal and server
CN108964925B (en) File authentication equipment method, device, equipment and readable medium
CN106850201B (en) Intelligent terminal multiple-factor authentication method, intelligent terminal, certificate server and system
CN108171486B (en) A kind of terminal with E-seal function
CN102567686A (en) Security authentication method of application software of mobile terminal based on human body stable characteristics
CN107733636A (en) Authentication method and Verification System
CN107612880A (en) One kind applies access method and device
CN105868970A (en) Authentication method and electronic device
CN104820814A (en) Second-generation ID card anti-counterfeiting verification system
US20230208637A1 (en) Key management method and apparatus
CN100444184C (en) Method and system of software identify identification
CN104486306B (en) Identity authentication method is carried out based on finger hand vein recognition and cloud service
CN106027257A (en) Method and system for securely performing identity authentication
CN110287673A (en) Finger vein authorization login method and system based on domestic CPU and operating system
CN110516427B (en) Terminal user identity authentication method and device, storage medium and computer equipment
CN105871840B (en) A kind of certificate management method and system
Hossain et al. Implementing Biometric or Graphical Password Authentication in a Universal Three-Factor Authentication System

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160817

WD01 Invention patent application deemed withdrawn after publication