CN1777101A - Real-time identity authentication method based on mobile phone, bluetooth and two-dimensional barcode - Google Patents

Real-time identity authentication method based on mobile phone, bluetooth and two-dimensional barcode Download PDF

Info

Publication number
CN1777101A
CN1777101A CN 200510047802 CN200510047802A CN1777101A CN 1777101 A CN1777101 A CN 1777101A CN 200510047802 CN200510047802 CN 200510047802 CN 200510047802 A CN200510047802 A CN 200510047802A CN 1777101 A CN1777101 A CN 1777101A
Authority
CN
China
Prior art keywords
mobile phone
bar code
server
image
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510047802
Other languages
Chinese (zh)
Inventor
冯林
袁彬
孙焘
吴炎飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University of Technology
Original Assignee
Dalian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University of Technology filed Critical Dalian University of Technology
Priority to CN 200510047802 priority Critical patent/CN1777101A/en
Publication of CN1777101A publication Critical patent/CN1777101A/en
Pending legal-status Critical Current

Links

Images

Abstract

The method for authenticating ID is related to handset, blue teeth communication technique and 2D bar code technique synthetically. Characters are that using blue teeth function of handset builds connection with server; using cipher key agreed on user in advance encrypts dynamic cipher generated by server, and transfers the encrypted dynamic cipher to handset; handset converts the decrypted dynamic cipher to information of 2D bar code, and displays the bar code on screen of the handset; server end uses camera header to take image of handset screen so as to recognize information of 2D bar code, and interpret the dynamic cipher contained; matching dynamic cipher from screen with dynamic cipher created before to authenticate user's ID. Advantages are: without need of carrying certificate, not easy of imitating features of authentication, solving issue of capturing and stealing information of authentication.

Description

Real-time identity authentication method based on mobile phone, bluetooth and two-dimensional bar code
Technical field
The invention belongs to information security identity identifying technology field, relate to a kind of identity identifying method that uses mobile phone, comprehensive utilization blue-tooth technology and 2D bar code technology.
Background technology
The traditional advantages such as two-dimensional bar code is novel barcode technology, and it is simple except the making that bar code had, cost is low, information gathering speed is fast, also have high density, have error correcting capability, contain much information, multiple advantage such as high safety.At present from image construction, two-dimensional bar code has three kinds of stacks, checkerboard type, matrix form.Two-dimensional bar code is extensive use of in the world, the domestic national standard of also having formulated PDF417 and QR sign indicating number.
At present, mobile phone is extensively popularized as a kind of common personal portable electronic product, and the various aspects of going into the thick of life.The volume of holding of China's mobile phone has surpassed landline telephone quantity has been installed, and still in rapid growth.Simultaneously the performance of mobile phone is also in continuous enhancing, and function is abundant gradually, and no longer only traditional communication tool forms and is important digitlization auxiliary equipment.The mobile phone that is using at present has bigger screen mostly, and short-distance wireless communication functions such as subsidiary bluetooth can independently be installed the software that JAVA, C++ write by the user.
Bluetooth is a kind of short-distance wireless interconnection technique that is taken the lead in developing by Ericsson Nokia, Intel, IBM and Toshiba etc., is operated on the 2.4GHz frequency range.It provides the equipment that has Bluetooth chip or adapter more than two to carry out wireless connections, and communication distance is grown up and be about 10 meters most, and is non-directional, can carry out data and voice transfer in real time, and higher transmission rate is arranged.As a kind of wireless transmission method, bluetooth is very convenient easy-to-use, but because it has characteristics such as do not have linear, non-directional and coverage is wider, but is stolen easily or intercepts and captures, and confidentiality and fail safe are relatively poor.
Existing identity identifying method approximately is divided three classes:
1, based on the identity identifying method of static password
These class methods are traditional identity identifying methods, have mature technique and are widely used.It can be divided into input cipher and certificate formula two classes again according to the form of expression.
In input cipher method, the user will carry out authentication, need utilize keyboard input password under designated equipment or system.This mode can intercept password because exposed keypad outside, is damaged easily, and at keyboard or system wooden horse class software is set.
In the method for using certificate, generally be to use bar code information or other explicit, implicit expression graph text informations on the special scanning device checking certificate, perhaps use card reader to read the information of magnetic card.In using the system of these class methods, certificate often occurs and lost efficacy, perhaps certificate content situation about being replicated because damage.
Based on the system of static password authentication method, it is unified shortcoming and is: have the cost of device of buying particular device, password remains unchanged for a long period of time, easily is replicated imitation even penetrates, and it is convenient inadequately or the like to use.There are a lot of potential safety hazards in this type systematic, more and more can't adapt to the demand that improves day by day.
2, based on the identity identifying method of dynamic password
Dynamic password is meant that the user uses Special Equipment or software, all produces a password at random when each authentication, is confirmed the correctness and the identity verification of this password by Verification System.System based on these class methods needs the user to carry special dynamic password generation equipment, and the equipment of certain software perhaps need be installed.And the product that wherein uses wireless signal to carry out communication, the possibility that exists transmission information to be intercepted and captured.
3, based on the identity identifying method of biological characteristic
The identification of end user's body characteristics comprises fingerprint, people's face, sound or the like.Easy to use, but be subjected to unexpected situation, the influence of health in person easily, also may be replicated imitation, some equipment manufacturing cost height.
Summary of the invention
The object of the present invention is to provide the identity identifying method of a kind of convenient and practical, highly versatile, highly effective and safe, additionally carry certificate or equipment to solve the user that needs who exists in the existing identification system, authentication feature is easily imitated, and problem may be intercepted and captured, steal etc. to authentication information.
Technical scheme of the present invention is:
The user at first installs at the mobile phone end and is used for the client software of authentication and registers at server end, when authentication, set up being connected between mobile phone and the certificate server by bluetooth, server is tentatively confirmed visitor's identity according to the information that mobile phone provides, return a random cipher to mobile phone, and temporarily preserve this password at server end; The random cipher that mobile phone returns server is interpreted as two-dimensional bar code and is presented on the screen; Certificate server obtains mobile phone screen and extracts the two-dimensional barcode information of explaining wherein by camera, with identifying user identity; The random cipher that produces ceases to be in force automatically under the situation that does not have success identity behind the authentication success or in a period of time.And provide the remedial measure when meeting accident.System configuration is referring to Fig. 2.
The user is installed in the mobile phone end with software, and registers at server end.Client software writes down sign, the user ID of this authentication server and determines a static keys, after this static keys is used the MD5 algorithm for encryption, recorded mobile phone end and server end respectively, except that revising log-on message, can't be transmitted by any way from now on.As Fig. 4.
After the user carried the communication context of bluetooth equipment that mobile phone enters certificate server, client software detected the information on services of server end by bluetooth equipment broadcasting, and whether the prompting user connects.If the user confirms to connect, then connect and corresponding user ID is sent to server.
Server is just known user identity, and is produced dynamic password at random by the identification user ID.Verification process afterwards provides two kinds of technical solutions.
Scheme one:
Server end uses the user key (via the MD5 algorithm for encryption) of storage in advance to use symmetric encipherment algorithm RC2 to encrypt to dynamic password, and the information after encrypting is sent it back client.
The client user key (equally via the MD5 algorithm for encryption) of storage, perhaps the value of password after md5 encryption of the instant input of user is decrypted the information that obtains.
Client will be converted to Data Matrix two-dimensional barcode information through the dynamic password that deciphering obtains and show.Before the user places camera with mobile phone screen, by the camera collection image.
Server end is analyzed the contained information of two-dimensional bar code that obtains with the image of camera collection.By being original form with these information revertings, i.e. if dynamic password, and it is compared with the dynamic password that is kept at server end is identical then confirm its identity.
If authentication success or long-time from the correct image information of screen acquisition is then abandoned dynamic password.
Scheme two:
Server end directly sends dynamic password to client.
Client uses the user key through md5 encryption to carry out the RC2 encryption dynamic password.
Cipher-text information after client will be encrypted is converted into Data Matrix two-dimensional barcode information and is presented on the screen.Before the user places camera with mobile phone screen, by the camera collection image.
Server end is analyzed two information that bar code is contained that obtain with the image of camera collection.And the user key (via md5 encryption) that uses the server end storage compares with decrypted result its deciphering again with dynamic password, if identical then confirm its identity.
If authentication success or long-time from the correct image information of screen acquisition then all can cause dynamic password to lose efficacy.Fig. 3 has described the identifying procedure of first kind of scheme.
Authentication Once you begin, whole processing procedures of authentication all can record in the journal file, so that verification in the future.
Allow the user that mobile phone end program is carried out cryptoguard among the present invention, perhaps user key is not stored in this locality, but is imported immediately by the user, further to carry the high security of system.
Measures such as user's internet usage, note, on-site manual are provided among the present invention, have closed account, cancelled it and continue the right to use, with remedial measure as lost mobile phone with this.The flow process that closes account such as Fig. 5.
The generation of Data Matrix two-dimensional bar code, error correction and deciphering technology are all followed international standard ISO/IEC16022-International Symbology Specification, Data Matrix among the present invention.
The invention also discloses a kind of recognition methods of two-dimensional bar code, location two-dimensional bar code and discern the information of two-dimensional bar code from the captured mobile phone screen image of camera is referring to accompanying drawing 6.Specifically comprise the steps:
1, crosses the true color image that camera obtains mobile phone screen.Effect such as Fig. 7.
2, the redness of image, blue two-phase are carried out mean filter, common reddish blue speckle when LCD screen being taken to eliminate.
3, with image gray processing.
4, dark partially according to body color around the image, the characteristic that the intermediate screen color is bright is partially added up definite threshold value to the gray value of entire image, in conjunction with the method to carrying out linear punishment around the image, extracts the mobile phone screen zone from image.
5, use maximum variance between clusters with the bianry image of above-mentioned mobile phone screen area image binaryzation with the acquisition mobile phone screen.
6, use the edge of the above-mentioned bianry image of Sobel operator extraction to obtain edge image.Referring to Fig. 8.
7, above-mentioned edge image is used the Radon conversion, extract the straight line in the image.
8, angle is spent to the straight line between 95 degree extracting 85, with the pixel projection near certain zone to straight line, with dot matrix zone, location.Referring to Fig. 9.
9, revolve positive image according to rectilinear direction,, and extract two-dimensional barcode image according to the deformation of included angle of straight line correct tilt.As Figure 10.
10, according to known dot matrix size, dot matrix image is divided equally, judged the color value in every lattice, obtain the numerical value of dot matrix, transfer to system check, decoding.
Effect of the present invention and benefit are:
The present invention uses mobile phone as the user side carrier, does not need extra equipment.Because mobile phone screen itself is luminous, so collecting device also need not to use lighting module.Simultaneously because the high privacy of mobile phone has also reduced user side information by the possibility of other people acquisition.
The present invention uses image to transmit final authorization information, and with two-dimensional bar code information is expressed.Information was discerned easily, avoid non-directional, the publicity of wireless transmission again, made the disabled user can't intercept and capture, decode, duplicate, simulate final authorization information, thereby kept wireless mode, do not lose easyly easy-to-use the time, greatly improved security performance.The displaying that the user can be by bar code simultaneously and discern this process is confirmed to be to the designated equipment request of having sent and is identified, and has reduced the user to using the indefinite worry of connecting object of wireless device, makes that this method is easier to be accepted.
The present invention uses dynamic password, has guaranteed the ageing of authorization information.Even if the cracker can duplicate authorization information, also can't repeat verification process, further increased degree of safety.
Description of drawings
Fig. 1 is an organizational composition schematic diagram of the present invention.
Among the figure: 1 mobile phone; 2 mobile phone screens; 3 cameras; 4 support the PC or the server of bluetooth communication; 5 connect the Bluetooth adapter of PC or server.
Fig. 2 is an architectural schematic of the present invention.
Fig. 3 is checking stream signal journey figure of the present invention.
Fig. 4 is a Registering modules schematic flow sheet of the present invention.
Fig. 5 is a cancellation module schematic flow sheet of the present invention.
Fig. 6 is a two-dimensional bar code identification process schematic diagram of the present invention.
Fig. 7 is a camera photographic images illustration of the present invention.
Fig. 8 is in the above-mentioned two-dimension bar code recognition method, through the effect illustration behind screen extraction, the edge extracting.
Fig. 9 is in the above-mentioned two-dimension bar code recognition method, the two-dimensional bar code region figure that straight line extracted that conversion identifies according to Radon.
Figure 10 is in the above-mentioned two-dimension bar code recognition method, the two-dimensional barcode image figure that is extracting after just revolving, proofreading and correct.
Figure 11 is the architectural schematic of embodiment 1.
Figure 12 is the architectural schematic of embodiment 2.
Embodiment
Be described in detail specific embodiments of the invention below in conjunction with technical scheme and accompanying drawing.
Embodiment 1:
As Figure 11, it has provided gate control system and has used one embodiment of the present of invention.
The hardware device of the server end of this gate control system is by a PC that can move WindowsXP SP2 with upper mounting plate, and a WindowsXP SP2 bluetooth drives compatible bluetooth communication module, and a camera constitutes.Identity authorization system service end software is installed on the PC.
The client of this gate control system is any support Bluetooth function, screen resolution greater than 50 * 50 mobile phone, the smart mobile phone that comprises operation Symbian, Windows, linux system, support the CDMA mobile phone of Brew platform, and other support JSR82 API, the i.e. mobile phone of Java APIs for Bluetooth WirelessTechnology (JABWT).The mobile phone end need be installed the client-side program of corresponding corresponding platform.This example is the example explanation with the mobile phone that uses the Symbian system.
At first the user is in the registration of gate inhibition's server end, at server end input user ID and password A, simultaneously at mobile phone end software input username and password A.The password of server end and mobile phone end uses the MD5 algorithm for encryption as word string B and storage, as user key.The user also need on mobile phone, import and server exclusive service ID number and PIN code.This ID number is 16 ten's digits, in order to distinguish different identification service systems.PIN code can be set by server administrators, and it mainly acts on is to avoid the connection of other bluetooth equipments to disturb.Registration back user can try out the accuracy of gate control system with confirmation at once.
Behind the startup of server, use the RFCOMM agreement, start bluetooth Socket service, and outwards issue this service.Behind the client software on user's starting hand-set, client software begins to seek bluetooth service, and attempts using PIN code to connect.If successful connection, then server end sends service ID number to client, and whether client validation is the registered service for checking credentials.If then return confirmation to server.Server generates 64 dynamic password C after receiving confirmation at random, uses above-mentioned string B to carry out becoming string D after RC2 encrypts, and sends to user mobile phone.Mobile phone receives behind the string D string B with local storage and is decrypted and obtains dynamic password C, and with the two-dimensional bar code of dynamic password C according to the standard generation 20 * 20 of Data Matrix.The mobile phone end calls drawing interface, and the form of two-dimensional bar code with the white background stain is presented on the screen.
The user represents mobile phone screen to the camera that is installed on the door, and camera cut-away view picture also is sent to server.Server end is converted to binary message by the two-dimensional bar code recognizer with the image information of two-dimensional bar code.The information of using Data Matrix standard method to understand two-dimensional bar code is string D.If image is then obtained in the verification failure again in the process of understanding.Whether server authentication string D and dynamic password C coincide, with identifying user identity.If be proved to be successful, then send the information of opening the door to electronic gate.
If be proved to be successful, perhaps server did not obtain correct authorization information in 20 second time, announced that then dynamic password lost efficacy.The server disconnection is connected issuing service again with client.
If mobile phone is lost, can arrive the server end logging off users, prevent that mobile phone from illegally being used.
The gate control system that this embodiment showed can be used for family, sub-district and various enterprises and institutions.
Embodiment 2:
As Figure 12, market consume system use one embodiment of the present of invention have been provided with bank's networking.Its flow process and the foregoing description 1 are similar, and difference is:
The user registers in bank, obtains service ID number from bank.The service ID of consume system number only is used to distinguish different bank.Same bank is number all identical in the service ID of each market consume system.The user can be in the service of the bank that the selection of mobile phone end will be used.
The market obtains static keys after md5 encryption, promptly above-mentioned string B by bank network from bank server in checking user profile.User's relevant information is not possessed in the market.If the Information Authentication success is then finished consume activity by bank network.
Cancellation can be by Web bank, I nullify to multiple modes such as bank, notes.
The consume system that present embodiment is showed can be used for various markets, supermarket, hotel or other consumption places.

Claims (2)

1, a kind of real-time identity authentication method based on mobile phone, bluetooth and two-dimensional bar code, be at mobile phone, camera, the authentication server of supporting bluetooth communication and can be connected on the bluetooth communication equipment of authentication server and realize, it is characterized in that: mobile phone is as client, and sets up wireless connections by bluetooth communication equipment between the certificate server; Camera is as image collecting device, and sets up wired connection between the certificate server; Server is tentatively discerned user identity by the information that client is sent after setting up wireless connections with client; After just knowing successfully, server generates dynamic password, and uses the user key of just knowing the user to encrypt this dynamic password, and ciphertext is issued mobile phone; The ciphertext that mobile phone uses the user key deciphering to receive obtains dynamic password, and is that two-dimensional bar code is presented on the screen with the dynamic password information translation; Server is taken mobile phone screen by camera, and the two-dimensional bar code on the recognition screen is understood the dynamic password information that is contained in the two-dimensional bar code, and is complementary with identifying user identity with the dynamic password that generates before.
2, in a kind of real-time identity authentication method according to claim 1 based on mobile phone, bluetooth and two-dimensional bar code, the method that is used to discern the two-dimensional bar code on the mobile phone screen is characterized in that: image is carried out red blue mean filter, common redness, blue speckle when eliminate taking mobile phone screen; Behind image gray processing, extract the mobile phone screen zone; Use difference method binaryzation mobile phone screen zone between maximum kind; Use the marginal information of Sobel operator extraction two dimensional image; Use the straight line in the Radon conversion extraction two dimensional image; It is right to extract orthogonal straight line, and judges the dot matrix zone; Revolve positive image, proofread and correct deformation and extract two-dimensional barcode image; Two-dimensional barcode image is divided equally to obtain two-dimensional barcode information.
CN 200510047802 2005-11-22 2005-11-22 Real-time identity authentication method based on mobile phone, bluetooth and two-dimensional barcode Pending CN1777101A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200510047802 CN1777101A (en) 2005-11-22 2005-11-22 Real-time identity authentication method based on mobile phone, bluetooth and two-dimensional barcode

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510047802 CN1777101A (en) 2005-11-22 2005-11-22 Real-time identity authentication method based on mobile phone, bluetooth and two-dimensional barcode

Publications (1)

Publication Number Publication Date
CN1777101A true CN1777101A (en) 2006-05-24

Family

ID=36766429

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510047802 Pending CN1777101A (en) 2005-11-22 2005-11-22 Real-time identity authentication method based on mobile phone, bluetooth and two-dimensional barcode

Country Status (1)

Country Link
CN (1) CN1777101A (en)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008034348A1 (en) * 2006-09-15 2008-03-27 Fujian Newland Auto-Id Tech. Co., Ltd. Device and method for reading encrypted barcodes
CN101826227A (en) * 2010-04-30 2010-09-08 广州合立正通信息网络集成有限公司 Triple-authentication gate control system and control method
CN102158262A (en) * 2011-04-15 2011-08-17 江苏怡和科技股份有限公司 Unsymmetrical wireless communication method and system
CN101398951B (en) * 2007-09-28 2012-01-25 中国移动通信集团公司 Electronic card verification method and electronic card service platform
CN102572314A (en) * 2011-12-22 2012-07-11 格科微电子(上海)有限公司 Image sensor and payment authentication method
CN102780560A (en) * 2011-05-11 2012-11-14 索尼公司 Communication device, communication method and program
CN102841997A (en) * 2012-07-10 2012-12-26 郭小卫 Method and device for achieving authentication on intelligent device by mobile terminal
CN103020818A (en) * 2013-01-09 2013-04-03 重庆新亚盟电子科技有限公司 Payment system utilizing dynamic two-dimensional verification codes
CN103067052A (en) * 2012-12-26 2013-04-24 上海合合信息科技发展有限公司 Method and system used for establishing bluetooth link and based on two-dimension bar code
CN101958024B (en) * 2009-07-16 2013-06-26 全宏科技股份有限公司 Financial transaction system, automated teller machine and method for operating automated teller machine
CN103186931A (en) * 2011-12-30 2013-07-03 牟颖 Community entrance guard control method based on two-dimensional bar code
CN103236935A (en) * 2013-05-21 2013-08-07 北京梅泰诺电子商务有限公司 Two-dimension code user registration certification system and method thereof
CN103957105A (en) * 2014-04-28 2014-07-30 中国联合网络通信集团有限公司 Use identity authentication method and SIM card
CN104009844A (en) * 2013-02-26 2014-08-27 成都勤智数码科技股份有限公司 Multilevel password processing method based on safety management
CN104065621A (en) * 2013-03-21 2014-09-24 腾讯科技(深圳)有限公司 Identify verification method for third-party service, client and system
CN104106074A (en) * 2012-02-09 2014-10-15 夏普株式会社 Information processing system, information processing device, and communication connection method
CN104766003A (en) * 2015-04-08 2015-07-08 福建联迪商用设备有限公司 Method and system for transmitting password in bar code mode
CN104780043A (en) * 2014-01-14 2015-07-15 中国电信股份有限公司 Access control method and system based on two-dimension code
CN104780044A (en) * 2014-01-15 2015-07-15 杭州晟元芯片技术有限公司 Dynamic token type smart watch based on mobile phone, Bluetooth and two-dimension code and implementation method
CN104899739A (en) * 2014-03-05 2015-09-09 恩智浦有限公司 Transaction execution system and transaction execution method
GB2525472A (en) * 2014-02-24 2015-10-28 Mobbu Ltd Method & system for enabling authenticated operation of a data processing device
US9479499B2 (en) 2013-03-21 2016-10-25 Tencent Technology (Shenzhen) Company Limited Method and apparatus for identity authentication via mobile capturing code
CN106060126A (en) * 2016-05-24 2016-10-26 众安在线财产保险股份有限公司 Method and system for remotely and automatically identifying screen state of smart device
CN106156641A (en) * 2016-07-08 2016-11-23 刘兴丹 The storage of a kind of information and the method and device of inquiring and authenticating
CN106656908A (en) * 2015-10-28 2017-05-10 阿里巴巴集团控股有限公司 Two-dimensional code processing method and two-dimensional code processing device
WO2017140219A1 (en) * 2016-02-19 2017-08-24 腾讯科技(深圳)有限公司 User position verification method, controlled device access method, controlled device and user terminal
CN109359691A (en) * 2018-10-24 2019-02-19 全链通有限公司 Auth method and system based on block chain
CN110062382A (en) * 2014-07-31 2019-07-26 阿里巴巴集团控股有限公司 A kind of auth method, client, trunking and server
CN110472390A (en) * 2019-08-15 2019-11-19 江苏建筑职业技术学院 A method of protection computer system security

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008034348A1 (en) * 2006-09-15 2008-03-27 Fujian Newland Auto-Id Tech. Co., Ltd. Device and method for reading encrypted barcodes
CN101398951B (en) * 2007-09-28 2012-01-25 中国移动通信集团公司 Electronic card verification method and electronic card service platform
CN101958024B (en) * 2009-07-16 2013-06-26 全宏科技股份有限公司 Financial transaction system, automated teller machine and method for operating automated teller machine
CN101826227A (en) * 2010-04-30 2010-09-08 广州合立正通信息网络集成有限公司 Triple-authentication gate control system and control method
CN102158262A (en) * 2011-04-15 2011-08-17 江苏怡和科技股份有限公司 Unsymmetrical wireless communication method and system
CN102780560A (en) * 2011-05-11 2012-11-14 索尼公司 Communication device, communication method and program
CN102572314A (en) * 2011-12-22 2012-07-11 格科微电子(上海)有限公司 Image sensor and payment authentication method
CN102572314B (en) * 2011-12-22 2015-01-14 格科微电子(上海)有限公司 Image sensor and payment authentication method
CN103186931A (en) * 2011-12-30 2013-07-03 牟颖 Community entrance guard control method based on two-dimensional bar code
CN104106074A (en) * 2012-02-09 2014-10-15 夏普株式会社 Information processing system, information processing device, and communication connection method
CN104106074B (en) * 2012-02-09 2019-11-08 夏普株式会社 Information processing system, information processing unit and communication connecting method
US10462127B2 (en) 2012-02-09 2019-10-29 Sharp Kabushiki Kaisha Information processing system, information processing device, and communication connection method
CN102841997A (en) * 2012-07-10 2012-12-26 郭小卫 Method and device for achieving authentication on intelligent device by mobile terminal
CN103067052A (en) * 2012-12-26 2013-04-24 上海合合信息科技发展有限公司 Method and system used for establishing bluetooth link and based on two-dimension bar code
CN103020818A (en) * 2013-01-09 2013-04-03 重庆新亚盟电子科技有限公司 Payment system utilizing dynamic two-dimensional verification codes
CN104009844B (en) * 2013-02-26 2018-10-19 勤智数码科技股份有限公司 A kind of multistage cipher processing method based on safety management
CN104009844A (en) * 2013-02-26 2014-08-27 成都勤智数码科技股份有限公司 Multilevel password processing method based on safety management
CN104065621A (en) * 2013-03-21 2014-09-24 腾讯科技(深圳)有限公司 Identify verification method for third-party service, client and system
US9479499B2 (en) 2013-03-21 2016-10-25 Tencent Technology (Shenzhen) Company Limited Method and apparatus for identity authentication via mobile capturing code
WO2014146446A1 (en) * 2013-03-21 2014-09-25 Tencent Technology (Shenzhen) Company Limited Method, client and system of identity authentication
CN104065621B (en) * 2013-03-21 2018-10-30 腾讯科技(深圳)有限公司 A kind of auth method of third party's service, client and system
CN103236935A (en) * 2013-05-21 2013-08-07 北京梅泰诺电子商务有限公司 Two-dimension code user registration certification system and method thereof
CN103236935B (en) * 2013-05-21 2016-04-13 北京梅泰诺电子商务有限公司 A kind of two-dimension code user registration certification system and method thereof
CN104780043A (en) * 2014-01-14 2015-07-15 中国电信股份有限公司 Access control method and system based on two-dimension code
CN104780044A (en) * 2014-01-15 2015-07-15 杭州晟元芯片技术有限公司 Dynamic token type smart watch based on mobile phone, Bluetooth and two-dimension code and implementation method
GB2525472A (en) * 2014-02-24 2015-10-28 Mobbu Ltd Method & system for enabling authenticated operation of a data processing device
CN104899739A (en) * 2014-03-05 2015-09-09 恩智浦有限公司 Transaction execution system and transaction execution method
CN103957105A (en) * 2014-04-28 2014-07-30 中国联合网络通信集团有限公司 Use identity authentication method and SIM card
CN110062382A (en) * 2014-07-31 2019-07-26 阿里巴巴集团控股有限公司 A kind of auth method, client, trunking and server
CN104766003A (en) * 2015-04-08 2015-07-08 福建联迪商用设备有限公司 Method and system for transmitting password in bar code mode
CN106656908A (en) * 2015-10-28 2017-05-10 阿里巴巴集团控股有限公司 Two-dimensional code processing method and two-dimensional code processing device
US10534946B2 (en) 2015-10-28 2020-01-14 Alibaba Group Holding Limited Two-dimensional code processing method and apparatus
CN106656908B (en) * 2015-10-28 2020-02-21 阿里巴巴集团控股有限公司 Two-dimensional code processing method and device
WO2017140219A1 (en) * 2016-02-19 2017-08-24 腾讯科技(深圳)有限公司 User position verification method, controlled device access method, controlled device and user terminal
US10764304B2 (en) 2016-02-19 2020-09-01 Tencent Technology (Shenzhen) Company Limited User location check method, controlled device access method, controlled device, and user terminal
CN106060126B (en) * 2016-05-24 2019-03-19 众安在线财产保险股份有限公司 A kind of the remote auto recognition methods and system of screen of intelligent device state
CN106060126A (en) * 2016-05-24 2016-10-26 众安在线财产保险股份有限公司 Method and system for remotely and automatically identifying screen state of smart device
CN106156641B (en) * 2016-07-08 2018-10-02 刘兴丹 A kind of method and device of information storage and inquiring and authenticating
CN106156641A (en) * 2016-07-08 2016-11-23 刘兴丹 The storage of a kind of information and the method and device of inquiring and authenticating
CN109359691A (en) * 2018-10-24 2019-02-19 全链通有限公司 Auth method and system based on block chain
CN110472390A (en) * 2019-08-15 2019-11-19 江苏建筑职业技术学院 A method of protection computer system security

Similar Documents

Publication Publication Date Title
CN1777101A (en) Real-time identity authentication method based on mobile phone, bluetooth and two-dimensional barcode
US10158621B2 (en) Method, apparatus, and system for providing a security check
CN1860724A (en) Method for identification
WO2015192669A1 (en) Two-dimensional code scanning positioning prompt method and system
US20210211419A1 (en) Provisioning a device to be an authentication device
CN1764115A (en) The authentication method of approaching terminal room, the allocator of secret information, device, the system and program
JP2014518597A (en) System and method for establishing a communication session associated with an application
US9639825B1 (en) Securing multifactor authentication
CN1710577A (en) Digit water-mark certificate anti-fake method based on mobile communication network
US20140321640A1 (en) Apparatus and Method for Generating Digital Images
CN1889419A (en) Method and apparatus for realizing encrypting
CN1802017A (en) Identification method for preventing replay attack
AU2003276864A2 (en) Cryptographically secure person identification
CN104780044A (en) Dynamic token type smart watch based on mobile phone, Bluetooth and two-dimension code and implementation method
CN111831995A (en) Trusted identity authentication method and system based on eID and human body biological information
CN108959883B (en) Network identity real-name authentication method based on quick response matrix code
JP2011165102A (en) Biometrics authentication system and portable terminal
WO2019114614A1 (en) Original photo identification method and system
CN104135480A (en) Entrance guard authorization system and entrance guard authorization method
CN1260927C (en) IP network system for realizing safety verification and method thereof
CN1858812A (en) Indentity identifying system, method and radio terminal
CN116341582B (en) Electronic traffic data management method and system based on two-dimension code
CN1300948C (en) Fingerprint identifying cell phone
CN1655161A (en) Business delivery certification system
CN115766259A (en) Information one-way transmission method based on two-dimensional code image recognition technology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20060524