TWI777148B - Identity verification method, computer device, and readable storage medium - Google Patents

Identity verification method, computer device, and readable storage medium Download PDF

Info

Publication number
TWI777148B
TWI777148B TW109110712A TW109110712A TWI777148B TW I777148 B TWI777148 B TW I777148B TW 109110712 A TW109110712 A TW 109110712A TW 109110712 A TW109110712 A TW 109110712A TW I777148 B TWI777148 B TW I777148B
Authority
TW
Taiwan
Prior art keywords
user
biometric data
data
computer device
identity verification
Prior art date
Application number
TW109110712A
Other languages
Chinese (zh)
Other versions
TW202137030A (en
Inventor
劉揚偉
謝承佑
林忠億
Original Assignee
鴻海精密工業股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 鴻海精密工業股份有限公司 filed Critical 鴻海精密工業股份有限公司
Priority to TW109110712A priority Critical patent/TWI777148B/en
Publication of TW202137030A publication Critical patent/TW202137030A/en
Application granted granted Critical
Publication of TWI777148B publication Critical patent/TWI777148B/en

Links

Images

Landscapes

  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The present invention provides an identity verification method, which includes: periodically collecting biometric data of a user; when a difference between currently collected biometric data and pre-stored biometric data is greater than a preset threshold, the pre-stored biometric data is updated to be the currently collected biometric data, and the currently collected biometrics data is uploaded to a blockchain together with identification data of the user; and when it is necessary to perform identity verification on the user, downloading the user's identification data from the blockchain based on the user's current biometric data, such that the user does not need to keep their own identification data in mind at all times. The present invention also provides a computer device and a readable storage medium for implementing the identity verification method.

Description

身份驗證方法、電腦裝置、可讀儲存媒體 Authentication method, computer device, and readable storage medium

本發明涉及身份認證技術領域,尤其涉及一種身份驗證方法、電腦裝置及可讀儲存媒體。 The present invention relates to the technical field of identity authentication, and in particular, to an identity authentication method, a computer device and a readable storage medium.

身份驗證在很多領域都是必要的功能。然而,當一個人因為一些原因如事故或老人癡呆等失去記憶時,很可能不能記得自己的身份驗證資料例如身份證號碼、帳號密碼等資訊。因此,有必要對現行的身份驗證方法進行改進。 Authentication is a necessary feature in many areas. However, when a person loses his memory due to some reasons such as accident or dementia, he may not be able to remember his identity verification information such as ID number, account password and other information. Therefore, it is necessary to improve the current authentication methods.

鑒於以上內容,有必要提出一種身份驗證方法、電腦裝置及可讀儲存媒體,可基於使用者的生物特徵資料來獲取用於執行身份驗證的身份辨識資料,解決習知技術中所存在的上述技術問題。 In view of the above, it is necessary to propose an identity verification method, a computer device and a readable storage medium, which can obtain the identity identification data for performing identity verification based on the biometric data of the user, so as to solve the above-mentioned technical problems existing in the prior art. question.

本發明的第一方面提供一種身份驗證方法,包括:定期採集使用者的生物特徵資料;將當前所採集的生物特徵資料與預先儲存的生物特徵資料作比對,確定當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異;於當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異大於預設的閾值時,將所述預先儲存的生物特徵資料更新為當前所採集的生物特徵資料,並將當前所採集的生物特徵資料附加所述使用者的身份辨識資料上載到 區塊鏈;及當需對所述使用者執行身份驗證時,採集所述使用者當前的生物特徵資料,基於所述使用者當前的生物特徵資料從所述區塊鏈下載所述使用者的身份辨識資料,以利用該下載的身份辨識資料執行身份驗證。 A first aspect of the present invention provides an identity verification method, comprising: regularly collecting biometric data of a user; comparing the currently collected biometric data with pre-stored biometric data to determine the currently collected biometric data The difference between the biometric data and the pre-stored biometric data; when the difference between the currently collected biometric data and the pre-stored biometric data is greater than a preset threshold, the pre-stored biometric data is updated to the current The collected biometric data, and upload the currently collected biometric data with the user's identification data to the blockchain; and when the user needs to be authenticated, collect the user's current biometric data, and download the user's biometric data from the blockchain based on the user's current biometric data. Identification data to perform authentication using the downloaded identification data.

優選地,所述生物特徵資料包括指紋、聲紋、人臉、虹膜、心跳、靜脈中的一者或者多者的組合。 Preferably, the biometric data includes one or a combination of fingerprints, voiceprints, faces, irises, heartbeats, and veins.

優選地,該方法利用穿戴式裝置定期採集使用者的所述生物特徵資料。 Preferably, the method utilizes the wearable device to periodically collect the biometric data of the user.

優選地,該方法還包括:於當前所採集的生物特徵資料與所述預先儲存的生物特徵資料之間的差異大於所述預設的閾值時,發出警示;以及回應於使用者的操作關閉所述警示。 Preferably, the method further includes: when the difference between the currently collected biometric data and the pre-stored biometric data is greater than the preset threshold, issuing a warning; and closing the system in response to the user's operation the warning.

優選地,所述身份辨識資料包括:姓名和身份號碼、通訊位址、登入指定應用的帳號和密碼。 Preferably, the identity identification data includes: name and identity number, communication address, account number and password for logging in to a designated application.

優選地,該方法還包括:在將當前所採集的生物特徵資料附加所述使用者的身份辨識資料上載到區塊鏈之前,利用預設的加密演算法對所述當前所採集的生物特徵資料以及所述使用者的身份辨識資料加密;以及當從所述區塊鏈下載到所述使用者的身份辨識資料時,對所述使用者的身份辨識資料解密。 Preferably, the method further includes: before uploading the currently collected biometric data with the user's identification data to the blockchain, using a preset encryption algorithm to encrypt the currently collected biometric data And the user's identification data is encrypted; and when the user's identification data is downloaded from the blockchain, the user's identification data is decrypted.

本發明第二方面提供一種電腦裝置,所述電腦裝置包括處理器和儲存器,所述儲存器用於儲存至少一個指令,所述處理器用於執行所述至少一個指令實現所述身份驗證方法。 A second aspect of the present invention provides a computer device, the computer device includes a processor and a storage, the storage is configured to store at least one instruction, and the processor is configured to execute the at least one instruction to implement the identity verification method.

本發明協力廠商面提供一種電腦可讀儲存媒體,所述電腦可讀儲存媒體儲存有至少一個指令,當所述一個指令被處理器執行時實現所述身份驗證方法。 The third party aspect of the present invention provides a computer-readable storage medium, wherein the computer-readable storage medium stores at least one instruction, and when the one instruction is executed by a processor, the identity verification method is implemented.

相較於習知技術,本發明提供的電腦裝置及身份驗證方法,透過定期採集使用者的生物特徵資料;將當前所採集的生物特徵資料與預先儲存的生物特徵資料作比對,確定當前所採集的生物特徵資料與預先儲存的生物特徵 資料之間的差異;於當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異大於預設的閾值時,將所述預先儲存的生物特徵資料更新為當前所採集的生物特徵資料,並將當前所採集的生物特徵資料附加所述使用者的身份辨識資料上載到區塊鏈;及當需對所述使用者執行身份驗證時,採集所述使用者當前的生物特徵資料,基於所述使用者當前的生物特徵資料從所述區塊鏈下載所述使用者的身份辨識資料,以利用該下載的身份辨識資料執行身份驗證,可基於使用者的生物特徵資料來獲取用於執行身份驗證的身份辨識資料,使用者無需時刻牢記自己的身份辨識資料。 Compared with the prior art, the computer device and the identity verification method provided by the present invention periodically collect the biometric data of the user; Collected biometric data vs. pre-stored biometrics The difference between the data; when the difference between the currently collected biometric data and the pre-stored biometric data is greater than a preset threshold, update the pre-stored biometric data to the currently collected biometric data , and upload the currently collected biometric data with the user's identification data to the blockchain; and when the user needs to be authenticated, collect the user's current biometric data, based on The user's current biometric data downloads the user's identification data from the blockchain, so as to use the downloaded identification data to perform identity verification, which can be obtained based on the user's biometric data for execution Identity verification information, users do not need to keep in mind their identity information at all times.

1:電腦裝置 1: Computer device

2:穿戴式裝置 2: Wearable Devices

30:身份驗證系統 30: Authentication System

301:獲取模組 301: Get Mods

302:執行模組 302: Execute the module

31:儲存器 31: Storage

32:處理器 32: Processor

33:通信匯流排 33: Communication bus

34:顯示熒幕 34: Display screen

35:通訊模組 35: Communication module

為了更清楚地說明本發明實施例或習知技術中的技術方案,下面將對實施例或習知技術描述中所需要使用的附圖作簡單地介紹,顯而易見地,下面描述中的附圖僅僅是本發明的實施例,對於本領域普通技術人員來講,在不付出創造性勞動的前提下,還可以根據提供的附圖獲得其他的附圖。 In order to more clearly illustrate the technical solutions in the embodiments of the present invention or in the prior art, the following briefly introduces the accompanying drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only It is an embodiment of the present invention. For those of ordinary skill in the art, other drawings can also be obtained according to the provided drawings without creative work.

圖1是本發明較佳實施例提供的身份驗證方法的應用環境架構圖。 FIG. 1 is an application environment architecture diagram of an identity verification method provided by a preferred embodiment of the present invention.

圖2是本發明較佳實施例提供的身份驗證方法的流程圖。 FIG. 2 is a flowchart of an identity verification method provided by a preferred embodiment of the present invention.

圖3是本發明較佳實施例提供的身份驗證系統的功能模組圖。 FIG. 3 is a functional module diagram of an identity verification system provided by a preferred embodiment of the present invention.

圖4是本發明較佳實施例提供的電腦裝置的結構圖。 FIG. 4 is a structural diagram of a computer device according to a preferred embodiment of the present invention.

為了能夠更清楚地理解本發明的上述目的、特徵和優點,下面結合附圖和具體實施例對本發明進行詳細描述。需要說明的是,在不衝突的情況下,本發明的實施例及實施例中的特徵可以相互組合。 In order to more clearly understand the above objects, features and advantages of the present invention, the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments. It should be noted that the embodiments of the present invention and the features in the embodiments may be combined with each other under the condition of no conflict.

在下面的描述中闡述了很多具體細節以便於充分理解本發明,所描述的實施例僅僅是本發明一部分實施例,而不是全部的實施例。基於本發明中的實施 例,本領域普通技術人員在沒有做出創造性勞動前提下所獲得的所有其他實施例,都屬於本發明保護的範圍。 In the following description, many specific details are set forth in order to facilitate a full understanding of the present invention, and the described embodiments are only some, but not all, embodiments of the present invention. Based on the implementation in the present invention For example, all other embodiments obtained by those of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

除非另有定義,本文所使用的所有的技術和科學術語與屬於本發明的技術領域的技術人員通常理解的含義相同。本文中在本發明的說明書中所使用的術語只是為了描述具體的實施例的目的,不是旨在於限制本發明。 Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terms used herein in the description of the present invention are for the purpose of describing specific embodiments only, and are not intended to limit the present invention.

參閱圖1所示,為本發明較佳實施例提供的身份驗證方法的應用環境架構圖。 Referring to FIG. 1 , it is an application environment architecture diagram of the authentication method provided by a preferred embodiment of the present invention.

本發明的身份驗證方法應用在由電腦裝置1以及一個或多個穿戴式裝置2所構成的環境中。 The identity verification method of the present invention is applied in an environment composed of a computer device 1 and one or more wearable devices 2 .

在一個實施例中,所述電腦裝置1可以透過有線方式(例如USB(Universal Serial Bus,通用序列匯流排)或無線方式(例如藍牙、WIFI)與所述穿戴式裝置2建立通訊連接。 In one embodiment, the computer device 1 can establish a communication connection with the wearable device 2 through a wired method (eg, USB (Universal Serial Bus)) or a wireless method (eg, Bluetooth, WIFI).

本實施例中,所述電腦裝置1可以是任何涉及到需要執行使用者身份驗證的設備如電腦或其他終端設備。本實施例中,所述需要執行使用者身份驗證可以是指登入所述電腦裝置1需要執行使用者身份驗證、安裝在所述電腦裝置1的軟體需要執行使用者身份驗證,或者訪問儲存在所述電腦裝置1的指定資料(例如資料夾)需要執行使用者身份驗證。 In this embodiment, the computer device 1 may be any device that needs to perform user authentication, such as a computer or other terminal device. In this embodiment, the need to perform user identity verification may refer to the need to perform user identity verification to log in to the computer device 1, the software installed in the computer device 1 to perform user identity verification, or to access data stored in the computer device 1. The specified data (eg, folder) of the computer device 1 needs to perform user authentication.

本實施例中,所述穿戴式裝置2可以用於採集使用者的生物特徵資料,例如指紋、聲紋、人臉、虹膜、心跳、靜脈等。所述穿戴式裝置2可以為智慧手環、可貼於皮膚的貼片式的感測裝置、智慧束帶、智慧衣服等可穿戴或者黏貼於使用者身上的微型電腦裝置。 In this embodiment, the wearable device 2 can be used to collect biometric data of the user, such as fingerprints, voiceprints, faces, irises, heartbeats, veins, and the like. The wearable device 2 may be a microcomputer device that can be worn or adhered to the user, such as a smart bracelet, a patch-type sensing device that can be attached to the skin, a smart harness, a smart clothing, or the like.

本領域技術人員應該可以理解,所述應用環境僅為舉例說明,不應解釋為對本發明的限制。 Those skilled in the art should understand that the application environment is only an example, and should not be construed as a limitation of the present invention.

圖2是本發明較佳實施例提供的身份驗證方法的流程圖。 FIG. 2 is a flowchart of an identity verification method provided by a preferred embodiment of the present invention.

在本實施例中,所述身份驗證方法可以應用於電腦裝置中,對於需要執行身份驗證功能的電腦裝置,可以直接在電腦裝置上集成本發明的方法 所提供的用於身份驗證的功能,或者以軟體開發套件(Software Development Kit,SDK)的形式運行在電腦裝置上。 In this embodiment, the identity verification method can be applied to a computer device. For a computer device that needs to perform an identity verification function, the method of the present invention can be directly integrated on the computer device. The provided functions for authentication, or run on the computer device in the form of a software development kit (Software Development Kit, SDK).

如圖2所示,所述身份驗證方法具體包括以下步驟,根據不同的需求,該流程圖中步驟的順序可以改變,某些步驟可以省略。 As shown in FIG. 2 , the identity verification method specifically includes the following steps. According to different requirements, the order of the steps in the flowchart can be changed, and some steps can be omitted.

步驟S1、電腦裝置1定期採集使用者的生物特徵資料。 Step S1, the computer device 1 periodically collects the biometric data of the user.

在一個實施例中,電腦裝置1可以利用穿戴式裝置2來定期(例如每隔預設時間例如10天或者半個月)採集使用者的生物特徵資料。所述穿戴式裝置2可以用於採集使用者的生物特徵資料,例如指紋、聲紋、人臉、虹膜、心跳、靜脈等中的一者或者多者的組合。 In one embodiment, the computer device 1 can use the wearable device 2 to collect the biometric data of the user periodically (eg, every preset time, such as 10 days or half a month). The wearable device 2 can be used to collect biometric data of the user, such as one or a combination of fingerprints, voiceprints, faces, irises, heartbeats, veins, and the like.

在一個實施例中,所述穿戴式裝置2可以為智慧手環、可貼於皮膚的貼片式的感測裝置、智慧束帶、智慧衣服等可穿戴或者黏貼於使用者身上的微型電腦裝置。 In one embodiment, the wearable device 2 may be a microcomputer device that can be worn or adhered to the user, such as a smart bracelet, a skin-stickable patch-type sensing device, a smart harness, a smart clothing, or the like. .

步驟S2、電腦裝置1將當前所採集的生物特徵資料與預先儲存的生物特徵資料作比對,確定當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異。當當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異大於預設的閾值時,執行步驟S3。當當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異小於或者等於所述預設的閾值時,回到步驟S1。 In step S2, the computer device 1 compares the currently collected biometric data with the pre-stored biometric data, and determines the difference between the currently collected biometric data and the pre-stored biometric data. When the difference between the currently collected biometric data and the pre-stored biometric data is greater than a preset threshold, step S3 is executed. When the difference between the currently collected biometric data and the pre-stored biometric data is less than or equal to the preset threshold, go back to step S1.

在本實施例中,所述預先儲存的生物特徵資料儲存在電腦裝置1中,或者儲存在與所述電腦裝置1通訊連接的雲儲存器中。 In this embodiment, the pre-stored biometric data is stored in the computer device 1 or in a cloud storage communicatively connected to the computer device 1 .

步驟S3、當當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異大於預設的閾值時,電腦裝置1將所述預先儲存的生物特徵資料更新為當前所採集的生物特徵資料,並將當前所採集的生物特徵資料附加所述使用者的身份辨識資料上載到區塊鏈。 Step S3, when the difference between the currently collected biometric data and the pre-stored biometric data is greater than a preset threshold, the computer device 1 updates the pre-stored biometric data to the currently collected biometric data , and upload the currently collected biometric data to the blockchain along with the user's identification data.

在一個實施例中,當當前所採集的生物特徵資料與所述預先儲存的生物特徵資料之間的差異大於所述預設的閾值時,電腦裝置1發出警示。電腦裝置1還回應於使用者的操作關閉所述警示。 In one embodiment, when the difference between the currently collected biometric data and the pre-stored biometric data is greater than the preset threshold, the computer device 1 issues a warning. The computer device 1 also closes the warning in response to the user's operation.

在一個實施例中,電腦裝置1可以透過在該電腦裝置1的顯示熒幕上顯示文字提示資訊提示需對所述穿戴式裝置2的使用者是否為使用者本人進行確認。所述電腦裝置1可以在顯示熒幕上顯示一個對話方塊,當從該對話方塊接收到確認所述穿戴式裝置2的使用者為使用者本人的確認訊號時,關閉所述警示。 In one embodiment, the computer device 1 may display text prompt information on the display screen of the computer device 1 to prompt whether the user of the wearable device 2 is the user himself or herself. The computer device 1 can display a dialog box on the display screen, and when a confirmation signal confirming that the user of the wearable device 2 is the user is received from the dialog box, the alert is turned off.

在一個實施例中,可以由人工確認所述穿戴式裝置2的使用者是否為使用者本人。 In one embodiment, whether the user of the wearable device 2 is the user can be confirmed manually.

在其他實施例中,也可以由電腦裝置1自動識別所述穿戴式裝置2的使用者是否為使用者本人。 In other embodiments, the computer device 1 can also automatically identify whether the user of the wearable device 2 is the user himself.

具體地,電腦裝置1可以利用所述穿戴式裝置2拍攝該穿戴式裝置2的當前使用者的人臉或者由電腦裝置1直接對所述穿戴式裝置2的當前使用者的人臉進行識別。電腦裝置1然後利用人臉識別演算法對所述穿戴式裝置2的當前使用者是否為使用者本人進行識別。所述電腦裝置1中預先儲存了所述穿戴式裝置2的使用者本人的人臉圖像。 Specifically, the computer device 1 can use the wearable device 2 to photograph the face of the current user of the wearable device 2 or directly recognize the face of the current user of the wearable device 2 by the computer device 1 . The computer device 1 then uses the face recognition algorithm to identify whether the current user of the wearable device 2 is the user himself. A face image of the user of the wearable device 2 is pre-stored in the computer device 1 .

在其他實施例中,當當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異大於預設的閾值時,電腦裝置1於接收到所述確認訊號時,將所述預先儲存的生物特徵資料更新為當前所採集的生物特徵資料,並將當前所採集的生物特徵資料附加所述使用者的身份辨識資料上載到區塊鏈。即當當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異大於預設的閾值時,電腦裝置1需要接收到確認所述穿戴式裝置2的當前使用者為使用者本人的確認訊號時,才將所述預先儲存的生物特徵資料更新為當前所採集的生物特徵資料,並將當前所採集的生物特徵資料附加所述使用者的身份辨識資料上載到區塊鏈。 In other embodiments, when the difference between the currently collected biometric data and the pre-stored biometric data is greater than a preset threshold, the computer device 1, upon receiving the confirmation signal, stores the pre-stored biometric data. The biometric data is updated to the currently collected biometric data, and the currently collected biometric data is added to the user's identification data and uploaded to the blockchain. That is, when the difference between the currently collected biometric data and the pre-stored biometric data is greater than a preset threshold, the computer device 1 needs to receive a confirmation that the current user of the wearable device 2 is the user himself. When the signal is received, the pre-stored biometric data is updated to the currently collected biometric data, and the currently collected biometric data is added to the user's identification data and uploaded to the blockchain.

在一個實施例中,電腦裝置1中還預先儲存了所述穿戴式裝置的使用者的身份辨識資料。 In one embodiment, the computer device 1 also pre-stores the identification data of the user of the wearable device.

在一個實施例中,所述身份辨識資料包括,但不限於,所述穿戴式裝置的使用者的姓名和身份號碼、通訊位址、登入指定應用的帳號和密碼。 In one embodiment, the identification information includes, but is not limited to, the name and identification number of the user of the wearable device, a communication address, an account number and password for logging in to a designated application.

在一個實施例中,電腦裝置1還預先將使用者的所述生物特徵資料以及所述使用者的身份辨識資料上載到了區塊鏈。 In one embodiment, the computer device 1 further uploads the biometric data of the user and the identification data of the user to the blockchain in advance.

在一個實施例中,電腦裝置1在將使用者的所述生物特徵資料以及所述使用者的身份辨識資料上載到區塊鏈之前,還對使用者的所述生物特徵資料以及所述使用者的身份辨識資料建立關聯並利用預設的加密演算法(例如DES加密演算法)對使用者的所述生物特徵資料以及所述使用者的身份辨識資料加密,然而再將建立關聯且加密後的使用者的所述生物特徵資料以及所述使用者的身份辨識資料上載到區塊鏈。 In one embodiment, before uploading the biometric data of the user and the identification data of the user to the blockchain, the computer device 1 further records the biometric data of the user and the user The user's biometric data and the user's identification data are encrypted by using a preset encryption algorithm (such as DES encryption algorithm), and then the association is established and the encrypted data is encrypted. The user's biometric data and the user's identification data are uploaded to the blockchain.

步驟S4、當需對所述使用者執行身份驗證時,電腦裝置1採集所述使用者當前的生物特徵資料,基於所述使用者當前的生物特徵資料從所述區塊鏈下載所述使用者的身份辨識資料。 Step S4, when it is necessary to perform identity verification on the user, the computer device 1 collects the current biometric data of the user, and downloads the user from the blockchain based on the current biometric data of the user identification information.

具體地,當需對所述使用者執行身份驗證時,電腦裝置1可以利用所述穿戴式裝置2採集所述使用者當前的生物特徵資料。電腦裝置1還從所述區塊鏈下載與所採集的所述使用者當前的生物特徵資料所對應的使用者身份辨識資料。由此,電腦裝置1可以基於所下載的使用者身份辨識資料對使用者的身份進行驗證。 Specifically, when the user needs to be authenticated, the computer device 1 can use the wearable device 2 to collect the current biometric data of the user. The computer device 1 also downloads the user identification data corresponding to the collected current biometric data of the user from the blockchain. Thus, the computer device 1 can verify the user's identity based on the downloaded user identity information.

需要說明的是,當先前上載到所述區塊鏈的使用者的生物特徵資料以及身份辨識資料經過了加密處理時,則電腦裝置1還於下載到所述身份辨識資料後對身份辨識資料進行解密。 It should be noted that, when the biometric data and identification data of the user previously uploaded to the blockchain have been encrypted, the computer device 1 will also perform an encryption process on the identification data after downloading the identification data. decrypt.

本實施例中,所述需對所述使用者執行身份驗證可以是指需要利用所述使用者的身份辨識資料進行身份驗證。舉例而言,可以是指登入所述電腦裝置1需要執行使用者身份驗證、安裝在所述電腦裝置1的軟體需要執行使用 者身份驗證,及/或訪問儲存在所述電腦裝置1的指定資料(例如資料夾)需要執行使用者身份驗證。 In this embodiment, the need to perform identity verification on the user may refer to the need to use the user's identity identification data to perform identity verification. For example, it may mean that user authentication needs to be performed to log in to the computer device 1, and software installed on the computer device 1 needs to be used User authentication, and/or access to specific data (eg, folders) stored in the computer device 1 requires user authentication.

綜上所述,本發明實施例中所述的身份驗證方法,透過定期採集使用者的生物特徵資料;將當前所採集的生物特徵資料與預先儲存的生物特徵資料作比對,確定當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異;於當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異大於預設的閾值時,將所述預先儲存的生物特徵資料更新為當前所採集的生物特徵資料,並將當前所採集的生物特徵資料附加所述使用者的身份辨識資料上載到區塊鏈;及當需對所述使用者執行身份驗證時,採集所述使用者當前的生物特徵資料,基於所述使用者當前的生物特徵資料從所述區塊鏈下載所述使用者的身份辨識資料,以利用該下載的身份辨識資料執行身份驗證,可基於使用者的生物特徵資料來獲取用於執行身份驗證的身份辨識資料,使用者無需時刻牢記自己的身份辨識資料。 To sum up, the identity verification method described in the embodiments of the present invention periodically collects the biometric data of the user; compares the currently collected biometric data with the pre-stored biometric data to determine the currently collected biometric data the difference between the biometric data collected and the pre-stored biometric data; when the difference between the currently collected biometric data and the pre-stored biometric data is greater than a preset threshold, the pre-stored biometric data The data is updated to the currently collected biometric data, and the currently collected biometric data is added to the user's identification data and uploaded to the blockchain; and when the user needs to be authenticated, the collection The user's current biometric data, based on the user's current biometric data, download the user's identification data from the blockchain to use the downloaded identification data to perform identity verification, which can be based on the use of The user's biometric information is used to obtain the identification information for performing authentication, and the user does not need to keep in mind their identification information at all times.

上述圖2詳細介紹了本發明的身份驗證方法,下面結合圖3和圖4,對實現所述身份驗證方法的軟體系統的功能模組以及實現所述身份驗證方法的硬體裝置架構進行介紹。 The above-mentioned FIG. 2 describes the identity verification method of the present invention in detail. Below, in conjunction with FIG. 3 and FIG. 4 , the functional modules of the software system for implementing the identity verification method and the hardware device architecture for implementing the identity verification method are introduced.

應該瞭解,所述實施例僅為說明之用,在專利申請範圍上並不受此結構的限制。 It should be understood that the embodiments are only used for illustration, and are not limited by this structure in the scope of the patent application.

參閱圖3所示,是本發明較佳實施例提供的身份驗證系統的模組圖。 Referring to FIG. 3 , it is a module diagram of an identity verification system provided by a preferred embodiment of the present invention.

在一些實施例中,所述身份驗證系統30運行於電腦裝置中。所述身份驗證系統30可以包括多個由程式碼段所組成的功能模組。所述身份驗證系統30中的各個程式段的程式碼可以儲存於電腦裝置的儲存器中,並由至少一個處理器所執行,以實現身份驗證功能(詳見圖2描述)。 In some embodiments, the identity verification system 30 runs on a computer device. The identity verification system 30 may include a plurality of functional modules composed of code segments. The code of each program segment in the identity verification system 30 can be stored in the memory of the computer device and executed by at least one processor to realize the identity verification function (see the description in FIG. 2 for details).

本實施例中,所述身份驗證系統30根據其所執行的功能,可以被劃分為多個功能模組。所述功能模組可以包括:獲取模組301、執行模組302。 本發明所稱的模組是指一種能夠被至少一個處理器所執行並且能夠完成固定功能的一系列電腦程式段,其儲存在儲存器中。在本實施例中,關於各模組的功能將在後續的實施例中詳述。 In this embodiment, the identity verification system 30 can be divided into a plurality of functional modules according to the functions performed by the identity verification system 30 . The function modules may include: an acquisition module 301 and an execution module 302 . The module referred to in the present invention refers to a series of computer program segments that can be executed by at least one processor and can perform fixed functions, and are stored in a memory. In this embodiment, the functions of each module will be described in detail in subsequent embodiments.

獲取模組301定期採集使用者的生物特徵資料。 The acquisition module 301 regularly collects the biometric data of the user.

在一個實施例中,獲取模組301可以利用穿戴式裝置2來定期(例如每隔預設時間例如10天或者半個月)採集使用者的生物特徵資料。所述穿戴式裝置2可以用於採集使用者的生物特徵資料,例如指紋、聲紋、人臉、虹膜、心跳、靜脈等中的一者或者多者的組合。 In one embodiment, the acquisition module 301 can use the wearable device 2 to acquire the biometric data of the user on a regular basis (for example, every preset time period, for example, 10 days or half a month). The wearable device 2 can be used to collect biometric data of the user, such as one or a combination of fingerprints, voiceprints, faces, irises, heartbeats, veins, and the like.

在一個實施例中,所述穿戴式裝置2可以為智慧手環、可貼於皮膚的貼片式的感測裝置、智慧束帶、智慧衣服等可穿戴或者黏貼於使用者身上的微型電腦裝置。 In one embodiment, the wearable device 2 may be a microcomputer device that can be worn or adhered to the user, such as a smart bracelet, a skin-stickable patch-type sensing device, a smart harness, a smart clothing, or the like. .

執行模組302將當前所採集的生物特徵資料與預先儲存的生物特徵資料作比對,確定當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異。 The execution module 302 compares the currently collected biometric data with the pre-stored biometric data, and determines the difference between the currently collected biometric data and the pre-stored biometric data.

在本實施例中,所述預先儲存的生物特徵資料儲存在電腦裝置1中,或者儲存在與所述電腦裝置1通訊連接的雲儲存器中。 In this embodiment, the pre-stored biometric data is stored in the computer device 1 or in a cloud storage communicatively connected to the computer device 1 .

當當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異大於預設的閾值時,執行模組302將所述預先儲存的生物特徵資料更新為當前所採集的生物特徵資料,並將當前所採集的生物特徵資料附加所述使用者的身份辨識資料上載到區塊鏈。 When the difference between the currently collected biometric data and the pre-stored biometric data is greater than a preset threshold, the execution module 302 updates the pre-stored biometric data to the currently collected biometric data, and The currently collected biometric data is appended to the user's identification data and uploaded to the blockchain.

在一個實施例中,當當前所採集的生物特徵資料與所述預先儲存的生物特徵資料之間的差異大於所述預設的閾值時,執行模組302發出警示。執行模組302還回應於使用者的操作關閉所述警示。 In one embodiment, when the difference between the currently collected biometric data and the pre-stored biometric data is greater than the preset threshold, the execution module 302 issues a warning. The execution module 302 also closes the alert in response to the user's operation.

在一個實施例中,執行模組302可以透過在該電腦裝置1的顯示熒幕上顯示文字提示資訊提示需對所述穿戴式裝置2的使用者是否為使用者本人進行確認。所述執行模組302可以在顯示熒幕上顯示一個對話方塊,當從該對 話方塊接收到確認所述穿戴式裝置2的使用者為使用者本人的確認訊號時,關閉所述警示。 In one embodiment, the execution module 302 may prompt to confirm whether the user of the wearable device 2 is the user by displaying text prompt information on the display screen of the computer device 1 . The execution module 302 can display a dialog box on the display screen. When the dialog box receives a confirmation signal confirming that the user of the wearable device 2 is the user, the warning is turned off.

在一個實施例中,可以由人工確認所述穿戴式裝置2的使用者是否為使用者本人。 In one embodiment, whether the user of the wearable device 2 is the user can be confirmed manually.

在其他實施例中,也可以由執行模組302自動識別所述穿戴式裝置2的使用者是否為使用者本人。 In other embodiments, the execution module 302 can also automatically identify whether the user of the wearable device 2 is the user himself.

具體地,執行模組302可以利用所述穿戴式裝置2拍攝該穿戴式裝置2的當前使用者的人臉或者由執行模組302直接對所述穿戴式裝置2的當前使用者的人臉進行識別。執行模組302然後利用人臉識別演算法對所述穿戴式裝置2的當前使用者是否為使用者本人進行識別。所述執行模組302預先儲存了所述穿戴式裝置2的使用者本人的人臉圖像。 Specifically, the execution module 302 can use the wearable device 2 to photograph the face of the current user of the wearable device 2 or the execution module 302 can directly perform the operation on the face of the current user of the wearable device 2 identify. The execution module 302 then uses the face recognition algorithm to identify whether the current user of the wearable device 2 is the user himself. The execution module 302 pre-stores the face image of the user of the wearable device 2 .

在其他實施例中,當當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異大於預設的閾值時,執行模組302於接收到所述確認訊號時,將所述預先儲存的生物特徵資料更新為當前所採集的生物特徵資料,並將當前所採集的生物特徵資料附加所述使用者的身份辨識資料上載到區塊鏈。即當當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異大於預設的閾值時,執行模組302需要接收到確認所述穿戴式裝置2的當前使用者為使用者本人的確認訊號時,才將所述預先儲存的生物特徵資料更新為當前所採集的生物特徵資料,並將當前所採集的生物特徵資料附加所述使用者的身份辨識資料上載到區塊鏈。 In other embodiments, when the difference between the currently collected biometric data and the pre-stored biometric data is greater than a preset threshold, the execution module 302, upon receiving the confirmation signal, stores the pre-stored biometric data. The biometric data of the user is updated to the currently collected biometric data, and the currently collected biometric data is added to the user's identification data and uploaded to the blockchain. That is, when the difference between the currently collected biometric data and the pre-stored biometric data is greater than a preset threshold, the execution module 302 needs to receive a confirmation that the current user of the wearable device 2 is the user himself. When the signal is confirmed, the pre-stored biometric data is updated to the currently collected biometric data, and the currently collected biometric data is added to the user's identification data and uploaded to the blockchain.

在一個實施例中,執行模組302還預先儲存了所述穿戴式裝置的使用者的身份辨識資料,例如儲存在電腦裝置1的儲存器中。 In one embodiment, the execution module 302 also pre-stores the identification data of the user of the wearable device, for example, in the storage of the computer device 1 .

在一個實施例中,所述身份辨識資料包括,但不限於,所述穿戴式裝置的使用者的姓名和身份號碼、通訊位址、登入指定應用的帳號和密碼。 In one embodiment, the identification information includes, but is not limited to, the name and identification number of the user of the wearable device, a communication address, an account number and password for logging in to a designated application.

在一個實施例中,執行模組302還預先將使用者的所述生物特徵資料以及所述使用者的身份辨識資料上載到了區塊鏈。 In one embodiment, the execution module 302 further uploads the user's biometric data and the user's identification data to the blockchain in advance.

在一個實施例中,執行模組302在將使用者的所述生物特徵資料以及所述使用者的身份辨識資料上載到區塊鏈之前,還對使用者的所述生物特徵資料以及所述使用者的身份辨識資料建立關聯並利用預設的加密演算法(例如DES加密演算法)對使用者的所述生物特徵資料以及所述使用者的身份辨識資料加密,然而再將建立關聯且加密後的使用者的所述生物特徵資料以及所述使用者的身份辨識資料上載到區塊鏈。 In one embodiment, before the execution module 302 uploads the biometric data of the user and the identification data of the user to the blockchain, the execution module 302 also executes the biometric data of the user and the usage information. The user's identification data is associated and the user's biometric data and the user's identification data are encrypted using a preset encryption algorithm (such as DES encryption algorithm), and then the association is established and encrypted. The biometric data of the user and the identification data of the user are uploaded to the blockchain.

當需對所述使用者執行身份驗證時,執行模組302採集所述使用者當前的生物特徵資料,基於所述使用者當前的生物特徵資料從所述區塊鏈下載所述使用者的身份辨識資料。 When the user needs to be authenticated, the execution module 302 collects the user's current biometric data, and downloads the user's identity from the blockchain based on the user's current biometric data. identification information.

具體地,當需對所述使用者執行身份驗證時,執行模組302可以利用所述穿戴式裝置2採集所述使用者當前的生物特徵資料。執行模組302還從所述區塊鏈下載與所採集的所述使用者當前的生物特徵資料所對應的使用者身份辨識資料。由此,執行模組302可以基於所下載的使用者身份辨識資料對使用者的身份進行驗證。 Specifically, when the user needs to be authenticated, the execution module 302 can use the wearable device 2 to collect the current biometric data of the user. The execution module 302 also downloads the user identification data corresponding to the collected current biometric data of the user from the blockchain. Thus, the execution module 302 can verify the user's identity based on the downloaded user identification data.

需要說明的是,當先前上載到所述區塊鏈的使用者的生物特徵資料以及身份辨識資料經過了加密處理時,則所述執行模組302還於下載到所述身份辨識資料後對身份辨識資料進行解密。 It should be noted that, when the biometric data and identification data of the user previously uploaded to the blockchain have undergone encryption processing, the execution module 302 will also verify the identity of the user after downloading the identification data. The identification data is decrypted.

本實施例中,所述需對所述使用者執行身份驗證可以是指需要利用所述使用者的身份辨識資料進行身份驗證。舉例而言,可以是指登入所述電腦裝置1需要執行使用者身份驗證、安裝在所述電腦裝置1的軟體需要執行使用者身份驗證,及/或訪問儲存在所述電腦裝置1的指定資料(例如資料夾)需要執行使用者身份驗證。 In this embodiment, the need to perform identity verification on the user may refer to the need to use the user's identity identification data to perform identity verification. For example, it may mean that logging into the computer device 1 requires user authentication, software installed on the computer device 1 requires user authentication, and/or accessing specified data stored in the computer device 1 (eg folders) requires user authentication to be performed.

綜上所述,本發明實施例中所述的身份驗證系統,透過定期採集使用者的生物特徵資料;將當前所採集的生物特徵資料與預先儲存的生物特徵資料作比對,確定當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異;於當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異 大於預設的閾值時,將所述預先儲存的生物特徵資料更新為當前所採集的生物特徵資料,並將當前所採集的生物特徵資料附加所述使用者的身份辨識資料上載到區塊鏈;及當需對所述使用者執行身份驗證時,採集所述使用者當前的生物特徵資料,基於所述使用者當前的生物特徵資料從所述區塊鏈下載所述使用者的身份辨識資料,以利用該下載的身份辨識資料執行身份驗證,可基於使用者的生物特徵資料來獲取用於執行身份驗證的身份辨識資料,使用者無需時刻牢記自己的身份辨識資料。 To sum up, the identity verification system described in the embodiments of the present invention regularly collects the biometric data of the user; compares the currently collected biometric data with the pre-stored biometric data to determine the currently collected biometric data Differences between biometric data currently collected and pre-stored biometric data; differences between currently collected biometric data and pre-stored biometric data When it is greater than the preset threshold, update the pre-stored biometric data to the currently collected biometric data, and upload the currently collected biometric data with the user's identification data to the blockchain; and when the user needs to be authenticated, collect the user's current biometric data, and download the user's identification data from the blockchain based on the user's current biometric data, By using the downloaded identification information to perform identity verification, the identification information for performing the identity verification can be obtained based on the biometric data of the user, and the user does not need to keep his own identification information in mind at all times.

參閱圖4所示,為本發明較佳實施例提供的電腦裝置的結構示意圖。在本發明較佳實施例中,所述電腦裝置1包括儲存器31、至少一個處理器32、至少一條通信匯流排33、顯示熒幕34、通訊模組35。本領域技術人員應該瞭解,圖4示出的電腦裝置的結構並不構成本發明實施例的限定,既可以是匯流排型結構,也可以是星形結構,所述電腦裝置1還可以包括比圖示更多或更少的其他硬體或者軟體,或者不同的部件佈置。 Referring to FIG. 4 , it is a schematic structural diagram of a computer device according to a preferred embodiment of the present invention. In a preferred embodiment of the present invention, the computer device 1 includes a storage 31 , at least one processor 32 , at least one communication bus 33 , a display screen 34 , and a communication module 35 . Those skilled in the art should understand that the structure of the computer device shown in FIG. 4 does not constitute a limitation of the embodiments of the present invention, and may be a bus-bar type structure or a star-shaped structure, and the computer device 1 may also include a More or less other hardware or software, or different component arrangements are shown.

在一個實施例中,所述電腦裝置1可以透過有線方式(例如USB(Universal Serial Bus,通用序列匯流排)或無線方式與一個或多個所述穿戴式裝置2建立通訊連接。 In one embodiment, the computer device 1 can establish a communication connection with one or more of the wearable devices 2 through a wired method (eg, USB (Universal Serial Bus, Universal Serial Bus)) or a wireless method.

本實施例中,所述電腦裝置1可以是任何涉及到需要執行使用者身份驗證的設備如電腦或其他終端設備。本實施例中,所述需要執行使用者身份驗證可以是指登入所述電腦裝置1需要執行使用者身份驗證、安裝在所述電腦裝置1的軟體需要執行使用者身份驗證,或者訪問儲存在所述電腦裝置1的指定資料(例如資料夾)需要執行使用者身份驗證。 In this embodiment, the computer device 1 may be any device that needs to perform user authentication, such as a computer or other terminal device. In this embodiment, the need to perform user identity verification may refer to the need to perform user identity verification to log in to the computer device 1, the software installed in the computer device 1 to perform user identity verification, or to access data stored in the computer device 1. The specified data (eg, folder) of the computer device 1 needs to perform user authentication.

在一些實施例中,所述電腦裝置1包括一種能夠按照事先設定或儲存的指令,自動進行數值計算和/或資訊處理的終端,其硬體包括但不限於微處理器、專用積體電路、可程式設計閘陣列、數文書處理器及嵌入式設備等。 In some embodiments, the computer device 1 includes a terminal capable of automatically performing numerical calculation and/or information processing according to pre-set or stored instructions, and its hardware includes but is not limited to microprocessors, dedicated integrated circuits, Programmable design gate arrays, digital word processors and embedded devices, etc.

需要說明的是,所述電腦裝置1僅為舉例,其他現有的或今後可能出現的電子產品如可適應於本發明,也應包含在本發明的保護範圍以內,並以引用方式包含於此。 It should be noted that the computer device 1 is only an example, and other existing or future electronic products that can be adapted to the present invention should also be included within the protection scope of the present invention, and are incorporated herein by reference.

在一些實施例中,所述儲存器31用於儲存程式碼和各種資料,例如安裝在所述電腦裝置1中的身份驗證系統30,並在電腦裝置1的運行過程中實現高速、自動地完成程式或資料的存取。所述儲存器31包括唯讀儲存器(Read-Only Memory,ROM)、可程式設計唯讀儲存器(Programmable Read-Only Memory,PROM)、可抹除可程式設計唯讀儲存器(Erasable Programmable Read-Only Memory,EPROM)、一次可程式設計唯讀儲存器(One-time Programmable Read-Only Memory,OTPROM)、電子抹除式可複寫唯讀儲存器(Electrically-Erasable Programmable Read-Only Memory,EEPROM)、唯讀光碟(Compact Disc Read-Only Memory,CD-ROM)或其他光碟儲存器、磁碟儲存器、磁帶儲存器、或者任何其他能夠用於攜帶或儲存資料的電腦可讀儲存媒體。 In some embodiments, the storage 31 is used to store program codes and various data, such as the identity verification system 30 installed in the computer device 1 , and realize high-speed and automatic completion during the operation of the computer device 1 . Access to programs or data. The storage 31 includes a Read-Only Memory (ROM), a Programmable Read-Only Memory (PROM), and an Erasable Programmable Read-Only Memory (Erasable Programmable Read). -Only Memory, EPROM), One-time Programmable Read-Only Memory (OTPROM), Electronically-Erasable Programmable Read-Only Memory (EEPROM) , Compact Disc Read-Only Memory (CD-ROM) or other optical disk storage, magnetic disk storage, magnetic tape storage, or any other computer-readable storage medium that can be used to carry or store data.

在一些實施例中,所述至少一個處理器32可以由積體電路組成,例如可以由單個封裝的積體電路所組成,也可以是由多個相同功能或不同功能封裝的積體電路所組成,包括一個或者多個中央處理器(Central Processing unit,CPU)、微處理器、數文書處理晶片、圖形處理器及各種控制晶片的組合等。所述至少一個處理器32是所述電腦裝置1的控制核心(Control Unit),利用各種介面和線路連接整個電腦裝置1的各個部件,透過運行或執行儲存在所述儲存器31內的程式或者模組,以及調用儲存在所述儲存器31內的資料,以執行電腦裝置1的各種功能和處理資料,例如執行身份驗證的功能。 In some embodiments, the at least one processor 32 may be composed of an integrated circuit, for example, may be composed of a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same function or different functions , including one or more central processing units (Central Processing Units, CPUs), microprocessors, digital word processing chips, graphics processors and combinations of various control chips, etc. The at least one processor 32 is the control core (Control Unit) of the computer device 1, and uses various interfaces and lines to connect the various components of the entire computer device 1, by running or executing the programs stored in the storage 31 or module, and call the data stored in the storage 31 to perform various functions of the computer device 1 and process data, such as the function of performing identity verification.

在一些實施例中,所述至少一條通信匯流排33被設置為實現所述儲存器31以及所述至少一個處理器32等之間的連接通信。 In some embodiments, the at least one communication bus 33 is configured to enable connection communication between the storage 31 and the at least one processor 32 and the like.

所述顯示熒幕34可以為觸摸顯示熒幕。所述通訊模組35可以為藍牙模組或者WIFI模組。 The display screen 34 may be a touch display screen. The communication module 35 may be a Bluetooth module or a WIFI module.

儘管未示出,所述電腦裝置1還可以包括給各個部件供電的電源(比如電池),優選的,電源可以透過電源管理裝置與所述至少一個處理器32邏輯相連,從而透過電源管理裝置實現管理充電、放電、以及功耗管理等功能。電源還可以包括一個或一個以上的直流或交流電源、再充電裝置、電源故障檢測電路、電源轉換器或者逆變器、電源狀態指示器等任意元件。所述電腦裝置1還可以包括多種感測器等,在此不再贅述。 Although not shown, the computer device 1 may also include a power source (such as a battery) for supplying power to various components. Preferably, the power source may be logically connected to the at least one processor 32 through the power management device, so as to realize the realization through the power management device. Manage charging, discharging, and power management functions. The power supply may also include one or more of a DC or AC power source, a recharging device, a power failure detection circuit, a power converter or inverter, a power supply status indicator, or any other element. The computer device 1 may also include various sensors, etc., which will not be repeated here.

應該瞭解,所述實施例僅為說明之用,在專利申請範圍上並不受此結構的限制。 It should be understood that the embodiments are only used for illustration, and are not limited by this structure in the scope of the patent application.

上述以軟體功能模組的形式實現的集成的單元,可以儲存在一個電腦可讀取儲存媒體中。上述軟體功能模組儲存在一個儲存媒體中,包括若干指令用以使得一台電腦裝置(可以是伺服器、個人電腦等)或處理器(processor)執行本發明各個實施例所述方法的部分。 The above-mentioned integrated units implemented in the form of software function modules can be stored in a computer-readable storage medium. The above-mentioned software function module is stored in a storage medium, and includes a number of instructions for causing a computer device (which may be a server, a personal computer, etc.) or a processor to execute parts of the methods described in various embodiments of the present invention.

在進一步的實施例中,結合圖3,所述至少一個處理器32可執行所述電腦裝置1的作業系統以及安裝的各類應用程式(如所述的身份驗證系統30)、程式碼等,例如,上述的各個模組。 In a further embodiment, referring to FIG. 3 , the at least one processor 32 can execute the operating system of the computer device 1 and various installed applications (such as the authentication system 30 ), code, etc., For example, the above-mentioned modules.

所述儲存器31中儲存有程式碼,且所述至少一個處理器32可調用所述儲存器31中儲存的程式碼以執行相關的功能。例如,圖3中所述的各個模組是儲存在所述儲存器31中的程式碼,並由所述至少一個處理器32所執行,從而實現所述各個模組的功能以達到身份驗證的目的。 The storage 31 stores program codes, and the at least one processor 32 can call the program codes stored in the storage 31 to execute related functions. For example, each module described in FIG. 3 is a program code stored in the storage 31 and executed by the at least one processor 32, so as to realize the functions of the various modules to achieve identity verification. Purpose.

在本發明的一個實施例中,所述儲存器31儲存一個或多個指令(即至少一個指令),所述至少一個指令被所述至少一個處理器32所執行以實現身份驗證的目的。 In one embodiment of the present invention, the storage 31 stores one or more instructions (ie, at least one instruction), and the at least one instruction is executed by the at least one processor 32 for the purpose of authentication.

結合圖2所示,所述至少一個處理器32對上述至少一個指令的具體實現方法包括:定期採集使用者的生物特徵資料;將當前所採集的生物特徵資料與預先儲存的生物特徵資料作比對,確定當前所採集的生物特徵資料與預先儲 存的生物特徵資料之間的差異;於當前所採集的生物特徵資料與預先儲存的生物特徵資料之間的差異大於預設的閾值時,將所述預先儲存的生物特徵資料更新為當前所採集的生物特徵資料,並將當前所採集的生物特徵資料附加所述使用者的身份辨識資料上載到區塊鏈;及當需對所述使用者執行身份驗證時,採集所述使用者當前的生物特徵資料,基於所述使用者當前的生物特徵資料從所述區塊鏈下載所述使用者的身份辨識資料,以利用該下載的身份辨識資料執行身份驗證。 With reference to FIG. 2 , the specific implementation method of the at least one processor 32 for the above-mentioned at least one instruction includes: periodically collecting the biometric data of the user; comparing the currently collected biometric data with the pre-stored biometric data Yes, determine the current collected biometric data and the pre-stored When the difference between the currently collected biometric data and the pre-stored biometric data is greater than a preset threshold, update the pre-stored biometric data to the currently collected biometric data the biometric data, and upload the currently collected biometric data with the user's identification data to the blockchain; and when the user needs to be authenticated, collect the user's current biometric data Feature data, download the user's identification data from the blockchain based on the user's current biometric data, so as to use the downloaded identification data to perform identity verification.

優選地,所述生物特徵資料包括指紋、聲紋、人臉、虹膜、心跳、靜脈中的一者或者多者的組合。 Preferably, the biometric data includes one or a combination of fingerprints, voiceprints, faces, irises, heartbeats, and veins.

優選地,該方法利用穿戴式裝置定期採集使用者的所述生物特徵資料。 Preferably, the method utilizes the wearable device to periodically collect the biometric data of the user.

優選地,該方法還包括:於當前所採集的生物特徵資料與所述預先儲存的生物特徵資料之間的差異大於所述預設的閾值時,發出警示;以及回應於使用者的操作關閉所述警示。 Preferably, the method further includes: when the difference between the currently collected biometric data and the pre-stored biometric data is greater than the preset threshold, issuing a warning; and closing the system in response to the user's operation the warning.

優選地,所述身份辨識資料包括:姓名和身份號碼、通訊位址、登入指定應用的帳號和密碼。 Preferably, the identity identification data includes: name and identity number, communication address, account number and password for logging in to a designated application.

優選地,該方法還包括:在將當前所採集的生物特徵資料附加所述使用者的身份辨識資料上載到區塊鏈之前,利用預設的加密演算法對所述當前所採集的生物特徵資料以及所述使用者的身份辨識資料加密;以及當從所述區塊鏈下載到所述使用者的身份辨識資料時,對所述使用者的身份辨識資料解密。 Preferably, the method further includes: before uploading the currently collected biometric data with the user's identification data to the blockchain, using a preset encryption algorithm to encrypt the currently collected biometric data And the user's identification data is encrypted; and when the user's identification data is downloaded from the blockchain, the user's identification data is decrypted.

在本發明所提供的幾個實施例中,應該理解到,所揭露的裝置和方法,可以透過其它的方式實現。例如,以上所描述的裝置實施例僅僅是示意性的,例如,所述模組的劃分,僅僅為一種邏輯功能劃分,實際實現時可以有另外的劃分方式。 In the several embodiments provided by the present invention, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the device embodiments described above are only illustrative. For example, the division of the modules is only a logical function division, and other division methods may be used in actual implementation.

所述作為分離部件說明的模組可以是或者也可以不是物理上分開的,作為模組顯示的部件可以是或者也可以不是物理單元,即可以位於一個地方,或者也可以分佈到多個網路單元上。可以根據實際的需要選擇其中的部分或者全部模組來實現本實施例方案的目的。 The modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical units, that is, they can be located in one place or distributed to multiple networks. on the unit. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution in this embodiment.

另外,在本發明各個實施例中的各功能模組可以集成在一個處理單元中,也可以是各個單元單獨物理存在,也可以兩個或兩個以上單元集成在一個單元中。上述集成的單元既可以採用硬體的形式實現,也可以採用硬體加軟體功能模組的形式實現。 In addition, each functional module in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit. The above-mentioned integrated units can be implemented in the form of hardware, or can be implemented in the form of hardware plus software function modules.

對於本領域技術人員而言,顯然本發明不限於上述示範性實施例的細節,而且在不背離本發明的精神或基本特徵的情況下,能夠以其他的具體形式實現本發明。因此,無論從哪一點來看,均應將實施例看作是示範性的,而且是非限制性的,本發明的範圍由所附請求項而不是上述說明限定,因此旨在將落在請求項的等同要件的含義和範圍內的所有變化涵括在本發明內。不應將請求項中的任何附圖標記視為限制所涉及的請求項。此外,顯然“包括”一詞不排除其他單元或,單數不排除複數。裝置請求項中陳述的多個單元或裝置也可以由一個單元或裝置透過軟體或者硬體來實現。第一,第二等詞語用來表示名稱,而並不表示任何特定的順序。 It will be apparent to those skilled in the art that the present invention is not limited to the details of the above-described exemplary embodiments, but that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics of the invention. Therefore, the embodiments are to be regarded in all respects as illustrative and not restrictive, and the scope of the present invention is defined by the appended claims rather than the foregoing description, and is therefore intended to fall within the scope of the claims. All changes within the meaning and range of the equivalents of , are included in the present invention. Any reference sign in a claim should not be construed as limiting the claim to which it relates. Furthermore, it is clear that the word "comprising" does not exclude other units or, and the singular does not exclude the plural. Multiple units or means stated in the device claim may also be implemented by one unit or means through software or hardware. The terms first, second, etc. are used to denote names and do not denote any particular order.

最後應說明的是,以上實施例僅用以說明本發明的技術方案而非限制,儘管參照較佳實施例對本發明進行了詳細說明,本領域的普通技術人員應當理解,可以對本發明的技術方案進行修改或等同替換,而不脫離本發明技術方案的精神和範圍。 Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present invention and not to limit them. Although the present invention has been described in detail with reference to the preferred embodiments, those of ordinary skill in the art should understand that the technical solutions of the present invention can be Modifications or equivalent substitutions can be made without departing from the spirit and scope of the technical solutions of the present invention.

Claims (7)

一種身份驗證方法,應用於電腦裝置,其中,所述方法包括:利用穿戴式裝置定期採集使用者的一種生物特徵資料;將當前所採集的所述生物特徵資料與預先儲存的生物特徵資料作比對,確定當前所採集的所述生物特徵資料與預先儲存的生物特徵資料之間的差異;於當前所採集的所述生物特徵資料與預先儲存的生物特徵資料之間的差異大於預設的閾值,且根據使用者的另一種生物特徵資料確認所述穿戴式裝置的當前使用者為使用者本人時,將所述預先儲存的生物特徵資料更新為當前所採集的所述生物特徵資料,並將當前所採集的所述生物特徵資料附加所述使用者的身份辨識資料上載到區塊鏈;及當需對所述使用者執行身份驗證時,採集所述使用者當前的生物特徵資料,基於所述使用者當前的生物特徵資料從所述區塊鏈下載所述使用者的身份辨識資料,以利用該下載的身份辨識資料執行身份驗證。 An identity verification method applied to a computer device, wherein the method comprises: using a wearable device to periodically collect a biometric data of a user; comparing the currently collected biometric data with pre-stored biometric data Yes, determine the difference between the currently collected biometric data and the pre-stored biometric data; the difference between the currently collected biometric data and the pre-stored biometric data is greater than a preset threshold , and when it is confirmed that the current user of the wearable device is the user according to another biometric data of the user, the pre-stored biometric data is updated to the currently collected biometric data, and the The currently collected biometric data is uploaded to the blockchain along with the user's identification data; and when the user needs to be authenticated, the current biometric data of the user is collected, based on the The current biometric data of the user downloads the user's identification data from the blockchain, so as to use the downloaded identification data to perform identity verification. 如請求項1所述的身份驗證方法,其中,所述定期採集的所述生物特徵資料包括指紋、聲紋、虹膜、心跳、靜脈中的一者或者多者的組合,所述另一種生物特徵資料包括人臉。 The identity verification method according to claim 1, wherein the biometric data collected periodically includes one or a combination of fingerprints, voiceprints, irises, heartbeats, and veins, and the other biometrics The data includes human faces. 如請求項1所述的身份驗證方法,其中,該方法還包括:於當前所採集的所述生物特徵資料與所述預先儲存的生物特徵資料之間的差異大於所述預設的閾值時,發出警示;以及回應於使用者的操作關閉所述警示。 The identity verification method according to claim 1, wherein the method further comprises: when the difference between the currently collected biometric data and the pre-stored biometric data is greater than the preset threshold, issuing an alert; and dismissing the alert in response to a user action. 如請求項1所述的身份驗證方法,其中,所述身份辨識資料包括:姓名和身份號碼、通訊位址、登入指定應用的帳號和密碼。 The identity verification method according to claim 1, wherein the identity identification data includes: name and identity number, communication address, account number and password for logging in to a specified application. 如請求項1所述的身份驗證方法,其中,該方法還包括: 在將當前所採集的所述生物特徵資料附加所述使用者的身份辨識資料上載到區塊鏈之前,利用預設的加密演算法對所述當前所採集的所述生物特徵資料以及所述使用者的身份辨識資料加密;以及當從所述區塊鏈下載到所述使用者的身份辨識資料時,對所述使用者的身份辨識資料解密。 The authentication method according to claim 1, wherein the method further comprises: Before uploading the currently collected biometric data with the user's identification data to the blockchain, a preset encryption algorithm is used to encrypt the currently collected biometric data and the usage The user's identification data is encrypted; and when the user's identification data is downloaded from the blockchain, the user's identification data is decrypted. 一種電腦裝置,其中,所述電腦裝置包括處理器和儲存器,所述儲存器用於儲存至少一個指令,所述處理器用於執行所述至少一個指令實現如請求項1至5中任意一項所述身份驗證方法。 A computer device, wherein the computer device comprises a processor and a storage, the storage is used to store at least one instruction, and the processor is configured to execute the at least one instruction to achieve any one of claim 1 to 5. the authentication method described above. 一種電腦可讀儲存媒體,其中,所述電腦可讀儲存媒體儲存有至少一個指令,當所述一個指令被處理器執行時實現如請求項1至5中任意一項所述身份驗證方法。 A computer-readable storage medium, wherein the computer-readable storage medium stores at least one instruction, when the one instruction is executed by a processor, the authentication method according to any one of claim items 1 to 5 is implemented.
TW109110712A 2020-03-27 2020-03-27 Identity verification method, computer device, and readable storage medium TWI777148B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW109110712A TWI777148B (en) 2020-03-27 2020-03-27 Identity verification method, computer device, and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW109110712A TWI777148B (en) 2020-03-27 2020-03-27 Identity verification method, computer device, and readable storage medium

Publications (2)

Publication Number Publication Date
TW202137030A TW202137030A (en) 2021-10-01
TWI777148B true TWI777148B (en) 2022-09-11

Family

ID=79601315

Family Applications (1)

Application Number Title Priority Date Filing Date
TW109110712A TWI777148B (en) 2020-03-27 2020-03-27 Identity verification method, computer device, and readable storage medium

Country Status (1)

Country Link
TW (1) TWI777148B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105354463A (en) * 2015-09-30 2016-02-24 宇龙计算机通信科技(深圳)有限公司 Fingerprint identification method and mobile terminal
CN106778165A (en) * 2016-11-30 2017-05-31 努比亚技术有限公司 Finger prints processing device and method
CN108650231A (en) * 2018-04-04 2018-10-12 广州广电运通金融电子股份有限公司 Physical characteristics collecting method and system based on block chain
CN109165491A (en) * 2018-08-02 2019-01-08 考拉征信服务有限公司 Security certificate method, apparatus, electronic equipment and storage medium
CN109359601A (en) * 2018-10-19 2019-02-19 平安科技(深圳)有限公司 Authentication recognition methods, electronic device and computer readable storage medium
CN109948320A (en) * 2019-03-22 2019-06-28 泰康保险集团股份有限公司 Identity identification managing method, device, medium and electronic equipment based on block chain
CN110059552A (en) * 2019-03-12 2019-07-26 上海大学 A kind of identity identifying method of block chain in conjunction with biological characteristic
CN110263578A (en) * 2019-06-26 2019-09-20 湖南科技学院 A kind of authentication system based on cloud computing
CN110569636A (en) * 2019-09-12 2019-12-13 腾讯科技(深圳)有限公司 Application program login method and device based on block chain and storage medium
CN110717164A (en) * 2019-12-16 2020-01-21 国网电子商务有限公司 Intelligent multidimensional weighting identity authentication and risk control method and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105354463A (en) * 2015-09-30 2016-02-24 宇龙计算机通信科技(深圳)有限公司 Fingerprint identification method and mobile terminal
CN106778165A (en) * 2016-11-30 2017-05-31 努比亚技术有限公司 Finger prints processing device and method
CN108650231A (en) * 2018-04-04 2018-10-12 广州广电运通金融电子股份有限公司 Physical characteristics collecting method and system based on block chain
CN109165491A (en) * 2018-08-02 2019-01-08 考拉征信服务有限公司 Security certificate method, apparatus, electronic equipment and storage medium
CN109359601A (en) * 2018-10-19 2019-02-19 平安科技(深圳)有限公司 Authentication recognition methods, electronic device and computer readable storage medium
CN110059552A (en) * 2019-03-12 2019-07-26 上海大学 A kind of identity identifying method of block chain in conjunction with biological characteristic
CN109948320A (en) * 2019-03-22 2019-06-28 泰康保险集团股份有限公司 Identity identification managing method, device, medium and electronic equipment based on block chain
CN110263578A (en) * 2019-06-26 2019-09-20 湖南科技学院 A kind of authentication system based on cloud computing
CN110569636A (en) * 2019-09-12 2019-12-13 腾讯科技(深圳)有限公司 Application program login method and device based on block chain and storage medium
CN110717164A (en) * 2019-12-16 2020-01-21 国网电子商务有限公司 Intelligent multidimensional weighting identity authentication and risk control method and system

Also Published As

Publication number Publication date
TW202137030A (en) 2021-10-01

Similar Documents

Publication Publication Date Title
CN107278313B (en) Payment means operation support method and electronic device for supporting the same
WO2016082229A1 (en) Identity authentication method and wearable device
CN107682545B (en) Person and evidence machine integrated mobile phone terminal system based on biological identification technology
EP3195524B1 (en) Systems and methods for device based authentication
KR102368614B1 (en) Authentication Processing Method and electronic device supporting the same
US10986088B2 (en) Methods and apparatus for account linking
CN106682518A (en) Method for guaranteeing firmware security of management controller and computer apparatus
WO2017094998A1 (en) Biometric information personal identity authenticating system and method using financial card information stored in mobile communication terminal
EP2545485A1 (en) A secured personal data handling and management system
US20150356256A1 (en) Apparatus and method for managing a care service
CN107077671A (en) Use the payment mechanism and method of security module
CN111798302A (en) Quota updating method and device based on micro service, electronic equipment and storage medium
US10572652B2 (en) Oral authentication management
TWI777148B (en) Identity verification method, computer device, and readable storage medium
US20210306153A1 (en) Identity verification method and computer device employing the same
CN110321757B (en) Cross-end biological feature recognition system, biological feature management system, method and device
CN112674723A (en) Medication compliance monitoring method, terminal and readable storage medium
CN106991307A (en) Using time slot scrambling and device
KR102439879B1 (en) System for authenticating identity based on blockchain and method thereof
CN106859597B (en) Remote monitoring method and device
CA3021236C (en) Method for configuring diabetes management device by healthcare provider
US20170329948A1 (en) Digital signature with custom fingerprint
US10789340B2 (en) Dynamic device activation control
JP2017211845A (en) Plant monitoring control system, and plant operation console
JP2021093148A (en) Method for securing access to watch

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent