WO2023108635A1 - Authentication method, apparatus, device and system - Google Patents

Authentication method, apparatus, device and system Download PDF

Info

Publication number
WO2023108635A1
WO2023108635A1 PCT/CN2021/139267 CN2021139267W WO2023108635A1 WO 2023108635 A1 WO2023108635 A1 WO 2023108635A1 CN 2021139267 W CN2021139267 W CN 2021139267W WO 2023108635 A1 WO2023108635 A1 WO 2023108635A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
authenticated
authentication
controlled device
biometric
Prior art date
Application number
PCT/CN2021/139267
Other languages
French (fr)
Chinese (zh)
Inventor
夏洪朴
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2021/139267 priority Critical patent/WO2023108635A1/en
Publication of WO2023108635A1 publication Critical patent/WO2023108635A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present application relates to the technical field of intelligent unlocking, and in particular to an authentication method, device, equipment and system.
  • the express cabinet decouples the sender and the picker, reducing the time cost of both parties;
  • the unmanned vending machine can be installed in a variety of venues, which is convenient for consumers to shop;
  • the smart charging car is not limited by the venue, which can make users more convenient ground charge.
  • the unmanned scenario involves the user's identity authentication.
  • the wearable device worn by the user is usually used for identity authentication.
  • the general process is: the user wears the wearable device close to a smart device, and sends authentication information to the smart device.
  • the smart device Match the received authentication information with the pre-stored authentication information, and unlock it after the matching is successful. There are risks such as information leakage in this authentication method, and the information security is low.
  • the present application proposes an authentication method, an authentication device, an authentication system, an authentication device, a device to be authenticated, a storage medium, a chip, and a computer program product.
  • an embodiment of the present application provides an authentication method, the method is applied to an authentication device, and the method includes: acquiring first information at a first moment and second information at the first moment, the The first information is associated with first biometric information from the first controlled device, and the second information is associated with second biometric information from the first
  • the device to be authenticated is associated with the user corresponding to the first device to be authenticated; the first information is matched with the second information; according to the matching result of the first information and the second information, control The state of the first controlled device.
  • the authentication device does not need to pre-store the biometric information of the user corresponding to the first device to be authenticated.
  • the state of the device so as to realize the user identity authentication corresponding to the first device to be authenticated, and at the same time avoid the leakage risk of pre-stored user biometric information, improve information security, and protect user privacy.
  • the authentication device can acquire the biometric information from each device to be authenticated at the first moment, and for any device to be authenticated, the information from the device to be authenticated can be The biometric information of the authentication device is sequentially matched with the biometric information collected by each controlled device. If the matching is successful, the authentication device controls the corresponding controlled device to be in the open state when the matching is successful.
  • the user corresponding to the authentication device performs identity authentication, and can control multiple controlled devices to be turned on at the same time, so as to provide services for multiple authenticated users at the same time, improve authentication efficiency, improve user experience, and save costs.
  • the first controlled device includes a first smart lock; the matching of the first information and the second information As a result, controlling the state of the first controlled device includes: when the first information and the second information match successfully, sending first control information, the first control information is used to control the The first smart lock is in an open state.
  • the successful matching of the first information and the second information indicates that the user identity authentication corresponding to the first device to be authenticated has passed, and the authentication device can control the first smart lock to be in an open state so that the user corresponding to the first device to be authenticated can obtain Corresponding service.
  • the method further includes: when controlling the first controlled device After the state of , clear the first information and the second information.
  • the authentication device controls the state of the first controlled device, the user's identity authentication has been completed. Since the first information and the second information contain the user's biometric information, the authentication device does not need to store the first information and the second information. The second information, clear the first information and the second information in time, so as to avoid information leakage, protect user privacy, and save storage space at the same time.
  • the method further includes: connecting the first controlled device and the When the distance between the first devices to be authenticated is less than the preset threshold, send second control information to the first controlled device, where the second control information is used to control the first controlled device to collect the First biometric information.
  • the function of the first controlled device to collect biometric information can be initially configured as off, so that when the distance between the first controlled device and the first device to be authenticated is less than a preset threshold, it indicates that The user corresponding to the first device to be authenticated has approached the first controlled device, and the authentication device controls the first controlled device to enable the biometric information collection function, so that when the user touches the first controlled device, the first controlled device can collect At the same time, the first controlled device only enables the biometric information collection function when needed, thereby reducing the energy consumption of the first controlled device and the data processing amount of the authentication device.
  • the acquiring the first information at the first moment and the The second information includes: obtaining third information and fourth information, wherein the third information is associated with first service information, and the first service information is a service provided by the cloud server for the first controlled device information, the fourth information is associated with second business information, and the second business information is the business information provided by the cloud server for the first device to be authenticated; for the third information and the fourth information matching; if the third information and the fourth information are successfully matched, the first information and the second information are acquired.
  • the authentication device matches the third information with the fourth information to realize authorization authentication. If the third information and the fourth information match successfully, it indicates that the second business information and the first business information are the same business information, that is, The user corresponding to the first device to be authenticated is the authorized service object of the first controlled device; when the authorization authentication is passed, the authentication device obtains the first information and the second information and performs matching, and controls the first controlled device according to the matching result.
  • the status of the device, the authentication device does not need to pre-store the biometric information of the user corresponding to the first device to be authenticated, and can realize the identity authentication of the user corresponding to the first device to be authenticated, so as to ensure that the user corresponding to the first device to be authenticated opens the
  • the first controlled device avoids the leakage risk of pre-stored user biometric information, improves information security, and protects user privacy.
  • the authentication device can obtain business information from multiple devices to be authenticated, and for any device to be authenticated, the cloud server can be set as The service information provided by the device to be authenticated is sequentially matched with the service information provided by the cloud server for each controlled device, so as to simultaneously authorize and authenticate users corresponding to multiple devices to be authenticated.
  • the authentication device obtains the biometric information collected by the device to be authenticated, and the biometric information collected by the corresponding target controlled device.
  • the authentication device will control the target controlled device to be in the open state, otherwise, the target controlled device will remain in the closed state; thereby realizing simultaneous authentication of users corresponding to multiple devices to be authenticated Identity authentication, and ensure that the corresponding target controlled device is turned on by the corresponding user of the device to be authenticated; and, at the same time, the users corresponding to multiple devices to be authenticated can open their corresponding target controlled devices, so as to realize simultaneous access to multiple Provide services for each user, improve authentication efficiency, improve user experience, and save costs.
  • the authentication device sends third control information to the first controlled device, and the third control information is used to control the first controlled device to collect the first biometric characteristic information. If the third information and the fourth information match successfully, it means that the first controlled device provides services for the user corresponding to the first device to be authenticated, and the authentication device controls the first controlled device to enable the biometric information collection function, so that When the user touches the first controlled device, the first controlled device can collect the biometric information of the user; at the same time, the first controlled device only turns on the biometric information collection function when needed, thus reducing the number of first controlled devices.
  • the energy consumption of the control equipment and the data processing volume of the authentication equipment are examples of the authentication equipment.
  • the first service information includes identification information of the first controlled device; the The second service information includes identification information of the target controlled device.
  • the target controlled device may be a device allocated by the cloud server to provide services for the user corresponding to the first device to be authenticated.
  • the first information includes The information obtained by encrypting the characteristic information, and/or, the second information includes the information obtained by encrypting the second biometric information through the first encryption algorithm; the method further includes: receiving the information from the cloud server The first encryption algorithm.
  • the authentication device receives the first encryption algorithm from the cloud server, so as to encrypt the biometric information collected by the first controlled device, and the first information and/or the second information include encrypted biometric information , further improving the security of information.
  • the method further includes: after controlling the state of the first controlled device , clear the first encryption algorithm.
  • the authentication device controls the state of the first controlled device, the identity authentication of the user corresponding to the first device to be authenticated has been completed, and the authentication device can clear the first encryption algorithm, thereby avoiding the leakage of the encryption algorithm and ensuring information security. Safe while saving storage space.
  • the first information includes the encryption of the first biological information through the second encryption algorithm
  • the information obtained by encrypting the characteristic information, and/or, the second information includes the information obtained by encrypting the second biometric information through the second encryption algorithm
  • the method further includes: generating the second encryption algorithm ; Send the second encryption algorithm to the first device to be authenticated.
  • the authentication device generates and sends a second encryption algorithm to the first device to be authenticated, which is used to encrypt the biometric information collected by the first controlled device and the biometric information collected by the first device to be authenticated.
  • Both the information and the second information include encrypted biometric information, which further improves the security of the information.
  • the method further includes: after controlling the state of the first controlled device , clear the second encryption algorithm.
  • the authentication device controls the state of the first controlled device, the identity authentication of the user corresponding to the first device to be authenticated has been completed, and the authentication device can clear the second encryption algorithm, thereby avoiding the leakage of the encryption algorithm and ensuring information security. Safe while saving storage space.
  • the first biometric information includes first electrocardiographic information; the first The second biometric information includes second ECG information.
  • the ECG information is unique, that is, the ECG information of different users is different, the ECG information can be used to accurately distinguish different users, thereby ensuring the accuracy of identity authentication; at the same time, the user's ECG information
  • the information is random and cannot be copied and simulated. It is safer and more reliable to use ECG information for identity authentication; in addition, compared with other biometric information that is greatly affected by the external environment, ECG information is not affected by the external environment and can be better applied. in various environments.
  • the method further includes: when controlling the first controlled After confirming the state of the device, send the identification information of the first controlled device and the second information to the cloud server, where the identification information of the first controlled device and the second information are at least used to generate the first Settlement information corresponding to the device to be authenticated.
  • the authentication device sends the identification information of the first controlled device and the second information to the cloud server.
  • the settlement information may represent information related to fees generated by the user for obtaining services provided by the first controlled device.
  • the identification information of a controlled device can be used to determine the fee generated by the first controlled device for providing services, and the second information can be used to match the first information, so as to determine that the fee is the first Generated by the services provided by the controlled equipment.
  • an embodiment of the present application provides an authentication system, including an authentication device and a cloud server, wherein the cloud server is configured to send the third information to the first controlled device, and send the third information to the first device to be authenticated.
  • sending fourth information wherein the third information is associated with first business information, and the first business information is business information provided by the cloud server for the first controlled device; the fourth information is associated with Associated with the second business information, the second business information is the business information provided by the cloud server for the first device to be authenticated; the authentication device is configured to receive the first device to be authenticated from the first device to be authenticated Four information; match the third information with the fourth information; if the third information and the fourth information are successfully matched, acquire the first information at the first moment and the first moment matching the first information and the second information; controlling the state of the first controlled device according to the matching result of the first information and the second information; wherein, the The first information is associated with first biological feature information, the first biological feature information is from the first controlled device, the second information is associated with second biological
  • the cloud server sends the third information to the first controlled device, and sends the fourth information to the first device to be authenticated, and the authentication device receives the fourth information from the first device to be authenticated, and compares the third information and The fourth information is matched to achieve authorization authentication. If the third information and the fourth information are successfully matched, it indicates that the second business information and the first business information are the same business information, that is, the user corresponding to the first device to be authenticated is the first subject.
  • the authorized service object of the controlled device when the authorized authentication is passed, the authentication device obtains the first information and the second information and performs matching, and controls the state of the first controlled device according to the matching result.
  • the authentication device does not need to store the first information in advance.
  • the identity authentication of the user corresponding to the first device to be authenticated can be realized, thereby ensuring that the user corresponding to the first device to be authenticated turns on the first controlled device, while avoiding pre-stored
  • the leakage risk of the user's biometric information improves the security of the information and protects the privacy of the user.
  • the first controlled device includes a first smart lock; the authentication device is further configured to: If the matching with the second information is successful, first control information is sent, and the first control information is used to control the first smart lock to be in an open state.
  • the successful matching of the first information and the second information indicates that the user identity authentication corresponding to the first device to be authenticated has passed, and the authentication device can control the first smart lock to be in an open state so that the user corresponding to the first device to be authenticated can obtain Corresponding service.
  • the authentication device is further configured to: After the status of a controlled device, clear the first information and the second information.
  • the authentication device controls the state of the first controlled device, the user's identity authentication has been completed. Since the first information and the second information contain the user's biometric information, the authentication device does not need to store the first information and the second information. The second information, clear the first information and the second information in time, so as to avoid information leakage, protect user privacy, and save storage space at the same time.
  • the authentication device is further configured to: When the distance between the device and the first device to be authenticated is less than a preset threshold, send second control information to the first controlled device, where the second control information is used to control the first controlled device The device collects the first biometric information.
  • the function of the first controlled device to collect biometric information can be initially configured as off, so that when the distance between the first controlled device and the first device to be authenticated is less than a preset threshold, it indicates that The user corresponding to the first device to be authenticated has approached the first controlled device, and the authentication device controls the first controlled device to enable the biometric information collection function, so that when the user touches the first controlled device, the first controlled device can collect At the same time, the first controlled device only enables the biometric information collection function when needed, thereby reducing the energy consumption of the first controlled device and the data processing amount of the authentication device.
  • the cloud server is further configured to: receive service request information;
  • the service request information is generated to generate the third information and the fourth information.
  • the cloud server allocates existing available service resources according to the service request information, and generates third information and fourth information, so as to meet user needs.
  • the first service information includes identification information of the first controlled device ;
  • the second service information includes identification information of the target controlled device.
  • the target controlled device may be a device allocated by the cloud server to provide services for the user corresponding to the first device to be authenticated.
  • the first information includes The information obtained by encrypting the characteristic information, and/or, the second information includes the information obtained by encrypting the second biometric information through the first encryption algorithm;
  • the cloud server is further configured to: send the The authentication device sends the first encryption algorithm, and sends the first encryption algorithm to the first device to be authenticated;
  • the authentication device is further configured to: receive the first encryption algorithm.
  • the authentication device receives the first encryption algorithm from the cloud server, so as to encrypt the biometric information collected by the first controlled device, and the first information and/or the second information include encrypted biometric information , thereby further improving the security of information.
  • the authentication device is further configured to: control the first controlled After the state of the device is cleared, the first encryption algorithm is cleared.
  • the authentication device controls the state of the first controlled device, the identity authentication of the user corresponding to the first device to be authenticated has been completed, and the authentication device can clear the first encryption algorithm, thereby avoiding the leakage of the encryption algorithm and ensuring information security. Safe while saving storage space.
  • the first information includes the encryption of the first biological information through the second encryption algorithm.
  • the information obtained by encrypting the characteristic information, and/or, the second information includes the information obtained by encrypting the second biometric information by the second encryption algorithm;
  • the authentication device is further configured to: generate the a second encryption algorithm; sending the second encryption algorithm to the first device to be authenticated.
  • the authentication device generates and sends a second encryption algorithm to the first device to be authenticated, which is used to encrypt the biometric information collected by the first controlled device and the biometric information collected by the first device to be authenticated.
  • Both the information and the second information include encrypted biometric information, which further improves the security of the information.
  • the authentication device is further configured to: After the state of the device is cleared, the second encryption algorithm is cleared.
  • the authentication device controls the state of the first controlled device, the identity authentication of the user corresponding to the first device to be authenticated has been completed, and the authentication device can clear the second encryption algorithm, thereby avoiding the leakage of the encryption algorithm and ensuring information security. Safe while saving storage space.
  • the first biometric information includes first electrocardiographic information; the first The second biometric information includes second ECG information.
  • the ECG information is unique, that is, the ECG information of different users is different, the ECG information can be used to accurately distinguish different users, thereby ensuring the accuracy of identity authentication; at the same time, the user's ECG information
  • the information is random and cannot be copied and simulated. It is safer and more reliable to use ECG information for identity authentication; in addition, compared with other biometric information that is greatly affected by the external environment, ECG information is not affected by the external environment and can be better applied. in various environments.
  • the authentication device is further configured to: After checking the state of the first controlled device, sending the identification information of the first controlled device and the second information to the cloud server; the cloud server is also configured to: receive the identification of the first controlled device information and the second information; determine the first device to be authenticated according to the second information; generate the settlement corresponding to the first device to be authenticated according to the service information corresponding to the identification information of the first controlled device information; sending the settlement information to the first device to be authenticated.
  • the settlement information may represent information related to fees generated by the user's acquisition of services provided by the first controlled device
  • the authentication device sends the identification information of the first controlled device and the second information to the cloud server
  • the cloud server receives the above information Afterwards, according to the identification information of the first controlled device, it is possible to determine the fee generated by the first controlled device for providing services, and match the second information with the first information, so as to determine that the fee is the fee for the user corresponding to the first device to be authenticated to obtain the second
  • a fee generated by the service provided by the controlled device is sent to the first device to be authenticated, so that the user corresponding to the first device to be authenticated can make settlement.
  • the embodiment of the present application provides an authentication method, the method is applied to the first device to be authenticated, and the method includes: collecting the second biometric information at the first moment, the second biometric information Associated with the user corresponding to the first device to be authenticated; sending second information, the second information is associated with the second biological feature information, the second information is at least used to match the first information, and the The first information is associated with the first biometric information at the first moment, and the first biometric information comes from the first controlled device.
  • the first device to be authenticated collects the second biometric information at the first moment, and sends the second information associated with the second biometric information, and the second information is used to match the first information at the same moment
  • the identity authentication of the user corresponding to the first device to be authenticated can be realized without pre-storing the biometric information of the user corresponding to the first device to be authenticated, and at the same time, the risk of leakage of the pre-stored biometric information of the user is avoided.
  • the collecting the second biometric information at the first moment includes: When the distance between authentication devices is less than a preset threshold, the second biometric information is collected.
  • the function of the first device to be authenticated to collect biometric information can be initially configured as off, and when the distance between the first controlled device and the first device to be authenticated is less than a preset threshold, it indicates that the The user corresponding to the device to be authenticated has approached the first controlled device, and the first device to be authenticated turns on the biometric information collection function so as to collect the biometric information of the user; at the same time, the first device to be authenticated only turns on the biometric feature when needed
  • the information collection function reduces the energy consumption of the first device to be certified and the data processing amount of the certified device.
  • the method further includes: receiving fourth information from the cloud server, the The fourth information is associated with the second service information corresponding to the first device to be authenticated, the fourth information is at least used to match with the third information, the third information is related to the first controlled device associated with the first service information; and sending the fourth information.
  • the method further includes: sending service request information to the cloud server, and the service The request information is at least used to request to acquire service information corresponding to the first device to be authenticated.
  • the first service information includes identification information of the first controlled device; the The second service information includes identification information of the target controlled device.
  • the target controlled device may be a device allocated by the cloud server to provide services for the user corresponding to the first device to be authenticated.
  • the second information includes encryption of the second biometric information through an encryption algorithm
  • the obtained information is encrypted
  • the method further includes: receiving the encryption algorithm.
  • the first device to be authenticated receives an encryption algorithm so as to encrypt the biometric information collected by it, thereby improving the security of the information.
  • the first biometric information includes first electrocardiographic information; the first The second biometric information includes second ECG information.
  • the ECG information is unique, that is, the ECG information of different users is different, the ECG information can be used to accurately distinguish different users, thereby ensuring the accuracy of identity authentication; at the same time, the user's ECG information
  • the information is random and cannot be copied and simulated. It is safer and more reliable to use ECG information for identity authentication; in addition, compared with other biometric information that is greatly affected by the external environment, ECG information is not affected by the external environment and can be better applied. in various environments.
  • the first device to be authenticated is equipped with an electrocardiogram sensor, and the electrocardiogram sensor is used to collect The second ECG information.
  • the method further includes: receiving the settlement corresponding to the first device to be authenticated information.
  • the settlement information may represent information related to fees generated when the user obtains the service provided by the first controlled device, and the first device to be authenticated receives the corresponding settlement information so that the user corresponding to the first device to be authenticated can perform settlement.
  • an embodiment of the present application provides an authentication system, including an authentication device and a device to be authenticated, wherein the authentication device is configured to implement the above-mentioned first aspect or various possible implementations of the first aspect
  • An authentication method, the device to be authenticated is configured to execute the authentication method in the above third aspect or in various possible implementation manners of the third aspect.
  • the embodiments of the present application provide an authentication system, including an authentication device, a device to be authenticated, and a controlled device, wherein the authentication device is configured to implement the above-mentioned first aspect or various possibilities of the first aspect
  • the authentication method in the implementation manner of the third aspect the device to be authenticated is configured to execute the authentication method in the above third aspect or in various possible implementation manners of the third aspect
  • the controlled device is used to collect the first - biometric information.
  • an embodiment of the present application provides an authentication device, including: a transceiver module, configured to obtain first information at a first moment and second information at the first moment, wherein the first information and The first biometric information is associated with the first controlled device, the second information is associated with the second biometric information, the second biometric information is from the first device to be authenticated, And associated with the user corresponding to the first device to be authenticated; a processing module, configured to match the first information with the second information; according to the matching result of the first information and the second information, and controlling the state of the first controlled device.
  • the first controlled device includes a first smart lock; the processing module is further configured to: If the second information matches successfully, the first control information is sent, and the first control information is used to control the first smart lock to be in an open state.
  • the processing module is further configured to: control the first After the state of the controlled device is cleared, the first biological feature information and the second biological feature information are cleared.
  • the processing module is further configured to: in the first controlled device When the distance to the first device to be authenticated is less than a preset threshold, sending second control information to the first controlled device, where the second control information is used to control the first controlled device Collect the first biometric information.
  • the transceiver module is further configured to: acquire third information and fourth information , wherein the third information is associated with the first business information, the first business information is the business information provided by the cloud server for the first controlled device, and the fourth information is associated with the second business information , the second business information is the business information provided by the cloud server for the first device to be authenticated; matching the third information with the fourth information; If the four pieces of information match successfully, the first information and the second information are acquired.
  • the first service information includes identification information of the first controlled device; the The second service information includes identification information of the target controlled device.
  • the first information includes the password of the first biological
  • the information obtained by encrypting the characteristic information, and/or, the second information includes the information obtained by encrypting the second biometric information by the first encryption algorithm; The first encryption algorithm of .
  • the processing module is further configured to: control the first controlled device After the status of , clear the first encryption algorithm.
  • the first information includes the encryption of the first biological information through the second encryption algorithm.
  • the information obtained by encrypting the characteristic information, and/or, the second information includes the information obtained by encrypting the second biometric information by the second encryption algorithm;
  • the processing module is further configured to: generate the first A second encryption algorithm, sending the second encryption algorithm to the first device to be authenticated.
  • the processing module is further configured to: control the first controlled device After the status of the second encryption algorithm is cleared.
  • the first biometric information includes first electrocardiographic information; the first The second biometric information includes second ECG information.
  • the processing module is further configured to: After checking the state of a controlled device, send the identification information of the first controlled device and the second information to the cloud server, where the identification information of the first controlled device and the second information are at least used to generate the Settlement information corresponding to the first device to be authenticated.
  • the embodiment of the present application provides a device to be authenticated, including: a processing module, configured to collect second biometric information at the first moment, the second biometric information is associated with the first device to be authenticated a user; a transceiver module, configured to send second information, the second information is associated with the second biometric information, the second information is at least used to match with the first information, and the first information is associated with the first information
  • a processing module configured to collect second biometric information at the first moment, the second biometric information is associated with the first device to be authenticated a user
  • a transceiver module configured to send second information, the second information is associated with the second biometric information, the second information is at least used to match with the first information, and the first information is associated with the first information
  • the first biological feature information at the first moment is associated, and the first biological feature information comes from the first controlled device.
  • the processing module is further configured to: the distance between the first controlled device and the first device to be authenticated If it is less than the preset threshold, the second biometric information is collected.
  • the transceiver module is further configured to: receive fourth information from the cloud server , the fourth information is associated with the second business information corresponding to the first device to be authenticated, the fourth information is at least used to match with the third information, and the third information is associated with the first service information corresponding to the first The first service information of the controlled device is associated; and the fourth information is sent to the authentication device.
  • the transceiver module is further configured to: send service request information to the cloud server,
  • the service request information is at least used to request to obtain service information corresponding to the first device to be authenticated.
  • the first service information includes identification information of the first controlled device; the The second service information includes identification information of the target controlled device.
  • the second information includes encryption of the second biometric information through an encryption algorithm
  • the transceiver module is further configured to: receive the encryption algorithm
  • the first biometric information includes first electrocardiographic information; the first The second biometric information includes second ECG information.
  • the first device to be authenticated is equipped with an electrocardiogram sensor, and the electrocardiogram sensor is used to collect The second ECG information.
  • the transceiver module is further configured to: receive the first controlled device corresponding billing information.
  • an embodiment of the present application provides an authentication device, including: a processor; a memory for storing processor-executable instructions; wherein, the processor is configured to implement the above-mentioned first authentication when executing the instructions.
  • an embodiment of the present application provides a device to be authenticated, including: a sensor for collecting biometric information; a processor; a memory for storing instructions executable by the processor; wherein the processor is configured To implement the above third aspect or the authentication method in various possible implementation manners of the third aspect when executing the instructions.
  • the embodiments of the present application provide a chip, including a processor.
  • the processor executes instructions, the processor executes the above-mentioned first aspect or various possible implementations of the first aspect.
  • the authentication method or execute the above third aspect or the authentication method in various possible implementation manners of the third aspect.
  • the embodiments of the present application provide a computer-readable storage medium, on which computer program instructions are stored, and when the computer program instructions are executed by a processor, the above-mentioned first aspect or various aspects of the first aspect are implemented.
  • the embodiments of the present application provide a computer program product, which, when the computer program product is run on a computer, causes the computer to execute the above-mentioned first aspect or various possible implementations of the first aspect
  • the authentication method in or execute the authentication method in the above third aspect or in various possible implementation manners of the third aspect.
  • FIG. 1 shows a schematic diagram of an authentication system architecture according to an embodiment of the present application
  • Fig. 2 shows a schematic diagram of a mobile charging scene according to an embodiment of the present application
  • Fig. 3 shows a schematic diagram of a smart express cabinet scene according to an embodiment of the present application
  • Fig. 4 shows a schematic diagram of an unmanned vending machine scene according to an embodiment of the present application
  • Fig. 5 shows a schematic diagram of an unlocking scene of a smart vehicle according to an embodiment of the present application
  • FIG. 6 shows a flowchart of an authentication method according to an embodiment of the present application
  • FIG. 7 shows a flow chart of another authentication method according to an embodiment of the present application.
  • FIG. 8 shows a flow chart of another authentication method according to an embodiment of the present application.
  • FIG. 9 shows a structural diagram of an authentication device according to an embodiment of the present application.
  • FIG. 10 shows a structural diagram of another authentication device according to an embodiment of the present application.
  • Fig. 11 shows a schematic structural diagram of an electronic device according to an embodiment of the present application.
  • Fig. 1 shows a schematic diagram of an authentication system architecture according to an embodiment of the present application.
  • the authentication system 10 may include an authentication device 101 , a device to be authenticated 102 , and a controlled device 104 ; It should be noted that the authentication system 10 in FIG. 1 is only shown as one authentication device, two devices to be authenticated, two controlled devices, and one server. It should be understood that this does not limit The authentication system 10 may also include more authentication devices, devices to be authenticated, controlled devices, servers, and other devices.
  • the authentication device 101 may have a communication function and a data processing function, and may be realized by hardware, software, or a combination of software and hardware.
  • the authentication device 101 can be a general-purpose device or a dedicated device; for example, the authentication device 101 can be a desktop computer, a portable computer, a network server, a palm computer (personal digital assistant, PDA), a mobile phone, a tablet computer, Wireless terminal devices, embedded devices or other general-purpose devices with data processing functions and communication functions, or components in these general-purpose devices; authentication device 101 can also be intelligent vehicles (such as automobiles, bicycles, motorcycles, electric vehicles, etc.
  • intelligent vehicles such as automobiles, bicycles, motorcycles, electric vehicles, etc.
  • the authentication device 101 can also be a Chips, processors, or servers that process functions.
  • the authentication device 101 can send an encryption algorithm to the device to be authenticated 102 (or the device to be authenticated 103); it can also control the controlled device 104 (or the controlled device 105) to be in different states such as open or closed; it can also receive The information sent by the authenticating device 102 , the controlled device 104 or the server 106 may be used to authenticate the identity of the user corresponding to the device to be authenticated 102 according to the received information.
  • the device to be authenticated 102 (or the device to be authenticated 103) can be a portable device, and the device to be authenticated 102 can have a communication function, a biometric information collection function, and a data processing function.
  • the device to be authenticated 102 can be a wearable device , for example, smart watches, smart bracelets, smart necklaces, smart headphones, smart glasses, smart clothing, etc.; the device 102 to be authenticated can also be a terminal device, such as mobile phones, laptops, tablet computers, virtual reality devices, etc. .
  • the device 102 to be authenticated may be equipped with a sensor for collecting biometric information, such as an electrocardiogram sensor, a fingerprint sensor, a temperature sensor, a blood oxygen sensor, etc., and may send the collected biometric information to the authentication device 101;
  • the device 102 may send service request information to the server 106, and may also receive encryption algorithms, service information, etc. sent by the server 106 or the authentication device 101.
  • the controlled device 104 (or the controlled device 105) can be a smart lock with biometric information collection function, for example, it can be a car lock, door lock, express cabinet lock, charging gun lock, etc.; the controlled device 104 can be an independent The device can have a communication function; the controlled device 104 can also be integrated with the authentication device 101, and can transmit data with the authentication device 101 through a general-purpose input/output (GPIO).
  • GPIO general-purpose input/output
  • the controlled device 104 may be configured with a sensor for collecting biometric information, such as an electrocardiogram sensor, a fingerprint sensor, a temperature sensor, a blood oxygen sensor, etc., and may send the collected biometric information to the authentication device 101;
  • the control information of the authentication device 101 is received, and corresponding operations such as opening, closing, or biometric information collection are performed according to the control information.
  • the server 106 may be an entity with business scheduling, communication functions or settlement capabilities, for example, it may be a cloud server, and the cloud server may be a server or a server cluster composed of multiple servers. Exemplarily, the server 106 may provide service information for the device to be authenticated 102 (or the device to be authenticated 103), the controlled device 104 (or the controlled device 105), and may also send an encryption algorithm or Provide information forwarding services, etc.
  • the above biometric information includes information that can represent the unique identity of the user, for example, it may include: one or more of ECG, body temperature, blood oxygen concentration, iris, fingerprint, voice, palm print or human face.
  • the device to be authenticated 102 can be a smart bracelet equipped with an ECG sensor, which can collect the user's ECG information
  • the controlled device 104 can be a smart door lock installed on the door handle, and the smart door lock is equipped with an ECG sensor.
  • the device to be authenticated 102 can be smart glasses equipped with an image sensor
  • the controlled device 104 can be an express cabinet equipped with an image sensor lock
  • the user wears the smart glasses since the glasses lenses are transparent, when the user looks directly at the express locker lock, both the smart glasses and the express locker can collect the user's iris information
  • the device to be authenticated 102 can A mobile phone equipped with a fingerprint sensor can collect user's fingerprint information.
  • the controlled device 104 can be a car lock equipped with a fingerprint sensor. When the user touches the car lock, the user's fingerprint information can be collected.
  • ECG information is used as biometric information as an example for illustration, which is not considered as limiting the protection scope of the application, and is also applicable to other types of biometric information mentioned above.
  • FIG. 2 shows a schematic diagram of a mobile charging scenario according to an embodiment of the present application.
  • the smart charging vehicle that is, the authentication device
  • the charging guns are different according to the charging type. It can be divided into fast charging charging guns, slow charging charging guns, etc.; each charging gun handle is equipped with a corresponding charging gun lock (that is, a controlled device), as shown in Figure 2.
  • Each charging gun lock is equipped with an ECG sensor; the smart charging car can provide charging services for one or more users, and users who need to charge can send charging requests to the cloud server through wearable devices (that is, devices to be authenticated) information, wherein the charging request information may include one or more items of information such as the license plate number of the user's vehicle, charging address, or charging type, and the cloud server assigns a charging gun to the user according to the charging request information and generates corresponding charging service information.
  • the charging service information can include one or more of the order number, license plate number of the vehicle to be charged, charging address, charging type, charging gun identification or charging gun lock identification; the cloud server sends the charging business information to the smart phone.
  • the charging car and the user's wearable device when the smart charging car drives to the user's location, the wearable device can send the charging service information and the user's ECG information to the smart charging car.
  • the smart charging car can To obtain the user's ECG information collected by the charging gun lock, the smart charging car matches the charging service information sent by the wearable device with the charging service information sent by the cloud server, and matches the ECG information collected by the charging gun lock with the charging service information from the wearable device.
  • ECG information to complete the authentication of the user's identity, and control the corresponding charging gun lock to open after the authentication is passed, so that the user can charge; in this way, the smart charging car can realize the user's identity authentication without pre-stored user's ECG information .
  • FIG. 3 shows a schematic diagram of a smart express cabinet scene according to an embodiment of the present application.
  • the door handle of the box is equipped with a corresponding storage box lock (that is, a controlled device), as shown in Figure 3, the storage box lock 01, the storage box lock 02..., each storage box lock is equipped with an ECG sensor;
  • Pickup business information can be generated according to the relevant information of the express delivery stored in each storage box, wherein the pickup business information can include: order number, picker information, locker logo or locker logo, etc. one or more of .
  • the cloud server sends the pick-up business information to the smart express cabinet and the wearable device of the corresponding user.
  • the wearable device can send the pick-up business information and the user's ECG information to the smart express cabinet;
  • the door handle of the storage box, the smart express cabinet can obtain the user's ECG information collected by the locker lock, the smart express cabinet matches the pickup business information sent by the wearable device with the pickup business information issued by the cloud server, and Match the ECG information collected by the locker lock with the ECG information from the wearable device, complete the authentication of the user's identity, and control the corresponding locker to open after the authentication is passed, so that the user can pick up the package; in this way, the smart express The cabinet does not need to store the user's ECG information in advance to realize the user's identity authentication.
  • FIG. 4 shows a schematic diagram of an unmanned vending machine scenario according to an embodiment of the present application.
  • the unmanned vending machine that is, the authentication device
  • the handle of each shopping slot is equipped with a corresponding shopping slot lock (that is, a controlled device), as shown in Figure 4, shopping slot lock 01, shopping slot lock 02..., each shopping slot lock is equipped with an ECG sensor.
  • the wearable device worn by the user can establish a communication connection with the cloud server; the wearable device collects the user's ECG information and sends it to the cloud server, and the cloud server forwards the ECG information To the unmanned vending machine; when the user purchases goods, hold the handle of the shopping trough, the unmanned vending machine can obtain the user's ECG information collected by the shopping trough lock, and the unmanned vending machine matches the ECG information collected by the shopping trough lock With the ECG information from the wearable device, the user's identity is authenticated, and the corresponding shopping slot lock is controlled to open after the authentication is passed, so that the user can take the goods in the shopping slot; after the user finishes purchasing the goods, the unmanned vending machine Send the ECG information collected by the shopping slot lock and the shopping slot lock identification to the cloud server, and the cloud server generates the settlement business information corresponding to the shopping slot lock identification according to the pre-stored information such as the commodity price
  • the cloud server matches the ECG information collected by the shopping slot lock with the ECG information from the wearable device, thereby determining the corresponding wearable device, and sends the settlement business information to the wearable device, so that the user can check the selected Checkout for purchased items.
  • the unmanned vending machine can realize the identity authentication of the user without pre-storing the user's ECG information.
  • FIG. 5 shows a schematic diagram of a smart vehicle unlocking scenario according to an embodiment of the present application.
  • car lock 01, car lock 02... each car lock is equipped with an ECG sensor;
  • the smart car can be initialized and paired with the wearable device worn by the user (that is, the device to be authenticated) in advance, That is, the user obtains authorization for the smart vehicle in advance, and the wearable device and the smart vehicle can be configured with the same encryption algorithm; when the user arrives near the smart vehicle, the wearable device collects the user's ECG information and encrypts it using the encryption algorithm, and the wearable The device sends the encrypted information to the smart vehicle, and the smart vehicle uses an encryption algorithm to decrypt the received information to obtain the ECG information collected by the wearable device; when the user touches the door handle, the smart vehicle can obtain the ECG information collected by the car lock.
  • the smart vehicle authenticates the user's identity by matching the ECG information collected by the wearable device with the ECG information collected by the car lock, and controls the unlocking of the car lock after the authentication is passed, so that the user can use the car. In this way, the smart vehicle can realize the identity authentication of the user without storing the user's ECG information in advance.
  • the above application scenarios can be divided into service scenarios (such as the above scenario 1, scenario 2, and scenario 3) and non-service scenarios (such as the above scenario 4), wherein, in a service scenario, the server provides service information to the controlled device and the device to be authenticated, so as to instruct the controlled device to provide services for the user corresponding to the device to be authenticated; the service information can be generated by the server according to the service to be processed , or the user initiates a service request to the server through the device to be authenticated, and the server generates the service request based on the user; further, according to the time sequence relationship between the generation of business information and the authentication of the authentication device, some business scenarios can be divided into prior Scenarios of authentication after business (such as scenario 1 and scenario 2 above) and scenarios of authentication before business (such as scenario 3 above).
  • the authentication device (or controlled device) and the device to be authenticated are initialized and paired in advance.
  • Fig. 6 shows a flowchart of an authentication method according to an embodiment of the present application.
  • the method may be executed by the authentication device 101 in Fig. 1 above; as shown in Fig. 6, the method may include the following steps:
  • Step 601. The authentication device acquires first information at the first moment and second information at the first moment.
  • the first information is associated with the first biometric information
  • the first biometric information is from the first controlled device
  • the second information is associated with the second biometric information
  • the second biometric information is from the first device to be authenticated, And it is associated with the user corresponding to the first device to be authenticated.
  • the second biometric information is associated with the user corresponding to the first device to be authenticated, it may indicate that the second biometric information is the biometric information of the user corresponding to the first device to be authenticated, for example, it may be the user wearing the first device to be authenticated biometric information.
  • the user corresponding to the first device to be authenticated may include a user authorized to use the first device to be authenticated, for example, the owner of the first device to be authenticated.
  • the authentication device can control the state of at least one controlled device, and the first controlled device may be any controlled device in the at least one controlled device, for example, it may be the controlled device 104 in FIG. 1 above. Or the controlled device 105, etc.; at the first moment, the authentication device can obtain information from at least one device to be authenticated, and the first device to be authenticated can be any device to be authenticated in the at least one device to be authenticated, for example, it can be The above-mentioned device to be authenticated 102 or device to be authenticated 103 in FIG. 1 .
  • the first moment may be a certain point in time, for example, the authentication device may acquire the information associated with the first biometric information and the information associated with the second biometric information when the first controlled device collects the biometric information of the user. associated information.
  • the first moment may also be a certain period of time; for example, the authentication device may acquire information related to the first biometric information during the period from when the user approaches the first controlled device to when the first controlled device collects the user's biometric information. associated information and information associated with the second biometric information.
  • the authentication device may receive the second information sent by the first device to be authenticated, or receive the second information forwarded via the cloud server;
  • the authentication device may obtain the first biometric information collected by the first controlled device; for example, in the case where the first controlled device is set independently, the authentication device may receive the first information sent by the first controlled device, Or receive the first information forwarded by the cloud server.
  • the authentication device may send the second control information to the first controlled device, wherein, The second control information is used to control the first controlled device to collect the first biological feature information.
  • the preset threshold can be set according to actual needs, which is not limited here, for example, it can be 2m, 5m, 10m, etc.; for example, the distance between the first controlled device and the first device to be authenticated can be based on the global positioning system (Global Positioning System, GPS), laser radar ranging technology, ultra-wideband (Ultra-wideband, UWB) ranging technology, short-range communication technology, etc. to determine one or more.
  • GPS Global Positioning System
  • UWB ultra-wideband
  • the short-distance communication technology may include the technology supporting wireless short-distance communication. It can be called short-range wireless communication, including but not limited to Bluetooth (bluetooth) technology, wireless fidelity (wireless fidelity, Wi-Fi) technology, near field communication (near field communication, NFC) technology, Wi-Fi Aware technology, general Short-distance communication technology, short-distance communication technology standardized by Starlight Alliance, etc.
  • short-range wireless communication including but not limited to Bluetooth (bluetooth) technology, wireless fidelity (wireless fidelity, Wi-Fi) technology, near field communication (near field communication, NFC) technology, Wi-Fi Aware technology, general Short-distance communication technology, short-distance communication technology standardized by Starlight Alliance, etc.
  • the authentication device may obtain GPS location information of the first controlled device and GPS location information of the first device to be authenticated, so as to determine the distance between the first controlled device and the first device to be authenticated.
  • the function of the first controlled device to collect biometric information can be initially configured as off, so that when the distance between the first controlled device and the first device to be authenticated is less than a preset threshold, it indicates that the user Already approaching the first controlled device with the intention of unlocking, the authentication device controls the first controlled device to enable the biometric information collection function, so that when the user touches the first controlled device, the first controlled device can collect the user's biometrics information; at the same time, the first controlled device only enables the biometric information collection function when needed, thereby reducing the energy consumption of the first controlled device and the data processing amount of the authentication device.
  • the user when the user is close to the first controlled device, the user can trigger the first controlled device to start the biometric information collection function so as to collect the first biometric information, wherein the triggering method may include clicking a preset physical button, voice control etc.
  • the user may trigger the first device to be authenticated to start the biometric information collection function, so as to collect the second biometric information.
  • the association of the first information with the first biological feature information may mean that: the first information includes the first biological feature information, or the first information includes information obtained after processing the first biological feature information, for example, the first biological feature information
  • the information may include information obtained by encrypting the first biometric information through an encryption algorithm.
  • the association of the second information with the second biometric information means that: the second information includes the second biometric information, or the second information includes information obtained after processing the second biometric information, for example, the second information may include The encryption algorithm encrypts the information obtained by encrypting the second biometric information.
  • the encryption algorithm can be an asymmetric encryption algorithm, for example, Rivest Shamir Adleman (Rivest Shamir Adleman, RSA) encryption algorithm, elliptic curve (Elliptic Curve Cryptography, ECC) encryption algorithm, etc.; It can be a symmetric encryption algorithm, that is, an algorithm using the same password for encryption and decryption.
  • the encryption algorithm may include a first encryption algorithm from the cloud server, and may also include a second encryption algorithm from the authentication device.
  • the first information may include first biometric information
  • the second information may include second biometric information
  • the authentication device may obtain the first biometric information collected by the first controlled device, and the first The second biometric information collected by the device to be authenticated.
  • the first biometric information and the second biometric information may be the same type of biometric information, for example, the first biometric information may include first ECG information; the second biometric information may include second ECG information. information. Since the ECG information is unique, that is, the ECG information of different users is different, and the ECG information can be used to accurately distinguish different users, thereby ensuring the accuracy of identity authentication; at the same time, the user's ECG information is random at each moment.
  • ECG information is not affected by the external environment , which can be better applied to various environments.
  • the first information may include information obtained by encrypting the first biometric feature information with an encryption algorithm
  • the second information may include information obtained by encrypting the second biometric feature information with an encryption algorithm.
  • the first information may include information obtained by encrypting the first biometric information with a first encryption algorithm
  • the second information may include information obtained by encrypting the second biometric information with a first encryption algorithm; for example, the authentication device
  • the first encryption algorithm can be received; and the first biometric information collected by the first controlled device can be encrypted by the first encryption algorithm to obtain the first information; the authentication device can also receive the second information, the second information It is obtained by encrypting the second biometric information collected by the first device to be authenticated by using the first encryption algorithm.
  • the authentication device receives the first encryption algorithm from the cloud server, so as to encrypt the biometric information collected by the first controlled device, and both the first information and the second information include the encrypted biometric information, which further improves the Information Security.
  • the first information may include information obtained by encrypting the first biometric information with a second encryption algorithm
  • the second information may include information obtained by encrypting the second biometric information with a second encryption algorithm
  • the device can generate a second encryption algorithm, and send the second encryption algorithm to the first device to be authenticated;
  • the authentication device can use the second encryption algorithm to encrypt the first biometric information collected by the first controlled device, thereby obtaining First information;
  • the authentication device may also receive second information, which is obtained by encrypting the second biometric information collected by the first device to be authenticated by using a second encryption algorithm.
  • the authentication device generates and sends a second encryption algorithm to the first device to be authenticated.
  • the second encryption algorithm is used to encrypt the biometric information collected by the first controlled device and the biometric information collected by the first device to be authenticated. Both the first information and the second information include encrypted biometric information, which further improves information security.
  • the first information may include information obtained by encrypting the first biological feature information by using an encryption algorithm
  • the second information may include the second biological feature information.
  • the first information can be the information obtained by the authentication device encrypting the first biometric information through the first encryption algorithm, and the second information is the second biometric information; The information obtained by encrypting the first biometric feature information, and the second information is the second biometric feature information.
  • the first information may include first biometric information
  • the second information may include information obtained by encrypting the second biometric information through an encryption algorithm
  • the first information is the first biometric information
  • the second information It is the information obtained by encrypting the second biometric information by the first device to be authenticated by the first encryption algorithm
  • the first information is the first biometric information
  • the second information is the information obtained by the first device to be authenticated by the second encryption algorithm.
  • Step 602 the authentication device matches the first information with the second information.
  • the authentication device may determine a corresponding difference between the first information and the second information by using a least squares algorithm, and if the difference is smaller than a corresponding preset threshold, it may determine that the first information and the second information match successfully, Otherwise, it is determined that the matching between the first information and the second information fails.
  • the authentication device can also perform Fourier transform on the first information and the second information respectively, and obtain the peak values of multiple frequencies corresponding to the first information, and the peak values of multiple frequencies corresponding to the second information, and obtain two peak values of the same frequency. peak value, if the difference is less than the corresponding preset threshold, it can be determined that the first information and the second information match successfully, otherwise, it can be determined that the first information and the second information have failed to match.
  • the authentication device can also compare the first information with the second information to obtain the corresponding similarity. When the similarity is greater than the corresponding preset threshold, it can determine that the first information and the second information match successfully; otherwise, it can determine that the first information Failed to match with the second information; wherein, the above-mentioned preset thresholds can be set according to actual needs, which is not limited.
  • the authentication device can compare the first biometric information with the second biometric information, and if the corresponding difference is less than the preset threshold, it is determined that the first information matches the second information successfully; otherwise, it is determined that the first information matches the second information failed.
  • the authentication device can compare the first information and the second information, if the corresponding difference is less than the preset threshold, indicating that the first biometric information is consistent with the second biometric information, and the corresponding encryption algorithm is the same, it is determined that the first information and the second information are successfully matched; otherwise, It is determined that the matching between the first information and the second information fails.
  • the authentication device may respectively decrypt the first information and the second information according to the encryption algorithm, and if the decryption is successful, compare the decrypted first biometric information with the decrypted second biometric information, and if the corresponding difference is less than If the threshold is preset, it is determined that the first information matches the second information successfully; otherwise, it is determined that the first information matches the second information failed.
  • the authentication device can decrypt the second information according to the encryption algorithm, if the decryption If it succeeds, compare the first biometric information with the decrypted second biometric information, and if the corresponding difference is smaller than the preset threshold, it is determined that the first information and the second information match successfully; otherwise, it is determined that the first information and the second information Information matching failed.
  • the authentication device can decrypt the first information and compare the second biometric information and the first biometric information obtained through decryption, so as to determine whether the matching between the first information and the second information succeeds or fails.
  • the first biometric information List1 can be represented as: List1 ⁇ [time1, value1]>
  • the second biometric information List2 can be represented as: List2 ⁇ [time1, value2]>; where time1 represents the first moment, value1 and value2 are respectively the biometric values collected by the first controlled device and the first device to be authenticated or a sequence of values with the same duration.
  • the authentication device compares value1 and value2. For example, the authentication device can use the least square method to determine the difference between value1 and value2. If the difference is less than the preset threshold, it determines that value1 and value2 match successfully; otherwise, value1 and value2 fail to match.
  • the authentication device can also perform Fourier transform on value1 to obtain the peak sequence [F11, F12, F13,...,F1n] corresponding to the first-order frequency to n-order frequency, and perform Fourier transform on value2 to obtain the first-order
  • the information List1_new obtained by encrypting the first biological feature information List1 through an encryption algorithm can be expressed as: List1_new ⁇ [time1, newValue1]>
  • the information List2_new obtained by encrypting the second biological feature information List2 through an encryption algorithm can be expressed as : List2_new ⁇ [time1,newValue2]>, where newValue1 and newValue2 are the values or sequence of values after encrypting value1 and value2 respectively; you can refer to the above method to match newValue1 and newValue2, or you can match newValue1 and / or newValue2 is decrypted and then matched.
  • the authentication device may send control information to the first controlled device to disable the biometric information collection function, so as to instruct the first controlled device to stop collecting biometric information, thereby saving the second The energy consumption of a controlled device.
  • Step 603 the authentication device controls the state of the first controlled device according to the matching result of the first information and the second information.
  • the matching result may include matching success and matching failure;
  • the state of the first controlled device may include an open state or an closed state.
  • the authentication device may send first control information, where the first control information is used to control the first controlled device to be in an open state.
  • the first controlled device may be a first smart lock
  • the authentication device may control the opening of the first smart lock when the first information and the second information match successfully.
  • the successful matching of the first information and the second information indicates that the identity authentication of the user corresponding to the first device to be authenticated has passed, and the user expects to be served by the device corresponding to the first smart lock, then the authentication device can control the first smart lock to be in the Open state, so that the user can get the corresponding service.
  • the first controlled device when the first information fails to match the second information, the state of the first controlled device remains unchanged, for example, the state of the first controlled device is initially configured as an off state , the first controlled device can be the first smart lock; the failure to match the first information and the second information indicates that the user identity authentication corresponding to the first device to be authenticated has not passed, and there is no right to obtain the corresponding service, and the state of the first smart lock remains closed state.
  • the authentication device after controlling the state of the first controlled device, sends the identification information of the first controlled device and the second information to the cloud server, and the identification information of the first controlled device and the second information
  • the information is at least used to generate settlement information corresponding to the first device to be authenticated.
  • the settlement information indicates that the user obtains information related to fees generated by the service provided by the first controlled device, and the fees and first information corresponding to each controlled device can be pre-stored in the cloud server.
  • the settlement information can be the above-mentioned scenario 4 Billing business information in .
  • the authentication device sends the identification information of the first controlled device and the second information to the cloud server, the identification information of the first controlled device is used to determine the service fee generated by the first controlled device, and the second information is used to communicate with the second information.
  • the first information is matched, so that the fee is determined to be the fee generated by the user corresponding to the first device to be authenticated to obtain the service provided by the first controlled device.
  • the authentication device may send the identification information and the second information of the multiple controlled devices to the cloud server, so as to uniformly generate settlement information corresponding to the first device to be authenticated.
  • the authentication device does not need to pre-store the user's biometric information, and matches the acquired first information and second information at the same time, and controls the first controlled device according to the matching result. state, thereby realizing the user identity authentication corresponding to the first device to be authenticated, and avoiding the leakage risk of pre-stored user biometric information, improving information security, and ensuring user privacy.
  • the authentication device can obtain the biometric information from each device to be authenticated at the first moment, and for any device to be authenticated, the information from The biometric information of the device to be authenticated is sequentially matched with the biometric information collected by each controlled device. If the matching is successful, it indicates that the user has obtained the service authorization from the cloud server or the authentication device in advance.
  • the controlled device is in the open state, so that the authentication device can simultaneously authenticate the users corresponding to multiple devices to be authenticated, and can control multiple controlled devices to be in the open state at the same time, so as to realize the simultaneous authentication of multiple identities. Users provide services.
  • one authentication device can simultaneously authenticate multiple user identities, which saves costs.
  • the wearable device a worn by user A can send the collected ECG information to the cloud server, and the cloud server forwards the ECG information to For an unmanned vending machine, user A is authorized to purchase goods.
  • the shopping trough lock 03 can collect user A’s ECG information, and the unmanned vending machine can obtain the shopping The user's ECG information collected by the slot lock 03; the unmanned vending machine can successfully match the ECG information collected by the shopping slot lock 03 with the ECG information from the wearable device a, indicating that user A is an authorized service object and is shopping For the goods in the shopping trough corresponding to the shopping trough lock 03, the unmanned vending machine controls the opening of the shopping trough lock 03, so that user A can take the goods in the shopping trough; the unmanned vending machine sends the heart rate collected by the shopping trough lock 03 to the cloud server Electronic information and shopping slot lock 03 logo, the cloud server generates settlement business information corresponding to shopping slot lock 03 according to the pre-stored information such as commodity prices corresponding to each shopping slot lock logo.
  • the cloud server matches the ECG information collected by the shopping slot lock 03 with the ECG information from the wearable device a, thereby determining the corresponding wearable device a, and sends the settlement business information to the wearable device a, so that the user A makes the settlement.
  • the unmanned vending machine can realize the user's identity authentication without storing the user's ECG information in advance, which improves the security of information.
  • different users can touch different shopping trough handles. For any user, the unmanned vending machine can successfully match the handles touched by the user.
  • the ECG information collected by the shopping trough lock and the ECG information from the user's wearable device can control the opening of multiple shopping trough locks, so that multiple users can purchase goods at the same time, and the user does not need to queue up, which saves the user's time and improves the user experience.
  • user B has obtained the authorization to use the smart vehicle in advance, and the wearable device b worn by user B is configured with the same encryption algorithm as the smart vehicle; when user B arrives near the smart vehicle, the wearable device b b collects the ECG information of user B and encrypts it using the above-mentioned encryption algorithm.
  • the wearable device b sends the encrypted information to the smart vehicle, and the smart vehicle uses the encryption algorithm to decrypt the received information to obtain the information collected by the wearable device b.
  • the authentication device controls car lock 01 to enable the ECG information collection function
  • the smart The vehicle can obtain the ECG information collected by the car lock 01, and the smart vehicle can successfully match the ECG information collected by the wearable device b with the ECG information collected by the car lock 01, indicating that user B is an authorized user, and the smart vehicle controls the car
  • the lock 01 is opened for the user to use the vehicle. In this way, the smart vehicle can realize the identity authentication of the user without storing the user's ECG information in advance, which improves the security of information.
  • different users can touch different door handles.
  • the smart vehicle can successfully match the ECG information collected by the door lock touched by the user with the ECG information from the user.
  • the ECG information of the wearable device can control the opening of multiple door locks, enabling multiple users to open and unlock the door at the same time.
  • the smart vehicle can also update the encryption algorithm to ensure the timeliness of the encryption algorithm, and send the updated encryption algorithm to the wearable device for use when unlocking next time.
  • Fig. 7 shows a flow chart of another authentication method according to an embodiment of the present application.
  • this method may be executed by the authentication device 101 in Fig. 1 above; as shown in Fig. 7, this method may include the following steps :
  • Step 701 the authentication device acquires third information and fourth information.
  • the third information is associated with the first business information
  • the first business information is the business information provided by the cloud server for the first controlled device
  • the fourth information is associated with the second business information
  • the second business information is that the cloud server is Service information provided by the first device to be authenticated.
  • the association of the third information with the first business information may indicate that: the third information includes the first business information, or the third information includes information obtained after processing the first business information, for example, the third information may include The encryption algorithm encrypts the first service information to obtain information.
  • the association between the fourth information and the second business information means that: the fourth information includes the second business information, or the fourth information includes the information obtained after processing the second business information, for example, the fourth information may include Information obtained by encrypting the second service information.
  • the encryption algorithm may include a first encryption algorithm from the cloud server, and may also include a second encryption algorithm from the authentication device.
  • the third information may include the first service information, and the fourth information may include the second service information; as another example, the third information may include information obtained by encrypting the first service information through an encryption algorithm, and the fourth information It may include the information obtained by encrypting the second business information through an encryption algorithm; as another example, the third information may include the information obtained by encrypting the first business information through an encryption algorithm, and the fourth information may include the second business information; as another In one example, the third information may include the first service information, and the fourth information may include information obtained by encrypting the second service information by using an encryption algorithm.
  • the service information represents the service-related information pre-allocated by the cloud server to instruct the target controlled device to provide services for the user corresponding to the target device to be authenticated, that is, the user corresponding to the target device to be authenticated is the authorized service object of the target controlled device.
  • the service information may be the charging service information in the above-mentioned scenario 1, or the pickup service information in the above-mentioned scenario 2, and so on.
  • the cloud server may provide the service information to the corresponding target device to be authenticated and the target controlled device in advance.
  • the first service information may indicate that the first controlled device can provide a service for a user corresponding to the target device to be authenticated
  • the second service information may indicate that the user corresponding to the first device to be authenticated can obtain the service of the corresponding target controlled device.
  • the authentication device may receive third information from the cloud server, and may also receive fourth information from the first device to be authenticated.
  • the authentication device may receive the third information in advance before receiving the fourth information, and pre-save the third information locally, for example, the authentication device may store the third information in a white list.
  • the authentication device may pre-obtain service information provided by the cloud server for one or more controlled devices, and store each service information in a white list.
  • Step 702 the authentication device matches the third information with the fourth information.
  • the authentication device may match the second service information with the first service information in the whitelist. It can be understood that when storing multiple pieces of business information in the white list, the second business information can be matched with each business information in sequence until the matching is successful, or all the business information in the white list can be traversed.
  • the first service information may include identification information of the first controlled device; the second service information may include identification information of the target controlled device. It can be understood that if the identification information of the target controlled device is the same as the identification information of the first controlled device, it means that the first service information and the second service information are the same service information, and the first controlled device can be The first device to be authenticated corresponds to a target controlled device for the user to provide services.
  • the authentication device can determine whether the second service information and the first service information are the same service information by matching the third information and the fourth information, that is, determine whether the user corresponding to the first device to be authenticated is the first The authorized service object of the controlled device, so as to realize authorization authentication.
  • step 601 for specific instructions on how the authentication device acquires the first information and the second information, reference may be made to relevant expressions in the above-mentioned step 601, which will not be repeated here.
  • the authentication device may further obtain the first information and the second information.
  • the authentication device may send third control information to the first controlled device, and the third control information is used to control the first controlled device Collect first biometric information.
  • the function of the first controlled device to collect biometric information is initially configured as off, so that if the third information and the fourth information match successfully, it indicates that the first controlled device is the first device to be authenticated
  • the corresponding user provides services, and the user intends to unlock the first controlled device, and the authentication device controls the first controlled device to enable the biometric information collection function, so that when the user touches the first controlled device, the first controlled device
  • the biometric information of the user can be collected; at the same time, the first controlled device only enables the biometric information collection function when needed, thereby reducing the energy consumption of the first controlled device and the data processing amount of the authentication device.
  • the authentication device may feed back the information that the matching is successful to the first device to be authenticated, so as to obtain the second information from the first device to be authenticated .
  • the matching of the third information and the fourth information fails, it indicates that the second business information is not the same business information as the first business information, that is, the user corresponding to the first device to be authenticated is not the user of the first controlled device. If the service object is authorized, the authentication device may not process the second information from the first device to be authenticated, thereby reducing the amount of data processing.
  • Step 704 the authentication device matches the first information with the second information.
  • step 602 For a specific description of this step, reference may be made to the relevant expression of the above-mentioned step 602, which will not be repeated here.
  • Step 705 the authentication device controls the state of the controlled device according to the matching result between the first information and the second information.
  • the authentication device matches the third information with the fourth information by performing the above steps 701-705, thereby realizing authorization authentication. If the third information and the fourth information are successfully matched, it indicates that the second business information is equal to the first business information.
  • the same business information, that is, the user corresponding to the first device to be authenticated is the authorized service object of the first controlled device; then, if the authorization authentication passes, the authentication device obtains the first information and the second information and performs matching, and according to the matching
  • the state of the first controlled device is controlled, and the authentication device can realize the identity authentication of the user corresponding to the first device to be authenticated without storing the user's biometric information in advance, thereby ensuring that the user corresponding to the first device to be authenticated opens the
  • the first controlled device avoids the leakage risk of pre-stored user biometric information, improves information security, and protects user privacy.
  • the authentication device can obtain business information from multiple devices to be authenticated, and for any device to be authenticated, the cloud The service information provided by the server for the device to be authenticated is sequentially matched with the service information provided by the cloud server for each controlled device, so as to simultaneously authorize and authenticate users corresponding to multiple devices to be authenticated.
  • the authentication device obtains the biometric information collected by the device to be authenticated, and the biometric information collected by the corresponding target controlled device.
  • the authentication device will control the target controlled device to be in the open state, otherwise, the target controlled device will remain in the closed state; thereby realizing simultaneous authentication of users corresponding to multiple devices to be authenticated Identity authentication, and ensure that the corresponding target controlled device is opened by the user corresponding to the device to be authenticated; and, at the same time, users corresponding to multiple devices to be authenticated can open their corresponding target controlled devices, so as to realize simultaneous Multiple users provide services.
  • authorization authentication and identity authentication of multiple users can be performed at the same time, and services can be provided to multiple authenticated users at the same time, which improves authentication efficiency and user experience.
  • one authentication device can simultaneously authenticate multiple user identities, which saves costs.
  • the cloud server when the vehicle driven by user C needs to be charged, user C can send charging request information to the cloud server through the wearable device c worn by user C, and the cloud server will allocate a smart charging car according to the charging request information of the user.
  • the charging gun corresponding to charging gun lock 01 provides charging service for user C and generates corresponding charging service information.
  • the charging service information includes the identification of charging gun lock 01; Wearable device c; the smart charging car stores the charging service information in the white list, the smart charging car drives to the location indicated in the charging service information, and the wearable device c sends the charging service information and collected user C's information to the smart charging car. ECG information.
  • the smart charging car matches the charging service information sent by the received wearable device c with the charging service information in the white list, and the charging service information including the charging gun lock 01 logo is successfully matched with the charging service information sent by the charging gun lock 01 , so that the smart charging car can confirm that user C is the authorized service object of the smart charging car, and the charging gun corresponding to the charging gun lock 01 provides charging service for user C, and then the smart charging car sends control information to the charging gun lock 01 to control charging Gunlock 01 enables the ECG information collection function.
  • User C can pull out the charging gun equipped with the smart charging car to charge his own vehicle; if user C pulls out the charging gun corresponding to the charging gun lock 01, the charging gun lock 01 can collect the ECG information of user C and send it to the smart charging car, and the smart charging The car can successfully match the ECG information collected by the charging gun lock 01 with the received ECG information from the wearable device c, indicating that user C is pulling out the charging gun corresponding to the charging gun lock 01, and the smart charging car controls the charging gun lock 01 is turned on for user C to charge.
  • the ECG information collected by charging gun lock 01 fails to match the ECG information from wearable device c, indicating that user C is not pulling out the charging gun corresponding to charging gun lock 01.
  • Charging gun lock 01 remains closed.
  • the smart charging car can realize the user's identity authentication without pre-storing the user's ECG information, which improves the security of information.
  • different users can pull out different charging guns.
  • the smart charging car can control the opening of multiple charging gun locks to realize multi-user synchronous charging .
  • the locker corresponding to the locker 02 stores the courier of user D
  • the cloud server generates the corresponding pickup service information and encryption algorithm.
  • the pickup service information includes the locker lock 02
  • the cloud server sends the pickup service information and encryption algorithm to the smart express cabinet and user D’s wearable device d
  • the smart express cabinet stores the pickup service information in the white list.
  • wearable device d collects user D's ECG information and encrypts it using the above encryption algorithm, and wearable device d sends the pick-up business information and encrypted information to the smart express cabinet.
  • the smart express cabinet matches the pickup service information received from the wearable device d with the pickup service information in the whitelist, including the pickup service information identified by locker 02 and the pickup service information sent by the wearable device d.
  • the business information of the package is successfully matched, so that the smart express cabinet can confirm that user D is the authorized service object of the smart express cabinet, and the storage box corresponding to the storage box lock 02 contains the express delivery of user D, and then the smart express cabinet can send
  • the box lock 02 sends control information to control the storage box lock 02 to enable the ECG information collection function.
  • User D touches the door handle of the storage box. If user D touches the door handle of the storage box corresponding to the storage box lock 02, the storage box lock 02 can collect the ECG information of user D and send it to the smart express cabinet.
  • the smart express cabinet controls the storage box lock 02 to open so that the user D can take the express delivery. If another user touches the door handle of the storage box corresponding to the storage box lock 02, the smart express cabinet encrypts the ECG information collected by the storage box lock 02, and the encrypted information and the encrypted information from the wearable device d If the matching fails, it means that the user D is not touching the handle of the storage box door corresponding to the storage box lock 02, and the storage box lock 02 remains closed.
  • the smart express cabinet can realize the user's identity authentication without pre-storing the user's ECG information, which improves the security of information.
  • different users can touch different locker door handles. Open the corresponding storage box lock, and other users cannot open the storage box lock, so as to prevent other users from taking the user's courier, thereby ensuring that each user can take his own courier; and, at the same time, multiple
  • the smart express cabinet can control the locks of multiple lockers to open, realizing the simultaneous pick-up of multiple users.
  • the authentication device may clear the acquired information (such as one or more of biometric information, encryption algorithm, or business information, etc.), so that Avoid information leakage and ensure information security.
  • the authentication device may clear relevant information after performing the above step 603 or step 705 .
  • the authentication device may clear the first information and the second information after controlling the state of the first controlled device. It can be understood that after the authentication device controls the state of the first controlled device, the user's identity authentication has been completed. Since the first information and the second information include the user's biometric information, the authentication device does not need to store the first information and the second information. The second information, clear the first information and the second information in time, so as to avoid information leakage, protect user privacy, and save storage space at the same time.
  • the authentication device may clear the encryption algorithm.
  • the encryption algorithm may include the first encryption algorithm or the second encryption algorithm.
  • the encryption algorithm used by the authentication device in each authentication process can be different.
  • the authentication device can clear the business information; for example, the authentication device can clear the business information provided by the cloud server for the first controlled device, and can also clear the received The service information from the first device to be authenticated.
  • the authentication device controls the state of the first controlled device the user's authorization authentication has been completed. Since the business information may include the user's personal information, the authentication device clears the business information; thereby avoiding information leakage, protecting user privacy, and saving storage space.
  • the smart charging car can clear the charging service information provided by the cloud server for the charging gun lock 01, or the charging service information from the wearable device c. Charging business information.
  • the smart express cabinet can clear the encryption algorithm, and can also clear the pickup business information provided by the cloud server for the storage box lock 02 Or pickup business information from wearable device d.
  • the unmanned vending machine can clear the ECG information collected by the shopping slot lock 03 or the ECG information from the wearable device a. ECG information.
  • the smart vehicle can clear the encryption algorithm, and also clear the ECG information collected by car lock 01 or the ECG information from wearable device b.
  • Fig. 8 shows a flowchart of another authentication method according to an embodiment of the present application.
  • the method may be executed by the device to be authenticated (such as the device to be authenticated 102) in Fig. 1 above, as shown in Fig. 8 , the method may include the following steps:
  • Step 801 the first device to be authenticated collects second biometric information at the first moment, and the second biometric information is associated with a user corresponding to the first device to be authenticated.
  • the second biometric information may include second electrocardiographic information
  • the first device to be authenticated is configured with an electrocardiographic sensor
  • the electrocardiographic sensor is used to collect the second electrocardiographic information. Since the ECG information is unique, that is, the ECG information of different users is different, the ECG information can be used to accurately distinguish different users, thereby ensuring the accuracy of user identity authentication; at the same time, the user's ECG information is random at each moment , can not replicate the simulation, using ECG information for identity authentication is more secure and reliable; in addition, compared with other biometric information that is greatly affected by the external environment, ECG information is not affected by the external environment and can be better applicable to various environments .
  • the first device to be authenticated collects the second biometric feature information.
  • the manner in which the first device to be authenticated determines that the distance between the first controlled device and the first device to be authenticated is smaller than the preset threshold may refer to the relevant expressions in the above step 601.
  • the function of the first device to be authenticated to collect biometric information can be initially configured as off, so that when the distance between the first controlled device and the first device to be authenticated is less than a preset threshold, it indicates that the user already close to the first controlled device and has the intention of unlocking, the first device to be authenticated starts the biometric information collection function in order to collect the biometric information; at the same time, the first device to be authenticated only starts the biometric information collection function when needed, thereby reducing The energy consumption of the first device to be certified and the data processing capacity of the certified device are calculated.
  • the user may trigger the first device to be authenticated to start the biometric information collection function.
  • the first device to be authenticated may receive fourth information from the cloud server, the fourth information is associated with the second service information corresponding to the first device to be authenticated, and the fourth information is at least used for Matching with the third information, the third information is associated with the first service information corresponding to the first controlled device.
  • the first service information may include identification information of the first controlled device; the second service information may include identification information of the target controlled device.
  • the first device to be authenticated may send the fourth information; for example, the first device to be authenticated may send the fourth information to the authentication device, or send the fourth information to the cloud server, and forward the fourth information to the authentication device through the cloud server; exemplary Specifically, when the distance between the first controlled device and the first device to be authenticated is smaller than a preset threshold, the first device to be authenticated may send fourth information.
  • the first device to be authenticated may send service request information to the cloud server, where the service request information is at least used to request acquisition of service information corresponding to the first device to be authenticated.
  • the user can send charging request information to the cloud server through the wearable device, so as to obtain the charging service information assigned by the cloud server to the wearable device.
  • the first device to be authenticated may receive the information of the successful matching fed back by the authentication device, so that the biometric information collection function may be enabled, and according to the collected second The biometric information generates second information.
  • the function of the first device to be authenticated to collect biometric information can be initially configured to be off. In this way, if the third information and the fourth information match successfully, it indicates that the first controlled device is the first device to be authenticated.
  • the user provides services, and the user has the intention to unlock the first controlled device, the first device to be authenticated starts the biometric information collection function, so as to collect the user's biometric information; at the same time, the first device to be authenticated only turns on the biometric
  • the feature information collection function reduces the energy consumption of the first device to be certified and the data processing amount of the certified device.
  • Step 802 the first device to be authenticated sends second information, the second information is associated with the second biological feature information, the second information is at least used to match the first information, and the first information is related to the first biological feature at the first moment The information is associated, and the first biometric information comes from the first controlled device.
  • the first device to be authenticated may send the second information to the authentication device, or send the second information to the cloud server, and forward the second information to the authentication device through the cloud server.
  • the first device to be authenticated may send the second information and the fourth information at the same time.
  • the first device to be authenticated may receive an encryption algorithm; and then use the encryption algorithm to encrypt the collected second biometric information to obtain the second information, and send the second information to the authentication equipment.
  • the device to be authenticated may receive the first encryption algorithm from the cloud server, or the second encryption algorithm from the authentication device. In this way, the first authentication device receives the encryption algorithm, so as to encrypt the collected biometric information, thereby improving the security of the information.
  • the first device to be authenticated may receive settlement information corresponding to the first device to be authenticated.
  • the first device to be authenticated may receive settlement information sent from the cloud server, so that the user corresponding to the first device to be authenticated can perform settlement.
  • the first device to be authenticated can also receive feedback information from the authentication device, for example, the feedback information of successful matching; further, the first device to be authenticated can clear the second information, the fourth information or encryption algorithm, so as to avoid information leakage, ensure information security, and save storage space at the same time.
  • the first device to be authenticated collects the second biometric information at the first moment, and sends the second information associated with the second biometric information, and the second information is used to perform authentication with the first information at the same moment.
  • the user identity authentication corresponding to the first device to be authenticated can be realized without pre-storing the user's biometric information, and at the same time, the risk of leakage of the pre-stored user's biometric information is avoided, and the security of information is improved. , protecting user privacy.
  • the embodiment of the present application also provides another authentication system, which may include an authentication device and a cloud server, wherein the cloud server is configured to send the third information to the first controlled device, and send the third information to the first device to be authenticated.
  • Sending fourth information wherein, the third information is associated with the first business information, and the first business information is the business information provided by the cloud server for the first controlled device; the fourth information is associated with the second business information, and the second business information
  • the information is service information provided by the cloud server for the first device to be authenticated.
  • the authentication device is configured to receive fourth information from the first device to be authenticated; match the third information with the fourth information; and obtain the first information and the second information at the first moment; match the first information with the second information; control the state of the first controlled device according to the matching result of the first information and the second information; wherein, the first information and the first Biometric information is associated, the first biometric information comes from the first controlled device, the second information is associated with the second biometric information, the second biometric information comes from the first device to be authenticated, and is associated with the first device to be authenticated the corresponding user.
  • the cloud server sends the third information to the first controlled device, and sends the fourth information to the first device to be authenticated, and the authentication device receives the fourth information from the first device to be authenticated, and the third information Match with the fourth information to realize authorization authentication. If the third information and the fourth information match successfully, it indicates that the second business information and the first business information are the same business information, that is, the user corresponding to the first device to be authenticated is the first The authorized service object of the controlled device; when the authorization authentication is passed, the authentication device obtains the first information and the second information and performs matching, and controls the state of the first controlled device according to the matching result.
  • the authentication device does not need to pre-store the user's Biometric information can realize the identity authentication of the user corresponding to the first device to be authenticated, thereby ensuring that the user corresponding to the first device to be authenticated turns on the first controlled device, and at the same time avoids the existence of pre-stored user's biometric information The risk of leakage is reduced, the security of information is improved, and the privacy of users is guaranteed.
  • the above authentication system may further include a first device to be authenticated, and the first device to be authenticated is configured to execute the steps of the above authentication method shown in FIG. 8 .
  • the first biometric information may include first electrocardiographic information
  • the second biometric information may include second electrocardiographic information. Since the ECG information is unique, that is, the ECG information of different users is different, and the ECG information can be used to accurately distinguish different users, thereby ensuring the accuracy of identity authentication; at the same time, the user's ECG information is random at each moment. Simulation cannot be copied, and it is safer and more reliable to use ECG information for identity authentication; in addition, compared with other biometric information that is greatly affected by the external environment, ECG information is not affected by the external environment and can be better applied to various environments.
  • the first service information may include identification information of the first controlled device; the second service information may include identification information of the target controlled device.
  • the target controlled device may be a device allocated by the cloud server to provide services for the user corresponding to the first device to be authenticated.
  • the first controlled device may include a first smart lock; the authentication device is further configured to: when the first information and the second information match successfully, send first control information, and the first control information is used to Control the first smart lock to be in the open state.
  • the successful matching of the first information and the second information indicates that the identity authentication of the user corresponding to the first device to be authenticated has passed, and the user expects to be served by the device corresponding to the first smart lock, then the authentication device can control the first smart lock to be in the Open state, so that the user can get the corresponding service.
  • the authentication device is further configured to: when the distance between the first controlled device and the first device to be authenticated is smaller than a preset threshold, send the second Control information, the second control information is used to control the first controlled device to collect the first biological feature information.
  • the function of the first controlled device to collect biometric information can be initially configured as off, so that when the distance between the first controlled device and the first device to be authenticated is less than a preset threshold, it indicates that the user has approached the first controlled device and has the intention to unlock, the authentication device controls the first controlled device to enable the biometric information collection function, so that when the user touches the first controlled device, the first controlled device can collect the user's first Biological feature information; at the same time, the first controlled device only enables the biometric information collection function when needed, thereby reducing the energy consumption of the first controlled device and the data processing amount of the authentication device.
  • the cloud server is further configured to: receive service request information; and generate third information and fourth information according to the service request information.
  • the service request information may come from the first device to be authenticated, and the cloud server allocates existing available service resources according to the service request information, and generates third information and fourth information, so as to meet user needs.
  • the cloud server after receiving the charging request information sent by the wearable device worn by the user, the cloud server allocates a suitable charging gun for the user according to the user's charging request and available charging gun resources, and generates corresponding service Information, and then the business information can be sent to the smart charging car and the wearable device worn by the user respectively.
  • the cloud server is further configured to: generate the third information and the fourth information according to the business to be processed; for example, in the second scenario above, the cloud server may Store the relevant information of the express delivery, generate the pick-up business information, and then send the pick-up business information to the smart express cabinet and the wearable device of the corresponding picker respectively.
  • the first information may include information obtained by encrypting the first biological feature information through the first encryption algorithm
  • the second information may include information obtained by encrypting the second biological feature information through the first encryption algorithm.
  • the obtained information; the cloud server is further configured to: send the first encryption algorithm to the authentication device, and send the first encryption algorithm to the first device to be authenticated; the authentication device is also configured to: receive the first encryption algorithm.
  • the cloud server can generate an encryption algorithm and send the encryption algorithm to the authentication device and the device to be authenticated, so as to encrypt the biometric information collected by the device to be authenticated or the controlled device; the first information and/or the second information both include The information after encrypting the biometric information further improves the security of the information.
  • the cloud server can generate an encryption algorithm and send the encryption algorithm to the authentication device and the device to be authenticated.
  • business information may correspond to an encryption algorithm, that is, different business information corresponds to a different encryption algorithm; when the cloud server generates business information, it may generate a corresponding encryption algorithm, and the business information and the encryption algorithm may be , respectively sent to the corresponding authentication device and the device to be authenticated.
  • the authentication device After the authentication device receives the business information provided by the cloud server for multiple controlled devices and the corresponding multiple encryption algorithms, for the biometric information collected by any controlled device, the authentication device can use the business information related to the controlled device
  • the corresponding encryption algorithm is used for encryption.
  • the first information may include information obtained by encrypting the first biometric information with a second encryption algorithm
  • the second information may include information obtained by encrypting the second biometric information with a second encryption algorithm.
  • Encrypt the obtained information; the authentication device is further configured to: generate a second encryption algorithm; send the second encryption algorithm to the first device to be authenticated.
  • the second encryption algorithm is used to encrypt the biometric information collected by the first controlled device and the biometric information collected by the first device to be authenticated, the first information and the second information both include encrypted biometric information, and further Improved information security.
  • the authentication device may generate an encryption algorithm and send the encryption algorithm to the device to be authenticated for initial pairing.
  • the second encryption algorithm is time-sensitive, and the authentication device may update the encryption algorithm after each authentication, thereby improving the security of encrypted information during each authentication process.
  • the authentication device is further configured to: send the identification information and the second information of the first controlled device to the cloud server after controlling the state of the first controlled device; the cloud server is further configured It is used to: receive the identification information of the first controlled device and the second information; determine the first device to be authenticated according to the second information; generate the corresponding service information of the first device to be authenticated according to the service information corresponding to the identification information of the first controlled device. Settlement information; send the settlement information to the first device to be authenticated.
  • the settlement information may represent the cost-related information generated by the user to obtain the service provided by the first controlled device, and the cloud server may pre-store the cost-related information generated by the service provided by each controlled device and the information forwarded by the cloud server.
  • the information forwarded via the cloud server may include the first information.
  • the authentication device sends the identification information of the first controlled device and the second information to the cloud server.
  • the cloud server may determine according to the identification information of the first controlled device that the first controlled device provides a service. and match the second information with the information forwarded by the cloud server. The second information is successfully matched with the first information, so it is determined that the fee is what the user corresponding to the first device to be authenticated obtains from the service provided by the first controlled device. The generated fee is then sent to the first device to be authenticated, so that the user corresponding to the first device to be authenticated can make settlement.
  • the authentication device may send the identification information and the second information of the multiple controlled devices to the cloud server, and the cloud server uniformly generates the first to-be-authenticated device.
  • the settlement information corresponding to the authentication device is sent to the first device to be authenticated, so that the user can perform unified settlement.
  • the cloud server after the cloud server generates the settlement information corresponding to the first device to be authenticated, it can send the settlement information to the first device to be authenticated after a preset time interval, thereby realizing shopping first and then settlement, and improving the user experience. experience.
  • the authentication device is further configured to: clear the first information and the second information after controlling the state of the first controlled device. It can be understood that after the authentication device controls the state of the first controlled device, the user's identity authentication has been completed. Since the first information and the second information include the user's biometric information, the authentication device does not need to store the first information and the second information. The second information, clear the first information and the second information in time, so as to avoid information leakage, protect user privacy, and save storage space at the same time.
  • the authentication device is further configured to: clear the encryption algorithm after controlling the state of the first controlled device.
  • the encryption algorithm may include the first encryption algorithm or the second encryption algorithm. After the authentication device controls the state of the first controlled device, the user's identity authentication has been completed, and the authentication device can clear the encryption algorithm, thereby avoiding the leakage of the encryption algorithm, ensuring information security, and saving storage space.
  • the authentication device is further configured to: clear the service information after controlling the state of the first controlled device. After the authentication device controls the state of the first controlled device, the user's authorization authentication has been completed. Since the business information may include the user's personal information, the authentication device clears the business information; thereby avoiding information leakage, protecting user privacy, and saving storage space.
  • the embodiment of the present application also provides another authentication system, which may include an authentication device and a device to be authenticated, wherein the authentication device is configured to execute the steps of the authentication method shown in FIG. 6 or FIG. 7 above,
  • the device to be authenticated is configured to execute the steps of the above authentication method shown in FIG. 8 .
  • the embodiment of the present application also provides another authentication system, which may include an authentication device, a device to be authenticated, and a controlled device, wherein the authentication device is configured to execute the above-mentioned authentication method shown in FIG. 6 or FIG. 7
  • the device to be authenticated is configured to execute the steps of the authentication method shown in FIG. 8 above, and the controlled device is used to collect the first biometric information at the first moment.
  • the embodiments of the present application further provide an authentication device, which is configured to implement the technical solution described in the above-mentioned method embodiments. For example, each step of the above method shown in FIG. 6 or FIG. 7 may be executed.
  • Fig. 9 shows a structural diagram of an authentication device according to an embodiment of the present application.
  • the authentication device may include: a first transceiver module 901, configured to obtain first information and The second information at the first moment, wherein the first information is associated with the first biometric information, the first biometric information comes from the first controlled device, and the second information is associated with the second biometric information Associated, the second biometric information comes from the first device to be authenticated, and is associated with the user corresponding to the first device to be authenticated; the first processing module 902 is configured to compare the first information and the second information matching; according to the matching result of the first information and the second information, the state of the first controlled device is controlled.
  • the first controlled device includes a first smart lock; the first processing module is further configured to: if the first information and the second information match successfully , sending first control information, where the first control information is used to control the first smart lock to be in an unlocked state.
  • the first processing module 902 is further configured to: clear the first biometric feature information and the second biometric information after the state of the first controlled device is controlled. characteristic information.
  • the first processing module 902 is further configured to: when the distance between the first controlled device and the first device to be authenticated is less than a preset threshold, send The first controlled device sends second control information, where the second control information is used to control the first controlled device to collect the first biological feature information.
  • the first transceiving module 902 is further configured to: acquire third information and fourth information, where the third information is associated with first service information, and the first service The information is service information provided by the cloud server for the first controlled device, the fourth information is associated with second service information, and the second service information is provided by the cloud server for the first device to be authenticated matching the third information with the fourth information; and acquiring the first information and the second information if the third information and the fourth information are successfully matched.
  • the first service information includes identification information of the first controlled device; the second service information includes identification information of a target controlled device.
  • the first information includes information obtained by encrypting the first biometric information with a first encryption algorithm
  • the second information includes information obtained by encrypting the first biometric information with the first encryption algorithm.
  • the information obtained by encrypting the second biological feature information; the first transceiving module 901 is further configured to: receive the first encryption algorithm from the cloud server.
  • the first processing module 902 is further configured to: clear the first encryption algorithm after the state of the first controlled device is controlled.
  • the first information includes information obtained by encrypting the first biometric information through a second encryption algorithm
  • the second information includes information obtained by encrypting the first biometric information through the second encryption algorithm.
  • the information obtained by encrypting the second biometric feature information; the first processing module 902 is further configured to: generate the second encryption algorithm, and send the second encryption algorithm to the first device to be authenticated.
  • the first processing module 902 is further configured to: clear the second encryption algorithm after the state of the first controlled device is controlled.
  • the first biometric information includes first electrocardiographic information
  • the second biometric information includes second electrocardiographic information
  • the first processing module 902 is further configured to: after controlling the state of the first controlled device, send the identification information of the first controlled device to a cloud server and the second information, the identification information of the first controlled device and the second information are at least used to generate settlement information corresponding to the first device to be authenticated.
  • Embodiments of the present application also provide another authentication device, which is used to implement the technical solutions described in the above method embodiments. For example, each step of the above-mentioned method shown in FIG. 8 may be executed.
  • Fig. 10 shows a structural diagram of another authentication device according to an embodiment of the present application.
  • the authentication device may include: a second processing module 1001, configured to collect a second biometric feature at the first moment information, the second biometric information is associated with the user corresponding to the first device to be authenticated; the second transceiver module 1002 is configured to send second information, the second information is associated with the second biometric information, and the The second information is at least used to match with the first information, the first information is associated with the first biological feature information at the first moment, and the first biological feature information comes from the first controlled device.
  • a second processing module 1001 configured to collect a second biometric feature at the first moment information, the second biometric information is associated with the user corresponding to the first device to be authenticated
  • the second transceiver module 1002 is configured to send second information, the second information is associated with the second biometric information, and the The second information is at least used to match with the first information, the first information is associated with the first biological feature information at the first moment, and the
  • the second processing module 1001 is further configured to: collect The second biometric information.
  • the second transceiver module 1002 is further configured to: receive fourth information from the cloud server, the fourth information is related to the second business information corresponding to the first device to be authenticated Associating, the fourth information is at least used to match with third information, the third information is associated with the first service information corresponding to the first controlled device; sending the fourth information to the authentication device.
  • the second transceiver module 1002 is further configured to: send service request information to the cloud server, where the service request information is at least used to request to obtain a service corresponding to the first device to be authenticated information.
  • the first service information includes identification information of the first controlled device; the second service information includes identification information of a target controlled device.
  • the second information includes information obtained by encrypting the second biometric information with an encryption algorithm
  • the second transceiver module 1002 is further configured to: receive the encryption algorithm
  • the first biometric information includes first electrocardiographic information
  • the second biometric information includes second electrocardiographic information
  • the first device to be authenticated is configured with an electrocardiographic sensor, and the electrocardiographic sensor is configured to collect the second electrocardiographic information.
  • the second transceiving module 1002 is further configured to: receive settlement information corresponding to the first controlled device.
  • the division of the modules in the above device is only a division of logical functions, which may be fully or partially integrated into one physical entity or physically separated during actual implementation.
  • the modules in the device can be implemented in the form of a processor calling software; for example, the device includes a processor, the processor is connected to a memory, instructions are stored in the memory, and the processor calls the instructions stored in the memory to implement any of the above methods Or realize the function of each module of the device, wherein the processor is, for example, a general-purpose processor, such as a central processing unit (Central Processing Unit, CPU) or a microprocessor, and the memory is a memory in the device or a memory outside the device.
  • CPU central processing unit
  • microprocessor a microprocessor
  • the modules in the device may be implemented in the form of hardware circuits, and part or all of the functions of the modules may be realized by designing the hardware circuits.
  • the hardware circuits may be understood as one or more processors; for example, in one implementation,
  • the hardware circuit is an application-specific integrated circuit (ASIC), through the design of the logical relationship between the components in the circuit, the functions of some or all of the above modules are realized; for another example, in another implementation, the hardware circuit is It can be realized by programmable logic device (programmable logic device, PLD). Taking field programmable gate array (Field Programmable Gate Array, FPGA) as an example, it can include a large number of logic gate circuits, and configure the logic gate circuits through configuration files.
  • programmable logic device programmable logic device
  • All the modules of the above device can be realized in the form of calling software by the processor, or in the form of hardware circuit, or partially realized in the form of calling software by the processor, and the rest can be realized in the form of hardware circuit.
  • the processor is a circuit with signal processing capabilities.
  • the processor may be a circuit with instruction reading and execution capabilities, such as CPU, microprocessor, graphics processor (graphics processing unit, GPU) (can be understood as a microprocessor), or digital signal processor (digital signal processor, DSP), etc.; in another implementation, the processor can realize a certain Function, the logical relationship of the hardware circuit is fixed or reconfigurable, for example, the processor is a hardware circuit implemented by ASIC or PLD, such as FPGA.
  • the process of the processor loading the configuration file to realize the configuration of the hardware circuit can be understood as the process of the processor loading instructions to realize the functions of some or all of the above modules.
  • a hardware circuit designed for artificial intelligence can be understood as an ASIC, such as a neural network processing unit (Neural Network Processing Unit, NPU) tensor processing unit (Tensor Processing Unit, TPU), a deep learning processing unit (Deep learning Processing Unit, DPU), etc.
  • NPU Neural Network Processing Unit
  • TPU tensor processing unit
  • DPU Deep learning Processing Unit
  • each module in the above device can be one or more processors (or processing circuits) configured to implement the above method, for example: CPU, GPU, NPU, TPU, DPU, microprocessor, DSP, ASIC, FPGA , or a combination of at least two of these processor forms.
  • the SOC may include at least one processor for implementing any of the above methods or realizing the functions of each module of the device.
  • the at least one processor may be of different types, such as including CPU and FPGA, CPU and artificial intelligence processor, CPUs and GPUs, etc.
  • the embodiment of the present application also provides an authentication device, and the embodiment of the present application does not limit the type of the authentication device.
  • the authentication device can be implemented in hardware, software or a combination of software and hardware.
  • the authentication device may include: a processor; a memory for storing instructions executable by the processor; wherein the processor is configured to implement the above authentication method when executing the instructions. Exemplarily, the above-mentioned methods shown in FIG. 6 and FIG. 7 may be implemented.
  • the authentication device may include a hardware module or a software module, for example, may include one or more modules described above in FIG. 9 .
  • the embodiment of the present application also provides a device to be authenticated, and the embodiment of the present application does not limit the type of the device to be authenticated.
  • the device to be authenticated can be realized by hardware, software or a combination of software and hardware.
  • the device to be authenticated may include: a sensor for collecting biometric information; a processor; a memory for storing instructions executable by the processor; wherein the processor is configured to implement the above-mentioned authentication method. Exemplarily, the above method shown in FIG. 8 may be implemented.
  • the device to be authenticated may include a hardware module or a software module, for example, may include one or more modules described above in FIG. 10 .
  • Fig. 11 shows a schematic structural diagram of an electronic device according to an embodiment of the present application.
  • the electronic device may be an authentication device or a device to be authenticated.
  • the authentication device may include: at least one processor 1101 , a communication line 1102 , a memory 1103 and at least one communication interface 1104 .
  • the processor 1101 may be a CPU, a microprocessor, an application-specific integrated circuit ASIC, or one or more integrated circuits used to control the program execution of the program of this application.
  • Communications link 1102 may include a pathway for communicating information between the components described above.
  • Communication interface 1104 using any device such as a transceiver for communicating with other devices or communication networks, such as Ethernet, radio access networks (radio access networks, RAN), wireless local area networks (wireless local area networks, WLAN), etc. .
  • a transceiver for communicating with other devices or communication networks, such as Ethernet, radio access networks (radio access networks, RAN), wireless local area networks (wireless local area networks, WLAN), etc. .
  • Memory 1103 may be read-only memory (read-only memory, ROM) or other types of static storage devices that can store static information and instructions, random access memory (random access memory, RAM) or other types that can store information and instructions It can also be an electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc storage (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be programmed by a computer Any other medium accessed, but not limited to.
  • the memory may exist independently and be connected to the processor through the communication line 1102 .
  • Memory can also be integrated with the processor.
  • the memory provided by the embodiment of the present application may generally be non-volatile.
  • the memory 1103 is used to store computer-executed instructions for implementing the solutions of the present application, and the processor 1101 controls the execution.
  • the processor 1101 is configured to execute computer-executed instructions stored in the memory 1103, so as to implement the methods provided in the above-mentioned embodiments of the present application. Exemplarily, the above steps shown in FIG. 6 or FIG. 7 or FIG. 8 may be implemented.
  • the computer-executed instructions in the embodiments of the present application may also be referred to as application program codes, which is not specifically limited in the embodiments of the present application.
  • the processor 1101 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 11 .
  • the authentication device may include multiple processors, such as processor 1101 and processor 1107 in FIG. 11 .
  • processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor.
  • a processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
  • the authentication apparatus may further include an output device 1105 and an input device 1106 .
  • Output device 1105 is in communication with processor 1101 and can display information in a variety of ways.
  • the output device 1105 may be a liquid crystal display (liquid crystal display, LCD), a light emitting diode (light emitting diode, LED) display device, a cathode ray tube (cathode ray tube, CRT) display device, or a projector (projector) wait.
  • the input device 1106 communicates with the processor 1101 and can receive user input in various ways.
  • the input device 1106 may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
  • the first transceiver module 901 in FIG. 9 above can be realized by the communication interface 1104 in FIG. 11; the first processing module 902 in FIG.
  • the processor 1101 is implemented.
  • the second processing module 1001 in FIG. 10 above can be implemented by the processor 1101 in FIG. 11; the second transceiver module 1002 in FIG. In the communication interface 1104 to achieve.
  • Embodiments of the present application provide a chip, including a processor, and when the processor executes an instruction, the processor executes the method in the foregoing embodiments.
  • the authentication method shown in FIG. 6 , FIG. 7 or FIG. 8 above may be implemented.
  • Embodiments of the present application provide a computer-readable storage medium on which computer program instructions are stored, and when the computer program instructions are executed by a processor, the methods in the foregoing embodiments are implemented. Exemplarily, the authentication method shown in FIG. 6 , FIG. 7 or FIG. 8 above may be implemented.
  • An embodiment of the present application provides a computer program product, including computer-readable codes, or a non-volatile computer-readable storage medium bearing computer-readable codes, when the computer-readable codes are stored in a processor of an electronic device
  • the processor in the electronic device executes the method in the foregoing embodiment.
  • the authentication method shown in FIG. 6 , FIG. 7 or FIG. 8 above may be implemented.
  • a computer readable storage medium may be a tangible device that can retain and store instructions for use by an instruction execution device.
  • a computer readable storage medium may be, for example, but is not limited to, an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
  • Computer-readable storage media include: portable computer discs, hard drives, RAM, ROM, Electrically Programmable Read-Only-Memory (EPROM), or flash memory , Static Random-Access Memory (SRAM), Portable Compact Disc Read-Only Memory (CD-ROM), Digital Video Disc (DVD), Memory Stick, Floppy disks, mechanically encoded devices, such as punched cards or raised structures in grooves with instructions stored thereon, and any suitable combination of the foregoing.
  • Computer readable program instructions or codes described herein may be downloaded from a computer readable storage medium to a respective computing/processing device, or downloaded to an external computer or external storage device over a network, such as the Internet, local area network, wide area network, and/or wireless network.
  • the network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers.
  • a network adapter card or a network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in each computing/processing device .
  • Computer program instructions for performing the operations of the present application may be assembly instructions, instruction set architecture (Instruction Set Architecture, ISA) instructions, machine instructions, machine-related instructions, microcode, firmware instructions, state setting data, or in one or more source or object code written in any combination of programming languages, including object-oriented programming languages—such as Smalltalk, C++, etc., and conventional procedural programming languages—such as the “C” language or similar programming languages.
  • Computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server implement.
  • the remote computer can be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or it can be connected to an external computer such as use an Internet service provider to connect via the Internet).
  • LAN Local Area Network
  • WAN Wide Area Network
  • an Internet service provider to connect via the Internet.
  • the electronic circuits can execute computer-readable Program instructions are read, thereby implementing various aspects of the present application.
  • These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine such that when executed by the processor of the computer or other programmable data processing apparatus , producing an apparatus for realizing the functions/actions specified in one or more blocks in the flowchart and/or block diagram.
  • These computer-readable program instructions can also be stored in a computer-readable storage medium, and these instructions cause computers, programmable data processing devices and/or other devices to work in a specific way, so that the computer-readable medium storing instructions includes An article of manufacture comprising instructions for implementing various aspects of the functions/acts specified in one or more blocks in flowcharts and/or block diagrams.
  • each block in a flowchart or block diagram may represent a module, a portion of a program segment, or an instruction that includes one or more Executable instructions.
  • the functions noted in the block may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block in the block diagrams and/or flowcharts, and combinations of blocks in the block diagrams and/or flowcharts can be implemented with hardware (such as circuits or ASIC (Application Specific Integrated Circuit, application-specific integrated circuit)), or it can be realized by a combination of hardware and software, such as firmware.
  • hardware such as circuits or ASIC (Application Specific Integrated Circuit, application-specific integrated circuit)
  • firmware such as firmware

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The present application relates to an authentication method, apparatus, device and system. The method comprises: obtaining first information of a first time point and second information of the first time point, the first information being associated with first biometric information, the first biometric information being from a first controlled device, the second information being associated with second biometric information, and the second biometric information being from a first device to be authenticated and being associated with a user corresponding to said first device; matching the first information with the second information; and controlling a state of the first controlled device according to a matching result of the first information and the second information. By means of the present application, an authentication device can, without pre-storing biometric information of the user, implement identity authentication of the user corresponding to said first device; moreover, the leakage risk of pre-storing the biometric information is avoided, the information security is improved, and the privacy of the user is ensured.

Description

一种认证方法、装置、设备及系统An authentication method, device, equipment and system 技术领域technical field
本申请涉及智能解锁技术领域,尤其涉及一种认证方法、装置、设备及系统。The present application relates to the technical field of intelligent unlocking, and in particular to an authentication method, device, equipment and system.
背景技术Background technique
随着智能技术的发展,无人化应用场景越来越丰富,通过使用无人化智能设备可以有效降低成本和提高服务效率。例如,快递柜将送件人和取件人解耦,降低双方的时间成本;无人售卖机可以设置在多种场地,方便消费者购物;智能充电车不受场地限制,可以让用户更方便地充电。With the development of intelligent technology, unmanned application scenarios are becoming more and more abundant, and the use of unmanned smart devices can effectively reduce costs and improve service efficiency. For example, the express cabinet decouples the sender and the picker, reducing the time cost of both parties; the unmanned vending machine can be installed in a variety of venues, which is convenient for consumers to shop; the smart charging car is not limited by the venue, which can make users more convenient ground charge.
无人化场景中涉及到用户的身份认证,目前通常利用用户所佩戴的可穿戴设备进行身份认证,大致流程为:用户佩戴可穿戴设备靠近一个智能设备,并向智能设备发送认证信息,智能设备将接收的认证信息与预存的认证信息进行匹配,匹配成功后进行解锁。采用这种认证方式存在信息泄露等风险,信息安全性较低。The unmanned scenario involves the user's identity authentication. At present, the wearable device worn by the user is usually used for identity authentication. The general process is: the user wears the wearable device close to a smart device, and sends authentication information to the smart device. The smart device Match the received authentication information with the pre-stored authentication information, and unlock it after the matching is successful. There are risks such as information leakage in this authentication method, and the information security is low.
发明内容Contents of the invention
有鉴于此,本申请提出了一种认证方法、认证装置、认证系统、认证设备、待认证设备、存储介质、芯片及计算机程序产品。In view of this, the present application proposes an authentication method, an authentication device, an authentication system, an authentication device, a device to be authenticated, a storage medium, a chip, and a computer program product.
第一方面,本申请的实施例提供了一种认证方法,所述方法应用于认证设备,所述方法包括:获取第一时刻的第一信息和所述第一时刻的第二信息,所述第一信息与第一生物特征信息相关联,所述第一生物特征信息来自第一受控设备,所述第二信息与第二生物特征信息相关联,所述第二生物特征信息来自第一待认证设备,且关联于所述第一待认证设备对应的用户;对所述第一信息和所述第二信息进行匹配;根据所述第一信息和所述第二信息的匹配结果,控制所述第一受控设备的状态。In a first aspect, an embodiment of the present application provides an authentication method, the method is applied to an authentication device, and the method includes: acquiring first information at a first moment and second information at the first moment, the The first information is associated with first biometric information from the first controlled device, and the second information is associated with second biometric information from the first The device to be authenticated is associated with the user corresponding to the first device to be authenticated; the first information is matched with the second information; according to the matching result of the first information and the second information, control The state of the first controlled device.
基于上述技术方案,认证设备无需预先存储第一待认证设备对应的用户的生物特征信息,通过对所获取的同一时刻的第一信息及第二信息进行匹配,并根据匹配结果控制第一受控设备的状态,从而实现了对第一待认证设备所对应的用户身份认证,同时避免了预先存储用户的生物特征信息存在的泄露风险,提高了信息的安全性,保障了用户隐私。Based on the above technical solution, the authentication device does not need to pre-store the biometric information of the user corresponding to the first device to be authenticated. By matching the acquired first information and second information at the same time, and controlling the first controlled device according to the matching result The state of the device, so as to realize the user identity authentication corresponding to the first device to be authenticated, and at the same time avoid the leakage risk of pre-stored user biometric information, improve information security, and protect user privacy.
作为一个示例,在待认证设备或受控设备的数量不止一个的情况下,认证设备可以获取第一时刻的来自各待认证设备的生物特征信息,针对任一待认证设备,可以将来自该待认证设备的生物特征信息依次与各受控设备采集的生物特征信息进行匹配,若匹配成功,认证设备控制匹配成功时所对应的受控设备处于打开状态,这样,认证设备可以同时对多个待认证设备所对应用户进行身份认证,并可以控制多个受控设备同时处于打开状态,从而实现同时为多个身份认证通过的用户提供服务,提高了认证效率,提升了用户体验,节约了成本。As an example, when the number of devices to be authenticated or controlled devices is more than one, the authentication device can acquire the biometric information from each device to be authenticated at the first moment, and for any device to be authenticated, the information from the device to be authenticated can be The biometric information of the authentication device is sequentially matched with the biometric information collected by each controlled device. If the matching is successful, the authentication device controls the corresponding controlled device to be in the open state when the matching is successful. The user corresponding to the authentication device performs identity authentication, and can control multiple controlled devices to be turned on at the same time, so as to provide services for multiple authenticated users at the same time, improve authentication efficiency, improve user experience, and save costs.
根据第一方面,在所述第一方面的第一种可能的实现方式中,所述第一受控设备包括第一智能锁;所述根据所述第一信息和所述第二信息的匹配结果,控制所述第一受控设备的状态,包括:在所述第一信息和所述第二信息匹配成功的情况下,发送第一控制信息,所述第一控制信息用于控制所述第一智能锁处于打开状态。According to the first aspect, in a first possible implementation manner of the first aspect, the first controlled device includes a first smart lock; the matching of the first information and the second information As a result, controlling the state of the first controlled device includes: when the first information and the second information match successfully, sending first control information, the first control information is used to control the The first smart lock is in an open state.
基于上述技术方案,第一信息和第二信息匹配成功表明第一待认证设备对应的用户身份认证通过,则认证设备可以控制第一智能锁处于打开状态,以便第一待认证设备对应的用户获得相应服务。Based on the above technical solution, the successful matching of the first information and the second information indicates that the user identity authentication corresponding to the first device to be authenticated has passed, and the authentication device can control the first smart lock to be in an open state so that the user corresponding to the first device to be authenticated can obtain Corresponding service.
根据第一方面或第一方面的第一种可能的实现方式,在所述第一方面的第二种可能的实现方式中,所述方法还包括:在所述控制所述第一受控设备的状态之后,清除所述第一信息及所述第二信息。According to the first aspect or the first possible implementation manner of the first aspect, in the second possible implementation manner of the first aspect, the method further includes: when controlling the first controlled device After the state of , clear the first information and the second information.
基于上述技术方案,认证设备在控制第一受控设备的状态之后,用户的身份认证已经完成,由于第一信息及第二信息包含用户的生物特征信息,认证设备无需存储该第一信息和第二信息,及时清除第一信息及第二信息,从而避免信息泄露,保护用户隐私,同时节省存储空间。Based on the above technical solution, after the authentication device controls the state of the first controlled device, the user's identity authentication has been completed. Since the first information and the second information contain the user's biometric information, the authentication device does not need to store the first information and the second information. The second information, clear the first information and the second information in time, so as to avoid information leakage, protect user privacy, and save storage space at the same time.
根据第一方面或第一方面的上述各种可能的实现方式,在所述第一方面的第三种可能的实现方式中,所述方法还包括:在所述第一受控设备与所述第一待认证设备之间的距离小于预设阈值的情况下,向所述第一受控设备发送第二控制信息,所述第二控制信息用于控制所述第一受控设备采集所述第一生物特征信息。According to the first aspect or the above-mentioned various possible implementation manners of the first aspect, in a third possible implementation manner of the first aspect, the method further includes: connecting the first controlled device and the When the distance between the first devices to be authenticated is less than the preset threshold, send second control information to the first controlled device, where the second control information is used to control the first controlled device to collect the First biometric information.
基于上述技术方案,第一受控设备采集生物特征信息的功能可以初始配置为关闭状态,这样,在第一受控设备与第一待认证设备之间的距离小于预设阈值的情况下,表明第一待认证设备对应的用户已经靠近第一受控设备,认证设备控制第一受控设备开启生物特征信息采集功能,以便当该用户触摸第一受控设备时,第一受控设备可以采集到该用户的生物特征信息;同时,第一受控设备仅在需要时开启生物特征信息采集功能,从而降低了第一受控设备的能耗及认证设备的数据处理量。Based on the above technical solution, the function of the first controlled device to collect biometric information can be initially configured as off, so that when the distance between the first controlled device and the first device to be authenticated is less than a preset threshold, it indicates that The user corresponding to the first device to be authenticated has approached the first controlled device, and the authentication device controls the first controlled device to enable the biometric information collection function, so that when the user touches the first controlled device, the first controlled device can collect At the same time, the first controlled device only enables the biometric information collection function when needed, thereby reducing the energy consumption of the first controlled device and the data processing amount of the authentication device.
根据第一方面或上述第一方面的各种可能的实现方式,在所述第一方面的第四种可能的实现方式中,所述获取第一时刻的第一信息和所述第一时刻的第二信息,包括:获取第三信息和第四信息,其中,所述第三信息与第一业务信息相关联,所述第一业务信息为云端服务器为所述第一受控设备提供的业务信息,所述第四信息与第二业务信息相关联,所述第二业务信息为所述云端服务器为所述第一待认证设备提供的业务信息;对所述第三信息和所述第四信息进行匹配;在所述第三信息和所述第四信息匹配成功的情况下,获取所述第一信息和所述第二信息。According to the first aspect or various possible implementations of the first aspect above, in a fourth possible implementation of the first aspect, the acquiring the first information at the first moment and the The second information includes: obtaining third information and fourth information, wherein the third information is associated with first service information, and the first service information is a service provided by the cloud server for the first controlled device information, the fourth information is associated with second business information, and the second business information is the business information provided by the cloud server for the first device to be authenticated; for the third information and the fourth information matching; if the third information and the fourth information are successfully matched, the first information and the second information are acquired.
基于上述技术方案,认证设备对第三信息和第四信息进行匹配,从而实现授权认证,若第三信息和第四信息匹配成功,表明第二业务信息与第一业务信息为同一业务信息,即第一待认证设备对应的用户是第一受控设备的授权服务对象;在授权认证通过的情况下,认证设备获取第一信息和第二信息并进行匹配,并根据匹配结果控制第一受控设备的状态,认证设备无需预先存储第一待认证设备对应的用户的生物特征信息,即可实现对第一待认证设备所对应用户的身份认证,从而保证由第一待认证设备对应的用户开启第一受控设备,同时避免了预先存储用户的生物特征信息存在的泄露风险,提高了信息的安全性,保障了用户隐私。Based on the above technical solution, the authentication device matches the third information with the fourth information to realize authorization authentication. If the third information and the fourth information match successfully, it indicates that the second business information and the first business information are the same business information, that is, The user corresponding to the first device to be authenticated is the authorized service object of the first controlled device; when the authorization authentication is passed, the authentication device obtains the first information and the second information and performs matching, and controls the first controlled device according to the matching result. The status of the device, the authentication device does not need to pre-store the biometric information of the user corresponding to the first device to be authenticated, and can realize the identity authentication of the user corresponding to the first device to be authenticated, so as to ensure that the user corresponding to the first device to be authenticated opens the The first controlled device avoids the leakage risk of pre-stored user biometric information, improves information security, and protects user privacy.
作为一个示例,在待认证设备或受控设备的数量不止一个的情况下,在同一时刻,认证设备可以获取来自多个待认证设备的业务信息,针对任一待认证设备,可以将云端服务器为该待认证设备提供的业务信息依次与云端服务器为各受控设备提供的业务信息进行匹配,从而实现同时对多个待认证设备所对应用户进行授权认证。另外,在多个待认证设备所对应的用户授权认证通过的情况下,针对任一待认证设备,认证设备获取该待认证设备采集的生物特征信息,及对应的目标受控设备所采集的生物特征信息,并将两者进行匹配,若匹配成功,则认证设备控制该目标受控设备处于打开状态,否则,目标受控设备保持关闭状态;从而实现同时对多个待认证设备所对应用户进行身份认证,并保证由待认证设备对应用户开启对应的目标受控设备;并且,在同一时刻,多个待认证设备所对应的用户均能打开各自对应的目标受控设备,从而实现同时为多个用户提供服务,提高了认证效率,提升了用户体验,节约了成本。As an example, when the number of devices to be authenticated or controlled devices is more than one, at the same time, the authentication device can obtain business information from multiple devices to be authenticated, and for any device to be authenticated, the cloud server can be set as The service information provided by the device to be authenticated is sequentially matched with the service information provided by the cloud server for each controlled device, so as to simultaneously authorize and authenticate users corresponding to multiple devices to be authenticated. In addition, when the user authorization authentication corresponding to multiple devices to be authenticated passes, for any device to be authenticated, the authentication device obtains the biometric information collected by the device to be authenticated, and the biometric information collected by the corresponding target controlled device. If the matching is successful, the authentication device will control the target controlled device to be in the open state, otherwise, the target controlled device will remain in the closed state; thereby realizing simultaneous authentication of users corresponding to multiple devices to be authenticated Identity authentication, and ensure that the corresponding target controlled device is turned on by the corresponding user of the device to be authenticated; and, at the same time, the users corresponding to multiple devices to be authenticated can open their corresponding target controlled devices, so as to realize simultaneous access to multiple Provide services for each user, improve authentication efficiency, improve user experience, and save costs.
作为一个示例,在第三信息和第四信息匹配成功的情况下,认证设备向第一受控设备发送第三控制信息,所述第三控制信息用于控制第一受控设备采集第一生物特征信息。在第三信息和第四信息匹配成功的情况下,表明由第一受控设备为第一待认证设备所对应的用户提供服务,认证设备控制第一受控设备开启生物特征信息采集功能,以便当该用户触摸第一受控设备时,第一受控设备可以采集到该用户的生物特征信息;同时,第一受控设备仅在需要时开启生物特征信息采集功能,从而降低了第一受控设备的能耗及认证设备的数据处理量。As an example, when the third information and the fourth information match successfully, the authentication device sends third control information to the first controlled device, and the third control information is used to control the first controlled device to collect the first biometric characteristic information. If the third information and the fourth information match successfully, it means that the first controlled device provides services for the user corresponding to the first device to be authenticated, and the authentication device controls the first controlled device to enable the biometric information collection function, so that When the user touches the first controlled device, the first controlled device can collect the biometric information of the user; at the same time, the first controlled device only turns on the biometric information collection function when needed, thus reducing the number of first controlled devices. The energy consumption of the control equipment and the data processing volume of the authentication equipment.
根据上述第一方面的第四种可能的实现方式,在所述第一方面的第五种可能的实现方式中,所述第一业务信息包括所述第一受控设备的标识信息;所述第二业务信息包括目标受控设备的标识信息。作为一个示例,目标受控设备可以为云端服务器分配的为第一待认证设备对应的用户提供服务的设备。According to the fourth possible implementation of the first aspect, in the fifth possible implementation of the first aspect, the first service information includes identification information of the first controlled device; the The second service information includes identification information of the target controlled device. As an example, the target controlled device may be a device allocated by the cloud server to provide services for the user corresponding to the first device to be authenticated.
根据第一方面或上述第一方面的各种可能的实现方式,在所述第一方面的第六种可能的实现方式中,所述第一信息包括通过第一加密算法对所述第一生物特征信息加密得到的信息,和/或,所述第二信息包括通过所述第一加密算法对所述第二生物特征信息加密得到的信息;所述方法还包括:接收来自云端服务器的所述第一加密算法。According to the first aspect or various possible implementations of the above-mentioned first aspect, in a sixth possible implementation of the first aspect, the first information includes The information obtained by encrypting the characteristic information, and/or, the second information includes the information obtained by encrypting the second biometric information through the first encryption algorithm; the method further includes: receiving the information from the cloud server The first encryption algorithm.
基于上述技术方案,认证设备接收来自云端服务器的第一加密算法,以便对第一受控设备采集的生物特征信息进行加密,第一信息和/或第二信息包括对生物特征信息加密后的信息,进一步提高了信息的安全性。Based on the above technical solution, the authentication device receives the first encryption algorithm from the cloud server, so as to encrypt the biometric information collected by the first controlled device, and the first information and/or the second information include encrypted biometric information , further improving the security of information.
根据上述第一方面的第六种可能的实现方式,在所述第一方面的第七种可能的实现方式中,所述方法还包括:在所述控制所述第一受控设备的状态之后,清除所述第一加密算法。According to the sixth possible implementation manner of the first aspect, in the seventh possible implementation manner of the first aspect, the method further includes: after controlling the state of the first controlled device , clear the first encryption algorithm.
基于上述技术方案,认证设备在控制第一受控设备的状态之后,对第一待认证设备对应的用户的身份认证已经完成,认证设备可以清除第一加密算法,从而避免加密算法泄露,保障信息安全,同时节省存储空间。Based on the above technical solution, after the authentication device controls the state of the first controlled device, the identity authentication of the user corresponding to the first device to be authenticated has been completed, and the authentication device can clear the first encryption algorithm, thereby avoiding the leakage of the encryption algorithm and ensuring information security. Safe while saving storage space.
根据第一方面或上述第一方面的各种可能的实现方式,在所述第一方面的第八种可能的实现方式中,所述第一信息包括通过第二加密算法对所述第一生物特征信息加密得到的信息,和/或,所述第二信息包括通过所述第二加密算法对所述第二生物特征信息加密得到的信息;所述方法还包括:生成所述第二加密算法;将所述第二加密算 法发送给所述第一待认证设备。According to the first aspect or various possible implementations of the above-mentioned first aspect, in an eighth possible implementation of the first aspect, the first information includes the encryption of the first biological information through the second encryption algorithm The information obtained by encrypting the characteristic information, and/or, the second information includes the information obtained by encrypting the second biometric information through the second encryption algorithm; the method further includes: generating the second encryption algorithm ; Send the second encryption algorithm to the first device to be authenticated.
基于上述技术方案,认证设备生成并向第一待认证设备发送第二加密算法,用于对第一受控设备采集的生物特征信息及第一待认证设备采集的生物特征信息进行加密,第一信息和第二信息均包括对生物特征信息加密后的信息,进一步提高了信息的安全性。Based on the above technical solution, the authentication device generates and sends a second encryption algorithm to the first device to be authenticated, which is used to encrypt the biometric information collected by the first controlled device and the biometric information collected by the first device to be authenticated. Both the information and the second information include encrypted biometric information, which further improves the security of the information.
根据上述第一方面的第八种可能的实现方式,在所述第一方面的第九种可能的实现方式中,所述方法还包括:在所述控制所述第一受控设备的状态之后,清除所述第二加密算法。According to the eighth possible implementation manner of the first aspect above, in the ninth possible implementation manner of the first aspect, the method further includes: after controlling the state of the first controlled device , clear the second encryption algorithm.
基于上述技术方案,认证设备在控制第一受控设备的状态之后,对第一待认证设备对应的用户的身份认证已经完成,认证设备可以清除第二加密算法,从而避免加密算法泄露,保障信息安全,同时节省存储空间。Based on the above technical solution, after the authentication device controls the state of the first controlled device, the identity authentication of the user corresponding to the first device to be authenticated has been completed, and the authentication device can clear the second encryption algorithm, thereby avoiding the leakage of the encryption algorithm and ensuring information security. Safe while saving storage space.
根据第一方面或上述第一方面的各种可能的实现方式,在所述第一方面的第十种可能的实现方式中,所述第一生物特征信息包括第一心电信息;所述第二生物特征信息包括第二心电信息。According to the first aspect or various possible implementation manners of the first aspect above, in a tenth possible implementation manner of the first aspect, the first biometric information includes first electrocardiographic information; the first The second biometric information includes second ECG information.
基于上述技术方案,由于心电信息具有唯一性,即不同用户的心电信息不同,利用心电信息能够准确区分不同用户,从而保证了身份认证的准确性;同时,每一时刻用户的心电信息具有随机性,无法复制模拟,利用心电信息进行身份认证更加安全可靠;此外,相对于受外部环境影响较大的其他生物特征信息,心电信息不受外部环境影响,可以更好地适用于各种环境。Based on the above technical solution, since the ECG information is unique, that is, the ECG information of different users is different, the ECG information can be used to accurately distinguish different users, thereby ensuring the accuracy of identity authentication; at the same time, the user's ECG information The information is random and cannot be copied and simulated. It is safer and more reliable to use ECG information for identity authentication; in addition, compared with other biometric information that is greatly affected by the external environment, ECG information is not affected by the external environment and can be better applied. in various environments.
根据第一方面或上述第一方面的各种可能的实现方式,在所述第一方面的第十一种可能的实现方式中,所述方法还包括:在所述控制所述第一受控设备的状态之后,向云端服务器发送所述第一受控设备的标识信息及所述第二信息,所述第一受控设备的标识信息和所述第二信息至少用于生成所述第一待认证设备对应的结算信息。According to the first aspect or various possible implementation manners of the above-mentioned first aspect, in the eleventh possible implementation manner of the first aspect, the method further includes: when controlling the first controlled After confirming the state of the device, send the identification information of the first controlled device and the second information to the cloud server, where the identification information of the first controlled device and the second information are at least used to generate the first Settlement information corresponding to the device to be authenticated.
基于上述技术方案,认证设备向云端服务器发送第一受控设备的标识信息及第二信息,作为一个示例,结算信息可以表示用户获取第一受控设备提供的服务所产生的费用相关信息,第一受控设备的标识信息可以用于确定第一受控设备提供服务产生的费用,第二信息可以用于与第一信息匹配,从而确定该费用为第一待认证设备对应的用户获取第一受控设备提供的服务所产生。Based on the above technical solution, the authentication device sends the identification information of the first controlled device and the second information to the cloud server. As an example, the settlement information may represent information related to fees generated by the user for obtaining services provided by the first controlled device. The identification information of a controlled device can be used to determine the fee generated by the first controlled device for providing services, and the second information can be used to match the first information, so as to determine that the fee is the first Generated by the services provided by the controlled equipment.
第二方面,本申请的实施例提供了一种认证系统,包括认证设备和云端服务器,其中,所述云端服务器被配置用于向第一受控设备发送第三信息,向第一待认证设备发送第四信息,其中,所述第三信息与第一业务信息相关联,所述第一业务信息为所述云端服务器为所述第一受控设备提供的业务信息;所述第四信息与第二业务信息相关联,所述第二业务信息为所述云端服务器为所述第一待认证设备提供的业务信息;所述认证设备被配置用于接收来自所述第一待认证设备的第四信息;对所述第三信息和所述第四信息进行匹配;在所述第三信息和所述第四信息匹配成功的情况下,获取第一时刻的第一信息和所述第一时刻的第二信息;对所述第一信息和所述第二信息进行匹配;根据所述第一信息和所述第二信息的匹配结果,控制所述第一受控设备的状态;其中,所述第一信息与第一生物特征信息相关联,所述第一生物特征信息来自所述第一受控设备,所述第二信息与第二生物特征信息相关联,所述第二生物特征信息 来自第一待认证设备,且关联于所述第一待认证设备对应的用户。In the second aspect, an embodiment of the present application provides an authentication system, including an authentication device and a cloud server, wherein the cloud server is configured to send the third information to the first controlled device, and send the third information to the first device to be authenticated. sending fourth information, wherein the third information is associated with first business information, and the first business information is business information provided by the cloud server for the first controlled device; the fourth information is associated with Associated with the second business information, the second business information is the business information provided by the cloud server for the first device to be authenticated; the authentication device is configured to receive the first device to be authenticated from the first device to be authenticated Four information; match the third information with the fourth information; if the third information and the fourth information are successfully matched, acquire the first information at the first moment and the first moment matching the first information and the second information; controlling the state of the first controlled device according to the matching result of the first information and the second information; wherein, the The first information is associated with first biological feature information, the first biological feature information is from the first controlled device, the second information is associated with second biological feature information, and the second biological feature information From the first device to be authenticated, and associated with the user corresponding to the first device to be authenticated.
基于上述技术方案,云端服务器向第一受控设备发送第三信息,并向第一待认证设备发送第四信息,认证设备接收来自第一待认证设备的第四信息,并对第三信息和第四信息进行匹配,从而实现授权认证,若第三信息和第四信息匹配成功,表明第二业务信息与第一业务信息为同一业务信息,即第一待认证设备对应的用户是第一受控设备的授权服务对象;在授权认证通过的情况下,认证设备获取第一信息和第二信息并进行匹配,并根据匹配结果控制第一受控设备的状态,认证设备无需预先存储第一待认证设备对应的用户的生物特征信息,即可实现对第一待认证设备所对应的用户的身份认证,从而保证由第一待认证设备对应的用户开启第一受控设备,同时避免了预先存储用户的生物特征信息存在的泄露风险,提高了信息的安全性,保障了用户隐私。Based on the above technical solution, the cloud server sends the third information to the first controlled device, and sends the fourth information to the first device to be authenticated, and the authentication device receives the fourth information from the first device to be authenticated, and compares the third information and The fourth information is matched to achieve authorization authentication. If the third information and the fourth information are successfully matched, it indicates that the second business information and the first business information are the same business information, that is, the user corresponding to the first device to be authenticated is the first subject. The authorized service object of the controlled device; when the authorized authentication is passed, the authentication device obtains the first information and the second information and performs matching, and controls the state of the first controlled device according to the matching result. The authentication device does not need to store the first information in advance. By authenticating the biometric information of the user corresponding to the device, the identity authentication of the user corresponding to the first device to be authenticated can be realized, thereby ensuring that the user corresponding to the first device to be authenticated turns on the first controlled device, while avoiding pre-stored The leakage risk of the user's biometric information improves the security of the information and protects the privacy of the user.
根据第二方面,在所述第二方面的第一种可能的实现方式中,所述第一受控设备包括第一智能锁;所述认证设备还被配置用于:在所述第一信息和所述第二信息匹配成功的情况下,发送第一控制信息,所述第一控制信息用于控制所述第一智能锁处于打开状态。According to the second aspect, in a first possible implementation manner of the second aspect, the first controlled device includes a first smart lock; the authentication device is further configured to: If the matching with the second information is successful, first control information is sent, and the first control information is used to control the first smart lock to be in an open state.
基于上述技术方案,第一信息和第二信息匹配成功表明第一待认证设备对应的用户身份认证通过,则认证设备可以控制第一智能锁处于打开状态,以便第一待认证设备对应的用户获得相应服务。Based on the above technical solution, the successful matching of the first information and the second information indicates that the user identity authentication corresponding to the first device to be authenticated has passed, and the authentication device can control the first smart lock to be in an open state so that the user corresponding to the first device to be authenticated can obtain Corresponding service.
根据第二方面或第二方面的第一种可能的实现方式,在所述第二方面的第二种可能的实现方式中,所述认证设备还被配置用于:在所述控制所述第一受控设备的状态之后,清除所述第一信息及所述第二信息。According to the second aspect or the first possible implementation manner of the second aspect, in the second possible implementation manner of the second aspect, the authentication device is further configured to: After the status of a controlled device, clear the first information and the second information.
基于上述技术方案,认证设备在控制第一受控设备的状态之后,用户的身份认证已经完成,由于第一信息及第二信息包含用户的生物特征信息,认证设备无需存储该第一信息和第二信息,及时清除第一信息及第二信息,从而避免信息泄露,保护用户隐私,同时节省存储空间。Based on the above technical solution, after the authentication device controls the state of the first controlled device, the user's identity authentication has been completed. Since the first information and the second information contain the user's biometric information, the authentication device does not need to store the first information and the second information. The second information, clear the first information and the second information in time, so as to avoid information leakage, protect user privacy, and save storage space at the same time.
根据第二方面或上述第二方面的各种可能的实现方式,在所述第二方面的第三种可能的实现方式中,所述认证设备还被配置用于:在所述第一受控设备与所述第一待认证设备之间的距离小于预设阈值的情况下,向所述第一受控设备发送第二控制信息,所述第二控制信息用于控制所述第一受控设备采集所述第一生物特征信息。According to the second aspect or various possible implementations of the second aspect above, in a third possible implementation of the second aspect, the authentication device is further configured to: When the distance between the device and the first device to be authenticated is less than a preset threshold, send second control information to the first controlled device, where the second control information is used to control the first controlled device The device collects the first biometric information.
基于上述技术方案,第一受控设备采集生物特征信息的功能可以初始配置为关闭状态,这样,在第一受控设备与第一待认证设备之间的距离小于预设阈值的情况下,表明第一待认证设备对应的用户已经靠近第一受控设备,认证设备控制第一受控设备开启生物特征信息采集功能,以便当该用户触摸第一受控设备时,第一受控设备可以采集到用户的第一生物特征信息;同时,第一受控设备仅在需要时开启生物特征信息采集功能,从而降低了第一受控设备的能耗及认证设备的数据处理量。Based on the above technical solution, the function of the first controlled device to collect biometric information can be initially configured as off, so that when the distance between the first controlled device and the first device to be authenticated is less than a preset threshold, it indicates that The user corresponding to the first device to be authenticated has approached the first controlled device, and the authentication device controls the first controlled device to enable the biometric information collection function, so that when the user touches the first controlled device, the first controlled device can collect At the same time, the first controlled device only enables the biometric information collection function when needed, thereby reducing the energy consumption of the first controlled device and the data processing amount of the authentication device.
根据第二方面或上述第二方面的各种可能的实现方式,在所述第二方面的第四种可能的实现方式中,所述云端服务器还被配置用于:接收服务请求信息;根据所述服务请求信息,生成所述第三信息和所述第四信息。According to the second aspect or various possible implementations of the second aspect above, in a fourth possible implementation of the second aspect, the cloud server is further configured to: receive service request information; The service request information is generated to generate the third information and the fourth information.
基于上述技术方案,云端服务器根据服务请求信息,对现有可用服务资源进行分配,生成第三信息和第四信息,以便满足用户需求。Based on the above technical solution, the cloud server allocates existing available service resources according to the service request information, and generates third information and fourth information, so as to meet user needs.
根据第二方面或上述第二方面的各种可能的实现方式,在所述第二方面的第五种可能的实现方式中,所述第一业务信息包括所述第一受控设备的标识信息;所述第二业务信息包括目标受控设备的标识信息。作为一个示例,目标受控设备可以为云端服务器分配的为第一待认证设备对应的用户提供服务的设备。According to the second aspect or various possible implementations of the second aspect above, in a fifth possible implementation of the second aspect, the first service information includes identification information of the first controlled device ; The second service information includes identification information of the target controlled device. As an example, the target controlled device may be a device allocated by the cloud server to provide services for the user corresponding to the first device to be authenticated.
根据第二方面或上述第二方面的各种可能的实现方式,在所述第二方面的第六种可能的实现方式中,所述第一信息包括通过第一加密算法对所述第一生物特征信息加密得到的信息,和/或,所述第二信息包括通过所述第一加密算法对所述第二生物特征信息加密得到的信息;所述云端服务器还被配置用于:向所述认证设备发送所述第一加密算法,向所述第一待认证设备发送所述第一加密算法;所述认证设备还被配置用于:接收所述第一加密算法。According to the second aspect or various possible implementation manners of the second aspect above, in a sixth possible implementation manner of the second aspect, the first information includes The information obtained by encrypting the characteristic information, and/or, the second information includes the information obtained by encrypting the second biometric information through the first encryption algorithm; the cloud server is further configured to: send the The authentication device sends the first encryption algorithm, and sends the first encryption algorithm to the first device to be authenticated; the authentication device is further configured to: receive the first encryption algorithm.
基于上述技术方案,认证设备接收来自云端服务器的第一加密算法,以便对第一受控设备采集的生物特征信息进行加密,第一信息和/或第二信息包括对生物特征信息加密后的信息,从而进一步提高了信息的安全性。Based on the above technical solution, the authentication device receives the first encryption algorithm from the cloud server, so as to encrypt the biometric information collected by the first controlled device, and the first information and/or the second information include encrypted biometric information , thereby further improving the security of information.
根据上述第二方面的第六种可能的实现方式,在所述第二方面的第七种可能的实现方式中,所述认证设备还被配置用于:在所述控制所述第一受控设备的状态之后,清除所述第一加密算法。According to the sixth possible implementation manner of the second aspect above, in the seventh possible implementation manner of the second aspect, the authentication device is further configured to: control the first controlled After the state of the device is cleared, the first encryption algorithm is cleared.
基于上述技术方案,认证设备在控制第一受控设备的状态之后,对第一待认证设备对应的用户的身份认证已经完成,认证设备可以清除第一加密算法,从而避免加密算法泄露,保障信息安全,同时节省存储空间。Based on the above technical solution, after the authentication device controls the state of the first controlled device, the identity authentication of the user corresponding to the first device to be authenticated has been completed, and the authentication device can clear the first encryption algorithm, thereby avoiding the leakage of the encryption algorithm and ensuring information security. Safe while saving storage space.
根据第二方面或上述第二方面的各种可能的实现方式,在所述第二方面的第八种可能的实现方式中,所述第一信息包括通过第二加密算法对所述第一生物特征信息加密得到的信息,和/或,所述第二信息包括通过所述第二加密算法对所述第二生物特征信息加密得到的信息;所述认证设备还被配置用于:生成所述第二加密算法;将所述第二加密算法发送给所述第一待认证设备。According to the second aspect or various possible implementations of the above-mentioned second aspect, in an eighth possible implementation of the second aspect, the first information includes the encryption of the first biological information through the second encryption algorithm. The information obtained by encrypting the characteristic information, and/or, the second information includes the information obtained by encrypting the second biometric information by the second encryption algorithm; the authentication device is further configured to: generate the a second encryption algorithm; sending the second encryption algorithm to the first device to be authenticated.
基于上述技术方案,认证设备生成并向第一待认证设备发送第二加密算法,用于对第一受控设备采集的生物特征信息及第一待认证设备采集的生物特征信息进行加密,第一信息和第二信息均包括对生物特征信息加密后的信息,进一步提高了信息的安全性。Based on the above technical solution, the authentication device generates and sends a second encryption algorithm to the first device to be authenticated, which is used to encrypt the biometric information collected by the first controlled device and the biometric information collected by the first device to be authenticated. Both the information and the second information include encrypted biometric information, which further improves the security of the information.
根据上述第二方面的第八种可能的实现方式,在所述第二方面的第九种可能的实现方式中,所述认证设备还被配置用于:在所述控制所述第一受控设备的状态之后,清除所述第二加密算法。According to the eighth possible implementation manner of the second aspect above, in the ninth possible implementation manner of the second aspect, the authentication device is further configured to: After the state of the device is cleared, the second encryption algorithm is cleared.
基于上述技术方案,认证设备在控制第一受控设备的状态之后,对第一待认证设备对应的用户的身份认证已经完成,认证设备可以清除第二加密算法,从而避免加密算法泄露,保障信息安全,同时节省存储空间。Based on the above technical solution, after the authentication device controls the state of the first controlled device, the identity authentication of the user corresponding to the first device to be authenticated has been completed, and the authentication device can clear the second encryption algorithm, thereby avoiding the leakage of the encryption algorithm and ensuring information security. Safe while saving storage space.
根据第二方面或上述第二方面的各种可能的实现方式,在所述第二方面的第十种可能的实现方式中,所述第一生物特征信息包括第一心电信息;所述第二生物特征信息包括第二心电信息。According to the second aspect or various possible implementation manners of the second aspect above, in a tenth possible implementation manner of the second aspect, the first biometric information includes first electrocardiographic information; the first The second biometric information includes second ECG information.
基于上述技术方案,由于心电信息具有唯一性,即不同用户的心电信息不同,利用心电信息能够准确区分不同用户,从而保证了身份认证的准确性;同时,每一时刻 用户的心电信息具有随机性,无法复制模拟,利用心电信息进行身份认证更加安全可靠;此外,相对于受外部环境影响较大的其他生物特征信息,心电信息不受外部环境影响,可以更好地适用于各种环境。Based on the above technical solution, since the ECG information is unique, that is, the ECG information of different users is different, the ECG information can be used to accurately distinguish different users, thereby ensuring the accuracy of identity authentication; at the same time, the user's ECG information The information is random and cannot be copied and simulated. It is safer and more reliable to use ECG information for identity authentication; in addition, compared with other biometric information that is greatly affected by the external environment, ECG information is not affected by the external environment and can be better applied. in various environments.
根据第二方面或上述第二方面的各种可能的实现方式,在所述第二方面的第十一种可能的实现方式中,所述认证设备还被配置用于:在所述控制所述第一受控设备的状态之后,向云端服务器发送所述第一受控设备的标识信息及所述第二信息;所述云端服务器还被配置用于:接收所述第一受控设备的标识信息及所述第二信息;根据所述第二信息确定所述第一待认证设备;根据所述第一受控设备的标识信息对应的服务信息,生成所述第一待认证设备对应的结算信息;向所述第一待认证设备发送所述结算信息。According to the second aspect or various possible implementation manners of the above-mentioned second aspect, in the eleventh possible implementation manner of the second aspect, the authentication device is further configured to: After checking the state of the first controlled device, sending the identification information of the first controlled device and the second information to the cloud server; the cloud server is also configured to: receive the identification of the first controlled device information and the second information; determine the first device to be authenticated according to the second information; generate the settlement corresponding to the first device to be authenticated according to the service information corresponding to the identification information of the first controlled device information; sending the settlement information to the first device to be authenticated.
作为一个示例,结算信息可以表示用户获取第一受控设备提供的服务所产生的费用相关信息,认证设备向云端服务器发送第一受控设备的标识信息及第二信息,云端服务器接收到上述信息后,可以根据第一受控设备的标识信息确定第一受控设备提供服务产生的费用,并将第二信息与第一信息匹配,从而确定该费用为第一待认证设备对应的用户获取第一受控设备提供服务所产生的费用,进而向第一待认证设备发送该费用,以便第一待认证设备对应的用户进行结算。As an example, the settlement information may represent information related to fees generated by the user's acquisition of services provided by the first controlled device, the authentication device sends the identification information of the first controlled device and the second information to the cloud server, and the cloud server receives the above information Afterwards, according to the identification information of the first controlled device, it is possible to determine the fee generated by the first controlled device for providing services, and match the second information with the first information, so as to determine that the fee is the fee for the user corresponding to the first device to be authenticated to obtain the second A fee generated by the service provided by the controlled device is sent to the first device to be authenticated, so that the user corresponding to the first device to be authenticated can make settlement.
第三方面,本申请的实施例提供了一种认证方法,所述方法应用于第一待认证设备,所述方法包括:采集第一时刻的第二生物特征信息,所述第二生物特征信息关联于所述第一待认证设备对应的用户;发送第二信息,所述第二信息与所述第二生物特征信息相关联,所述第二信息至少用于与第一信息进行匹配,所述第一信息与所述第一时刻的第一生物特征信息相关联,所述第一生物特征信息来自第一受控设备。In the third aspect, the embodiment of the present application provides an authentication method, the method is applied to the first device to be authenticated, and the method includes: collecting the second biometric information at the first moment, the second biometric information Associated with the user corresponding to the first device to be authenticated; sending second information, the second information is associated with the second biological feature information, the second information is at least used to match the first information, and the The first information is associated with the first biometric information at the first moment, and the first biometric information comes from the first controlled device.
基于上述技术方案,第一待认证设备采集第一时刻的第二生物特征信息,并发送与第二生物特征信息相关联的第二信息,第二信息用于与同一时刻的第一信息进行匹配,这样,无需预先存储第一待认证设备对应的用户的生物特征信息,即可实现对第一待认证设备所对应的用户身份认证,同时避免了预先存储用户的生物特征信息存在的泄露风险,提高了信息的安全性,保障了用户隐私。Based on the above technical solution, the first device to be authenticated collects the second biometric information at the first moment, and sends the second information associated with the second biometric information, and the second information is used to match the first information at the same moment In this way, the identity authentication of the user corresponding to the first device to be authenticated can be realized without pre-storing the biometric information of the user corresponding to the first device to be authenticated, and at the same time, the risk of leakage of the pre-stored biometric information of the user is avoided. Improve the security of information and protect user privacy.
根据第三方面,在所述第三方面的第一种可能的实现方式中,所述采集第一时刻的第二生物特征信息,包括:在所述第一受控设备与所述第一待认证设备之间的距离小于预设阈值的情况下,采集所述第二生物特征信息。According to the third aspect, in the first possible implementation manner of the third aspect, the collecting the second biometric information at the first moment includes: When the distance between authentication devices is less than a preset threshold, the second biometric information is collected.
基于上述技术方案,第一待认证设备采集生物特征信息的功能可以初始配置为关闭状态,在第一受控设备与第一待认证设备之间的距离小于预设阈值的情况下,表明第一待认证设备对应的用户已经靠近第一受控设备,第一待认证设备开启生物特征信息采集功能,以便采集到该用户的生物特征信息;同时,第一待认证设备仅在需要时开启生物特征信息采集功能,从而降低了第一待认证设备的能耗及认证设备的数据处理量。Based on the above technical solution, the function of the first device to be authenticated to collect biometric information can be initially configured as off, and when the distance between the first controlled device and the first device to be authenticated is less than a preset threshold, it indicates that the The user corresponding to the device to be authenticated has approached the first controlled device, and the first device to be authenticated turns on the biometric information collection function so as to collect the biometric information of the user; at the same time, the first device to be authenticated only turns on the biometric feature when needed The information collection function reduces the energy consumption of the first device to be certified and the data processing amount of the certified device.
根据第三方面或第三方面的第一种可能的实现方式,在所述第三方面的第二种可能的实现方式中,所述方法还包括:接收来自云端服务器的第四信息,所述第四信息与对应于所述第一待认证设备的第二业务信息相关联,所述第四信息至少用于与第三信息匹配,所述第三信息与对应于所述第一受控设备的第一业务信息相关联;发送所 述第四信息。According to the third aspect or the first possible implementation of the third aspect, in the second possible implementation of the third aspect, the method further includes: receiving fourth information from the cloud server, the The fourth information is associated with the second service information corresponding to the first device to be authenticated, the fourth information is at least used to match with the third information, the third information is related to the first controlled device associated with the first service information; and sending the fourth information.
根据第三方面或第三方面的上述各种可能的实现方式,在所述第三方面的第三种可能的实现方式中,所述方法还包括:向云端服务器发送服务请求信息,所述服务请求信息至少用于请求获取对应于所述第一待认证设备的业务信息。According to the third aspect or the above-mentioned various possible implementations of the third aspect, in the third possible implementation of the third aspect, the method further includes: sending service request information to the cloud server, and the service The request information is at least used to request to acquire service information corresponding to the first device to be authenticated.
根据上述第三方面的第二种可能的实现方式,在所述第三方面的第四种可能的实现方式中,所述第一业务信息包括所述第一受控设备的标识信息;所述第二业务信息包括目标受控设备的标识信息。作为一个示例,目标受控设备可以为云端服务器分配的为第一待认证设备对应的用户提供服务的设备。According to the second possible implementation of the third aspect above, in a fourth possible implementation of the third aspect, the first service information includes identification information of the first controlled device; the The second service information includes identification information of the target controlled device. As an example, the target controlled device may be a device allocated by the cloud server to provide services for the user corresponding to the first device to be authenticated.
根据第三方面或第三方面的上述各种可能的实现方式,在所述第三方面的第五种可能的实现方式中,所述第二信息包括通过加密算法对所述第二生物特征信息加密得到的信息,所述方法还包括:接收所述加密算法。According to the third aspect or the above-mentioned various possible implementation manners of the third aspect, in a fifth possible implementation manner of the third aspect, the second information includes encryption of the second biometric information through an encryption algorithm The obtained information is encrypted, and the method further includes: receiving the encryption algorithm.
基于上述技术方案,第一待认证设备接收加密算法,以便对其采集的生物特征信息进行加密,从而提高信息的安全性。Based on the above technical solution, the first device to be authenticated receives an encryption algorithm so as to encrypt the biometric information collected by it, thereby improving the security of the information.
根据第三方面或第三方面的上述各种可能的实现方式,在所述第三方面的第六种可能的实现方式中,所述第一生物特征信息包括第一心电信息;所述第二生物特征信息包括第二心电信息。According to the third aspect or the above-mentioned various possible implementation manners of the third aspect, in a sixth possible implementation manner of the third aspect, the first biometric information includes first electrocardiographic information; the first The second biometric information includes second ECG information.
基于上述技术方案,由于心电信息具有唯一性,即不同用户的心电信息不同,利用心电信息能够准确区分不同用户,从而保证了身份认证的准确性;同时,每一时刻用户的心电信息具有随机性,无法复制模拟,利用心电信息进行身份认证更加安全可靠;此外,相对于受外部环境影响较大的其他生物特征信息,心电信息不受外部环境影响,可以更好地适用于各种环境。Based on the above technical solution, since the ECG information is unique, that is, the ECG information of different users is different, the ECG information can be used to accurately distinguish different users, thereby ensuring the accuracy of identity authentication; at the same time, the user's ECG information The information is random and cannot be copied and simulated. It is safer and more reliable to use ECG information for identity authentication; in addition, compared with other biometric information that is greatly affected by the external environment, ECG information is not affected by the external environment and can be better applied. in various environments.
根据上述第三方面的第六种可能的实现方式,在所述第三方面的第七种可能的实现方式中,所述第一待认证设备配置有心电传感器,所述心电传感器用于采集所述第二心电信息。According to the sixth possible implementation of the third aspect, in the seventh possible implementation of the third aspect, the first device to be authenticated is equipped with an electrocardiogram sensor, and the electrocardiogram sensor is used to collect The second ECG information.
根据第三方面或第三方面的上述各种可能的实现方式,在所述第三方面的第八种可能的实现方式中,所述方法还包括:接收所述第一待认证设备对应的结算信息。According to the third aspect or the above-mentioned various possible implementation manners of the third aspect, in the eighth possible implementation manner of the third aspect, the method further includes: receiving the settlement corresponding to the first device to be authenticated information.
在一些示例中,结算信息可以表示用户获取第一受控设备提供的服务所产生的费用相关信息,第一待认证设备接收对应的结算信息,以便第一待认证设备对应的用户进行结算。In some examples, the settlement information may represent information related to fees generated when the user obtains the service provided by the first controlled device, and the first device to be authenticated receives the corresponding settlement information so that the user corresponding to the first device to be authenticated can perform settlement.
第四方面,本申请的实施例提供了一种认证系统,包括认证设备和待认证设备,其中,所述认证设备被配置为执行上述第一方面或者第一方面的各种可能的实现方式中的认证方法,所述待认证设备被配置为执行上述第三方面或者第三方面的各种可能的实现方式中的认证方法。In a fourth aspect, an embodiment of the present application provides an authentication system, including an authentication device and a device to be authenticated, wherein the authentication device is configured to implement the above-mentioned first aspect or various possible implementations of the first aspect An authentication method, the device to be authenticated is configured to execute the authentication method in the above third aspect or in various possible implementation manners of the third aspect.
第五方面,本申请的实施例提供了一种认证系统,包括认证设备、待认证设备和受控设备,其中,所述认证设备被配置为执行上述第一方面或者第一方面的各种可能的实现方式中的认证方法,所述待认证设备被配置为执行上述第三方面或者第三方面的各种可能的实现方式中的认证方法,所述受控设备用于采集第一时刻的第一生物特征信息。In the fifth aspect, the embodiments of the present application provide an authentication system, including an authentication device, a device to be authenticated, and a controlled device, wherein the authentication device is configured to implement the above-mentioned first aspect or various possibilities of the first aspect The authentication method in the implementation manner of the third aspect, the device to be authenticated is configured to execute the authentication method in the above third aspect or in various possible implementation manners of the third aspect, and the controlled device is used to collect the first - biometric information.
第六方面,本申请的实施例提供了一种认证装置,包括:收发模块,用于获取第 一时刻的第一信息和所述第一时刻的第二信息,其中,所述第一信息与第一生物特征信息相关联,所述第一生物特征信息来自第一受控设备,所述第二信息与第二生物特征信息相关联,所述第二生物特征信息来自第一待认证设备,且关联于所述第一待认证设备对应的用户;处理模块,用于对所述第一信息和所述第二信息进行匹配;根据所述第一信息和所述第二信息的匹配结果,控制所述第一受控设备的状态。In a sixth aspect, an embodiment of the present application provides an authentication device, including: a transceiver module, configured to obtain first information at a first moment and second information at the first moment, wherein the first information and The first biometric information is associated with the first controlled device, the second information is associated with the second biometric information, the second biometric information is from the first device to be authenticated, And associated with the user corresponding to the first device to be authenticated; a processing module, configured to match the first information with the second information; according to the matching result of the first information and the second information, and controlling the state of the first controlled device.
根据第六方面,在所述第六方面的第一种可能的实现方式中所述第一受控设备包括第一智能锁;所述处理模块,还用于:在所述第一信息和所述第二信息匹配成功的情况下,发送第一控制信息,所述第一控制信息用于控制所述第一智能锁处于打开状态。According to the sixth aspect, in a first possible implementation manner of the sixth aspect, the first controlled device includes a first smart lock; the processing module is further configured to: If the second information matches successfully, the first control information is sent, and the first control information is used to control the first smart lock to be in an open state.
根据第六方面或第六方面的第一种可能的实现方式,在所述第六方面的第二种可能的实现方式中,所述处理模块,还用于:在所述控制所述第一受控设备的状态之后,清除所述第一生物特征信息及所述第二生物特征信息。According to the sixth aspect or the first possible implementation manner of the sixth aspect, in the second possible implementation manner of the sixth aspect, the processing module is further configured to: control the first After the state of the controlled device is cleared, the first biological feature information and the second biological feature information are cleared.
根据第六方面或第六方面的上述各种可能的实现方式,在所述第六方面的第三种可能的实现方式中,所述处理模块,还用于:在所述第一受控设备与所述第一待认证设备之间的距离小于预设阈值的情况下,向所述第一受控设备发送第二控制信息,所述第二控制信息用于控制所述第一受控设备采集所述第一生物特征信息。According to the sixth aspect or the above-mentioned various possible implementation manners of the sixth aspect, in a third possible implementation manner of the sixth aspect, the processing module is further configured to: in the first controlled device When the distance to the first device to be authenticated is less than a preset threshold, sending second control information to the first controlled device, where the second control information is used to control the first controlled device Collect the first biometric information.
根据第六方面或上述第六方面的各种可能的实现方式,在所述第六方面的第四种可能的实现方式中,所述收发模块,还用于:获取第三信息和第四信息,其中,所述第三信息与第一业务信息相关联,所述第一业务信息为云端服务器为所述第一受控设备提供的业务信息,所述第四信息与第二业务信息相关联,所述第二业务信息为所述云端服务器为所述第一待认证设备提供的业务信息;对所述第三信息和所述第四信息进行匹配;在所述第三信息和所述第四信息匹配成功的情况下,获取所述第一信息和所述第二信息。According to the sixth aspect or various possible implementations of the sixth aspect above, in a fourth possible implementation of the sixth aspect, the transceiver module is further configured to: acquire third information and fourth information , wherein the third information is associated with the first business information, the first business information is the business information provided by the cloud server for the first controlled device, and the fourth information is associated with the second business information , the second business information is the business information provided by the cloud server for the first device to be authenticated; matching the third information with the fourth information; If the four pieces of information match successfully, the first information and the second information are acquired.
根据上述第六方面的第四种可能的实现方式,在所述第六方面的第五种可能的实现方式中,所述第一业务信息包括所述第一受控设备的标识信息;所述第二业务信息包括目标受控设备的标识信息。According to the fourth possible implementation of the sixth aspect, in the fifth possible implementation of the sixth aspect, the first service information includes identification information of the first controlled device; the The second service information includes identification information of the target controlled device.
根据第六方面或上述第六方面的各种可能的实现方式,在所述第六方面的第六种可能的实现方式中,所述第一信息包括通过第一加密算法对所述第一生物特征信息加密得到的信息,和/或,所述第二信息包括通过所述第一加密算法对所述第二生物特征信息加密得到的信息;所述收发模块,还用于:接收来自云端服务器的所述第一加密算法。According to the sixth aspect or various possible implementations of the sixth aspect above, in a sixth possible implementation of the sixth aspect, the first information includes the password of the first biological The information obtained by encrypting the characteristic information, and/or, the second information includes the information obtained by encrypting the second biometric information by the first encryption algorithm; The first encryption algorithm of .
根据上述第六方面的第六种可能的实现方式,在所述第六方面的第七种可能的实现方式中,所述处理模块,还用于:在所述控制所述第一受控设备的状态之后,清除所述第一加密算法。According to the sixth possible implementation manner of the sixth aspect, in the seventh possible implementation manner of the sixth aspect, the processing module is further configured to: control the first controlled device After the status of , clear the first encryption algorithm.
根据第六方面或上述第六方面的各种可能的实现方式,在所述第六方面的第八种可能的实现方式中,所述第一信息包括通过第二加密算法对所述第一生物特征信息加密得到的信息,和/或,所述第二信息包括通过所述第二加密算法对所述第二生物特征信息加密得到的信息;所述处理模块,还用于:生成所述第二加密算法,将所述第二加密算法发送给所述第一待认证设备。According to the sixth aspect or various possible implementations of the sixth aspect above, in an eighth possible implementation of the sixth aspect, the first information includes the encryption of the first biological information through the second encryption algorithm. The information obtained by encrypting the characteristic information, and/or, the second information includes the information obtained by encrypting the second biometric information by the second encryption algorithm; the processing module is further configured to: generate the first A second encryption algorithm, sending the second encryption algorithm to the first device to be authenticated.
根据上述第六方面的第八种可能的实现方式,在所述第六方面的第九种可能的实现方式中,所述处理模块,还用于:在所述控制所述第一受控设备的状态之后,清除所述第二加密算法。According to the eighth possible implementation manner of the sixth aspect, in the ninth possible implementation manner of the sixth aspect, the processing module is further configured to: control the first controlled device After the status of the second encryption algorithm is cleared.
根据第六方面或上述第六方面的各种可能的实现方式,在所述第六方面的第十种可能的实现方式中,所述第一生物特征信息包括第一心电信息;所述第二生物特征信息包括第二心电信息。According to the sixth aspect or various possible implementation manners of the sixth aspect above, in a tenth possible implementation manner of the sixth aspect, the first biometric information includes first electrocardiographic information; the first The second biometric information includes second ECG information.
根据第六方面或上述第六方面的各种可能的实现方式,在所述第六方面的第十一种可能的实现方式中,所述处理模块,还用于:在所述控制所述第一受控设备的状态之后,向云端服务器发送所述第一受控设备的标识信息及所述第二信息,所述第一受控设备的标识信息和所述第二信息至少用于生成所述第一待认证设备对应的结算信息。According to the sixth aspect or various possible implementation manners of the above sixth aspect, in the eleventh possible implementation manner of the sixth aspect, the processing module is further configured to: After checking the state of a controlled device, send the identification information of the first controlled device and the second information to the cloud server, where the identification information of the first controlled device and the second information are at least used to generate the Settlement information corresponding to the first device to be authenticated.
第七方面,本申请的实施例提供了一种待认证装置,包括:处理模块,用于采集第一时刻的第二生物特征信息,所述第二生物特征信息关联于第一待认证设备对应的用户;收发模块,用于发送第二信息,所述第二信息与所述第二生物特征信息相关联,所述第二信息至少用于与第一信息进行匹配,所述第一信息与所述第一时刻的第一生物特征信息相关联,所述第一生物特征信息来自第一受控设备。In the seventh aspect, the embodiment of the present application provides a device to be authenticated, including: a processing module, configured to collect second biometric information at the first moment, the second biometric information is associated with the first device to be authenticated a user; a transceiver module, configured to send second information, the second information is associated with the second biometric information, the second information is at least used to match with the first information, and the first information is associated with the first information The first biological feature information at the first moment is associated, and the first biological feature information comes from the first controlled device.
根据第七方面,在所述第七方面的第一种可能的实现方式中,所述处理模块,还用于:在所述第一受控设备与所述第一待认证设备之间的距离小于预设阈值的情况下,采集所述第二生物特征信息。According to the seventh aspect, in a first possible implementation manner of the seventh aspect, the processing module is further configured to: the distance between the first controlled device and the first device to be authenticated If it is less than the preset threshold, the second biometric information is collected.
根据第七方面或第七方面的第一种可能的实现方式,在所述第七方面的第二种可能的实现方式中,所述收发模块,还用于:接收来自云端服务器的第四信息,所述第四信息与对应于所述第一待认证设备的第二业务信息相关联,所述第四信息至少用于与第三信息匹配,所述第三信息与对应于所述第一受控设备的第一业务信息相关联;向认证设备发送所述第四信息。According to the seventh aspect or the first possible implementation of the seventh aspect, in the second possible implementation of the seventh aspect, the transceiver module is further configured to: receive fourth information from the cloud server , the fourth information is associated with the second business information corresponding to the first device to be authenticated, the fourth information is at least used to match with the third information, and the third information is associated with the first service information corresponding to the first The first service information of the controlled device is associated; and the fourth information is sent to the authentication device.
根据第七方面或第七方面的上述各种可能的实现方式,在所述第七方面的第三种可能的实现方式中,所述收发模块,还用于:向云端服务器发送服务请求信息,所述服务请求信息至少用于请求获取对应于所述第一待认证设备的业务信息。According to the seventh aspect or the above-mentioned various possible implementation manners of the seventh aspect, in a third possible implementation manner of the seventh aspect, the transceiver module is further configured to: send service request information to the cloud server, The service request information is at least used to request to obtain service information corresponding to the first device to be authenticated.
根据上述第七方面的第二种可能的实现方式,在所述第七方面的第四种可能的实现方式中,所述第一业务信息包括所述第一受控设备的标识信息;所述第二业务信息包括目标受控设备的标识信息。According to the second possible implementation manner of the seventh aspect above, in the fourth possible implementation manner of the seventh aspect, the first service information includes identification information of the first controlled device; the The second service information includes identification information of the target controlled device.
根据第七方面或第七方面的上述各种可能的实现方式,在所述第七方面的第五种可能的实现方式中,所述第二信息包括通过加密算法对所述第二生物特征信息加密得到的信息,所述收发模块,还用于:接收所述加密算法。According to the seventh aspect or the above-mentioned various possible implementation manners of the seventh aspect, in the fifth possible implementation manner of the seventh aspect, the second information includes encryption of the second biometric information through an encryption algorithm For the encrypted information, the transceiver module is further configured to: receive the encryption algorithm.
根据第七方面或第七方面的上述各种可能的实现方式,在所述第七方面的第六种可能的实现方式中,所述第一生物特征信息包括第一心电信息;所述第二生物特征信息包括第二心电信息。According to the seventh aspect or the above-mentioned various possible implementation manners of the seventh aspect, in a sixth possible implementation manner of the seventh aspect, the first biometric information includes first electrocardiographic information; the first The second biometric information includes second ECG information.
根据上述第七方面的第六种可能的实现方式,在所述第七方面的第七种可能的实现方式中,所述第一待认证设备配置有心电传感器,所述心电传感器用于采集所述第二心电信息。According to the sixth possible implementation of the seventh aspect, in the seventh possible implementation of the seventh aspect, the first device to be authenticated is equipped with an electrocardiogram sensor, and the electrocardiogram sensor is used to collect The second ECG information.
根据第七方面或第七方面的上述各种可能的实现方式,在所述第七方面的第八种 可能的实现方式中,所述收发模块,还用于:接收所述第一受控设备对应的结算信息。According to the seventh aspect or the above-mentioned various possible implementation manners of the seventh aspect, in an eighth possible implementation manner of the seventh aspect, the transceiver module is further configured to: receive the first controlled device corresponding billing information.
第八方面,本申请的实施例提供了一种认证设备,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为执行所述指令时实现上述第一方面或者第一方面的各种可能的实现方式中的认证方法。In an eighth aspect, an embodiment of the present application provides an authentication device, including: a processor; a memory for storing processor-executable instructions; wherein, the processor is configured to implement the above-mentioned first authentication when executing the instructions. Aspects or authentication methods in various possible implementation manners of the first aspect.
第九方面,本申请的实施例提供了一种待认证设备,包括:传感器,用于采集生物特征信息;处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为执行所述指令时实现上述第三方面或者第三方面的各种可能的实现方式中的认证方法。In a ninth aspect, an embodiment of the present application provides a device to be authenticated, including: a sensor for collecting biometric information; a processor; a memory for storing instructions executable by the processor; wherein the processor is configured To implement the above third aspect or the authentication method in various possible implementation manners of the third aspect when executing the instructions.
第十方面,本申请的实施例提供了一种芯片,包括处理器,当所述处理器执行指令时,所述处理器执行如上述第一方面或者第一方面的各种可能的实现方式中的认证方法,或者执行上述第三方面或者第三方面的各种可能的实现方式中的认证方法。In the tenth aspect, the embodiments of the present application provide a chip, including a processor. When the processor executes instructions, the processor executes the above-mentioned first aspect or various possible implementations of the first aspect. The authentication method, or execute the above third aspect or the authentication method in various possible implementation manners of the third aspect.
第十一方面,本申请的实施例提供了一种计算机可读存储介质,其上存储有计算机程序指令,所述计算机程序指令被处理器执行时实现上述第一方面或者第一方面的各种可能的实现方式中的认证方法,或者实现上述第三方面或者第三方面的各种可能的实现方式中的认证方法。In the eleventh aspect, the embodiments of the present application provide a computer-readable storage medium, on which computer program instructions are stored, and when the computer program instructions are executed by a processor, the above-mentioned first aspect or various aspects of the first aspect are implemented. An authentication method in a possible implementation manner, or an authentication method in various possible implementation manners for realizing the above third aspect or the third aspect.
第十二方面,本申请的实施例提供了一种计算机程序产品,当所述计算机程序产品在计算机上运行时,使得所述计算机执行上述第一方面或者第一方面的各种可能的实现方式中的认证方法,或者执行上述第三方面或者第三方面的各种可能的实现方式中的认证方法。In the twelfth aspect, the embodiments of the present application provide a computer program product, which, when the computer program product is run on a computer, causes the computer to execute the above-mentioned first aspect or various possible implementations of the first aspect The authentication method in , or execute the authentication method in the above third aspect or in various possible implementation manners of the third aspect.
上述第四方面到第十二方面及各种可能的实现方式的技术效果,参见上述第一方面及第一方面的各种可能的实现方式的技术效果,或者第二方面及第二方面的各种可能的实现方式的技术效果,或者第三方面及第三方面的各种可能的实现方式的技术效果。For the technical effects of the above-mentioned fourth to twelfth aspects and various possible implementations, refer to the technical effects of the above-mentioned first aspect and various possible implementations of the first aspect, or the second aspect and the various technical effects of the second aspect. The technical effect of one possible implementation manner, or the third aspect and the technical effects of various possible implementation manners of the third aspect.
附图说明Description of drawings
图1示出根据本申请一实施例的一种认证系统架构的示意图;FIG. 1 shows a schematic diagram of an authentication system architecture according to an embodiment of the present application;
图2示出根据本申请一实施例的一种移动充电场景的示意图;Fig. 2 shows a schematic diagram of a mobile charging scene according to an embodiment of the present application;
图3示出根据本申请一实施例的一种智能快递柜场景的示意图;Fig. 3 shows a schematic diagram of a smart express cabinet scene according to an embodiment of the present application;
图4示出根据本申请一实施例的一种无人售卖机场景的示意图;Fig. 4 shows a schematic diagram of an unmanned vending machine scene according to an embodiment of the present application;
图5示出根据本申请一实施例的一种智能车辆解锁场景的示意图;Fig. 5 shows a schematic diagram of an unlocking scene of a smart vehicle according to an embodiment of the present application;
图6示出根据本申请一实施例的一种认证方法的流程图;FIG. 6 shows a flowchart of an authentication method according to an embodiment of the present application;
图7示出根据本申请一实施例的另一种认证方法的流程图;FIG. 7 shows a flow chart of another authentication method according to an embodiment of the present application;
图8示出根据本申请一实施例的另一种认证方法的流程图;FIG. 8 shows a flow chart of another authentication method according to an embodiment of the present application;
图9示出根据本申请一实施例的一种认证装置的结构图;FIG. 9 shows a structural diagram of an authentication device according to an embodiment of the present application;
图10示出根据本申请一实施例的另一种认证装置的结构图;FIG. 10 shows a structural diagram of another authentication device according to an embodiment of the present application;
图11示出根据本申请一实施例的一种电子设备的结构示意图。Fig. 11 shows a schematic structural diagram of an electronic device according to an embodiment of the present application.
具体实施方式Detailed ways
以下将参考附图详细说明本申请的各种示例性实施例、特征和方面。附图中相同 的附图标记表示功能相同或相似的元件。尽管在附图中示出了实施例的各种方面,但是除非特别指出,不必按比例绘制附图。Various exemplary embodiments, features, and aspects of the present application will be described in detail below with reference to the accompanying drawings. The same reference numbers in the figures indicate functionally identical or similar elements. While various aspects of the embodiments are shown in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
在这里专用的词“示例性”意为“用作例子、实施例或说明性”。这里作为“示例性”所说明的任何实施例不必解释为优于或好于其它实施例。The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration." Any embodiment described herein as "exemplary" is not necessarily to be construed as superior or better than other embodiments.
下面首先对本申请实施例所提供的认证系统架构进行举例说明。图1示出根据本申请一实施例的一种认证系统架构的示意图。如图1所示,认证系统10可以包括认证设备101、待认证设备102、受控设备104;在一些示例中,认证系统10还可以包括服务器106、待认证设备103或受控设备105。需要说明的是,图1中认证系统10仅以一个认证设备、两个待认证设备、两个受控设备、一个服务器示出,应理解,这并不限定认证系统10中认证设备、待认证设备、受控设备、服务器等的数量及类型,认证系统10还可以包括更多的认证设备、待认证设备、受控设备、服务器以及其他的设备。The authentication system architecture provided by the embodiment of the present application will be described with an example below. Fig. 1 shows a schematic diagram of an authentication system architecture according to an embodiment of the present application. As shown in FIG. 1 , the authentication system 10 may include an authentication device 101 , a device to be authenticated 102 , and a controlled device 104 ; It should be noted that the authentication system 10 in FIG. 1 is only shown as one authentication device, two devices to be authenticated, two controlled devices, and one server. It should be understood that this does not limit The authentication system 10 may also include more authentication devices, devices to be authenticated, controlled devices, servers, and other devices.
其中,认证设备101可以具有通信功能及数据处理功能,可以为硬件、软件或软件和硬件的组合实现。举例来说,认证设备101可以是一个通用设备或者是一个专用设备;例如,认证设备101可以为台式机、便携式电脑、网络服务器、掌上电脑(personal digital assistant,PDA)、移动手机、平板电脑、无线终端设备、嵌入式设备或其他具有数据处理功能及通信功能的通用设备,或者为这些通用设备内的部件;认证设备101还可以为智能交通工具(如汽车、自行车、摩托车、电动车等)、智能快递柜、智能充电车(桩)、智能门锁、无人售卖机或其他具有数据处理功能及通信功能的专用设备,或者为这些专用设备内的部件;认证设备101还可以是具有处理功能的芯片、处理器或服务器等。示例性地,认证设备101可以向待认证设备102(或待认证设备103)发送加密算法;还可以控制受控设备104(或受控设备105)处于打开、闭合等不同状态;还可以接收待认证设备102、受控设备104或服务器106所发送的信息,并可以根据所接收到的信息对待认证设备102所对应的用户身份进行认证。Wherein, the authentication device 101 may have a communication function and a data processing function, and may be realized by hardware, software, or a combination of software and hardware. For example, the authentication device 101 can be a general-purpose device or a dedicated device; for example, the authentication device 101 can be a desktop computer, a portable computer, a network server, a palm computer (personal digital assistant, PDA), a mobile phone, a tablet computer, Wireless terminal devices, embedded devices or other general-purpose devices with data processing functions and communication functions, or components in these general-purpose devices; authentication device 101 can also be intelligent vehicles (such as automobiles, bicycles, motorcycles, electric vehicles, etc. ), smart express cabinets, smart charging vehicles (piles), smart door locks, unmanned vending machines or other special equipment with data processing functions and communication functions, or components in these special equipment; the authentication device 101 can also be a Chips, processors, or servers that process functions. Exemplarily, the authentication device 101 can send an encryption algorithm to the device to be authenticated 102 (or the device to be authenticated 103); it can also control the controlled device 104 (or the controlled device 105) to be in different states such as open or closed; it can also receive The information sent by the authenticating device 102 , the controlled device 104 or the server 106 may be used to authenticate the identity of the user corresponding to the device to be authenticated 102 according to the received information.
待认证设备102(或待认证设备103)可以是一种便携式设备,待认证设备102可以具有通信功能、生物特征信息采集功能及数据处理功能,举例来说,待认证设备102可以为可穿戴设备,例如,智能手表、智能手环、智能项链、智能耳机、智能眼镜、智能服装等等;待认证设备102还可以为终端设备,例如,移动手机、笔记本电脑、平板电脑、虚拟现实设备等等。示例性地,待认证设备102可以配置有采集生物特征信息的传感器,如心电传感器、指纹传感器、温度传感器、血氧传感器等,并可以将采集的生物特征信息发送至认证设备101;待认证设备102可以向服务器106发送服务请求信息,还可以接收服务器106或认证设备101所发送的加密算法、业务信息等。The device to be authenticated 102 (or the device to be authenticated 103) can be a portable device, and the device to be authenticated 102 can have a communication function, a biometric information collection function, and a data processing function. For example, the device to be authenticated 102 can be a wearable device , for example, smart watches, smart bracelets, smart necklaces, smart headphones, smart glasses, smart clothing, etc.; the device 102 to be authenticated can also be a terminal device, such as mobile phones, laptops, tablet computers, virtual reality devices, etc. . Exemplarily, the device 102 to be authenticated may be equipped with a sensor for collecting biometric information, such as an electrocardiogram sensor, a fingerprint sensor, a temperature sensor, a blood oxygen sensor, etc., and may send the collected biometric information to the authentication device 101; The device 102 may send service request information to the server 106, and may also receive encryption algorithms, service information, etc. sent by the server 106 or the authentication device 101.
受控设备104(或受控设备105)可以为具有生物特征信息采集功能的智能锁,例如,可以为车锁、门锁、快递柜锁、充电枪锁等等;受控设备104可以为独立设备,可以具有通信功能;受控设备104也可以与认证设备101集成一体,可以通过通用输入输出(General-purpose input/output,GPIO)与认证设备101传输数据。示例性地,受控设备104可以配置有采集生物特征信息的传感器,如心电传感器、指纹传感器、温度传感器、血氧传感器等,并可以将采集的生物特征信息发送至认证设备101;还 可以接收认证设备101的控制信息,并根据控制信息执行相应的打开、闭合或生物特征信息采集等操作。The controlled device 104 (or the controlled device 105) can be a smart lock with biometric information collection function, for example, it can be a car lock, door lock, express cabinet lock, charging gun lock, etc.; the controlled device 104 can be an independent The device can have a communication function; the controlled device 104 can also be integrated with the authentication device 101, and can transmit data with the authentication device 101 through a general-purpose input/output (GPIO). Exemplarily, the controlled device 104 may be configured with a sensor for collecting biometric information, such as an electrocardiogram sensor, a fingerprint sensor, a temperature sensor, a blood oxygen sensor, etc., and may send the collected biometric information to the authentication device 101; The control information of the authentication device 101 is received, and corresponding operations such as opening, closing, or biometric information collection are performed according to the control information.
服务器106可以为具有业务调度、通信功能或结算能力的实体,例如,可以为云端服务器,该云端服务器可以是一个服务器,或者是由多个服务器组成的服务器集群。示例性地,服务器106可以为待认证设备102(或待认证设备103)、受控设备104(或受控设备105)提供业务信息,还可以向待认证设备102、认证设备101发送加密算法或提供信息转发服务等等。The server 106 may be an entity with business scheduling, communication functions or settlement capabilities, for example, it may be a cloud server, and the cloud server may be a server or a server cluster composed of multiple servers. Exemplarily, the server 106 may provide service information for the device to be authenticated 102 (or the device to be authenticated 103), the controlled device 104 (or the controlled device 105), and may also send an encryption algorithm or Provide information forwarding services, etc.
示例性地,上述生物特征信息,包括能够表示用户唯一身份的信息,例如可以包括:心电、体温、血氧浓度、虹膜、指纹、语音、掌纹或人脸中的一项或多项。作为一个示例,待认证设备102可以为配置有心电传感器的智能手环,可以采集用户的心电信息,受控设备104可以为安装在门把手上的智能门锁,该智能门锁配置有心电传感器,当用户握住门把手时,可以采集用户的心电信息;作为另一个示例,待认证设备102可以为配置有图像传感器的智能眼镜,受控设备104可以为配置有图像传感器的快递柜锁,用户佩戴该智能眼镜,由于眼镜镜片是透明的,在用户直视快递柜锁的情况下,智能眼镜及快递柜锁均可以采集用户的虹膜信息;作为另一个示例,待认证设备102可以为配置有指纹传感器的手机,可以采集用户的指纹信息,受控设备104可以为配置有指纹传感器的车锁,用户触摸该车锁时,可以采集用户的指纹信息。为了便于描述,后续实施例中均以心电信息作为生物特征信息为例进行说明,其不视为对申请保护范围的限制,对于上述其他类型的生物特征信息同样适用。Exemplarily, the above biometric information includes information that can represent the unique identity of the user, for example, it may include: one or more of ECG, body temperature, blood oxygen concentration, iris, fingerprint, voice, palm print or human face. As an example, the device to be authenticated 102 can be a smart bracelet equipped with an ECG sensor, which can collect the user's ECG information, and the controlled device 104 can be a smart door lock installed on the door handle, and the smart door lock is equipped with an ECG sensor. sensor, when the user holds the doorknob, the user's ECG information can be collected; as another example, the device to be authenticated 102 can be smart glasses equipped with an image sensor, and the controlled device 104 can be an express cabinet equipped with an image sensor lock, the user wears the smart glasses, since the glasses lenses are transparent, when the user looks directly at the express locker lock, both the smart glasses and the express locker can collect the user's iris information; as another example, the device to be authenticated 102 can A mobile phone equipped with a fingerprint sensor can collect user's fingerprint information. The controlled device 104 can be a car lock equipped with a fingerprint sensor. When the user touches the car lock, the user's fingerprint information can be collected. For the convenience of description, in the following embodiments, ECG information is used as biometric information as an example for illustration, which is not considered as limiting the protection scope of the application, and is also applicable to other types of biometric information mentioned above.
上述图1所示的认证系统10,或者认证系统10中的一个或多个设备,通过执行本申请提供的技术方案(详细描述参见下文),无需预先存储用户的生物特征信息,即可实现用户的身份认证,避免了预先存储生物特征信息存在的泄露风险,提高了信息的安全性,保障了用户隐私。The above-mentioned authentication system 10 shown in Figure 1, or one or more devices in the authentication system 10, by implementing the technical solution provided by this application (see below for a detailed description), it is not necessary to pre-store the user's biometric information to realize user authentication. Identity authentication avoids the leakage risk of pre-stored biometric information, improves information security, and protects user privacy.
为了便于理解,下面列举了上述认证系统10所适用的几种应用场景。For ease of understanding, several application scenarios to which the authentication system 10 is applicable are listed below.
场景一、图2示出根据本申请一实施例的一种移动充电场景的示意图,如图2所示,智能充电车(即认证设备)搭载有多个充电枪,充电枪根据充电类型不同,可以分为快充充电枪、慢充充电枪等;每一充电枪的把手处安装有对应的充电枪锁(即受控设备),如图2中充电枪锁01、充电枪锁02、充电枪锁03等,各充电枪锁均配置有心电传感器;智能充电车可以为一个或多个用户提供充电服务,需要充电的用户可以通过可穿戴设备(即待认证设备)向云端服务器发送充电请求信息,其中,充电请求信息可以包括用户车辆的车牌号码、充电地址或充电类型等信息中的一项或多项,云端服务器根据充电请求信息为用户分配充电枪,并生成相应的充电业务信息,其中,充电业务信息可以包括订单编号、待充电车辆的车牌号、充电地址、充电类型、充电枪标识或充电枪锁标识等信息中的一项或多项;云端服务器将充电业务信息发送至智能充电车及用户的可穿戴设备;智能充电车行驶至用户所在位置,可穿戴设备可以向智能充电车发送充电业务信息及用户的心电信息,在用户拔取充电枪的过程中,智能充电车可以获取充电枪锁采集的用户的心电信息,智能充电车通过匹配可穿戴设备发送的充电业务信息与云端服务器下发的充电业务信息,以及匹配充电枪锁采集的心电信息与来自可穿戴设备的心电信息,完成对用户身份的认证,并在认证通过后控制相 应的充电枪锁打开,以便用户充电;这样,智能充电车无需预先存储用户的心电信息,即可实现用户的身份认证。Scenario 1. Figure 2 shows a schematic diagram of a mobile charging scenario according to an embodiment of the present application. As shown in Figure 2, the smart charging vehicle (that is, the authentication device) is equipped with multiple charging guns, and the charging guns are different according to the charging type. It can be divided into fast charging charging guns, slow charging charging guns, etc.; each charging gun handle is equipped with a corresponding charging gun lock (that is, a controlled device), as shown in Figure 2. Charging gun lock 01, charging gun lock 02, charging gun Gun lock 03, etc. Each charging gun lock is equipped with an ECG sensor; the smart charging car can provide charging services for one or more users, and users who need to charge can send charging requests to the cloud server through wearable devices (that is, devices to be authenticated) information, wherein the charging request information may include one or more items of information such as the license plate number of the user's vehicle, charging address, or charging type, and the cloud server assigns a charging gun to the user according to the charging request information and generates corresponding charging service information. Among them, the charging service information can include one or more of the order number, license plate number of the vehicle to be charged, charging address, charging type, charging gun identification or charging gun lock identification; the cloud server sends the charging business information to the smart phone. The charging car and the user's wearable device; when the smart charging car drives to the user's location, the wearable device can send the charging service information and the user's ECG information to the smart charging car. When the user pulls out the charging gun, the smart charging car can To obtain the user's ECG information collected by the charging gun lock, the smart charging car matches the charging service information sent by the wearable device with the charging service information sent by the cloud server, and matches the ECG information collected by the charging gun lock with the charging service information from the wearable device. ECG information to complete the authentication of the user's identity, and control the corresponding charging gun lock to open after the authentication is passed, so that the user can charge; in this way, the smart charging car can realize the user's identity authentication without pre-stored user's ECG information .
场景二、图3示出根据本申请一实施例的一种智能快递柜场景的示意图,如图3所示,智能快递柜(即认证设备)可以配置有多个储物箱,每一储物箱的门把手处配置有对应的储物箱锁(即受控设备),如图3中储物箱锁01、储物箱锁02…,各储物箱锁均配置有心电传感器;云端服务器可以根据各储物箱中所存放快递的相关信息,生成取件业务信息,其中,取件业务信息可以包括:订单编号、取件人信息、储物箱锁标识或储物箱标识等信息中的一项或多项。云端服务器将取件业务信息发送至智能快递柜及相应用户的可穿戴设备,用户到达智能快递柜附近时,可穿戴设备可以向智能快递柜发送取件业务信息及用户的心电信息;用户触摸储物箱的门把手,智能快递柜可以获取储物箱锁采集的用户的心电信息,智能快递柜通过匹配可穿戴设备发送的取件业务信息与云端服务器下发的取件业务信息,以及匹配储物箱锁采集的心电信息与来自可穿戴设备的心电信息,完成对用户身份的认证,并在认证通过后控制相应的储物箱锁打开,以便用户取件;这样,智能快递柜无需预先存储用户的心电信息,即可实现用户的身份认证。Scenario 2. FIG. 3 shows a schematic diagram of a smart express cabinet scene according to an embodiment of the present application. As shown in FIG. The door handle of the box is equipped with a corresponding storage box lock (that is, a controlled device), as shown in Figure 3, the storage box lock 01, the storage box lock 02..., each storage box lock is equipped with an ECG sensor; Pickup business information can be generated according to the relevant information of the express delivery stored in each storage box, wherein the pickup business information can include: order number, picker information, locker logo or locker logo, etc. one or more of . The cloud server sends the pick-up business information to the smart express cabinet and the wearable device of the corresponding user. When the user arrives near the smart express cabinet, the wearable device can send the pick-up business information and the user's ECG information to the smart express cabinet; The door handle of the storage box, the smart express cabinet can obtain the user's ECG information collected by the locker lock, the smart express cabinet matches the pickup business information sent by the wearable device with the pickup business information issued by the cloud server, and Match the ECG information collected by the locker lock with the ECG information from the wearable device, complete the authentication of the user's identity, and control the corresponding locker to open after the authentication is passed, so that the user can pick up the package; in this way, the smart express The cabinet does not need to store the user's ECG information in advance to realize the user's identity authentication.
场景三、图4示出根据本申请一实施例的一种无人售卖机场景的示意图,如图4所示,无人售卖机(即认证设备)设置有多个购物槽,每个购物槽内存放一类商品,每个购物槽的把手处设置有对应的购物槽锁(即受控设备),如图4中购物槽锁01、购物槽锁02…,各购物槽锁均配置有心电传感器。用户所佩戴的可穿戴设备(即待认证设备)、无人售卖机均可以与云端服务器建立通信连接;可穿戴设备采集用户的心电信息并发送至云端服务器,云端服务器将该心电信息转发至无人售卖机;用户选购商品时,手握购物槽的把手,无人售卖机可以获取购物槽锁采集的用户的心电信息,无人售卖机通过匹配购物槽锁采集的心电信息与来自可穿戴设备的心电信息,对用户身份进行认证,并在认证通过后控制相应的购物槽锁打开,以便用户在购物槽中取走商品;用户选购完商品后,无人售卖机向云端服务器发送购物槽锁采集的心电信息及该购物槽锁标识,云端服务器根据预存的各购物槽锁标识对应的商品价格等信息,生成该购物槽锁标识对应的结算业务信息,其中,该结算业务信息可以包括:购物金额、商品数量、商品类型、购物时间或购物地点等信息中的一项或多项。云端服务器将该购物槽锁采集的心电信息与来自可穿戴设备的心电信息进行匹配,从而确定对应的可穿戴设备,并将该结算业务信息发送到该可穿戴设备,以便用户对所选购的商品进行结算。这样,无人售卖机无需预先存储用户的心电信息,即可实现用户的身份认证。Scenario 3. FIG. 4 shows a schematic diagram of an unmanned vending machine scenario according to an embodiment of the present application. As shown in FIG. 4, the unmanned vending machine (that is, the authentication device) is provided with multiple shopping slots, each One type of commodity is stored inside, and the handle of each shopping slot is equipped with a corresponding shopping slot lock (that is, a controlled device), as shown in Figure 4, shopping slot lock 01, shopping slot lock 02..., each shopping slot lock is equipped with an ECG sensor. The wearable device worn by the user (that is, the device to be authenticated) and the unmanned vending machine can establish a communication connection with the cloud server; the wearable device collects the user's ECG information and sends it to the cloud server, and the cloud server forwards the ECG information To the unmanned vending machine; when the user purchases goods, hold the handle of the shopping trough, the unmanned vending machine can obtain the user's ECG information collected by the shopping trough lock, and the unmanned vending machine matches the ECG information collected by the shopping trough lock With the ECG information from the wearable device, the user's identity is authenticated, and the corresponding shopping slot lock is controlled to open after the authentication is passed, so that the user can take the goods in the shopping slot; after the user finishes purchasing the goods, the unmanned vending machine Send the ECG information collected by the shopping slot lock and the shopping slot lock identification to the cloud server, and the cloud server generates the settlement business information corresponding to the shopping slot lock identification according to the pre-stored information such as the commodity price corresponding to each shopping slot lock identification, wherein, The settlement service information may include: one or more of information such as shopping amount, commodity quantity, commodity type, shopping time or shopping location. The cloud server matches the ECG information collected by the shopping slot lock with the ECG information from the wearable device, thereby determining the corresponding wearable device, and sends the settlement business information to the wearable device, so that the user can check the selected Checkout for purchased items. In this way, the unmanned vending machine can realize the identity authentication of the user without pre-storing the user's ECG information.
场景四、图5示出根据本申请一实施例的一种智能车辆解锁场景的示意图,如图5所示,该智能车辆(即认证设备)的至少一个车门的把手上配置有车锁(即受控设备),如图5中车锁01、车锁02…,各车锁均配置有心电传感器;该智能车辆可以与用户所佩戴的可穿戴设备(即待认证设备)预先进行初始化配对,即该用户预先获得该智能车辆的使用授权,可穿戴设备与智能车辆可以配置同一加密算法;当用户到达智能车辆附近时,可穿戴设备采集用户的心电信息并利用加密算法进行加密,可穿戴设备将加密后的信息发送至智能车辆,智能车辆利用加密算法对收到的信息进行解密,得到可穿戴设备所采集的心电信息;用户触摸车门把手时,智能车辆可以获取车锁采 集的心电信息,智能车辆通过匹配可穿戴设备所采集的心电信息与车锁采集的心电信息,对用户身份进行认证,并在认证通过后控制车锁打开,以便用户用车。这样,智能车辆无需预先存储用户的心电信息,即可实现用户的身份认证。Scenario 4. FIG. 5 shows a schematic diagram of a smart vehicle unlocking scenario according to an embodiment of the present application. As shown in FIG. Controlled device), as shown in Figure 5, car lock 01, car lock 02..., each car lock is equipped with an ECG sensor; the smart car can be initialized and paired with the wearable device worn by the user (that is, the device to be authenticated) in advance, That is, the user obtains authorization for the smart vehicle in advance, and the wearable device and the smart vehicle can be configured with the same encryption algorithm; when the user arrives near the smart vehicle, the wearable device collects the user's ECG information and encrypts it using the encryption algorithm, and the wearable The device sends the encrypted information to the smart vehicle, and the smart vehicle uses an encryption algorithm to decrypt the received information to obtain the ECG information collected by the wearable device; when the user touches the door handle, the smart vehicle can obtain the ECG information collected by the car lock. The smart vehicle authenticates the user's identity by matching the ECG information collected by the wearable device with the ECG information collected by the car lock, and controls the unlocking of the car lock after the authentication is passed, so that the user can use the car. In this way, the smart vehicle can realize the identity authentication of the user without storing the user's ECG information in advance.
示例性地,上述应用场景按照服务器是否为受控设备和/或待认证设备提供业务信息,可以分为有业务场景(如上述场景一、场景二、场景三)及无业务场景(如上述场景四),其中,在有业务场景中,服务器向受控设备及待认证设备提供业务信息,以指示受控设备为待认证设备对应的用户提供服务;业务信息可以由服务器根据待处理的业务生成,也可以由用户通过待认证设备向服务器发起服务请求,并由服务器基于用户的服务请求生成;进一步地,根据产生业务信息与认证设备进行认证的时间先后关系,有业务场景可以分为先有业务后认证的场景(如上述场景一、场景二)及先认证后有业务的场景(如上述场景三)。在无业务场景中,认证设备(或受控设备)与待认证设备预先进行了初始化配对。Exemplarily, the above application scenarios can be divided into service scenarios (such as the above scenario 1, scenario 2, and scenario 3) and non-service scenarios (such as the above scenario 4), wherein, in a service scenario, the server provides service information to the controlled device and the device to be authenticated, so as to instruct the controlled device to provide services for the user corresponding to the device to be authenticated; the service information can be generated by the server according to the service to be processed , or the user initiates a service request to the server through the device to be authenticated, and the server generates the service request based on the user; further, according to the time sequence relationship between the generation of business information and the authentication of the authentication device, some business scenarios can be divided into prior Scenarios of authentication after business (such as scenario 1 and scenario 2 above) and scenarios of authentication before business (such as scenario 3 above). In a non-service scenario, the authentication device (or controlled device) and the device to be authenticated are initialized and paired in advance.
需要说明的是,本申请实施例描述的上述应用场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,针对其他相似的(例如,智能快递柜存件场景)或新的应用场景的出现,本申请实施例提供的技术方案对于类似的技术问题同样适用。It should be noted that the above application scenarios described in the embodiments of the present application are for more clearly illustrating the technical solutions of the embodiments of the present application, and do not constitute limitations on the technical solutions provided by the embodiments of the present application. Those of ordinary skill in the art know that, For the emergence of other similar (for example, smart express cabinet storage scenarios) or new application scenarios, the technical solutions provided by the embodiments of the present application are also applicable to similar technical problems.
下面对本申请实施例提供的认证方法进行详细介绍。The authentication method provided by the embodiment of the present application will be described in detail below.
图6示出根据本申请一实施例的一种认证方法的流程图,示例性地,该方法可以由上述图1中的认证设备101执行;如图6所示,该方法可以包括以下步骤:Fig. 6 shows a flowchart of an authentication method according to an embodiment of the present application. Exemplarily, the method may be executed by the authentication device 101 in Fig. 1 above; as shown in Fig. 6, the method may include the following steps:
步骤601、认证设备获取第一时刻的第一信息和第一时刻的第二信息。其中,第一信息与第一生物特征信息相关联,第一生物特征信息来自第一受控设备,第二信息与第二生物特征信息相关联,第二生物特征信息来自第一待认证设备,且关联于第一待认证设备对应的用户。 Step 601. The authentication device acquires first information at the first moment and second information at the first moment. Wherein, the first information is associated with the first biometric information, the first biometric information is from the first controlled device, the second information is associated with the second biometric information, and the second biometric information is from the first device to be authenticated, And it is associated with the user corresponding to the first device to be authenticated.
其中,第二生物特征信息关联于第一待认证设备对应的用户,可以表示第二生物特征信息为第一待认证设备对应用户的生物特征信息,例如,可以为佩戴第一待认证设备的用户的生物特征信息。Wherein, the second biometric information is associated with the user corresponding to the first device to be authenticated, it may indicate that the second biometric information is the biometric information of the user corresponding to the first device to be authenticated, for example, it may be the user wearing the first device to be authenticated biometric information.
示例性地,第一待认证设备对应的用户可以包括授权使用该第一待认证设备的用户,例如该第一待认证设备的所有者。Exemplarily, the user corresponding to the first device to be authenticated may include a user authorized to use the first device to be authenticated, for example, the owner of the first device to be authenticated.
示例性地,认证设备能够控制至少一个受控设备的状态,第一受控设备可以为该至少一个受控设备中的任一受控设备,例如,可以为上述图1中的受控设备104或受控设备105等;在第一时刻,认证设备可以获取来自至少一个待认证设备的信息,第一待认证设备可以为该至少一个待认证设备中的任一待认证设备,例如,可以为上述图1中的待认证设备102或待认证设备103等。Exemplarily, the authentication device can control the state of at least one controlled device, and the first controlled device may be any controlled device in the at least one controlled device, for example, it may be the controlled device 104 in FIG. 1 above. Or the controlled device 105, etc.; at the first moment, the authentication device can obtain information from at least one device to be authenticated, and the first device to be authenticated can be any device to be authenticated in the at least one device to be authenticated, for example, it can be The above-mentioned device to be authenticated 102 or device to be authenticated 103 in FIG. 1 .
其中,第一时刻可以为某一时间点,例如,认证设备可以在第一受控设备采集到用户的生物特征信息时,获取与第一生物特征信息相关联的信息及与第二生物特征信息相关联的信息。第一时刻也可以为某一时间段;例如,认证设备可以在用户靠近第一受控设备到第一受控设备采集到用户的生物特征信息的时间段内,获取与第一生物特征信息相关联的信息及与第二生物特征信息相关联的信息。Wherein, the first moment may be a certain point in time, for example, the authentication device may acquire the information associated with the first biometric information and the information associated with the second biometric information when the first controlled device collects the biometric information of the user. associated information. The first moment may also be a certain period of time; for example, the authentication device may acquire information related to the first biometric information during the period from when the user approaches the first controlled device to when the first controlled device collects the user's biometric information. associated information and information associated with the second biometric information.
示例性地,认证设备可以接收第一待认证设备所发送的第二信息,或者接收经由 云端服务器转发的第二信息;示例性地,在认证设备与第一受控设备集成一体设置的情况下,认证设备可以获取第一受控设备采集的第一生物特征信息;示例性地,在第一受控设备独立设置的情况下,认证设备可以接收第一受控设备所发送的第一信息,或者接收经由云端服务器转发的第一信息。Exemplarily, the authentication device may receive the second information sent by the first device to be authenticated, or receive the second information forwarded via the cloud server; Exemplarily, when the authentication device is integrated with the first controlled device , the authentication device may obtain the first biometric information collected by the first controlled device; for example, in the case where the first controlled device is set independently, the authentication device may receive the first information sent by the first controlled device, Or receive the first information forwarded by the cloud server.
在一种可能的实现方式中,在第一受控设备与第一待认证设备之间的距离小于预设阈值的情况下,认证设备可以向第一受控设备发送第二控制信息,其中,第二控制信息用于控制第一受控设备采集第一生物特征信息。预设阈值可以根据实际需求进行设置,此处不作限定,例如,可以为2m、5m、10m等;示例性地,第一受控设备与第一待认证设备之间的距离可以基于全球定位系统(Global Positioning System,GPS)、激光雷达测距技术、超宽带(Ultra-wideband,UWB)测距技术、短距通信技术等等中的一种或多种确定。在本申请实施例中,短距离通信技术可以包括支持无线短距通信的技术,无线短距通信包括通信双方通过无线电波传输信息并且传输距离在较短的范围内(例如百米以内),都可以称为短距离无线通信,包括但是不限于蓝牙(bluetooth)技术、无线保真(wireless fidelity,Wi-Fi)技术、近场通讯(near field communication,NFC)技术、Wi-Fi Aware技术、通用短距通信技术、星闪联盟规范的短距通信技术等。例如,在认证设备与第一受控设备集成一体设置的情况下,认证设备可以通过wifi、蓝牙、NFC等方式与第一待认证设备建立通信连接,进而可以根据wifi、蓝牙、NFC等信号的强度,确定认证设备与第一待认证设备之间的距离,即第一受控设备与第一待认证设备的距离。再例如,认证设备可以获取第一受控设备的GPS位置信息及第一待认证设备的GPS位置信息,从而确定第一受控设备与第一待认证设备之间的距离。In a possible implementation manner, when the distance between the first controlled device and the first device to be authenticated is smaller than a preset threshold, the authentication device may send the second control information to the first controlled device, wherein, The second control information is used to control the first controlled device to collect the first biological feature information. The preset threshold can be set according to actual needs, which is not limited here, for example, it can be 2m, 5m, 10m, etc.; for example, the distance between the first controlled device and the first device to be authenticated can be based on the global positioning system (Global Positioning System, GPS), laser radar ranging technology, ultra-wideband (Ultra-wideband, UWB) ranging technology, short-range communication technology, etc. to determine one or more. In the embodiment of the present application, the short-distance communication technology may include the technology supporting wireless short-distance communication. It can be called short-range wireless communication, including but not limited to Bluetooth (bluetooth) technology, wireless fidelity (wireless fidelity, Wi-Fi) technology, near field communication (near field communication, NFC) technology, Wi-Fi Aware technology, general Short-distance communication technology, short-distance communication technology standardized by Starlight Alliance, etc. For example, when the authentication device is integrated with the first controlled device, the authentication device can establish a communication connection with the first device to be authenticated through wifi, bluetooth, NFC, etc. Strength, to determine the distance between the authentication device and the first device to be authenticated, that is, the distance between the first controlled device and the first device to be authenticated. For another example, the authentication device may obtain GPS location information of the first controlled device and GPS location information of the first device to be authenticated, so as to determine the distance between the first controlled device and the first device to be authenticated.
示例性地,第一受控设备采集生物特征信息的功能可以初始配置为关闭状态,这样,在第一受控设备与第一待认证设备之间的距离小于预设阈值的情况下,表明用户已经靠近第一受控设备,具有开锁意图,认证设备控制第一受控设备开启生物特征信息采集功能,以便当用户触摸第一受控设备时,第一受控设备可以采集到用户的生物特征信息;同时,第一受控设备仅在需要时开启生物特征信息采集功能,从而降低了第一受控设备的能耗及认证设备的数据处理量。Exemplarily, the function of the first controlled device to collect biometric information can be initially configured as off, so that when the distance between the first controlled device and the first device to be authenticated is less than a preset threshold, it indicates that the user Already approaching the first controlled device with the intention of unlocking, the authentication device controls the first controlled device to enable the biometric information collection function, so that when the user touches the first controlled device, the first controlled device can collect the user's biometrics information; at the same time, the first controlled device only enables the biometric information collection function when needed, thereby reducing the energy consumption of the first controlled device and the data processing amount of the authentication device.
此外,在用户靠近第一受控设备时,用户可以触发第一受控设备开启生物特征信息采集功能,以便采集第一生物特征信息,其中,触发方式可以包括点击预设的物理按钮、语音控制等等。或者,用户可以触发第一待认证设备开启生物特征信息采集的功能,以便采集第二生物特征信息。In addition, when the user is close to the first controlled device, the user can trigger the first controlled device to start the biometric information collection function so as to collect the first biometric information, wherein the triggering method may include clicking a preset physical button, voice control etc. Alternatively, the user may trigger the first device to be authenticated to start the biometric information collection function, so as to collect the second biometric information.
该步骤中,第一信息与第一生物特征信息相关联可以表示:第一信息包括第一生物特征信息,或者第一信息包括对第一生物特征信息进行处理后所得到的信息,例如,第一信息可以包括通过加密算法对第一生物特征信息加密得到的信息。第二信息与第二生物特征信息相关联表示:第二信息包括第二生物特征信息,或者第二信息包括对第二生物特征信息进行处理后所得到的信息,例如,第二信息可以包括通过加密算法对第二生物特征信息加密得到的信息。其中,加密算法可以为非对称加密算法,例如,李维斯特-萨莫尔-阿德曼(Rivest Shamir Adleman,RSA)加密算法、椭圆曲线(Elliptic Curve Cryptography,ECC)加密算法等等;加密算法也可以为对称加密算法,即加密与解密采用同一密码的算法。示例性地,加密算法可以包括来自云端服务器的第一加 密算法,还可以包括来自认证设备的第二加密算法。In this step, the association of the first information with the first biological feature information may mean that: the first information includes the first biological feature information, or the first information includes information obtained after processing the first biological feature information, for example, the first biological feature information The information may include information obtained by encrypting the first biometric information through an encryption algorithm. The association of the second information with the second biometric information means that: the second information includes the second biometric information, or the second information includes information obtained after processing the second biometric information, for example, the second information may include The encryption algorithm encrypts the information obtained by encrypting the second biometric information. Wherein, the encryption algorithm can be an asymmetric encryption algorithm, for example, Rivest Shamir Adleman (Rivest Shamir Adleman, RSA) encryption algorithm, elliptic curve (Elliptic Curve Cryptography, ECC) encryption algorithm, etc.; It can be a symmetric encryption algorithm, that is, an algorithm using the same password for encryption and decryption. Exemplarily, the encryption algorithm may include a first encryption algorithm from the cloud server, and may also include a second encryption algorithm from the authentication device.
作为一个示例,第一信息可以包括第一生物特征信息,第二信息可以包括第二生物特征信息;该示例中,认证设备可以获取第一受控设备采集的第一生物特征信息,及第一待认证设备采集的第二生物特征信息。示例性地,第一生物特征信息与第二生物特征信息可以为同一类型的生物特征信息,例如,第一生物特征信息可以包括第一心电信息;第二生物特征信息可以包括第二心电信息。由于心电信息具有唯一性,即不同用户的心电信息不同,利用心电信息能够准确区分不同用户,从而保证了身份认证的准确性;同时,每一时刻用户的心电信息具有随机性,无法复制模拟,利用心电信息进行身份认证更加安全可靠;此外,相对于受外部环境影响较大的其他生物特征信息,如人脸特征信息受外部光照强度影响,心电信息不受外部环境影响,可以更好地适用于各种环境。As an example, the first information may include first biometric information, and the second information may include second biometric information; in this example, the authentication device may obtain the first biometric information collected by the first controlled device, and the first The second biometric information collected by the device to be authenticated. Exemplarily, the first biometric information and the second biometric information may be the same type of biometric information, for example, the first biometric information may include first ECG information; the second biometric information may include second ECG information. information. Since the ECG information is unique, that is, the ECG information of different users is different, and the ECG information can be used to accurately distinguish different users, thereby ensuring the accuracy of identity authentication; at the same time, the user's ECG information is random at each moment. Simulation cannot be copied, and it is safer and more reliable to use ECG information for identity authentication; in addition, compared with other biometric information that is greatly affected by the external environment, such as facial feature information is affected by the intensity of external light, ECG information is not affected by the external environment , which can be better applied to various environments.
作为另一个示例,第一信息可以包括通过加密算法对第一生物特征信息加密得到的信息,第二信息可以包括通过加密算法对第二生物特征信息加密得到的信息。例如,第一信息可以包括通过第一加密算法对第一生物特征信息加密得到的信息,第二信息可以包括通过第一加密算法对第二生物特征信息加密得到的信息;示例性地,认证设备可以接收第一加密算法;进而可以通过第一加密算法对第一受控设备采集到的第一生物特征信息进行加密,从而得到第一信息;认证设备还可以接收第二信息,该第二信息由第一待认证设备通过第一加密算法对其采集的第二生物特征信息加密得到。这样,认证设备接收来自云端服务器的第一加密算法,以便对第一受控设备采集的生物特征信息进行加密,第一信息和第二信息均包括对生物特征信息加密后的信息,进一步提高了信息的安全性。再例如,第一信息可以包括通过第二加密算法对第一生物特征信息加密得到的信息,第二信息可以包括通过第二加密算法对第二生物特征信息加密得到的信息;示例性地,认证设备可以生成第二加密算法,并将该第二加密算法发送至第一待认证设备;认证设备可以通过第二加密算法对第一受控设备采集到的第一生物特征信息进行加密,从而得到第一信息;认证设备还可以接收第二信息,该第二信息由第一待认证设备通过第二加密算法对其采集的第二生物特征信息加密得到。这样,认证设备生成并向第一待认证设备发送第二加密算法,第二加密算法用于对第一受控设备采集的生物特征信息及第一待认证设备采集的生物特征信息进行加密,第一信息和第二信息均包括对生物特征信息加密后的信息,进一步提高了信息的安全性。As another example, the first information may include information obtained by encrypting the first biometric feature information with an encryption algorithm, and the second information may include information obtained by encrypting the second biometric feature information with an encryption algorithm. For example, the first information may include information obtained by encrypting the first biometric information with a first encryption algorithm, and the second information may include information obtained by encrypting the second biometric information with a first encryption algorithm; for example, the authentication device The first encryption algorithm can be received; and the first biometric information collected by the first controlled device can be encrypted by the first encryption algorithm to obtain the first information; the authentication device can also receive the second information, the second information It is obtained by encrypting the second biometric information collected by the first device to be authenticated by using the first encryption algorithm. In this way, the authentication device receives the first encryption algorithm from the cloud server, so as to encrypt the biometric information collected by the first controlled device, and both the first information and the second information include the encrypted biometric information, which further improves the Information Security. For another example, the first information may include information obtained by encrypting the first biometric information with a second encryption algorithm, and the second information may include information obtained by encrypting the second biometric information with a second encryption algorithm; The device can generate a second encryption algorithm, and send the second encryption algorithm to the first device to be authenticated; the authentication device can use the second encryption algorithm to encrypt the first biometric information collected by the first controlled device, thereby obtaining First information; the authentication device may also receive second information, which is obtained by encrypting the second biometric information collected by the first device to be authenticated by using a second encryption algorithm. In this way, the authentication device generates and sends a second encryption algorithm to the first device to be authenticated. The second encryption algorithm is used to encrypt the biometric information collected by the first controlled device and the biometric information collected by the first device to be authenticated. Both the first information and the second information include encrypted biometric information, which further improves information security.
作为另一个示例,第一信息可以包括通过加密算法对第一生物特征信息加密得到的信息,第二信息可以包括第二生物特征信息。例如,第一信息可以为认证设备通过第一加密算法对第一生物特征信息加密得到的信息,第二信息为第二生物特征信息;再例如,第一信息为认证设备通过第二加密算法对第一生物特征信息加密得到的信息,第二信息为第二生物特征信息。As another example, the first information may include information obtained by encrypting the first biological feature information by using an encryption algorithm, and the second information may include the second biological feature information. For example, the first information can be the information obtained by the authentication device encrypting the first biometric information through the first encryption algorithm, and the second information is the second biometric information; The information obtained by encrypting the first biometric feature information, and the second information is the second biometric feature information.
作为另一个示例,第一信息可以包括第一生物特征信息,第二信息可以包括通过加密算法对第二生物特征信息加密得到的信息;例如,第一信息为第一生物特征信息,第二信息为第一待认证设备通过第一加密算法对第二生物特征信息加密得到的信息;再例如,第一信息为第一生物特征信息,第二信息为第一待认证设备通过第二加密算法对第二生物特征信息加密得到的信息。As another example, the first information may include first biometric information, and the second information may include information obtained by encrypting the second biometric information through an encryption algorithm; for example, the first information is the first biometric information, and the second information It is the information obtained by encrypting the second biometric information by the first device to be authenticated by the first encryption algorithm; for another example, the first information is the first biometric information, and the second information is the information obtained by the first device to be authenticated by the second encryption algorithm. Information obtained by encrypting the second biometric feature information.
步骤602、认证设备对第一信息和第二信息进行匹配。 Step 602, the authentication device matches the first information with the second information.
示例性地,认证设备可以利用最小二乘算法,确定第一信息和第二信息的对应差值,若该差值小于相应的预设阈值,则可以判定第一信息和第二信息匹配成功,否则,判定第一信息和第二信息匹配失败。认证设备还可以对第一信息和第二信息分别进行傅里叶变换,并得到第一信息对应的多个频率的峰值,及第二信息对应的多个频率的峰值,求取同一频率的两个峰值的差值,若该差值小于相应的预设阈值,则可以判定第一信息和第二信息匹配成功,否则,判定第一信息和第二信息匹配失败。认证设备还可以比较第一信息和第二信息,得到对应的相似度,在该相似度大于相应的预设阈值时,则可以判定第一信息和第二信息匹配成功;否则,判定第一信息和第二信息匹配失败;其中,上述各预设阈值可根据实际需求进行设定,对此不作限定。Exemplarily, the authentication device may determine a corresponding difference between the first information and the second information by using a least squares algorithm, and if the difference is smaller than a corresponding preset threshold, it may determine that the first information and the second information match successfully, Otherwise, it is determined that the matching between the first information and the second information fails. The authentication device can also perform Fourier transform on the first information and the second information respectively, and obtain the peak values of multiple frequencies corresponding to the first information, and the peak values of multiple frequencies corresponding to the second information, and obtain two peak values of the same frequency. peak value, if the difference is less than the corresponding preset threshold, it can be determined that the first information and the second information match successfully, otherwise, it can be determined that the first information and the second information have failed to match. The authentication device can also compare the first information with the second information to obtain the corresponding similarity. When the similarity is greater than the corresponding preset threshold, it can determine that the first information and the second information match successfully; otherwise, it can determine that the first information Failed to match with the second information; wherein, the above-mentioned preset thresholds can be set according to actual needs, which is not limited.
作为一个示例,若第一信息包括第一生物特征信息,第二信息包括第二生物特征信息;则认证设备可以比较第一生物特征信息与第二生物特征信息,若对应的差值小于预设阈值,则判定第一信息与第二信息匹配成功;否则,判定第一信息与第二信息匹配失败。As an example, if the first information includes the first biometric information, and the second information includes the second biometric information; then the authentication device can compare the first biometric information with the second biometric information, and if the corresponding difference is less than the preset threshold, it is determined that the first information matches the second information successfully; otherwise, it is determined that the first information matches the second information failed.
作为另一个示例,若第一信息包括通过加密算法对第一生物特征信息加密得到的信息,第二信息包括通过加密算法对第二生物特征信息加密得到的信息;则认证设备可以比较第一信息与第二信息,若对应的差值小于预设阈值,表明第一生物特征信息与第二生物特征信息一致,且对应的加密算法相同,则判定第一信息与第二信息匹配成功;否则,判定第一信息与第二信息匹配失败。或者,认证设备可以根据加密算法分别对第一信息与第二信息进行解密,若解密成功,则比较解密得到的第一生物特征信息与解密得到的第二生物特征信息,若对应的差值小于预设阈值,则判定第一信息与第二信息匹配成功;否则,判定第一信息与第二信息匹配失败。As another example, if the first information includes information obtained by encrypting the first biometric information through an encryption algorithm, and the second information includes information obtained by encrypting the second biometric information through an encryption algorithm; then the authentication device can compare the first information and the second information, if the corresponding difference is less than the preset threshold, indicating that the first biometric information is consistent with the second biometric information, and the corresponding encryption algorithm is the same, it is determined that the first information and the second information are successfully matched; otherwise, It is determined that the matching between the first information and the second information fails. Alternatively, the authentication device may respectively decrypt the first information and the second information according to the encryption algorithm, and if the decryption is successful, compare the decrypted first biometric information with the decrypted second biometric information, and if the corresponding difference is less than If the threshold is preset, it is determined that the first information matches the second information successfully; otherwise, it is determined that the first information matches the second information failed.
作为另一个示例,若第一信息包括第一生物特征信息,第二信息包括通过加密算法对第二生物特征信息加密得到的信息;则认证设备可以根据加密算法对第二信息进行解密,若解密成功,则比较第一生物特征信息与解密得到的第二生物特征信息,若对应的差值小于预设阈值,则判定第一信息与第二信息匹配成功;否则,判定第一信息与第二信息匹配失败。类似的,若第一信息包括通过加密算法对第一生物特征信息加密得到的信息,第二信息包括第二生物特征信息;则认证设备可以对第一信息进行解密,并比较第二生物特征信息与解密得到的第一生物特征信息,从而判定第一信息与第二信息匹配成功或失败。As another example, if the first information includes the first biometric information, and the second information includes information obtained by encrypting the second biometric information through an encryption algorithm; then the authentication device can decrypt the second information according to the encryption algorithm, if the decryption If it succeeds, compare the first biometric information with the decrypted second biometric information, and if the corresponding difference is smaller than the preset threshold, it is determined that the first information and the second information match successfully; otherwise, it is determined that the first information and the second information Information matching failed. Similarly, if the first information includes information obtained by encrypting the first biometric information through an encryption algorithm, and the second information includes the second biometric information; then the authentication device can decrypt the first information and compare the second biometric information and the first biometric information obtained through decryption, so as to determine whether the matching between the first information and the second information succeeds or fails.
举例来说,可以将第一生物特征信息List1表示为:List1<[time1,value1]>,第二生物特征信息List2表示为:List2<[time1,value2]>;其中,time1表示第一时刻,value1及value2分别为第一受控设备及第一待认证设备采集的生物特征数值或时长相同的数值序列。认证设备比较value1与value2,例如,认证设备可以利用最小二乘法,确定value1与value2的差值,若该差值小于预设阈值,则判定value1与value2匹配成功,否则,value1与value2匹配失败。再例如,认证设备还可以对value1进行傅里叶变换,得到一阶频率到n阶频率对应的峰值序列[F11,F12,F13,…,F1n],对value2进行傅里叶变换,得到一阶频率到n阶频率对应的峰值序列[F21,F22,F23,…,F2n];针对第i阶频率(n>i>0),认证设备计算峰值F1i与峰值F2i的差值,并将该差值与对应的预 设阈值σi比较,若该差值小于σi,则判定该差值有效,否则判定该差值无效;遍历n阶频率,若各阶频率对应的两个峰值的差值均有效,则判定value1与value2匹配成功,否则,判定value1与value2匹配失败。类似地,可以将通过加密算法对第一生物特征信息List1加密得到的信息List1_new表示为:List1_new<[time1,newValue1]>,将通过加密算法对第二生物特征信息List2加密得到的信息List2_new表示为:List2_new<[time1,newValue2]>,其中,newValue1与newValue2分别为对value1进行加密及对value2进行加密后的数值或数值序列;可以参照上述方式,对newValue1与newValue2进行匹配,或者可以将newValue1和/或newValue2进行解密后,再进行匹配。For example, the first biometric information List1 can be represented as: List1<[time1, value1]>, and the second biometric information List2 can be represented as: List2<[time1, value2]>; where time1 represents the first moment, value1 and value2 are respectively the biometric values collected by the first controlled device and the first device to be authenticated or a sequence of values with the same duration. The authentication device compares value1 and value2. For example, the authentication device can use the least square method to determine the difference between value1 and value2. If the difference is less than the preset threshold, it determines that value1 and value2 match successfully; otherwise, value1 and value2 fail to match. For another example, the authentication device can also perform Fourier transform on value1 to obtain the peak sequence [F11, F12, F13,...,F1n] corresponding to the first-order frequency to n-order frequency, and perform Fourier transform on value2 to obtain the first-order The peak sequence [F21, F22, F23,...,F2n] corresponding to the frequency to the n-order frequency; for the i-th order frequency (n>i>0), the authentication device calculates the difference between the peak value F1i and the peak value F2i, and calculates the difference value is compared with the corresponding preset threshold σi, if the difference is less than σi, it is determined that the difference is valid, otherwise it is determined that the difference is invalid; traversing the n-order frequency, if the difference between the two peaks corresponding to each order frequency is valid , it is determined that value1 and value2 match successfully, otherwise, it is determined that value1 and value2 fail to match. Similarly, the information List1_new obtained by encrypting the first biological feature information List1 through an encryption algorithm can be expressed as: List1_new<[time1, newValue1]>, and the information List2_new obtained by encrypting the second biological feature information List2 through an encryption algorithm can be expressed as : List2_new<[time1,newValue2]>, where newValue1 and newValue2 are the values or sequence of values after encrypting value1 and value2 respectively; you can refer to the above method to match newValue1 and newValue2, or you can match newValue1 and / or newValue2 is decrypted and then matched.
在一种可能的实现方式中,认证设备完成上述匹配后,可以向第一受控设备发送关闭生物特征信息采集功能的控制信息,以指示第一受控设备停止采集生物特征信息,从而节约第一受控设备的能耗。In a possible implementation manner, after the authentication device completes the above matching, it may send control information to the first controlled device to disable the biometric information collection function, so as to instruct the first controlled device to stop collecting biometric information, thereby saving the second The energy consumption of a controlled device.
步骤603、认证设备根据第一信息和第二信息的匹配结果,控制第一受控设备的状态。 Step 603, the authentication device controls the state of the first controlled device according to the matching result of the first information and the second information.
其中,匹配结果可以包括匹配成功和匹配失败;第一受控设备的状态可以包括打开状态或关闭状态。Wherein, the matching result may include matching success and matching failure; the state of the first controlled device may include an open state or an closed state.
在一种可能的实现方式中,在第一信息和第二信息匹配成功的情况下,认证设备可以发送第一控制信息,该第一控制信息用于控制第一受控设备处于打开状态。示例性地,第一受控设备可以为第一智能锁,认证设备可以在第一信息和第二信息匹配成功的情况下,控制第一智能锁打开。其中,第一信息和第二信息匹配成功表明第一待认证设备对应的用户身份认证通过,且用户期望由第一智能锁对应的设备为其提供服务,则认证设备可以控制第一智能锁处于打开状态,以便用户获得相应服务。In a possible implementation manner, when the first information matches the second information successfully, the authentication device may send first control information, where the first control information is used to control the first controlled device to be in an open state. Exemplarily, the first controlled device may be a first smart lock, and the authentication device may control the opening of the first smart lock when the first information and the second information match successfully. Wherein, the successful matching of the first information and the second information indicates that the identity authentication of the user corresponding to the first device to be authenticated has passed, and the user expects to be served by the device corresponding to the first smart lock, then the authentication device can control the first smart lock to be in the Open state, so that the user can get the corresponding service.
在一种可能的实现方式中,在第一信息和第二信息匹配失败的情况下,第一受控设备的状态保持不变,示例性地,第一受控设备的状态初始配置为关闭状态,第一受控设备可以为第一智能锁;第一信息和第二信息匹配失败表明第一待认证设备对应的用户身份认证未通过,没有权限获得相应服务,第一智能锁的状态保持关闭状态。In a possible implementation, when the first information fails to match the second information, the state of the first controlled device remains unchanged, for example, the state of the first controlled device is initially configured as an off state , the first controlled device can be the first smart lock; the failure to match the first information and the second information indicates that the user identity authentication corresponding to the first device to be authenticated has not passed, and there is no right to obtain the corresponding service, and the state of the first smart lock remains closed state.
在一种可能的实现方式中,在控制第一受控设备的状态之后,认证设备向云端服务器发送第一受控设备的标识信息及第二信息,第一受控设备的标识信息和第二信息至少用于生成第一待认证设备对应的结算信息。示例性地,结算信息表示用户获取第一受控设备提供服务所产生的费用相关信息,各受控设备对应的费用及第一信息可以预存在云端服务器中,例如,结算信息可以为上述场景四中的结算业务信息。这样,认证设备向云端服务器发送第一受控设备的标识信息及第二信息,第一受控设备的标识信息用于确定第一受控设备提供服务产生的费用,第二信息用于与第一信息匹配,从而确定该费用为第一待认证设备对应的用户获取第一受控设备提供服务所产生的费用。示例性地,若用户获取多个受控设备的服务,则认证设备可以向云端服务器发送多个受控设备的标识信息及第二信息,用于统一生成第一待认证设备对应的结算信息。In a possible implementation manner, after controlling the state of the first controlled device, the authentication device sends the identification information of the first controlled device and the second information to the cloud server, and the identification information of the first controlled device and the second information The information is at least used to generate settlement information corresponding to the first device to be authenticated. Exemplarily, the settlement information indicates that the user obtains information related to fees generated by the service provided by the first controlled device, and the fees and first information corresponding to each controlled device can be pre-stored in the cloud server. For example, the settlement information can be the above-mentioned scenario 4 Billing business information in . In this way, the authentication device sends the identification information of the first controlled device and the second information to the cloud server, the identification information of the first controlled device is used to determine the service fee generated by the first controlled device, and the second information is used to communicate with the second information. The first information is matched, so that the fee is determined to be the fee generated by the user corresponding to the first device to be authenticated to obtain the service provided by the first controlled device. Exemplarily, if the user obtains services of multiple controlled devices, the authentication device may send the identification information and the second information of the multiple controlled devices to the cloud server, so as to uniformly generate settlement information corresponding to the first device to be authenticated.
这样,认证设备通过执行上述步骤601-603,无需预先存储用户的生物特征信息,通过对所获取的同一时刻的第一信息及第二信息进行匹配,并根据匹配结果控制第一受控设备的状态,从而实现了对第一待认证设备所对应的用户身份认证,同时避免了预先存储用户的生物特征信息存在的泄露风险,提高了信息的安全性,保障了用户隐 私。In this way, by performing the above steps 601-603, the authentication device does not need to pre-store the user's biometric information, and matches the acquired first information and second information at the same time, and controls the first controlled device according to the matching result. state, thereby realizing the user identity authentication corresponding to the first device to be authenticated, and avoiding the leakage risk of pre-stored user biometric information, improving information security, and ensuring user privacy.
此外,在待认证设备或受控设备的数量不止一个的情况下,作为一个示例,认证设备可以获取第一时刻的来自各待认证设备的生物特征信息,针对任一待认证设备,可以将来自该待认证设备的生物特征信息依次与各受控设备采集的生物特征信息进行匹配,若匹配成功,则表明用户预先获取了来自云端服务器或者认证设备的服务授权,认证设备控制匹配成功时所对应的受控设备处于打开状态,这样,认证设备可以同时对多个待认证设备所对应用户进行身份认证,并可以控制多个受控设备同时处于打开状态,从而实现同时为多个身份认证通过的用户提供服务。相对于一对一的服务形式,即同一时间内只能为一个用户提供服务,多个用户需要排队才能依次进行获取服务,本申请实施例中可以同时认证多个用户身份,并可以同时对认证通过的多个用户提供服务,用户无需排队,提高了认证效率,提升了用户体验。此外,针对需要多个认证设备的认证方式,本申请实施例中通过一个认证设备即可实现同时认证多个用户身份,节约了成本。In addition, when the number of devices to be authenticated or controlled devices is more than one, as an example, the authentication device can obtain the biometric information from each device to be authenticated at the first moment, and for any device to be authenticated, the information from The biometric information of the device to be authenticated is sequentially matched with the biometric information collected by each controlled device. If the matching is successful, it indicates that the user has obtained the service authorization from the cloud server or the authentication device in advance. The controlled device is in the open state, so that the authentication device can simultaneously authenticate the users corresponding to multiple devices to be authenticated, and can control multiple controlled devices to be in the open state at the same time, so as to realize the simultaneous authentication of multiple identities. Users provide services. Compared with the one-to-one service form, that is, only one user can be provided with services at the same time, and multiple users need to queue up to obtain services sequentially. In the embodiment of this application, multiple user identities can be authenticated at the same time, and authentication Through multiple users to provide services, users do not need to queue up, which improves the authentication efficiency and improves the user experience. In addition, for an authentication method that requires multiple authentication devices, in the embodiment of the present application, one authentication device can simultaneously authenticate multiple user identities, which saves costs.
下面结合上述无业务场景或先认证后有业务场景,对上述图6所示认证方法的实现过程进行示例性描述。The implementation process of the authentication method shown in FIG. 6 above will be exemplarily described below in combination with the above-mentioned no-service scenario or the authentication-first and then-service scenario.
举例来说,在上述场景三中,用户A在无人售卖机选购商品时,用户A佩戴的可穿戴设备a可以向云端服务器发送采集的心电信息,云端服务器将该心电信息转发至无人售卖机,则用户A获得选购商品授权,若用户手握购物槽锁03所对应的购物槽的把手,购物槽锁03可以采集用户A的心电信息,无人售卖机可以获取购物槽锁03采集的用户的心电信息;无人售卖机可以成功匹配购物槽锁03采集的心电信息与来自可穿戴设备a的心电信息,说明用户A为授权服务对象,且正在选购购物槽锁03所对应的购物槽内的商品,无人售卖机控制购物槽锁03打开,以便用户A在购物槽中取走商品;无人售卖机向云端服务器发送购物槽锁03采集的心电信息及购物槽锁03标识,云端服务器根据预存的各购物槽锁标识对应的商品价格等信息,生成购物槽锁03对应的结算业务信息。云端服务器将购物槽锁03采集的心电信息与来自可穿戴设备a的心电信息进行匹配,从而确定对应的可穿戴设备a,并将该结算业务信息发送到该可穿戴设备a,以便用户A进行结算。这样,无人售卖机无需预先存储用户的心电信息,即可实现用户的身份认证,提高了信息的安全性。此外,在多个获得选购商品授权的用户同时在无人售卖机选购商品时,不同的用户可以触摸不同的购物槽把手,对于任一用户,无人售卖机可以成功匹配该用户所触摸的购物槽锁采集的心电信息与来自该用户的可穿戴设备的心电信息,从而控制多个购物槽锁打开,实现多用户同时选购商品,用户无需排队,节约了用户时间,提高了用户体验。For example, in the above-mentioned scenario three, when user A is shopping at an unmanned vending machine, the wearable device a worn by user A can send the collected ECG information to the cloud server, and the cloud server forwards the ECG information to For an unmanned vending machine, user A is authorized to purchase goods. If the user holds the handle of the shopping trough corresponding to the shopping trough lock 03, the shopping trough lock 03 can collect user A’s ECG information, and the unmanned vending machine can obtain the shopping The user's ECG information collected by the slot lock 03; the unmanned vending machine can successfully match the ECG information collected by the shopping slot lock 03 with the ECG information from the wearable device a, indicating that user A is an authorized service object and is shopping For the goods in the shopping trough corresponding to the shopping trough lock 03, the unmanned vending machine controls the opening of the shopping trough lock 03, so that user A can take the goods in the shopping trough; the unmanned vending machine sends the heart rate collected by the shopping trough lock 03 to the cloud server Electronic information and shopping slot lock 03 logo, the cloud server generates settlement business information corresponding to shopping slot lock 03 according to the pre-stored information such as commodity prices corresponding to each shopping slot lock logo. The cloud server matches the ECG information collected by the shopping slot lock 03 with the ECG information from the wearable device a, thereby determining the corresponding wearable device a, and sends the settlement business information to the wearable device a, so that the user A makes the settlement. In this way, the unmanned vending machine can realize the user's identity authentication without storing the user's ECG information in advance, which improves the security of information. In addition, when multiple users who are authorized to purchase commodities purchase commodities in the unmanned vending machine at the same time, different users can touch different shopping trough handles. For any user, the unmanned vending machine can successfully match the handles touched by the user. The ECG information collected by the shopping trough lock and the ECG information from the user's wearable device can control the opening of multiple shopping trough locks, so that multiple users can purchase goods at the same time, and the user does not need to queue up, which saves the user's time and improves the user experience.
举例来说,在上述场景四中,用户B预先获得了智能车辆的使用授权,用户B所佩戴的可穿戴设备b与智能车辆配置同一加密算法;当用户B到达智能车辆附近时,可穿戴设备b采集用户B的心电信息并利用上述加密算法进行加密,可穿戴设备b将加密后的信息发送至智能车辆,智能车辆利用加密算法对收到的信息进行解密,得到可穿戴设备b所采集的心电信息;在车锁01与可穿戴设备b之间的距离小于5m的情况下,认证设备控制车锁01开启心电信息采集功能,用户B触摸车锁01对应的车门把手时,智能车辆可以获取车锁01采集的心电信息,智能车辆可以成功匹配可穿戴设 备b所采集的心电信息与车锁01采集的心电信息,说明用户B为经授权的用户,智能车辆控制车锁01打开,以便用户使用车辆。这样,智能车辆无需预先存储用户的心电信息,即可实现用户的身份认证,提高了信息的安全性。此外,在多个获取使用授权的用户同时开车门时,不同用户可以触摸不同的车门把手,对于任一用户,智能车辆可以成功匹配该用户所触摸门锁采集的心电信息与来自该用户的可穿戴设备的心电信息,从而控制多个门锁打开,实现多用户同时开门解锁。进一步地,在每次解锁成功后,智能车辆还可以更新加密算法,从而保证加密算法的时效性,并将更新后的加密算法发送至可穿戴设备,以便下次开锁时使用。For example, in the above-mentioned scenario four, user B has obtained the authorization to use the smart vehicle in advance, and the wearable device b worn by user B is configured with the same encryption algorithm as the smart vehicle; when user B arrives near the smart vehicle, the wearable device b b collects the ECG information of user B and encrypts it using the above-mentioned encryption algorithm. The wearable device b sends the encrypted information to the smart vehicle, and the smart vehicle uses the encryption algorithm to decrypt the received information to obtain the information collected by the wearable device b. ECG information; when the distance between car lock 01 and wearable device b is less than 5m, the authentication device controls car lock 01 to enable the ECG information collection function, and when user B touches the door handle corresponding to car lock 01, the smart The vehicle can obtain the ECG information collected by the car lock 01, and the smart vehicle can successfully match the ECG information collected by the wearable device b with the ECG information collected by the car lock 01, indicating that user B is an authorized user, and the smart vehicle controls the car The lock 01 is opened for the user to use the vehicle. In this way, the smart vehicle can realize the identity authentication of the user without storing the user's ECG information in advance, which improves the security of information. In addition, when multiple authorized users open the door at the same time, different users can touch different door handles. For any user, the smart vehicle can successfully match the ECG information collected by the door lock touched by the user with the ECG information from the user. The ECG information of the wearable device can control the opening of multiple door locks, enabling multiple users to open and unlock the door at the same time. Furthermore, after each successful unlocking, the smart vehicle can also update the encryption algorithm to ensure the timeliness of the encryption algorithm, and send the updated encryption algorithm to the wearable device for use when unlocking next time.
图7示出根据本申请一实施例的另一种认证方法的流程图,示例性地,该方法可以由上述图1中的认证设备101执行;如图7所示,该方法可以包括以下步骤:Fig. 7 shows a flow chart of another authentication method according to an embodiment of the present application. Exemplarily, this method may be executed by the authentication device 101 in Fig. 1 above; as shown in Fig. 7, this method may include the following steps :
步骤701、认证设备获取第三信息和第四信息。其中,第三信息与第一业务信息相关联,第一业务信息为云端服务器为第一受控设备提供的业务信息,第四信息与第二业务信息相关联,第二业务信息为云端服务器为第一待认证设备提供的业务信息。 Step 701, the authentication device acquires third information and fourth information. Wherein, the third information is associated with the first business information, and the first business information is the business information provided by the cloud server for the first controlled device, and the fourth information is associated with the second business information, and the second business information is that the cloud server is Service information provided by the first device to be authenticated.
其中,第三信息与第一业务信息相关联可以表示:第三信息包括第一业务信息,或者第三信息包括对第一业务信息进行处理后所得到的信息,例如,第三信息可以包括通过加密算法对第一业务信息加密得到的信息。第四信息与第二业务信息相关联表示:第四信息包括第二业务信息,或者第四信息包括对第二业务信息进行处理后所得到的信息,例如,第四信息可以包括通过加密算法对第二业务信息加密得到的信息。Wherein, the association of the third information with the first business information may indicate that: the third information includes the first business information, or the third information includes information obtained after processing the first business information, for example, the third information may include The encryption algorithm encrypts the first service information to obtain information. The association between the fourth information and the second business information means that: the fourth information includes the second business information, or the fourth information includes the information obtained after processing the second business information, for example, the fourth information may include Information obtained by encrypting the second service information.
示例性地,加密算法可以包括来自云端服务器的第一加密算法,还可以包括来自认证设备的第二加密算法。Exemplarily, the encryption algorithm may include a first encryption algorithm from the cloud server, and may also include a second encryption algorithm from the authentication device.
作为一个示例,第三信息可以包括第一业务信息,第四信息可以包括第二业务信息;作为另一个示例,第三信息可以包括通过加密算法对第一业务信息加密得到的信息,第四信息可以包括通过加密算法对第二业务信息加密得到的信息;作为另一个示例,第三信息可以包括通过加密算法对第一业务信息加密得到的信息,第四信息可以包括第二业务信息;作为另一个示例,第三信息可以包括第一业务信息,第四信息可以包括通过加密算法对第二业务信息加密得到的信息。As an example, the third information may include the first service information, and the fourth information may include the second service information; as another example, the third information may include information obtained by encrypting the first service information through an encryption algorithm, and the fourth information It may include the information obtained by encrypting the second business information through an encryption algorithm; as another example, the third information may include the information obtained by encrypting the first business information through an encryption algorithm, and the fourth information may include the second business information; as another In one example, the third information may include the first service information, and the fourth information may include information obtained by encrypting the second service information by using an encryption algorithm.
其中,业务信息表示云端服务器预先分配的服务相关信息,以指示目标受控设备为目标待认证设备对应的用户提供服务,即目标待认证设备对应的用户为目标受控设备的授权服务对象。例如,业务信息可以为上述场景一中的充电业务信息,也可以为上述场景二中的取件业务信息等等。可以理解的是,对于任一业务信息,云端服务器可以预先为相应的目标待认证设备及目标受控设备提供该业务信息。第一业务信息可以指示第一受控设备可以为相应的目标待认证设备对应的用户提供服务,第二业务信息可以指示第一待认证设备对应用户可以获取相应的目标受控设备的服务。Wherein, the service information represents the service-related information pre-allocated by the cloud server to instruct the target controlled device to provide services for the user corresponding to the target device to be authenticated, that is, the user corresponding to the target device to be authenticated is the authorized service object of the target controlled device. For example, the service information may be the charging service information in the above-mentioned scenario 1, or the pickup service information in the above-mentioned scenario 2, and so on. It can be understood that, for any service information, the cloud server may provide the service information to the corresponding target device to be authenticated and the target controlled device in advance. The first service information may indicate that the first controlled device can provide a service for a user corresponding to the target device to be authenticated, and the second service information may indicate that the user corresponding to the first device to be authenticated can obtain the service of the corresponding target controlled device.
在一种可能的实现方式中,认证设备可以接收来自云端服务器的第三信息,还可以接收来自第一待认证设备的第四信息。作为一个示例,认证设备可以在接收第四信息之前预先接收第三信息,并将第三信息预先保存在本地,例如,认证设备可以将第三信息存储在白名单中。示例性地,认证设备可以预先获取云端服务器为一个或多个受控设备提供的业务信息,并将各业务信息存储在白名单中。In a possible implementation manner, the authentication device may receive third information from the cloud server, and may also receive fourth information from the first device to be authenticated. As an example, the authentication device may receive the third information in advance before receiving the fourth information, and pre-save the third information locally, for example, the authentication device may store the third information in a white list. Exemplarily, the authentication device may pre-obtain service information provided by the cloud server for one or more controlled devices, and store each service information in a white list.
步骤702、认证设备对第三信息和第四信息进行匹配。 Step 702, the authentication device matches the third information with the fourth information.
其中,该步骤中对第三信息和第四信息进行匹配的可能实现方式,可参照上述步骤602中第一信息和第二信息进行匹配的相关表述。Wherein, for a possible implementation manner of matching the third information and the fourth information in this step, reference may be made to the related expression of matching the first information and the second information in the above-mentioned step 602 .
示例性地,认证设备可以将第二业务信息与白名单中的第一业务信息进行匹配。可以理解的是,在白名单中存储多个业务信息时,可以将第二业务信息依次与各业务信息进行匹配,直到匹配成功,或者遍历白名单中所有的业务信息。Exemplarily, the authentication device may match the second service information with the first service information in the whitelist. It can be understood that when storing multiple pieces of business information in the white list, the second business information can be matched with each business information in sequence until the matching is successful, or all the business information in the white list can be traversed.
示例性地,第一业务信息可以包括第一受控设备的标识信息;第二业务信息可以包括目标受控设备的标识信息。可以理解的是,若目标受控设备的标识信息与第一受控设备的标识信息相同,则表明第一业务信息与第二业务信息为相同的业务信息,第一受控设备即为可以为第一待认证设备对应用户提供服务的目标受控设备。Exemplarily, the first service information may include identification information of the first controlled device; the second service information may include identification information of the target controlled device. It can be understood that if the identification information of the target controlled device is the same as the identification information of the first controlled device, it means that the first service information and the second service information are the same service information, and the first controlled device can be The first device to be authenticated corresponds to a target controlled device for the user to provide services.
该步骤中,认证设备可以通过对第三信息和第四信息进行匹配,从而判定第二业务信息与第一业务信息是否为同一业务信息,即判定第一待认证设备对应的用户是否为第一受控设备的授权服务对象,从而实现授权认证。In this step, the authentication device can determine whether the second service information and the first service information are the same service information by matching the third information and the fourth information, that is, determine whether the user corresponding to the first device to be authenticated is the first The authorized service object of the controlled device, so as to realize authorization authentication.
步骤703、在第三信息和第四信息匹配成功的情况下,认证设备获取第一信息和第二信息。 Step 703. If the third information and the fourth information match successfully, the authentication device acquires the first information and the second information.
该步骤中,认证设备获取第一信息和第二信息的具体说明,可参照上述步骤601中相关表述,此处不再赘述。In this step, for specific instructions on how the authentication device acquires the first information and the second information, reference may be made to relevant expressions in the above-mentioned step 601, which will not be repeated here.
其中,若第三信息和第四信息匹配成功,则表明第二业务信息与第一业务信息为同一业务信息,即第一待认证设备对应的用户是第一受控设备的授权服务对象,第一受控设备即为第一待认证设备对应用户提供服务的目标受控设备,认证设备可以进一步获取第一信息和第二信息。Wherein, if the third information and the fourth information match successfully, it indicates that the second business information and the first business information are the same business information, that is, the user corresponding to the first device to be authenticated is the authorized service object of the first controlled device, and the second A controlled device is a target controlled device that provides services to users corresponding to the first device to be authenticated, and the authentication device may further obtain the first information and the second information.
在一种可能的实现方式中,在第三信息和第四信息匹配成功的情况下,认证设备可以向第一受控设备发送第三控制信息,第三控制信息用于控制第一受控设备采集第一生物特征信息。示例性地,第一受控设备采集生物特征信息的功能初始配置为关闭状态,这样,在第三信息和第四信息匹配成功的情况下,表明由第一受控设备为第一待认证设备所对应的用户提供服务,且用户具有解锁第一受控设备的意图,认证设备控制第一受控设备开启生物特征信息采集功能,以便当用户触摸第一受控设备时,第一受控设备可以采集到用户的生物特征信息;同时,第一受控设备仅在需要时开启生物特征信息采集功能,从而降低了第一受控设备的能耗及认证设备的数据处理量。In a possible implementation manner, when the third information and the fourth information match successfully, the authentication device may send third control information to the first controlled device, and the third control information is used to control the first controlled device Collect first biometric information. Exemplarily, the function of the first controlled device to collect biometric information is initially configured as off, so that if the third information and the fourth information match successfully, it indicates that the first controlled device is the first device to be authenticated The corresponding user provides services, and the user intends to unlock the first controlled device, and the authentication device controls the first controlled device to enable the biometric information collection function, so that when the user touches the first controlled device, the first controlled device The biometric information of the user can be collected; at the same time, the first controlled device only enables the biometric information collection function when needed, thereby reducing the energy consumption of the first controlled device and the data processing amount of the authentication device.
在一种可能的实现方式中,在第三信息和第四信息匹配成功的情况下,认证设备可以向第一待认证设备反馈匹配成功的信息,从而获取来自第一待认证设备的第二信息。In a possible implementation, when the third information and the fourth information are successfully matched, the authentication device may feed back the information that the matching is successful to the first device to be authenticated, so as to obtain the second information from the first device to be authenticated .
可以理解的是,在第三信息和第四信息匹配失败的情况下,表明第二业务信息与第一业务信息并非同一业务信息,即第一待认证设备对应的用户不是第一受控设备的授权服务对象,则认证设备可以不对来自第一待认证设备的第二信息进行处理,从而减少数据处理量。It can be understood that, in the case where the matching of the third information and the fourth information fails, it indicates that the second business information is not the same business information as the first business information, that is, the user corresponding to the first device to be authenticated is not the user of the first controlled device. If the service object is authorized, the authentication device may not process the second information from the first device to be authenticated, thereby reducing the amount of data processing.
步骤704、认证设备对第一信息和第二信息进行匹配。 Step 704, the authentication device matches the first information with the second information.
该步骤的具体说明,可参照上述步骤602的相关表述,此处不再赘述。For a specific description of this step, reference may be made to the relevant expression of the above-mentioned step 602, which will not be repeated here.
步骤705、认证设备根据第一信息和第二信息的匹配结果,控制受控设备的状态。 Step 705, the authentication device controls the state of the controlled device according to the matching result between the first information and the second information.
该步骤的具体说明,可参照上述步骤603的相关表述,此处不再赘述。For a specific description of this step, reference may be made to the relevant expression of the above-mentioned step 603, which will not be repeated here.
这样,认证设备通过执行上述步骤701-705,对第三信息和第四信息进行匹配,从而实现授权认证,若第三信息和第四信息匹配成功,表明第二业务信息与第一业务信息为同一业务信息,即第一待认证设备对应的用户是第一受控设备的授权服务对象;则在授权认证通过的情况下,认证设备获取第一信息和第二信息并进行匹配,并根据匹配结果控制第一受控设备的状态,认证设备无需预先存储用户的生物特征信息,即可实现对第一待认证设备所对应的用户的身份认证,从而保证由第一待认证设备对应的用户开启第一受控设备,同时避免了预先存储用户的生物特征信息存在的泄露风险,提高了信息的安全性,保障了用户隐私。In this way, the authentication device matches the third information with the fourth information by performing the above steps 701-705, thereby realizing authorization authentication. If the third information and the fourth information are successfully matched, it indicates that the second business information is equal to the first business information. The same business information, that is, the user corresponding to the first device to be authenticated is the authorized service object of the first controlled device; then, if the authorization authentication passes, the authentication device obtains the first information and the second information and performs matching, and according to the matching As a result, the state of the first controlled device is controlled, and the authentication device can realize the identity authentication of the user corresponding to the first device to be authenticated without storing the user's biometric information in advance, thereby ensuring that the user corresponding to the first device to be authenticated opens the The first controlled device avoids the leakage risk of pre-stored user biometric information, improves information security, and protects user privacy.
此外,在待认证设备或受控设备的数量不止一个的情况下,作为一个示例,在同一时刻,认证设备可以获取来自多个待认证设备的业务信息,针对任一待认证设备,可以将云端服务器为该待认证设备提供的业务信息依次与云端服务器为各受控设备提供的业务信息进行匹配,从而实现同时对多个待认证设备所对应用户进行授权认证。另外,在多个待认证设备所对应的用户授权认证通过的情况下,针对任一待认证设备,认证设备获取该待认证设备采集的生物特征信息,及对应的目标受控设备所采集的生物特征信息,并将两者进行匹配,若匹配成功,则认证设备控制该目标受控设备处于打开状态,否则,目标受控设备保持关闭状态;从而实现同时对多个待认证设备所对应用户进行身份认证,并保证由待认证设备对应的用户开启对应的目标受控设备;并且,在同一时刻,多个待认证设备所对应的用户均能打开各自对应的目标受控设备,从而实现同时为多个用户提供服务。相对于一对一的服务形式,本申请实施例中可以同时进行多个用户的授权认证及身份认证,并可以同时对认证通过的多个用户提供服务,提高了认证效率,提升了用户体验。此外,针对需要多个认证设备的认证方式,本申请实施例中通过一个认证设备即可实现同时认证多个用户身份,节约了成本。In addition, when the number of devices to be authenticated or controlled devices is more than one, as an example, at the same time, the authentication device can obtain business information from multiple devices to be authenticated, and for any device to be authenticated, the cloud The service information provided by the server for the device to be authenticated is sequentially matched with the service information provided by the cloud server for each controlled device, so as to simultaneously authorize and authenticate users corresponding to multiple devices to be authenticated. In addition, when the user authorization authentication corresponding to multiple devices to be authenticated passes, for any device to be authenticated, the authentication device obtains the biometric information collected by the device to be authenticated, and the biometric information collected by the corresponding target controlled device. If the matching is successful, the authentication device will control the target controlled device to be in the open state, otherwise, the target controlled device will remain in the closed state; thereby realizing simultaneous authentication of users corresponding to multiple devices to be authenticated Identity authentication, and ensure that the corresponding target controlled device is opened by the user corresponding to the device to be authenticated; and, at the same time, users corresponding to multiple devices to be authenticated can open their corresponding target controlled devices, so as to realize simultaneous Multiple users provide services. Compared with the one-to-one service form, in the embodiment of the present application, authorization authentication and identity authentication of multiple users can be performed at the same time, and services can be provided to multiple authenticated users at the same time, which improves authentication efficiency and user experience. In addition, for an authentication method that requires multiple authentication devices, in the embodiment of the present application, one authentication device can simultaneously authenticate multiple user identities, which saves costs.
下面结合上述先有业务后认证场景,对上述图7所示认证方法的实现过程进行示例性描述。The implementation process of the authentication method shown in FIG. 7 is described below in combination with the above authentication scenario after the existing service.
举例来说,在上述场景一中,用户C所驾驶的车辆需要充电时,用户C可以通过佩戴的可穿戴设备c向云端服务器发送充电请求信息,云端服务器根据用户的充电请求信息分配智能充电车中充电枪锁01对应的充电枪为用户C提供充电服务,并生成相应的充电业务信息,该充电业务信息包含充电枪锁01标识;云端服务器将该充电业务信息下发至智能充电车及可穿戴设备c;智能充电车将该充电业务信息存储在白名单中,智能充电车行驶至充电业务信息中所指示的位置,可穿戴设备c向智能充电车发送充电业务信息及采集的用户C的心电信息。智能充电车将接收的可穿戴设备c所发送的充电业务信息与白名单中的各充电业务信息进行匹配,包含充电枪锁01标识的充电业务信息与充电枪锁01发送的充电业务信息匹配成功,从而智能充电车可以确认用户C为智能充电车的授权服务对象,且由充电枪锁01对应的充电枪为用户C提供充电服务,进而智能充电车向充电枪锁01发送控制信息,控制充电枪锁01开启心电信息采集功能。用户C可以拔取智能充电车搭载的充电枪为自己的车辆充电;若用户C拔取充电枪锁01对应充电枪,充电枪锁01可以采集用户C的心电信息并发送至智能充电车,智能充电车可以成功匹配上述充电枪锁01采集的心电信息与接收的来自可穿戴设备c的心电信息,说明用户C正在拔取充电枪锁01所对应的充电枪,则智能充 电车控制充电枪锁01打开,以便用户C进行充电。若其他用户拔取充电枪锁01对应的充电枪,充电枪锁01采集的心电信息与来自可穿戴设备c的心电信息匹配失败,说明并非用户C在拔取充电枪锁01对应的充电枪,充电枪锁01仍旧保持关闭状态。这样,智能充电车无需预先存储用户的心电信息,即可实现用户的身份认证,提高了信息的安全性。此外,在智能充电车同时需要为多个用户提供充电服务时,不同用户可以拔取不同的充电枪,对于任一用户,仅当该用户拔取云端服务器为其分配的充电枪时,可以打开相应的充电枪锁,而其他用户无法打开该充电枪锁,防止其他用户拔取云端服务器为该用户分配的充电枪给另一车辆充电,从而确保每一用户均能拔取云端服务器为其分配的对应充电枪进行充电,满足各用户的充电需求;并且,在同一时刻,多个用户均拔取云端服务器为各用户分配的充电枪时,智能充电车可以控制多个充电枪锁打开,实现多用户的同步充电。For example, in the above scenario 1, when the vehicle driven by user C needs to be charged, user C can send charging request information to the cloud server through the wearable device c worn by user C, and the cloud server will allocate a smart charging car according to the charging request information of the user. The charging gun corresponding to charging gun lock 01 provides charging service for user C and generates corresponding charging service information. The charging service information includes the identification of charging gun lock 01; Wearable device c; the smart charging car stores the charging service information in the white list, the smart charging car drives to the location indicated in the charging service information, and the wearable device c sends the charging service information and collected user C's information to the smart charging car. ECG information. The smart charging car matches the charging service information sent by the received wearable device c with the charging service information in the white list, and the charging service information including the charging gun lock 01 logo is successfully matched with the charging service information sent by the charging gun lock 01 , so that the smart charging car can confirm that user C is the authorized service object of the smart charging car, and the charging gun corresponding to the charging gun lock 01 provides charging service for user C, and then the smart charging car sends control information to the charging gun lock 01 to control charging Gunlock 01 enables the ECG information collection function. User C can pull out the charging gun equipped with the smart charging car to charge his own vehicle; if user C pulls out the charging gun corresponding to the charging gun lock 01, the charging gun lock 01 can collect the ECG information of user C and send it to the smart charging car, and the smart charging The car can successfully match the ECG information collected by the charging gun lock 01 with the received ECG information from the wearable device c, indicating that user C is pulling out the charging gun corresponding to the charging gun lock 01, and the smart charging car controls the charging gun lock 01 is turned on for user C to charge. If other users pull out the charging gun corresponding to charging gun lock 01, the ECG information collected by charging gun lock 01 fails to match the ECG information from wearable device c, indicating that user C is not pulling out the charging gun corresponding to charging gun lock 01. Charging gun lock 01 remains closed. In this way, the smart charging car can realize the user's identity authentication without pre-storing the user's ECG information, which improves the security of information. In addition, when the smart charging car needs to provide charging services for multiple users at the same time, different users can pull out different charging guns. For any user, only when the user pulls out the charging gun assigned to him by the cloud server, can open the corresponding Charging gun lock, and other users cannot open the charging gun lock, preventing other users from pulling out the charging gun assigned to the user by the cloud server to charge another vehicle, so as to ensure that each user can pull out the corresponding charging gun assigned by the cloud server Charging to meet the charging needs of each user; and, at the same time, when multiple users pull out the charging guns allocated by the cloud server for each user, the smart charging car can control the opening of multiple charging gun locks to realize multi-user synchronous charging .
举例来说,在上述场景二中,储物箱锁02对应的储物箱存放有用户D的快递,云端服务器生成相应的取件业务信息及加密算法,该取件业务信息包括储物箱锁02标识,云端服务器将该取件业务信息及加密算法分别发送至智能快递柜、用户D的可穿戴设备d,智能快递柜将该取件业务信息存储在白名单中。用户D到达该智能快递柜附近后,可穿戴设备d采集用户D的心电信息并利用上述加密算法进行加密,可穿戴设备d向智能快递柜发送取件业务信息及加密后的信息。智能快递柜将接收的来自的可穿戴设备d的取件业务信息与白名单中的各取件业务信息进行匹配,包含储物箱锁02标识的取件业务信息与可穿戴设备d发送的取件业务信息匹配成功,从而智能快递柜可以确认用户D为智能快递柜的授权服务对象,且储物箱锁02对应的储物箱内存储有用户D的快递,进而智能快递柜可以向储物箱锁02发送控制信息,控制储物箱锁02开启心电信息采集功能。用户D触摸储物箱的门把手,若用户D触摸储物箱锁02对应的储物箱门把手,储物箱锁02可以采集用户D的心电信息并发送至智能快递柜,智能快递柜利用上述加密算法对储物箱锁02采集的心电信息进行加密,并将加密后的信息与可穿戴设备d所发送的加密后的信息进行匹配,智能快递柜可以成功这两个加密后的信息,说明用户D正在触摸储物箱锁02对应的储物箱门把手,则智能快递柜控制储物箱锁02打开,以便用户D取走快递。若其他用户触摸储物箱锁02对应的储物箱门把手,智能快递柜对储物箱锁02所采集的心电信息进行加密,加密后的信息与来自可穿戴设备d的加密后的信息匹配失败,说明并非用户D在触摸储物箱锁02对应的储物箱门把手,储物箱锁02仍旧保持关闭状态。这样,智能快递柜无需预先存储用户的心电信息,即可实现用户的身份认证,提高了信息的安全性。此外,在多个用户同时在智能快递柜取件时,不同的用户可以触摸不同的储物箱门把手,对于任一用户,仅当该用户触摸存储其快递的储物箱门把手时,可以打开相应的储物箱锁,而其他用户无法打开该储物箱锁,避免其他用户取走该用户的快递,从而确保每一用户均能取走自己的快递;并且,在同一时刻,多个用户触摸存储各自快递的储物箱门把手时,智能快递柜可以控制多个储物箱锁打开,实现多用户的同步取件。For example, in the above scenario 2, the locker corresponding to the locker 02 stores the courier of user D, and the cloud server generates the corresponding pickup service information and encryption algorithm. The pickup service information includes the locker lock 02, the cloud server sends the pickup service information and encryption algorithm to the smart express cabinet and user D’s wearable device d, and the smart express cabinet stores the pickup service information in the white list. After user D arrives near the smart express cabinet, wearable device d collects user D's ECG information and encrypts it using the above encryption algorithm, and wearable device d sends the pick-up business information and encrypted information to the smart express cabinet. The smart express cabinet matches the pickup service information received from the wearable device d with the pickup service information in the whitelist, including the pickup service information identified by locker 02 and the pickup service information sent by the wearable device d. The business information of the package is successfully matched, so that the smart express cabinet can confirm that user D is the authorized service object of the smart express cabinet, and the storage box corresponding to the storage box lock 02 contains the express delivery of user D, and then the smart express cabinet can send The box lock 02 sends control information to control the storage box lock 02 to enable the ECG information collection function. User D touches the door handle of the storage box. If user D touches the door handle of the storage box corresponding to the storage box lock 02, the storage box lock 02 can collect the ECG information of user D and send it to the smart express cabinet. Use the above encryption algorithm to encrypt the ECG information collected by the locker lock 02, and match the encrypted information with the encrypted information sent by the wearable device d. The information indicates that the user D is touching the door handle of the storage box corresponding to the storage box lock 02, and the smart express cabinet controls the storage box lock 02 to open so that the user D can take the express delivery. If another user touches the door handle of the storage box corresponding to the storage box lock 02, the smart express cabinet encrypts the ECG information collected by the storage box lock 02, and the encrypted information and the encrypted information from the wearable device d If the matching fails, it means that the user D is not touching the handle of the storage box door corresponding to the storage box lock 02, and the storage box lock 02 remains closed. In this way, the smart express cabinet can realize the user's identity authentication without pre-storing the user's ECG information, which improves the security of information. In addition, when multiple users pick up items in the smart express cabinet at the same time, different users can touch different locker door handles. Open the corresponding storage box lock, and other users cannot open the storage box lock, so as to prevent other users from taking the user's courier, thereby ensuring that each user can take his own courier; and, at the same time, multiple When the user touches the door handle of the locker that stores their respective couriers, the smart express cabinet can control the locks of multiple lockers to open, realizing the simultaneous pick-up of multiple users.
进一步地,在认证设备控制第一受控设备的状态之后,认证设备可以对上述所获取的信息(如生物特征信息、加密算法或业务信息等中的一项或多项)进行清除处理,从而避免信息泄露,保障信息安全。示例性地,认证设备可以在执行完上述步骤603 或步骤705之后,清除相关信息。Further, after the authentication device controls the state of the first controlled device, the authentication device may clear the acquired information (such as one or more of biometric information, encryption algorithm, or business information, etc.), so that Avoid information leakage and ensure information security. Exemplarily, the authentication device may clear relevant information after performing the above step 603 or step 705 .
作为一个示例,认证设备在控制第一受控设备的状态之后,可以清除第一信息及第二信息。可以理解的是,认证设备在控制第一受控设备的状态之后,用户的身份认证已经完成,由于第一信息及第二信息包含用户的生物特征信息,认证设备无需存储该第一信息和第二信息,及时清除第一信息及第二信息,从而避免信息泄露,保护用户隐私,同时节省存储空间。As an example, the authentication device may clear the first information and the second information after controlling the state of the first controlled device. It can be understood that after the authentication device controls the state of the first controlled device, the user's identity authentication has been completed. Since the first information and the second information include the user's biometric information, the authentication device does not need to store the first information and the second information. The second information, clear the first information and the second information in time, so as to avoid information leakage, protect user privacy, and save storage space at the same time.
作为一个示例,认证设备在控制第一受控设备的状态之后,认证设备可以清除加密算法。其中,加密算法可以包括第一加密算法或第二加密算法。示例性地,认证设备在每次认证过程中所采用的加密算法可以不同,认证设备在控制第一受控设备的状态之后,用户的身份认证已经完成,认证设备可以清除加密算法,从而避免加密算法泄露,保障信息安全,同时节省存储空间。As an example, after the authentication device controls the state of the first controlled device, the authentication device may clear the encryption algorithm. Wherein, the encryption algorithm may include the first encryption algorithm or the second encryption algorithm. Exemplarily, the encryption algorithm used by the authentication device in each authentication process can be different. After the authentication device controls the state of the first controlled device, the user's identity authentication has been completed, and the authentication device can clear the encryption algorithm to avoid encryption. Algorithm leakage ensures information security and saves storage space.
作为一个示例,认证设备在控制第一受控设备的状态之后,认证设备可以清除业务信息;示例性地,认证设备可以清除云端服务器为第一受控设备提供的业务信息,还可以清除所接收的来自第一待认证设备的业务信息。认证设备在控制第一受控设备的状态之后,用户的授权认证已经完成,由于业务信息可能包括用户的个人信息,认证设备清除业务信息;从而避免信息泄露,保护用户隐私,同时节省存储空间。As an example, after the authentication device controls the state of the first controlled device, the authentication device can clear the business information; for example, the authentication device can clear the business information provided by the cloud server for the first controlled device, and can also clear the received The service information from the first device to be authenticated. After the authentication device controls the state of the first controlled device, the user's authorization authentication has been completed. Since the business information may include the user's personal information, the authentication device clears the business information; thereby avoiding information leakage, protecting user privacy, and saving storage space.
举例来说,在上述场景一中,在用户C成功拔取充电枪锁01对应的充电枪后,智能充电车可以清除云端服务器为充电枪锁01提供的充电业务信息,或来自可穿戴设备c的充电业务信息。在上述场景二中,在用户D从储物箱锁02对应的储物箱取走快递后,智能快递柜可以清除加密算法,还可以清除云端服务器为储物箱锁02提供的取件业务信息或来自可穿戴设备d的取件业务信息。在上述场景三中,在用户A拿走购物槽锁03对应的购物槽内的商品或完成结算后,无人售卖机可以清除购物槽锁03所采集的心电信息或来自可穿戴设备a的心电信息。在上述场景四中,在用户B成功打开车锁01对应的车门后,智能车辆可以清除加密算法,还可以清除车锁01采集的心电信息或来自可穿戴设备b的心电信息。For example, in the above scenario 1, after user C successfully pulls out the charging gun corresponding to the charging gun lock 01, the smart charging car can clear the charging service information provided by the cloud server for the charging gun lock 01, or the charging service information from the wearable device c. Charging business information. In the above scenario 2, after user D takes the courier from the storage box corresponding to the storage box lock 02, the smart express cabinet can clear the encryption algorithm, and can also clear the pickup business information provided by the cloud server for the storage box lock 02 Or pickup business information from wearable device d. In the above scenario three, after user A takes away the goods in the shopping slot corresponding to the shopping slot lock 03 or completes the settlement, the unmanned vending machine can clear the ECG information collected by the shopping slot lock 03 or the ECG information from the wearable device a. ECG information. In the above scenario four, after user B successfully opens the door corresponding to car lock 01, the smart vehicle can clear the encryption algorithm, and also clear the ECG information collected by car lock 01 or the ECG information from wearable device b.
图8示出根据本申请一实施例的另一种认证方法的流程图,示例性地,该方法可以由上述图1中的待认证设备(如待认证设备102)执行,如图8所示,该方法可以包括以下步骤:Fig. 8 shows a flowchart of another authentication method according to an embodiment of the present application. Exemplarily, the method may be executed by the device to be authenticated (such as the device to be authenticated 102) in Fig. 1 above, as shown in Fig. 8 , the method may include the following steps:
步骤801、第一待认证设备采集第一时刻的第二生物特征信息,第二生物特征信息关联于第一待认证设备对应的用户。 Step 801, the first device to be authenticated collects second biometric information at the first moment, and the second biometric information is associated with a user corresponding to the first device to be authenticated.
示例性地,第二生物特征信息可以包括第二心电信息,第一待认证设备配置有心电传感器,心电传感器用于采集第二心电信息。由于心电信息具有唯一性,即不同用户的心电信息不同,利用心电信息能够准确区分不同用户,从而保证了用户身份认证的准确性;同时,每一时刻用户的心电信息具有随机性,无法复制模拟,利用心电信息进行身份认证更加安全可靠;此外,相对于受外部环境影响较大的其他生物特征信息,心电信息不受外部环境影响,可以更好地适用于各种环境。Exemplarily, the second biometric information may include second electrocardiographic information, the first device to be authenticated is configured with an electrocardiographic sensor, and the electrocardiographic sensor is used to collect the second electrocardiographic information. Since the ECG information is unique, that is, the ECG information of different users is different, the ECG information can be used to accurately distinguish different users, thereby ensuring the accuracy of user identity authentication; at the same time, the user's ECG information is random at each moment , can not replicate the simulation, using ECG information for identity authentication is more secure and reliable; in addition, compared with other biometric information that is greatly affected by the external environment, ECG information is not affected by the external environment and can be better applicable to various environments .
在一种可能的实现方式中,在第一受控设备与第一待认证设备之间的距离小于预设阈值的情况下,第一待认证设备采集第二生物特征信息。其中,第一待认证设备确定第一受控设备与第一待认证设备之间的距离小于预设阈值的方式可参照上述步骤 601中相关表述。In a possible implementation manner, when the distance between the first controlled device and the first device to be authenticated is smaller than a preset threshold, the first device to be authenticated collects the second biometric feature information. Wherein, the manner in which the first device to be authenticated determines that the distance between the first controlled device and the first device to be authenticated is smaller than the preset threshold may refer to the relevant expressions in the above step 601.
示例性地,第一待认证设备采集生物特征信息的功能可以初始配置为关闭状态,这样,在第一受控设备与第一待认证设备之间的距离小于预设阈值的情况下,表明用户已经靠近第一受控设备,具有开锁意图,第一待认证设备开启生物特征信息采集功能,以便采集生物特征信息;同时,第一待认证设备仅在需要时开启生物特征信息采集功能,从而降低了第一待认证设备的能耗及认证设备的数据处理量。此外,在用户靠近第一受控设备时,用户可以触发第一待认证设备开启生物特征信息采集功能。Exemplarily, the function of the first device to be authenticated to collect biometric information can be initially configured as off, so that when the distance between the first controlled device and the first device to be authenticated is less than a preset threshold, it indicates that the user already close to the first controlled device and has the intention of unlocking, the first device to be authenticated starts the biometric information collection function in order to collect the biometric information; at the same time, the first device to be authenticated only starts the biometric information collection function when needed, thereby reducing The energy consumption of the first device to be certified and the data processing capacity of the certified device are calculated. In addition, when the user is close to the first controlled device, the user may trigger the first device to be authenticated to start the biometric information collection function.
作为一个示例,在执行步骤801之前,第一待认证设备可以接收来自云端服务器的第四信息,第四信息与对应于第一待认证设备的第二业务信息相关联,第四信息至少用于与第三信息匹配,第三信息与对应于第一受控设备的第一业务信息相关联。示例性地,第一业务信息可以包括第一受控设备的标识信息;第二业务信息可以包括目标受控设备的标识信息。进一步地,第一待认证设备可以发送第四信息;例如,第一待认证设备可以向认证设备发送第四信息,或者向云端服务器发送第四信息,并通过云端服务器转发至认证设备;示例性地,在第一受控设备与第一待认证设备之间的距离小于预设阈值的情况下,第一待认证设备可以发送第四信息。As an example, before performing step 801, the first device to be authenticated may receive fourth information from the cloud server, the fourth information is associated with the second service information corresponding to the first device to be authenticated, and the fourth information is at least used for Matching with the third information, the third information is associated with the first service information corresponding to the first controlled device. Exemplarily, the first service information may include identification information of the first controlled device; the second service information may include identification information of the target controlled device. Further, the first device to be authenticated may send the fourth information; for example, the first device to be authenticated may send the fourth information to the authentication device, or send the fourth information to the cloud server, and forward the fourth information to the authentication device through the cloud server; exemplary Specifically, when the distance between the first controlled device and the first device to be authenticated is smaller than a preset threshold, the first device to be authenticated may send fourth information.
在一种可能的实现方式中,第一待认证设备可以向云端服务器发送服务请求信息,服务请求信息至少用于请求获取对应于第一待认证设备的业务信息。例如,上述场景一中,用户可以通过可穿戴设备向云端服务器发送充电请求信息,从而获取云端服务器为可穿戴设备分配的充电业务信息。In a possible implementation manner, the first device to be authenticated may send service request information to the cloud server, where the service request information is at least used to request acquisition of service information corresponding to the first device to be authenticated. For example, in the above scenario 1, the user can send charging request information to the cloud server through the wearable device, so as to obtain the charging service information assigned by the cloud server to the wearable device.
示例性地,在第三信息和第四信息匹配成功的情况下,第一待认证设备可以接收到认证设备反馈的匹配成功的信息,从而可以开启生物特征信息采集功能,根据采集到的第二生物特征信息生成第二信息。第一待认证设备采集生物特征信息的功能可以初始配置为关闭状态,这样,在第三信息和第四信息匹配成功的情况下,表明由第一受控设备为第一待认证设备所对应的用户提供服务,且用户具有解锁第一受控设备的意图,第一待认证设备开启生物特征信息采集功能,以便采集到用户的生物特征信息;同时,第一待认证设备仅在需要时开启生物特征信息采集功能,从而降低了第一待认证设备的能耗及认证设备的数据处理量。Exemplarily, in the case that the third information and the fourth information are successfully matched, the first device to be authenticated may receive the information of the successful matching fed back by the authentication device, so that the biometric information collection function may be enabled, and according to the collected second The biometric information generates second information. The function of the first device to be authenticated to collect biometric information can be initially configured to be off. In this way, if the third information and the fourth information match successfully, it indicates that the first controlled device is the first device to be authenticated. The user provides services, and the user has the intention to unlock the first controlled device, the first device to be authenticated starts the biometric information collection function, so as to collect the user's biometric information; at the same time, the first device to be authenticated only turns on the biometric The feature information collection function reduces the energy consumption of the first device to be certified and the data processing amount of the certified device.
步骤802、第一待认证设备发送第二信息,第二信息与第二生物特征信息相关联,第二信息至少用于与第一信息进行匹配,第一信息与第一时刻的第一生物特征信息相关联,第一生物特征信息来自第一受控设备。 Step 802, the first device to be authenticated sends second information, the second information is associated with the second biological feature information, the second information is at least used to match the first information, and the first information is related to the first biological feature at the first moment The information is associated, and the first biometric information comes from the first controlled device.
示例性地,第一待认证设备可以向认证设备发送第二信息,或者向云端服务器发送第二信息,并通过云端服务器转发至认证设备。作为一个示例,第一待认证设备可以同时发送第二信息及第四信息。Exemplarily, the first device to be authenticated may send the second information to the authentication device, or send the second information to the cloud server, and forward the second information to the authentication device through the cloud server. As an example, the first device to be authenticated may send the second information and the fourth information at the same time.
在一种可能的实现方式中,第一待认证设备可以接收加密算法;进而通过该加密算法对所采集的第二生物特征信息进行加密,从而得到第二信息,并将第二信息发送至认证设备。示例性地,待认证设备可以接收来自云端服务器的第一加密算法,或来自认证设备的第二加密算法。这样,第一认证设备接收加密算法,以便对采集的生物特征信息进行加密,从而提高信息的安全性。In a possible implementation manner, the first device to be authenticated may receive an encryption algorithm; and then use the encryption algorithm to encrypt the collected second biometric information to obtain the second information, and send the second information to the authentication equipment. Exemplarily, the device to be authenticated may receive the first encryption algorithm from the cloud server, or the second encryption algorithm from the authentication device. In this way, the first authentication device receives the encryption algorithm, so as to encrypt the collected biometric information, thereby improving the security of the information.
在一种可能的实现方式中,第一待认证设备可以接收第一待认证设备对应的结算 信息。示例性地,第一待认证设备可以接收来自云端服务器发送的结算信息,以便第一待认证设备对应的用户进行结算。In a possible implementation manner, the first device to be authenticated may receive settlement information corresponding to the first device to be authenticated. Exemplarily, the first device to be authenticated may receive settlement information sent from the cloud server, so that the user corresponding to the first device to be authenticated can perform settlement.
示例性地,第一待认证设备还可以接收来自认证设备的反馈信息,例如,匹配成功的反馈信息;进一步地,第一待认证设备可以在接收到反馈信息后,清除第二信息、第四信息或加密算法,从而避免信息泄露,保障信息安全,同时节省存储空间。Exemplarily, the first device to be authenticated can also receive feedback information from the authentication device, for example, the feedback information of successful matching; further, the first device to be authenticated can clear the second information, the fourth information or encryption algorithm, so as to avoid information leakage, ensure information security, and save storage space at the same time.
本申请实施例中,第一待认证设备采集第一时刻的第二生物特征信息,并发送与第二生物特征信息相关联的第二信息,第二信息用于与同一时刻的第一信息进行匹配,这样,无需预先存储用户的生物特征信息,即可实现对第一待认证设备所对应的用户身份认证,同时避免了预先存储用户的生物特征信息存在的泄露风险,提高了信息的安全性,保障了用户隐私。In the embodiment of the present application, the first device to be authenticated collects the second biometric information at the first moment, and sends the second information associated with the second biometric information, and the second information is used to perform authentication with the first information at the same moment. In this way, the user identity authentication corresponding to the first device to be authenticated can be realized without pre-storing the user's biometric information, and at the same time, the risk of leakage of the pre-stored user's biometric information is avoided, and the security of information is improved. , protecting user privacy.
上述图8所述的认证方式及各种可能的实现方式的技术效果及具体描述可参见上述认证方法,此处不再赘述。For technical effects and specific descriptions of the authentication method and various possible implementation methods described above in FIG. 8 , refer to the above authentication method, and details are not repeated here.
本申请的实施例还提供了另一种认证系统,该认证系统可以包括认证设备和云端服务器,其中,云端服务器被配置用于向第一受控设备发送第三信息,向第一待认证设备发送第四信息,其中,第三信息与第一业务信息相关联,第一业务信息为云端服务器为第一受控设备提供的业务信息;第四信息与第二业务信息相关联,第二业务信息为云端服务器为第一待认证设备提供的业务信息。认证设备被配置用于接收来自第一待认证设备的第四信息;对第三信息和第四信息进行匹配;在第三信息和第四信息匹配成功的情况下,获取第一时刻的第一信息和第一时刻的第二信息;对第一信息和第二信息进行匹配;根据第一信息和第二信息的匹配结果,控制第一受控设备的状态;其中,第一信息与第一生物特征信息相关联,第一生物特征信息来自第一受控设备,第二信息与第二生物特征信息相关联,第二生物特征信息来自第一待认证设备,且关联于第一待认证设备对应的用户。The embodiment of the present application also provides another authentication system, which may include an authentication device and a cloud server, wherein the cloud server is configured to send the third information to the first controlled device, and send the third information to the first device to be authenticated. Sending fourth information, wherein, the third information is associated with the first business information, and the first business information is the business information provided by the cloud server for the first controlled device; the fourth information is associated with the second business information, and the second business information The information is service information provided by the cloud server for the first device to be authenticated. The authentication device is configured to receive fourth information from the first device to be authenticated; match the third information with the fourth information; and obtain the first information and the second information at the first moment; match the first information with the second information; control the state of the first controlled device according to the matching result of the first information and the second information; wherein, the first information and the first Biometric information is associated, the first biometric information comes from the first controlled device, the second information is associated with the second biometric information, the second biometric information comes from the first device to be authenticated, and is associated with the first device to be authenticated the corresponding user.
本申请实施例中,云端服务器向第一受控设备发送第三信息,并向第一待认证设备发送第四信息,认证设备接收来自第一待认证设备的第四信息,并对第三信息和第四信息进行匹配,从而实现授权认证,若第三信息和第四信息匹配成功,表明第二业务信息与第一业务信息为同一业务信息,即第一待认证设备对应的用户是第一受控设备的授权服务对象;在授权认证通过的情况下,认证设备获取第一信息和第二信息并进行匹配,并根据匹配结果控制第一受控设备的状态,认证设备无需预先存储用户的生物特征信息,即可实现对第一待认证设备所对应的用户的身份认证,从而保证由第一待认证设备对应的用户开启第一受控设备,同时避免了预先存储用户的生物特征信息存在的泄露风险,提高了信息的安全性,保障了用户隐私。In the embodiment of this application, the cloud server sends the third information to the first controlled device, and sends the fourth information to the first device to be authenticated, and the authentication device receives the fourth information from the first device to be authenticated, and the third information Match with the fourth information to realize authorization authentication. If the third information and the fourth information match successfully, it indicates that the second business information and the first business information are the same business information, that is, the user corresponding to the first device to be authenticated is the first The authorized service object of the controlled device; when the authorization authentication is passed, the authentication device obtains the first information and the second information and performs matching, and controls the state of the first controlled device according to the matching result. The authentication device does not need to pre-store the user's Biometric information can realize the identity authentication of the user corresponding to the first device to be authenticated, thereby ensuring that the user corresponding to the first device to be authenticated turns on the first controlled device, and at the same time avoids the existence of pre-stored user's biometric information The risk of leakage is reduced, the security of information is improved, and the privacy of users is guaranteed.
作为一个示例,上述认证系统还可以包括第一待认证设备,该第一待认证设备被配置为执行上述图8所示认证方法的各步骤。As an example, the above authentication system may further include a first device to be authenticated, and the first device to be authenticated is configured to execute the steps of the above authentication method shown in FIG. 8 .
示例性地,第一生物特征信息可以包括第一心电信息;第二生物特征信息可以包括第二心电信息。由于心电信息具有唯一性,即不同用户的心电信息不同,利用心电信息能够准确区分不同用户,从而保证了身份认证的准确性;同时,每一时刻用户的心电信息具有随机性,无法复制模拟,利用心电信息进行身份认证更加安全可靠;此外,相对于受外部环境影响较大的其他生物特征信息,心电信息不受外部环境影响, 可以更好地适用于各种环境。Exemplarily, the first biometric information may include first electrocardiographic information; the second biometric information may include second electrocardiographic information. Since the ECG information is unique, that is, the ECG information of different users is different, and the ECG information can be used to accurately distinguish different users, thereby ensuring the accuracy of identity authentication; at the same time, the user's ECG information is random at each moment. Simulation cannot be copied, and it is safer and more reliable to use ECG information for identity authentication; in addition, compared with other biometric information that is greatly affected by the external environment, ECG information is not affected by the external environment and can be better applied to various environments.
示例性地,第一业务信息可以包括第一受控设备的标识信息;第二业务信息可以包括目标受控设备的标识信息。其中,目标受控设备可以为云端服务器分配的为第一待认证设备对应的用户提供服务的设备。Exemplarily, the first service information may include identification information of the first controlled device; the second service information may include identification information of the target controlled device. Wherein, the target controlled device may be a device allocated by the cloud server to provide services for the user corresponding to the first device to be authenticated.
示例性地,第一受控设备可以包括第一智能锁;认证设备还被配置用于:在第一信息和第二信息匹配成功的情况下,发送第一控制信息,第一控制信息用于控制第一智能锁处于打开状态。其中,第一信息和第二信息匹配成功表明第一待认证设备对应的用户身份认证通过,且用户期望由第一智能锁对应的设备为其提供服务,则认证设备可以控制第一智能锁处于打开状态,以便用户获得相应服务。Exemplarily, the first controlled device may include a first smart lock; the authentication device is further configured to: when the first information and the second information match successfully, send first control information, and the first control information is used to Control the first smart lock to be in the open state. Wherein, the successful matching of the first information and the second information indicates that the identity authentication of the user corresponding to the first device to be authenticated has passed, and the user expects to be served by the device corresponding to the first smart lock, then the authentication device can control the first smart lock to be in the Open state, so that the user can get the corresponding service.
在一种可能的实现方式中,认证设备还被配置用于:在第一受控设备与第一待认证设备之间的距离小于预设阈值的情况下,向第一受控设备发送第二控制信息,第二控制信息用于控制第一受控设备采集第一生物特征信息。示例性地,第一受控设备采集生物特征信息的功能可以初始配置为关闭状态,这样,在第一受控设备与第一待认证设备之间的距离小于预设阈值的情况下,表明用户已经靠近第一受控设备,具有开锁意图,认证设备控制第一受控设备开启生物特征信息采集功能,以便当用户触摸第一受控设备时,第一受控设备可以采集到用户的第一生物特征信息;同时,第一受控设备仅在需要时开启生物特征信息采集功能,从而降低了第一受控设备的能耗及认证设备的数据处理量。In a possible implementation, the authentication device is further configured to: when the distance between the first controlled device and the first device to be authenticated is smaller than a preset threshold, send the second Control information, the second control information is used to control the first controlled device to collect the first biological feature information. Exemplarily, the function of the first controlled device to collect biometric information can be initially configured as off, so that when the distance between the first controlled device and the first device to be authenticated is less than a preset threshold, it indicates that the user has approached the first controlled device and has the intention to unlock, the authentication device controls the first controlled device to enable the biometric information collection function, so that when the user touches the first controlled device, the first controlled device can collect the user's first Biological feature information; at the same time, the first controlled device only enables the biometric information collection function when needed, thereby reducing the energy consumption of the first controlled device and the data processing amount of the authentication device.
在一种可能的实现方式中,云端服务器还被配置用于:接收服务请求信息;根据所述服务请求信息,生成第三信息和第四信息。其中,服务请求信息可以来自第一待认证设备,云端服务器根据服务请求信息,对现有可用服务资源进行分配,生成第三信息和第四信息,以便满足用户需求。例如,在上述场景一中,云端服务器接收到用户所佩戴的可穿戴设备发送的充电请求信息后,根据用户的充电请求及可用充电枪资源,为用户分配合适的充电枪,并生成相应的业务信息,进而可以将该业务信息分别发送至智能充电车及用户所佩戴的可穿戴设备。In a possible implementation manner, the cloud server is further configured to: receive service request information; and generate third information and fourth information according to the service request information. Wherein, the service request information may come from the first device to be authenticated, and the cloud server allocates existing available service resources according to the service request information, and generates third information and fourth information, so as to meet user needs. For example, in the above scenario 1, after receiving the charging request information sent by the wearable device worn by the user, the cloud server allocates a suitable charging gun for the user according to the user's charging request and available charging gun resources, and generates corresponding service Information, and then the business information can be sent to the smart charging car and the wearable device worn by the user respectively.
在一种可能的实现方式中,云端服务器还被配置用于:根据待处理的业务,生成第三信息和第四信息;例如,在上述场景二中,云端服务器可以根据各储物箱中所存放快递的相关信息,生成取件业务信息,进而将该取件业务信息分别发送至智能快递柜及对应取件人的可穿戴设备。In a possible implementation, the cloud server is further configured to: generate the third information and the fourth information according to the business to be processed; for example, in the second scenario above, the cloud server may Store the relevant information of the express delivery, generate the pick-up business information, and then send the pick-up business information to the smart express cabinet and the wearable device of the corresponding picker respectively.
在一种可能的实现方式中,第一信息可以包括通过第一加密算法对第一生物特征信息加密得到的信息,和/或,第二信息包括通过第一加密算法对第二生物特征信息加密得到的信息;云端服务器还被配置用于:向认证设备发送第一加密算法,向第一待认证设备发送第一加密算法;认证设备还被配置用于:接收第一加密算法。这样,云端服务器可以生成加密算法,并向认证设备及待认证设备发送该加密算法,用于对待认证设备或受控设备采集的生物特征信息进行加密;第一信息和/或第二信息均包括对生物特征信息加密后的信息,进一步提高了信息的安全性。例如,在有业务场景中,云端服务器可以生成加密算法,并向认证设备及待认证设备发送该加密算法。In a possible implementation manner, the first information may include information obtained by encrypting the first biological feature information through the first encryption algorithm, and/or the second information may include information obtained by encrypting the second biological feature information through the first encryption algorithm. The obtained information; the cloud server is further configured to: send the first encryption algorithm to the authentication device, and send the first encryption algorithm to the first device to be authenticated; the authentication device is also configured to: receive the first encryption algorithm. In this way, the cloud server can generate an encryption algorithm and send the encryption algorithm to the authentication device and the device to be authenticated, so as to encrypt the biometric information collected by the device to be authenticated or the controlled device; the first information and/or the second information both include The information after encrypting the biometric information further improves the security of the information. For example, in a business scenario, the cloud server can generate an encryption algorithm and send the encryption algorithm to the authentication device and the device to be authenticated.
示例性地,业务信息可以与加密算法相对应,即不同的业务信息对应于不同的加密算法;云端服务器在生成业务信息时,可以生成对应的加密算法,并可以将该业务 信息及该加密算法,分别发送至对应的认证设备及待认证设备。认证设备在接收到云端服务器为多个受控设备提供的业务信息及对应的多个加密算法后,针对任一受控设备采集的生物特征信息,认证设备可以采用与该受控设备的业务信息对应的加密算法进行加密。Exemplarily, business information may correspond to an encryption algorithm, that is, different business information corresponds to a different encryption algorithm; when the cloud server generates business information, it may generate a corresponding encryption algorithm, and the business information and the encryption algorithm may be , respectively sent to the corresponding authentication device and the device to be authenticated. After the authentication device receives the business information provided by the cloud server for multiple controlled devices and the corresponding multiple encryption algorithms, for the biometric information collected by any controlled device, the authentication device can use the business information related to the controlled device The corresponding encryption algorithm is used for encryption.
在一种可能的实现方式中,第一信息可以包括通过第二加密算法对第一生物特征信息加密得到的信息,和/或,第二信息可以包括通过第二加密算法对第二生物特征信息加密得到的信息;认证设备还被配置用于:生成第二加密算法;将第二加密算法发送给第一待认证设备。第二加密算法用于对第一受控设备采集的生物特征信息及第一待认证设备采集的生物特征信息进行加密,第一信息和第二信息均包括对生物特征信息加密后的信息,进一步提高了信息的安全性。例如,在无业务场景中,认证设备可以生成加密算法,并向初始化配对的待认证设备发送该加密算法。示例性地,第二加密算法具有时效性,认证设备可以在每次认证结束后,更新加密算法,从而提高每次认证过程中加密后信息的安全性。In a possible implementation manner, the first information may include information obtained by encrypting the first biometric information with a second encryption algorithm, and/or the second information may include information obtained by encrypting the second biometric information with a second encryption algorithm. Encrypt the obtained information; the authentication device is further configured to: generate a second encryption algorithm; send the second encryption algorithm to the first device to be authenticated. The second encryption algorithm is used to encrypt the biometric information collected by the first controlled device and the biometric information collected by the first device to be authenticated, the first information and the second information both include encrypted biometric information, and further Improved information security. For example, in a no-service scenario, the authentication device may generate an encryption algorithm and send the encryption algorithm to the device to be authenticated for initial pairing. Exemplarily, the second encryption algorithm is time-sensitive, and the authentication device may update the encryption algorithm after each authentication, thereby improving the security of encrypted information during each authentication process.
在一种可能的实现方式中,认证设备还被配置用于:在控制第一受控设备的状态之后,向云端服务器发送第一受控设备的标识信息及第二信息;云端服务器还被配置用于:接收第一受控设备的标识信息及第二信息;根据第二信息确定第一待认证设备;根据第一受控设备的标识信息对应的服务信息,生成第一待认证设备对应的结算信息;向第一待认证设备发送结算信息。其中,结算信息可以表示用户获取第一受控设备提供的服务所产生的费用相关信息,云端服务器可以预存有各受控设备提供服务所产生的费用相关信息及经由云端服务器转发的信息,可以理解的是,经由云端服务器转发的信息可以包括第一信息。示例性地,认证设备向云端服务器发送第一受控设备的标识信息及第二信息,云端服务器接收到上述信息后,可以根据第一受控设备的标识信息确定第一受控设备提供服务产生的费用,并将第二信息与经由云端服务器转发的信息进行匹配,第二信息与第一信息匹配成功,从而确定该费用为第一待认证设备对应的用户获取第一受控设备提供服务所产生的费用,进而向第一待认证设备发送该费用,以便第一待认证设备对应的用户进行结算。In a possible implementation, the authentication device is further configured to: send the identification information and the second information of the first controlled device to the cloud server after controlling the state of the first controlled device; the cloud server is further configured It is used to: receive the identification information of the first controlled device and the second information; determine the first device to be authenticated according to the second information; generate the corresponding service information of the first device to be authenticated according to the service information corresponding to the identification information of the first controlled device. Settlement information; send the settlement information to the first device to be authenticated. Wherein, the settlement information may represent the cost-related information generated by the user to obtain the service provided by the first controlled device, and the cloud server may pre-store the cost-related information generated by the service provided by each controlled device and the information forwarded by the cloud server. It can be understood that Notably, the information forwarded via the cloud server may include the first information. Exemplarily, the authentication device sends the identification information of the first controlled device and the second information to the cloud server. After receiving the above information, the cloud server may determine according to the identification information of the first controlled device that the first controlled device provides a service. and match the second information with the information forwarded by the cloud server. The second information is successfully matched with the first information, so it is determined that the fee is what the user corresponding to the first device to be authenticated obtains from the service provided by the first controlled device. The generated fee is then sent to the first device to be authenticated, so that the user corresponding to the first device to be authenticated can make settlement.
作为一个示例,若第一待认证设备对应的用户获取多个受控设备的服务,则认证设备可以向云端服务器发送多个受控设备的标识信息及第二信息,云端服务器统一生成第一待认证设备对应的结算信息,并发送至第一待认证设备,以便用户进行统一结算。作为另一个示例,云端服务器在生成第一待认证设备对应的结算信息之后,可以在间隔预设时间后,向第一待认证设备发送该结算信息,从而实现了先购物后结算,提高了用户体验。As an example, if the user corresponding to the first device to be authenticated obtains the services of multiple controlled devices, the authentication device may send the identification information and the second information of the multiple controlled devices to the cloud server, and the cloud server uniformly generates the first to-be-authenticated device. The settlement information corresponding to the authentication device is sent to the first device to be authenticated, so that the user can perform unified settlement. As another example, after the cloud server generates the settlement information corresponding to the first device to be authenticated, it can send the settlement information to the first device to be authenticated after a preset time interval, thereby realizing shopping first and then settlement, and improving the user experience. experience.
在一种可能的实现方式中,认证设备还被配置用于:在控制第一受控设备的状态之后,清除第一信息及第二信息。可以理解的是,认证设备在控制第一受控设备的状态之后,用户的身份认证已经完成,由于第一信息及第二信息包含用户的生物特征信息,认证设备无需存储该第一信息和第二信息,及时清除第一信息及第二信息,从而避免信息泄露,保护用户隐私,同时节省存储空间。In a possible implementation manner, the authentication device is further configured to: clear the first information and the second information after controlling the state of the first controlled device. It can be understood that after the authentication device controls the state of the first controlled device, the user's identity authentication has been completed. Since the first information and the second information include the user's biometric information, the authentication device does not need to store the first information and the second information. The second information, clear the first information and the second information in time, so as to avoid information leakage, protect user privacy, and save storage space at the same time.
在一种可能的实现方式中,认证设备还被配置用于:在控制第一受控设备的状态之后,清除加密算法。其中,加密算法可以包括第一加密算法或第二加密算法。认证 设备在控制第一受控设备的状态之后,用户的身份认证已经完成,认证设备可以清除加密算法,从而避免加密算法泄露,保障信息安全,同时节省存储空间。In a possible implementation manner, the authentication device is further configured to: clear the encryption algorithm after controlling the state of the first controlled device. Wherein, the encryption algorithm may include the first encryption algorithm or the second encryption algorithm. After the authentication device controls the state of the first controlled device, the user's identity authentication has been completed, and the authentication device can clear the encryption algorithm, thereby avoiding the leakage of the encryption algorithm, ensuring information security, and saving storage space.
在一种可能的实现方式中,认证设备还被配置用于:在控制第一受控设备的状态之后,清除业务信息。认证设备在控制第一受控设备的状态之后,用户的授权认证已经完成,由于业务信息可能包括用户的个人信息,认证设备清除业务信息;从而避免信息泄露,保护用户隐私,同时节省存储空间。In a possible implementation manner, the authentication device is further configured to: clear the service information after controlling the state of the first controlled device. After the authentication device controls the state of the first controlled device, the user's authorization authentication has been completed. Since the business information may include the user's personal information, the authentication device clears the business information; thereby avoiding information leakage, protecting user privacy, and saving storage space.
本申请的实施例还提供了另一种认证系统,该认证系统可以包括认证设备和待认证设备,其中,所述认证设备被配置为执行上述图6或图7所示认证方法的各步骤,所述待认证设备被配置为执行上述图8所示认证方法的各步骤。The embodiment of the present application also provides another authentication system, which may include an authentication device and a device to be authenticated, wherein the authentication device is configured to execute the steps of the authentication method shown in FIG. 6 or FIG. 7 above, The device to be authenticated is configured to execute the steps of the above authentication method shown in FIG. 8 .
本申请的实施例还提供了另一种认证系统,该认证系统可以包括认证设备、待认证设备和受控设备,其中,所述认证设备被配置为执行上述图6或图7所示认证方法的各步骤,所述待认证设备被配置为执行上述图8所示认证方法的各步骤,所述受控设备用于采集第一时刻的第一生物特征信息。The embodiment of the present application also provides another authentication system, which may include an authentication device, a device to be authenticated, and a controlled device, wherein the authentication device is configured to execute the above-mentioned authentication method shown in FIG. 6 or FIG. 7 The device to be authenticated is configured to execute the steps of the authentication method shown in FIG. 8 above, and the controlled device is used to collect the first biometric information at the first moment.
上述各认证系统及各认证系统中的多种可能的实现方式的技术效果及具体描述可参见上述认证方法,此处不再赘述。For technical effects and specific descriptions of the above-mentioned authentication systems and various possible implementations in each authentication system, please refer to the above-mentioned authentication methods, which will not be repeated here.
基于上述方法实施例的同一构思,本申请的实施例还提供了一种认证装置,该认证装置用于执行上述方法实施例所描述的技术方案。例如,可以执行上述图6或图7所示方法的各步骤。Based on the same idea of the above-mentioned method embodiments, the embodiments of the present application further provide an authentication device, which is configured to implement the technical solution described in the above-mentioned method embodiments. For example, each step of the above method shown in FIG. 6 or FIG. 7 may be executed.
图9示出根据本申请一实施例的一种认证装置的结构图,如图9所示,该认证装置,可以包括:第一收发模块901,用于获取第一时刻的第一信息和所述第一时刻的第二信息,其中,所述第一信息与第一生物特征信息相关联,所述第一生物特征信息来自第一受控设备,所述第二信息与第二生物特征信息相关联,所述第二生物特征信息来自第一待认证设备,且关联于所述第一待认证设备对应的用户;第一处理模块902,用于对所述第一信息和所述第二信息进行匹配;根据所述第一信息和所述第二信息的匹配结果,控制所述第一受控设备的状态。Fig. 9 shows a structural diagram of an authentication device according to an embodiment of the present application. As shown in Fig. 9, the authentication device may include: a first transceiver module 901, configured to obtain first information and The second information at the first moment, wherein the first information is associated with the first biometric information, the first biometric information comes from the first controlled device, and the second information is associated with the second biometric information Associated, the second biometric information comes from the first device to be authenticated, and is associated with the user corresponding to the first device to be authenticated; the first processing module 902 is configured to compare the first information and the second information matching; according to the matching result of the first information and the second information, the state of the first controlled device is controlled.
在一种可能的实现方式中,所述第一受控设备包括第一智能锁;所述第一处理模块,还用于:在所述第一信息和所述第二信息匹配成功的情况下,发送第一控制信息,所述第一控制信息用于控制所述第一智能锁处于打开状态。In a possible implementation manner, the first controlled device includes a first smart lock; the first processing module is further configured to: if the first information and the second information match successfully , sending first control information, where the first control information is used to control the first smart lock to be in an unlocked state.
在一种可能的实现方式中,所述第一处理模块902,还用于:在所述控制所述第一受控设备的状态之后,清除所述第一生物特征信息及所述第二生物特征信息。In a possible implementation manner, the first processing module 902 is further configured to: clear the first biometric feature information and the second biometric information after the state of the first controlled device is controlled. characteristic information.
在一种可能的实现方式中,所述第一处理模块902,还用于:在所述第一受控设备与所述第一待认证设备之间的距离小于预设阈值的情况下,向所述第一受控设备发送第二控制信息,所述第二控制信息用于控制所述第一受控设备采集所述第一生物特征信息。In a possible implementation manner, the first processing module 902 is further configured to: when the distance between the first controlled device and the first device to be authenticated is less than a preset threshold, send The first controlled device sends second control information, where the second control information is used to control the first controlled device to collect the first biological feature information.
在一种可能的实现方式中,所述第一收发模块902,还用于:获取第三信息和第四信息,其中,所述第三信息与第一业务信息相关联,所述第一业务信息为云端服务器为所述第一受控设备提供的业务信息,所述第四信息与第二业务信息相关联,所述第二业务信息为所述云端服务器为所述第一待认证设备提供的业务信息;对所述第三信息和所述第四信息进行匹配;在所述第三信息和所述第四信息匹配成功的情况下, 获取所述第一信息和所述第二信息。In a possible implementation manner, the first transceiving module 902 is further configured to: acquire third information and fourth information, where the third information is associated with first service information, and the first service The information is service information provided by the cloud server for the first controlled device, the fourth information is associated with second service information, and the second service information is provided by the cloud server for the first device to be authenticated matching the third information with the fourth information; and acquiring the first information and the second information if the third information and the fourth information are successfully matched.
在一种可能的实现方式中,所述第一业务信息包括所述第一受控设备的标识信息;所述第二业务信息包括目标受控设备的标识信息。In a possible implementation manner, the first service information includes identification information of the first controlled device; the second service information includes identification information of a target controlled device.
在一种可能的实现方式中,所述第一信息包括通过第一加密算法对所述第一生物特征信息加密得到的信息,和/或,所述第二信息包括通过所述第一加密算法对所述第二生物特征信息加密得到的信息;所述第一收发模块901,还用于:接收来自云端服务器的所述第一加密算法。In a possible implementation manner, the first information includes information obtained by encrypting the first biometric information with a first encryption algorithm, and/or, the second information includes information obtained by encrypting the first biometric information with the first encryption algorithm. The information obtained by encrypting the second biological feature information; the first transceiving module 901 is further configured to: receive the first encryption algorithm from the cloud server.
在一种可能的实现方式中,所述第一处理模块902,还用于:在所述控制所述第一受控设备的状态之后,清除所述第一加密算法。In a possible implementation manner, the first processing module 902 is further configured to: clear the first encryption algorithm after the state of the first controlled device is controlled.
在一种可能的实现方式中,所述第一信息包括通过第二加密算法对所述第一生物特征信息加密得到的信息,和/或,所述第二信息包括通过所述第二加密算法对所述第二生物特征信息加密得到的信息;所述第一处理模块902,还用于:生成所述第二加密算法,将所述第二加密算法发送给所述第一待认证设备。In a possible implementation manner, the first information includes information obtained by encrypting the first biometric information through a second encryption algorithm, and/or the second information includes information obtained by encrypting the first biometric information through the second encryption algorithm. The information obtained by encrypting the second biometric feature information; the first processing module 902 is further configured to: generate the second encryption algorithm, and send the second encryption algorithm to the first device to be authenticated.
在一种可能的实现方式中,所述第一处理模块902,还用于:在所述控制所述第一受控设备的状态之后,清除所述第二加密算法。In a possible implementation manner, the first processing module 902 is further configured to: clear the second encryption algorithm after the state of the first controlled device is controlled.
在一种可能的实现方式中,所述第一生物特征信息包括第一心电信息;所述第二生物特征信息包括第二心电信息。In a possible implementation manner, the first biometric information includes first electrocardiographic information; the second biometric information includes second electrocardiographic information.
在一种可能的实现方式中,所述第一处理模块902,还用于:在所述控制所述第一受控设备的状态之后,向云端服务器发送所述第一受控设备的标识信息及所述第二信息,所述第一受控设备的标识信息和所述第二信息至少用于生成所述第一待认证设备对应的结算信息。In a possible implementation manner, the first processing module 902 is further configured to: after controlling the state of the first controlled device, send the identification information of the first controlled device to a cloud server and the second information, the identification information of the first controlled device and the second information are at least used to generate settlement information corresponding to the first device to be authenticated.
本申请的实施例还提供了另一种认证装置,该认证装置用于执行上述方法实施例所描述的技术方案。例如,可以执行上述图8所示方法的各步骤。Embodiments of the present application also provide another authentication device, which is used to implement the technical solutions described in the above method embodiments. For example, each step of the above-mentioned method shown in FIG. 8 may be executed.
图10示出根据本申请一实施例的另一种认证装置的结构图,如图10所示,该认证装置,可以包括:第二处理模块1001,用于采集第一时刻的第二生物特征信息,所述第二生物特征信息关联于第一待认证设备对应的用户;第二收发模块1002,用于发送第二信息,所述第二信息与所述第二生物特征信息相关联,所述第二信息至少用于与第一信息进行匹配,所述第一信息与所述第一时刻的第一生物特征信息相关联,所述第一生物特征信息来自第一受控设备。Fig. 10 shows a structural diagram of another authentication device according to an embodiment of the present application. As shown in Fig. 10, the authentication device may include: a second processing module 1001, configured to collect a second biometric feature at the first moment information, the second biometric information is associated with the user corresponding to the first device to be authenticated; the second transceiver module 1002 is configured to send second information, the second information is associated with the second biometric information, and the The second information is at least used to match with the first information, the first information is associated with the first biological feature information at the first moment, and the first biological feature information comes from the first controlled device.
在一种可能的实现方式中,所述第二处理模块1001,还用于:在所述第一受控设备与所述第一待认证设备之间的距离小于预设阈值的情况下,采集所述第二生物特征信息。In a possible implementation manner, the second processing module 1001 is further configured to: collect The second biometric information.
在一种可能的实现方式中,所述第二收发模块1002,还用于:接收来自云端服务器的第四信息,所述第四信息与对应于所述第一待认证设备的第二业务信息相关联,所述第四信息至少用于与第三信息匹配,所述第三信息与对应于所述第一受控设备的第一业务信息相关联;向认证设备发送所述第四信息。In a possible implementation manner, the second transceiver module 1002 is further configured to: receive fourth information from the cloud server, the fourth information is related to the second business information corresponding to the first device to be authenticated Associating, the fourth information is at least used to match with third information, the third information is associated with the first service information corresponding to the first controlled device; sending the fourth information to the authentication device.
在一种可能的实现方式中,所述第二收发模块1002,还用于:向云端服务器发送服务请求信息,所述服务请求信息至少用于请求获取对应于所述第一待认证设备的业务信息。In a possible implementation manner, the second transceiver module 1002 is further configured to: send service request information to the cloud server, where the service request information is at least used to request to obtain a service corresponding to the first device to be authenticated information.
在一种可能的实现方式中,所述第一业务信息包括所述第一受控设备的标识信息;所述第二业务信息包括目标受控设备的标识信息。In a possible implementation manner, the first service information includes identification information of the first controlled device; the second service information includes identification information of a target controlled device.
在一种可能的实现方式中,所述第二信息包括通过加密算法对所述第二生物特征信息加密得到的信息,所述第二收发模块1002,还用于:接收所述加密算法。In a possible implementation manner, the second information includes information obtained by encrypting the second biometric information with an encryption algorithm, and the second transceiver module 1002 is further configured to: receive the encryption algorithm.
在一种可能的实现方式中,所述第一生物特征信息包括第一心电信息;所述第二生物特征信息包括第二心电信息。In a possible implementation manner, the first biometric information includes first electrocardiographic information; the second biometric information includes second electrocardiographic information.
在一种可能的实现方式中,所述第一待认证设备配置有心电传感器,所述心电传感器用于采集所述第二心电信息。In a possible implementation manner, the first device to be authenticated is configured with an electrocardiographic sensor, and the electrocardiographic sensor is configured to collect the second electrocardiographic information.
在一种可能的实现方式中,所述第二收发模块1002,还用于:接收所述第一受控设备对应的结算信息。In a possible implementation manner, the second transceiving module 1002 is further configured to: receive settlement information corresponding to the first controlled device.
上述图9及图10所示的认证装置及其各种可能的实现方式的技术效果及具体描述可参见上述认证方法,此处不再赘述。For technical effects and specific descriptions of the authentication device shown in FIG. 9 and FIG. 10 and various possible implementations thereof, reference may be made to the above authentication method, and details are not repeated here.
需要说明的是,应理解以上装置中各模块的划分仅是一种逻辑功能的划分,实际实现时可以全部或部分集成到一个物理实体上,也可以物理上分开。此外,装置中的模块可以以处理器调用软件的形式实现;例如装置包括处理器,处理器与存储器连接,存储器中存储有指令,处理器调用存储器中存储的指令,以实现以上任一种方法或实现该装置各模块的功能,其中处理器例如为通用处理器,例如中央处理单元(Central Processing Unit,CPU)或微处理器,存储器为装置内的存储器或装置外的存储器。或者,装置中的模块可以以硬件电路的形式实现,可以通过对硬件电路的设计实现部分或全部模块的功能,该硬件电路可以理解为一个或多个处理器;例如,在一种实现中,该硬件电路为专用集成电路(application-specific integrated circuit,ASIC),通过对电路内元件逻辑关系的设计,实现以上部分或全部模块的功能;再如,在另一种实现中,该硬件电路为可以通过可编程逻辑器件(programmable logic device,PLD)实现,以现场可编程门阵列(Field Programmable Gate Array,FPGA)为例,其可以包括大量逻辑门电路,通过配置文件来配置逻辑门电路之间的连接关系,从而实现以上部分或全部模块的功能。以上装置的所有模块可以全部通过处理器调用软件的形式实现,或全部通过硬件电路的形式实现,或部分通过处理器调用软件的形式实现,剩余部分通过硬件电路的形式实现。It should be noted that it should be understood that the division of the modules in the above device is only a division of logical functions, which may be fully or partially integrated into one physical entity or physically separated during actual implementation. In addition, the modules in the device can be implemented in the form of a processor calling software; for example, the device includes a processor, the processor is connected to a memory, instructions are stored in the memory, and the processor calls the instructions stored in the memory to implement any of the above methods Or realize the function of each module of the device, wherein the processor is, for example, a general-purpose processor, such as a central processing unit (Central Processing Unit, CPU) or a microprocessor, and the memory is a memory in the device or a memory outside the device. Alternatively, the modules in the device may be implemented in the form of hardware circuits, and part or all of the functions of the modules may be realized by designing the hardware circuits. The hardware circuits may be understood as one or more processors; for example, in one implementation, The hardware circuit is an application-specific integrated circuit (ASIC), through the design of the logical relationship between the components in the circuit, the functions of some or all of the above modules are realized; for another example, in another implementation, the hardware circuit is It can be realized by programmable logic device (programmable logic device, PLD). Taking field programmable gate array (Field Programmable Gate Array, FPGA) as an example, it can include a large number of logic gate circuits, and configure the logic gate circuits through configuration files. connection relationship, so as to realize the functions of some or all of the above modules. All the modules of the above device can be realized in the form of calling software by the processor, or in the form of hardware circuit, or partially realized in the form of calling software by the processor, and the rest can be realized in the form of hardware circuit.
在本申请实施例中,处理器是一种具有信号的处理能力的电路,在一种实现中,处理器可以是具有指令读取与运行能力的电路,例如CPU、微处理器、图形处理器(graphics processing unit,GPU)(可以理解为一种微处理器)、或数字信号处理器(digital signal processor,DSP)等;在另一种实现中,处理器可以通过硬件电路的逻辑关系实现一定功能,该硬件电路的逻辑关系是固定的或可以重构的,例如处理器为ASIC或PLD实现的硬件电路,例如FPGA。在可重构的硬件电路中,处理器加载配置文档,实现硬件电路配置的过程,可以理解为处理器加载指令,以实现以上部分或全部模块的功能的过程。此外,还可以是针对人工智能设计的硬件电路,其可以理解为一种ASIC,例如神经网络处理单元(Neural Network Processing Unit,NPU)张量处理单元(Tensor Processing Unit,TPU)、深度学习处理单元(Deep learning Processing Unit,DPU)等。In the embodiment of the present application, the processor is a circuit with signal processing capabilities. In one implementation, the processor may be a circuit with instruction reading and execution capabilities, such as CPU, microprocessor, graphics processor (graphics processing unit, GPU) (can be understood as a microprocessor), or digital signal processor (digital signal processor, DSP), etc.; in another implementation, the processor can realize a certain Function, the logical relationship of the hardware circuit is fixed or reconfigurable, for example, the processor is a hardware circuit implemented by ASIC or PLD, such as FPGA. In a reconfigurable hardware circuit, the process of the processor loading the configuration file to realize the configuration of the hardware circuit can be understood as the process of the processor loading instructions to realize the functions of some or all of the above modules. In addition, it can also be a hardware circuit designed for artificial intelligence, which can be understood as an ASIC, such as a neural network processing unit (Neural Network Processing Unit, NPU) tensor processing unit (Tensor Processing Unit, TPU), a deep learning processing unit (Deep learning Processing Unit, DPU), etc.
可见,以上装置中的各模块可以是被配置成实施以上方法的一个或多个处理器(或处理电路),例如:CPU、GPU、NPU、TPU、DPU、微处理器、DSP、ASIC、FPGA,或这些处理器形式中至少两种的组合。It can be seen that each module in the above device can be one or more processors (or processing circuits) configured to implement the above method, for example: CPU, GPU, NPU, TPU, DPU, microprocessor, DSP, ASIC, FPGA , or a combination of at least two of these processor forms.
此外,以上装置中的各模块可以全部或部分可以集成在一起,或者可以独立实现。在一种实现中,这些模块集成在一起,以片上系统(system-on-a-chip,SOC)的形式实现。该SOC中可以包括至少一个处理器,用于实现以上任一种方法或实现该装置各模块的功能,该至少一个处理器的种类可以不同,例如包括CPU和FPGA,CPU和人工智能处理器,CPU和GPU等。In addition, all or part of the modules in the above devices can be integrated together, or can be implemented independently. In one implementation, these modules are integrated together and implemented in the form of a system-on-a-chip (SOC). The SOC may include at least one processor for implementing any of the above methods or realizing the functions of each module of the device. The at least one processor may be of different types, such as including CPU and FPGA, CPU and artificial intelligence processor, CPUs and GPUs, etc.
本申请的实施例还提供了一种认证设备,本申请实施例不限定该认证设备的类型。该认证设备可以硬件,软件或软件和硬件的组合实现。作为一个示例,该认证设备可以包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为执行所述指令时实现上述认证方法。示例性地,可以执行上述图6、图7所示的方法。作为另一个示例,该认证设备可以包括硬件模块或软件模块,例如,可以包括上述图9中所述的一个或多个模块。The embodiment of the present application also provides an authentication device, and the embodiment of the present application does not limit the type of the authentication device. The authentication device can be implemented in hardware, software or a combination of software and hardware. As an example, the authentication device may include: a processor; a memory for storing instructions executable by the processor; wherein the processor is configured to implement the above authentication method when executing the instructions. Exemplarily, the above-mentioned methods shown in FIG. 6 and FIG. 7 may be implemented. As another example, the authentication device may include a hardware module or a software module, for example, may include one or more modules described above in FIG. 9 .
本申请的实施例还提供了一种待认证设备,本申请实施例不限定该待认证设备的类型。该待认证设备可以硬件,软件或软件和硬件的组合实现。作为一个示例,该待认证设备可以包括:传感器,用于采集生物特征信息;处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为执行所述指令时实现上述认证方法。示例性地,可以执行上述图8所示的方法。作为另一个示例,该待认证设备可以包括硬件模块或软件模块,例如,可以包括上述图10中所述的一个或多个模块。The embodiment of the present application also provides a device to be authenticated, and the embodiment of the present application does not limit the type of the device to be authenticated. The device to be authenticated can be realized by hardware, software or a combination of software and hardware. As an example, the device to be authenticated may include: a sensor for collecting biometric information; a processor; a memory for storing instructions executable by the processor; wherein the processor is configured to implement the above-mentioned authentication method. Exemplarily, the above method shown in FIG. 8 may be implemented. As another example, the device to be authenticated may include a hardware module or a software module, for example, may include one or more modules described above in FIG. 10 .
图11示出根据本申请一实施例的一种电子设备的结构示意图,示例性地,电子设备可以为认证设备或待认证设备,如图11所示,该认证装置可以包括:至少一个处理器1101,通信线路1102,存储器1103以及至少一个通信接口1104。Fig. 11 shows a schematic structural diagram of an electronic device according to an embodiment of the present application. Exemplarily, the electronic device may be an authentication device or a device to be authenticated. As shown in Fig. 11, the authentication device may include: at least one processor 1101 , a communication line 1102 , a memory 1103 and at least one communication interface 1104 .
处理器1101可以是一个CPU,微处理器,特定应用集成电路ASIC,或一个或多个用于控制本申请方案程序执行的集成电路。The processor 1101 may be a CPU, a microprocessor, an application-specific integrated circuit ASIC, or one or more integrated circuits used to control the program execution of the program of this application.
通信线路1102可包括一通路,在上述组件之间传送信息。Communications link 1102 may include a pathway for communicating information between the components described above.
通信接口1104,使用任何收发器一类的装置,用于与其他设备或通信网络通信,如以太网,无线接入网络(radio access networks,RAN),无线局域网(wireless local area networks,WLAN)等。 Communication interface 1104, using any device such as a transceiver for communicating with other devices or communication networks, such as Ethernet, radio access networks (radio access networks, RAN), wireless local area networks (wireless local area networks, WLAN), etc. .
存储器1103可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过通信线路1102与处理器相连接。存储器也可以和处理器集成在一起。本申请实施例提供的存储器通常可以具有非易失性。其中,存储器1103用于存储执行本申请方案的计算机执行指令,并由处 理器1101来控制执行。处理器1101用于执行存储器1103中存储的计算机执行指令,从而实现本申请上述实施例中提供的方法。示例性地,可以实现上述图6或图7或图8所示的各步骤。 Memory 1103 may be read-only memory (read-only memory, ROM) or other types of static storage devices that can store static information and instructions, random access memory (random access memory, RAM) or other types that can store information and instructions It can also be an electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc storage (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be programmed by a computer Any other medium accessed, but not limited to. The memory may exist independently and be connected to the processor through the communication line 1102 . Memory can also be integrated with the processor. The memory provided by the embodiment of the present application may generally be non-volatile. Wherein, the memory 1103 is used to store computer-executed instructions for implementing the solutions of the present application, and the processor 1101 controls the execution. The processor 1101 is configured to execute computer-executed instructions stored in the memory 1103, so as to implement the methods provided in the above-mentioned embodiments of the present application. Exemplarily, the above steps shown in FIG. 6 or FIG. 7 or FIG. 8 may be implemented.
可选的,本申请实施例中的计算机执行指令也可以称之为应用程序代码,本申请实施例对此不作具体限定。Optionally, the computer-executed instructions in the embodiments of the present application may also be referred to as application program codes, which is not specifically limited in the embodiments of the present application.
示例性地,处理器1101可以包括一个或多个CPU,例如图11中的CPU0和CPU1。Exemplarily, the processor 1101 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 11 .
示例性地,认证装置可以包括多个处理器,例如图11中的处理器1101和处理器1107。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。Exemplarily, the authentication device may include multiple processors, such as processor 1101 and processor 1107 in FIG. 11 . Each of these processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
在具体实现中,作为一种实施例,认证装置还可以包括输出设备1105和输入设备1106。输出设备1105和处理器1101通信,可以以多种方式来显示信息。例如,输出设备1105可以是液晶显示器(liquid crystal display,LCD),发光二级管(light emitting diode,LED)显示设备,阴极射线管(cathode ray tube,CRT)显示设备,或投影仪(projector)等。输入设备1106和处理器1101通信,可以以多种方式接收用户的输入。例如,输入设备1106可以是鼠标、键盘、触摸屏设备或传感设备等。In a specific implementation, as an example, the authentication apparatus may further include an output device 1105 and an input device 1106 . Output device 1105 is in communication with processor 1101 and can display information in a variety of ways. For example, the output device 1105 may be a liquid crystal display (liquid crystal display, LCD), a light emitting diode (light emitting diode, LED) display device, a cathode ray tube (cathode ray tube, CRT) display device, or a projector (projector) wait. The input device 1106 communicates with the processor 1101 and can receive user input in various ways. For example, the input device 1106 may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
作为一个示例,结合图11所示的电子设备,上述图9中的第一收发模块901可以由图11中的通信接口1104来实现;上述图9中的第一处理模块902可以由图11中的处理器1101来实现。As an example, in combination with the electronic device shown in FIG. 11, the first transceiver module 901 in FIG. 9 above can be realized by the communication interface 1104 in FIG. 11; the first processing module 902 in FIG. The processor 1101 is implemented.
作为另一个示例,结合图11所示的电子设备,上述图10中的第二处理模块1001可以由图11中的处理器1101来实现;上述图10中的第二收发模块1002可以由图11中的通信接口1104来实现。As another example, in combination with the electronic device shown in FIG. 11, the second processing module 1001 in FIG. 10 above can be implemented by the processor 1101 in FIG. 11; the second transceiver module 1002 in FIG. In the communication interface 1104 to achieve.
本申请的实施例提供了一种芯片,包括处理器,当所述处理器执行指令时,所述处理器执行上述实施例中的方法。示例性地,可以实现上述图6、图7或图8所示的认证方法。Embodiments of the present application provide a chip, including a processor, and when the processor executes an instruction, the processor executes the method in the foregoing embodiments. Exemplarily, the authentication method shown in FIG. 6 , FIG. 7 or FIG. 8 above may be implemented.
本申请的实施例提供了一种计算机可读存储介质,其上存储有计算机程序指令,所述计算机程序指令被处理器执行时实现上述实施例中的方法。示例性地,可以实现上述图6、图7或图8所示的认证方法。Embodiments of the present application provide a computer-readable storage medium on which computer program instructions are stored, and when the computer program instructions are executed by a processor, the methods in the foregoing embodiments are implemented. Exemplarily, the authentication method shown in FIG. 6 , FIG. 7 or FIG. 8 above may be implemented.
本申请的实施例提供了一种计算机程序产品,包括计算机可读代码,或者承载有计算机可读代码的非易失性计算机可读存储介质,当所述计算机可读代码在电子设备的处理器中运行时,所述电子设备中的处理器执行上述实施例中的方法。示例性地,可以实现上述图6、图7或图8所示的认证方法。An embodiment of the present application provides a computer program product, including computer-readable codes, or a non-volatile computer-readable storage medium bearing computer-readable codes, when the computer-readable codes are stored in a processor of an electronic device When running in the electronic device, the processor in the electronic device executes the method in the foregoing embodiment. Exemplarily, the authentication method shown in FIG. 6 , FIG. 7 or FIG. 8 above may be implemented.
计算机可读存储介质可以是可以保持和存储由指令执行设备使用的指令的有形设备。计算机可读存储介质例如可以是――但不限于――电存储设备、磁存储设备、光存储设备、电磁存储设备、半导体存储设备或者上述的任意合适的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:便携式计算机盘、硬盘、RAM、ROM、可擦式可编程只读存储器(Electrically Programmable Read-Only-Memory,EPROM)或闪存、静态随机存取存储器(Static Random-Access Memory,SRAM)、便携式压缩盘只读存储器(Compact Disc Read-Only Memory,CD-ROM)、数字多功能盘(Digital  Video Disc,DVD)、记忆棒、软盘、机械编码设备、例如其上存储有指令的打孔卡或凹槽内凸起结构、以及上述的任意合适的组合。A computer readable storage medium may be a tangible device that can retain and store instructions for use by an instruction execution device. A computer readable storage medium may be, for example, but is not limited to, an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of computer-readable storage media include: portable computer discs, hard drives, RAM, ROM, Electrically Programmable Read-Only-Memory (EPROM), or flash memory , Static Random-Access Memory (SRAM), Portable Compact Disc Read-Only Memory (CD-ROM), Digital Video Disc (DVD), Memory Stick, Floppy disks, mechanically encoded devices, such as punched cards or raised structures in grooves with instructions stored thereon, and any suitable combination of the foregoing.
这里所描述的计算机可读程序指令或代码可以从计算机可读存储介质下载到各个计算/处理设备,或者通过网络、例如因特网、局域网、广域网和/或无线网下载到外部计算机或外部存储设备。网络可以包括铜传输电缆、光纤传输、无线传输、路由器、防火墙、交换机、网关计算机和/或边缘服务器。每个计算/处理设备中的网络适配卡或者网络接口从网络接收计算机可读程序指令,并转发该计算机可读程序指令,以供存储在各个计算/处理设备中的计算机可读存储介质中。Computer readable program instructions or codes described herein may be downloaded from a computer readable storage medium to a respective computing/processing device, or downloaded to an external computer or external storage device over a network, such as the Internet, local area network, wide area network, and/or wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers. A network adapter card or a network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in each computing/processing device .
用于执行本申请操作的计算机程序指令可以是汇编指令、指令集架构(Instruction Set Architecture,ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码,所述编程语言包括面向对象的编程语言—诸如Smalltalk、C++等,以及常规的过程式编程语言—诸如“C”语言或类似的编程语言。计算机可读程序指令可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络—包括局域网(Local Area Network,LAN)或广域网(Wide Area Network,WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。在一些实施例中,通过利用计算机可读程序指令的状态信息来个性化定制电子电路,例如可编程逻辑电路、FPGA或可编程逻辑阵列(Programmable Logic Array,PLA),该电子电路可以执行计算机可读程序指令,从而实现本申请的各个方面。Computer program instructions for performing the operations of the present application may be assembly instructions, instruction set architecture (Instruction Set Architecture, ISA) instructions, machine instructions, machine-related instructions, microcode, firmware instructions, state setting data, or in one or more source or object code written in any combination of programming languages, including object-oriented programming languages—such as Smalltalk, C++, etc., and conventional procedural programming languages—such as the “C” language or similar programming languages. Computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server implement. In cases involving a remote computer, the remote computer can be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or it can be connected to an external computer such as use an Internet service provider to connect via the Internet). In some embodiments, by using state information of computer-readable program instructions to personalize and customize electronic circuits, such as programmable logic circuits, FPGAs, or programmable logic arrays (Programmable Logic Array, PLA), the electronic circuits can execute computer-readable Program instructions are read, thereby implementing various aspects of the present application.
这里参照根据本申请实施例的方法、装置(系统)和计算机程序产品的流程图和/或框图描述了本申请的各个方面。应当理解,流程图和/或框图的每个方框以及流程图和/或框图中各方框的组合,都可以由计算机可读程序指令实现。Aspects of the present application are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It should be understood that each block of the flowcharts and/or block diagrams, and combinations of blocks in the flowcharts and/or block diagrams, can be implemented by computer-readable program instructions.
这些计算机可读程序指令可以提供给通用计算机、专用计算机或其它可编程数据处理装置的处理器,从而生产出一种机器,使得这些指令在通过计算机或其它可编程数据处理装置的处理器执行时,产生了实现流程图和/或框图中的一个或多个方框中规定的功能/动作的装置。也可以把这些计算机可读程序指令存储在计算机可读存储介质中,这些指令使得计算机、可编程数据处理装置和/或其他设备以特定方式工作,从而,存储有指令的计算机可读介质则包括一个制造品,其包括实现流程图和/或框图中的一个或多个方框中规定的功能/动作的各个方面的指令。These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine such that when executed by the processor of the computer or other programmable data processing apparatus , producing an apparatus for realizing the functions/actions specified in one or more blocks in the flowchart and/or block diagram. These computer-readable program instructions can also be stored in a computer-readable storage medium, and these instructions cause computers, programmable data processing devices and/or other devices to work in a specific way, so that the computer-readable medium storing instructions includes An article of manufacture comprising instructions for implementing various aspects of the functions/acts specified in one or more blocks in flowcharts and/or block diagrams.
也可以把计算机可读程序指令加载到计算机、其它可编程数据处理装置、或其它设备上,使得在计算机、其它可编程数据处理装置或其它设备上执行一系列操作步骤,以产生计算机实现的过程,从而使得在计算机、其它可编程数据处理装置、或其它设备上执行的指令实现流程图和/或框图中的一个或多个方框中规定的功能/动作。It is also possible to load computer-readable program instructions into a computer, other programmable data processing device, or other equipment, so that a series of operational steps are performed on the computer, other programmable data processing device, or other equipment to produce a computer-implemented process , so that instructions executed on computers, other programmable data processing devices, or other devices implement the functions/actions specified in one or more blocks in the flowcharts and/or block diagrams.
附图中的流程图和框图显示了根据本申请的多个实施例的装置、系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或指令的一部分,所述模块、程序段或指令的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。在有些作为替换的实现中, 方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。The flowchart and block diagrams in the figures show the architecture, functions and operations of possible implementations of apparatuses, systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in a flowchart or block diagram may represent a module, a portion of a program segment, or an instruction that includes one or more Executable instructions. In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved.
也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行相应的功能或动作的硬件(例如电路或ASIC(Application Specific Integrated Circuit,专用集成电路))来实现,或者可以用硬件和软件的组合,如固件等来实现。It should also be noted that each block in the block diagrams and/or flowcharts, and combinations of blocks in the block diagrams and/or flowcharts, can be implemented with hardware (such as circuits or ASIC (Application Specific Integrated Circuit, application-specific integrated circuit)), or it can be realized by a combination of hardware and software, such as firmware.
需要说明的是,本申请实施例中采用诸如“第一”、“第二”的前缀词,仅仅为了区分不同的描述对象,对被描述对象的位置、顺序、优先级、数量或内容等没有限定作用。It should be noted that the prefixes such as "first" and "second" used in the embodiments of the present application are only to distinguish different description objects, and have no reference to the position, order, priority, quantity or content of the described objects. Limitation.
尽管在此结合各实施例对本申请进行了描述,然而,在实施所要求保护的本申请过程中,本领域技术人员通过查看所述附图、公开内容、以及所附权利要求书,可理解并实现所述公开实施例的其它变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其它单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。Although the present application has been described in conjunction with various embodiments here, however, in the process of implementing the claimed application, those skilled in the art can understand and Other variations of the disclosed embodiments are implemented. In the claims, the word "comprising" does not exclude other components or steps, and "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that these measures cannot be combined to advantage.
在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,各个实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。In each embodiment of the present application, if there is no special explanation and logical conflict, the terms and/or descriptions between the various embodiments are consistent and can be referred to each other. The technical features in different embodiments are based on their inherent logic Relationships can be combined to form new embodiments.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above is only a specific implementation of the application, but the scope of protection of the application is not limited thereto. Anyone familiar with the technical field can easily think of changes or substitutions within the technical scope disclosed in the application. Should be covered within the protection scope of this application. Therefore, the protection scope of the present application should be determined by the protection scope of the claims.

Claims (30)

  1. 一种认证方法,其特征在于,所述方法应用于认证设备,所述方法包括:An authentication method, characterized in that the method is applied to an authentication device, and the method includes:
    获取第一时刻的第一信息和所述第一时刻的第二信息,所述第一信息与第一生物特征信息相关联,所述第一生物特征信息来自第一受控设备,所述第二信息与第二生物特征信息相关联,所述第二生物特征信息来自第一待认证设备,且关联于所述第一待认证设备对应的用户;Acquiring the first information at the first moment and the second information at the first moment, the first information is associated with the first biological feature information, the first biological feature information comes from the first controlled device, and the first biological feature information is The second information is associated with second biometric information, the second biometric information comes from the first device to be authenticated, and is associated with the user corresponding to the first device to be authenticated;
    对所述第一信息和所述第二信息进行匹配;matching the first information with the second information;
    根据所述第一信息和所述第二信息的匹配结果,控制所述第一受控设备的状态。The state of the first controlled device is controlled according to a matching result of the first information and the second information.
  2. 根据权利要求1所述的方法,其特征在于,所述第一受控设备包括第一智能锁;The method according to claim 1, wherein the first controlled device comprises a first smart lock;
    所述根据所述第一信息和所述第二信息的匹配结果,控制所述第一受控设备的状态,包括:The controlling the state of the first controlled device according to the matching result of the first information and the second information includes:
    在所述第一信息和所述第二信息匹配成功的情况下,发送第一控制信息,所述第一控制信息用于控制所述第一智能锁处于打开状态。If the first information and the second information match successfully, first control information is sent, and the first control information is used to control the first smart lock to be in an open state.
  3. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:在所述控制所述第一受控设备的状态之后,清除所述第一信息及所述第二信息。The method according to claim 1 or 2, further comprising: after the state of the first controlled device is controlled, clearing the first information and the second information.
  4. 根据权利要求1-3中任一项所述的方法,其特征在于,所述方法还包括:在所述第一受控设备与所述第一待认证设备之间的距离小于预设阈值的情况下,向所述第一受控设备发送第二控制信息,所述第二控制信息用于控制所述第一受控设备采集所述第一生物特征信息。The method according to any one of claims 1-3, further comprising: when the distance between the first controlled device and the first device to be authenticated is less than a preset threshold, In this case, second control information is sent to the first controlled device, where the second control information is used to control the first controlled device to collect the first biological feature information.
  5. 根据权利要求1-4中任一项所述的方法,其特征在于,所述获取第一时刻的第一信息和所述第一时刻的第二信息,包括:The method according to any one of claims 1-4, wherein the acquiring the first information at the first moment and the second information at the first moment comprises:
    获取第三信息和第四信息,其中,所述第三信息与第一业务信息相关联,所述第一业务信息为云端服务器为所述第一受控设备提供的业务信息,所述第四信息与第二业务信息相关联,所述第二业务信息为所述云端服务器为所述第一待认证设备提供的业务信息;Acquiring third information and fourth information, wherein the third information is associated with first business information, the first business information is business information provided by the cloud server for the first controlled device, and the fourth The information is associated with second business information, and the second business information is business information provided by the cloud server for the first device to be authenticated;
    对所述第三信息和所述第四信息进行匹配;matching the third information with the fourth information;
    在所述第三信息和所述第四信息匹配成功的情况下,获取所述第一信息和所述第二信息。If the third information and the fourth information match successfully, the first information and the second information are acquired.
  6. 根据权利要求5所述的方法,其特征在于,所述第一业务信息包括所述第一受控设备的标识信息;所述第二业务信息包括目标受控设备的标识信息。The method according to claim 5, wherein the first service information includes identification information of the first controlled device; and the second service information includes identification information of a target controlled device.
  7. 根据权利要求1-6中任一项所述的方法,其特征在于,所述第一信息包括通过第一加密算法对所述第一生物特征信息加密得到的信息,和/或,所述第二信息包括通过所述第一加密算法对所述第二生物特征信息加密得到的信息;The method according to any one of claims 1-6, wherein the first information includes information obtained by encrypting the first biometric information with a first encryption algorithm, and/or, the first The second information includes information obtained by encrypting the second biometric information through the first encryption algorithm;
    所述方法还包括:接收来自云端服务器的所述第一加密算法。The method further includes: receiving the first encryption algorithm from a cloud server.
  8. 根据权利要求7所述的方法,其特征在于,所述方法还包括:在所述控制所述第一受控设备的状态之后,清除所述第一加密算法。The method according to claim 7, further comprising: after the state of the first controlled device is controlled, clearing the first encryption algorithm.
  9. 根据权利要求1-6中任一项所述的方法,其特征在于,所述第一信息包括通过第二加密算法对所述第一生物特征信息加密得到的信息,和/或,所述第二信息包括通过所述第二加密算法对所述第二生物特征信息加密得到的信息;The method according to any one of claims 1-6, wherein the first information includes information obtained by encrypting the first biometric information with a second encryption algorithm, and/or, the first The second information includes information obtained by encrypting the second biometric information through the second encryption algorithm;
    所述方法还包括:生成所述第二加密算法;The method also includes: generating the second encryption algorithm;
    将所述第二加密算法发送给所述第一待认证设备。Send the second encryption algorithm to the first device to be authenticated.
  10. 根据权利要求9所述的方法,其特征在于,所述方法还包括:在所述控制所述第一受控设备的状态之后,清除所述第二加密算法。The method according to claim 9, further comprising: after the state of the first controlled device is controlled, clearing the second encryption algorithm.
  11. 根据权利要求1-10中任一项所述的方法,其特征在于,所述第一生物特征信息包括第一心电信息;所述第二生物特征信息包括第二心电信息。The method according to any one of claims 1-10, wherein the first biometric information includes first electrocardiographic information; and the second biometric information includes second electrocardiographic information.
  12. 根据权利要求1-11中任一项所述的方法,其特征在于,所述方法还包括:在所述控制所述第一受控设备的状态之后,向云端服务器发送所述第一受控设备的标识信息及所述第二信息,所述第一受控设备的标识信息和所述第二信息至少用于生成所述第一待认证设备对应的结算信息。The method according to any one of claims 1-11, further comprising: after controlling the state of the first controlled device, sending the first controlled device to a cloud server The identification information of the device and the second information, the identification information of the first controlled device and the second information are at least used to generate settlement information corresponding to the first device to be authenticated.
  13. 一种认证系统,其特征在于,包括认证设备和云端服务器,其中,所述云端服务器被配置用于向第一受控设备发送第三信息,向第一待认证设备发送第四信息,其中,所述第三信息与第一业务信息相关联,所述第一业务信息为所述云端服务器为所述第一受控设备提供的业务信息;所述第四信息与第二业务信息相关联,所述第二业务信息为所述云端服务器为所述第一待认证设备提供的业务信息;An authentication system, characterized by comprising an authentication device and a cloud server, wherein the cloud server is configured to send third information to a first controlled device and send fourth information to a first device to be authenticated, wherein, The third information is associated with first service information, and the first service information is service information provided by the cloud server for the first controlled device; the fourth information is associated with second service information, The second service information is service information provided by the cloud server for the first device to be authenticated;
    所述认证设备被配置用于接收来自所述第一待认证设备的第四信息;对所述第三信息和所述第四信息进行匹配;在所述第三信息和所述第四信息匹配成功的情况下,获取第一时刻的第一信息和所述第一时刻的第二信息;对所述第一信息和所述第二信息进行匹配;根据所述第一信息和所述第二信息的匹配结果,控制所述第一受控设备的状态;其中,所述第一信息与第一生物特征信息相关联,所述第一生物特征信息来自所述第一受控设备,所述第二信息与第二生物特征信息相关联,所述第二生物特征信息来自第一待认证设备,且关联于所述第一待认证设备对应的用户。The authentication device is configured to receive fourth information from the first device to be authenticated; match the third information with the fourth information; and match the third information with the fourth information If successful, acquire the first information at the first moment and the second information at the first moment; match the first information with the second information; A matching result of the information controls the state of the first controlled device; wherein, the first information is associated with first biological feature information, the first biological feature information comes from the first controlled device, and the The second information is associated with second biological feature information, the second biological feature information is from the first device to be authenticated, and is associated with a user corresponding to the first device to be authenticated.
  14. 根据权利要求13所述的系统,其特征在于,所述第一受控设备包括第一智能锁;所述认证设备还被配置用于:在所述第一信息和所述第二信息匹配成功的情况下,发送第一控制信息,所述第一控制信息用于控制所述第一智能锁处于打开状态。The system according to claim 13, wherein the first controlled device comprises a first smart lock; and the authentication device is further configured to: when the first information and the second information match successfully In the case of , the first control information is sent, and the first control information is used to control the first smart lock to be in an open state.
  15. 根据权利要求13或14所述的系统,其特征在于,所述认证设备还被配置用于:在所述控制所述第一受控设备的状态之后,清除所述第一信息及所述第二信息。The system according to claim 13 or 14, wherein the authentication device is further configured to: clear the first information and the second information after the state of the first controlled device is controlled. Two information.
  16. 根据权利要求13-15中任一项所述的系统,其特征在于,所述认证设备还被配置用于:在所述第一受控设备与所述第一待认证设备之间的距离小于预设阈值的情况下,向所述第一受控设备发送第二控制信息,所述第二控制信息用于控制所述第一受控设备采集所述第一生物特征信息。The system according to any one of claims 13-15, wherein the authentication device is further configured to: the distance between the first controlled device and the first device to be authenticated is less than In the case of a preset threshold, sending second control information to the first controlled device, where the second control information is used to control the first controlled device to collect the first biological feature information.
  17. 根据权利要求13-16中任一项所述的系统,其特征在于,所述云端服务器还被配置用于:接收服务请求信息;根据所述服务请求信息,生成所述第三信息和所述第四信息。The system according to any one of claims 13-16, wherein the cloud server is further configured to: receive service request information; generate the third information and the Fourth information.
  18. 根据权利要求13-17中任一项所述的系统,其特征在于,所述第一信息包括通过第一加密算法对所述第一生物特征信息加密得到的信息,和/或,所述第二信息包括通过所述第一加密算法对所述第二生物特征信息加密得到的信息;The system according to any one of claims 13-17, wherein the first information includes information obtained by encrypting the first biometric information with a first encryption algorithm, and/or, the first The second information includes information obtained by encrypting the second biometric information through the first encryption algorithm;
    所述云端服务器还被配置用于:向所述认证设备发送所述第一加密算法,向所述第一待认证设备发送所述第一加密算法;The cloud server is further configured to: send the first encryption algorithm to the authentication device, and send the first encryption algorithm to the first device to be authenticated;
    所述认证设备还被配置用于:接收所述第一加密算法。The authentication device is further configured to: receive the first encryption algorithm.
  19. 根据权利要求13-18中任一项所述的系统,其特征在于,所述认证设备还被配置用于:在所述控制所述第一受控设备的状态之后,向云端服务器发送所述第一受控设备的标识信息及所述第二信息;The system according to any one of claims 13-18, wherein the authentication device is further configured to: after the state of the first controlled device is controlled, send the identification information of the first controlled device and the second information;
    所述云端服务器还被配置用于:接收所述第一受控设备的标识信息及所述第二信息;根据所述第二信息确定所述第一待认证设备;根据所述第一受控设备的标识信息对应的服务信息,生成所述第一待认证设备对应的结算信息;向所述第一待认证设备发送所述结算信息。The cloud server is further configured to: receive the identification information of the first controlled device and the second information; determine the first device to be authenticated according to the second information; The service information corresponding to the identification information of the device generates the settlement information corresponding to the first device to be authenticated; and sends the settlement information to the first device to be authenticated.
  20. 一种认证方法,其特征在于,所述方法应用于第一待认证设备,所述方法包括:An authentication method, characterized in that the method is applied to a first device to be authenticated, and the method includes:
    采集第一时刻的第二生物特征信息,所述第二生物特征信息关联于所述第一待认证设备对应的用户;Collecting second biometric information at the first moment, where the second biometric information is associated with the user corresponding to the first device to be authenticated;
    发送第二信息,所述第二信息与所述第二生物特征信息相关联,所述第二信息至少用于与第一信息进行匹配,所述第一信息与所述第一时刻的第一生物特征信息相关联,所述第一生物特征信息来自第一受控设备。sending second information, the second information is associated with the second biometric information, the second information is at least used to match with the first information, the first information is related to the first The biometric information is associated with the biometric information, and the first biometric information comes from the first controlled device.
  21. 根据权利要求20所述的方法,其特征在于,所述采集第一时刻的第二生物特征信息,包括:在所述第一受控设备与所述第一待认证设备之间的距离小于预设阈值的情况下,采集所述第二生物特征信息。The method according to claim 20, wherein the collecting the second biometric information at the first moment comprises: the distance between the first controlled device and the first device to be authenticated is less than a preset If the threshold is set, the second biometric information is collected.
  22. 一种认证系统,其特征在于,包括认证设备和待认证设备,其中,所述认证 设备被配置为执行上述权利要求1-12中任一项所述的方法,所述待认证设备被配置为执行上述权利要求20或21所述的方法。An authentication system, characterized by comprising an authentication device and a device to be authenticated, wherein the authentication device is configured to execute the method according to any one of claims 1-12, and the device to be authenticated is configured to Carrying out the method as claimed in claim 20 or 21 above.
  23. 一种认证系统,其特征在于,包括认证设备、待认证设备和受控设备,其中,所述认证设备被配置为执行上述权利要求1-12中任一项所述的方法,所述待认证设备被配置为执行上述权利要求20或21所述的方法,所述受控设备用于采集第一时刻的第一生物特征信息。An authentication system, characterized by comprising an authentication device, a device to be authenticated, and a controlled device, wherein the authentication device is configured to perform the method described in any one of claims 1-12 above, and the device to be authenticated The device is configured to execute the method described in claim 20 or 21 above, and the controlled device is used to collect the first biometric information at the first moment.
  24. 一种认证装置,其特征在于,包括:An authentication device, characterized in that it comprises:
    收发模块,用于获取第一时刻的第一信息和所述第一时刻的第二信息,其中,所述第一信息与第一生物特征信息相关联,所述第一生物特征信息来自第一受控设备,所述第二信息与第二生物特征信息相关联,所述第二生物特征信息来自第一待认证设备,且关联于所述第一待认证设备对应的用户;A transceiver module, configured to acquire first information at the first moment and second information at the first moment, wherein the first information is associated with first biometric information, and the first biometric information comes from the first In the controlled device, the second information is associated with second biometric information, the second biometric information comes from the first device to be authenticated, and is associated with a user corresponding to the first device to be authenticated;
    处理模块,用于对所述第一信息和所述第二信息进行匹配;根据所述第一信息和所述第二信息的匹配结果,控制所述第一受控设备的状态。A processing module, configured to match the first information with the second information; and control the state of the first controlled device according to a matching result between the first information and the second information.
  25. 一种待认证装置,其特征在于,包括:A device to be authenticated, characterized in that it comprises:
    处理模块,用于采集第一时刻的第二生物特征信息,所述第二生物特征信息关联于第一待认证设备对应的用户;A processing module, configured to collect second biometric information at the first moment, the second biometric information being associated with the user corresponding to the first device to be authenticated;
    收发模块,用于发送第二信息,所述第二信息与所述第二生物特征信息相关联,所述第二信息至少用于与第一信息进行匹配,所述第一信息与所述第一时刻的第一生物特征信息相关联,所述第一生物特征信息来自第一受控设备。A transceiver module, configured to send second information, the second information is associated with the second biometric information, the second information is at least used to match with the first information, and the first information is associated with the first information The first biological feature information at a moment is associated, and the first biological feature information comes from the first controlled device.
  26. 一种认证设备,其特征在于,包括:An authentication device, characterized in that it includes:
    处理器;processor;
    用于存储处理器可执行指令的存储器;memory for storing processor-executable instructions;
    其中,所述处理器被配置为执行所述指令时实现权利要求1-12中任一项所述的方法。Wherein, the processor is configured to implement the method according to any one of claims 1-12 when executing the instructions.
  27. 一种待认证设备,其特征在于,包括:A device to be certified, characterized in that it includes:
    传感器,用于采集生物特征信息;Sensors for collecting biometric information;
    处理器;processor;
    用于存储处理器可执行指令的存储器;memory for storing processor-executable instructions;
    其中,所述处理器被配置为执行所述指令时实现权利要求20或21所述的方法。Wherein, the processor is configured to implement the method of claim 20 or 21 when executing the instructions.
  28. 一种芯片,其特征在于,包括处理器,当所述处理器执行指令时,所述处理器执行如权利要求1-12中任一项所述的方法,或者执行如权利要求20或21所述的方法。A chip, characterized by comprising a processor, when the processor executes instructions, the processor executes the method according to any one of claims 1-12, or executes the method according to claim 20 or 21 described method.
  29. 一种计算机可读存储介质,其上存储有计算机程序指令,其特征在于,所述计 算机程序指令被处理器执行时实现权利要求1-12中任一项所述的方法,或者实现权利要求20或21所述的方法。A computer-readable storage medium, on which computer program instructions are stored, characterized in that, when the computer program instructions are executed by a processor, the method according to any one of claims 1-12 is implemented, or claim 20 is implemented. or the method described in 21.
  30. 一种计算机程序产品,其特征在于,当所述计算机程序产品在计算机上运行时,使得所述计算机执行权利要求1-12中任一项所述的方法,或者执行权利要求20或21所述的方法。A computer program product, characterized in that, when the computer program product is run on a computer, the computer is made to execute the method described in any one of claims 1-12, or to execute the method described in claim 20 or 21. Methods.
PCT/CN2021/139267 2021-12-17 2021-12-17 Authentication method, apparatus, device and system WO2023108635A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/139267 WO2023108635A1 (en) 2021-12-17 2021-12-17 Authentication method, apparatus, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/139267 WO2023108635A1 (en) 2021-12-17 2021-12-17 Authentication method, apparatus, device and system

Publications (1)

Publication Number Publication Date
WO2023108635A1 true WO2023108635A1 (en) 2023-06-22

Family

ID=86775336

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/139267 WO2023108635A1 (en) 2021-12-17 2021-12-17 Authentication method, apparatus, device and system

Country Status (1)

Country Link
WO (1) WO2023108635A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140089673A1 (en) * 2012-09-25 2014-03-27 Aliphcom Biometric identification method and apparatus to authenticate identity of a user of a wearable device that includes sensors
WO2015075664A1 (en) * 2013-11-20 2015-05-28 Zorzan Ivano Silvio Biometric authentication system and biometric authentication method
CN105938526A (en) * 2016-03-07 2016-09-14 李明 Identity authentication method and system
CN113672890A (en) * 2020-05-15 2021-11-19 中移(上海)信息通信科技有限公司 Identity authentication method and device, electronic equipment and computer storage medium
US11200306B1 (en) * 2021-02-25 2021-12-14 Telcom Ventures, Llc Methods, devices, and systems for authenticating user identity for location-based deliveries

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140089673A1 (en) * 2012-09-25 2014-03-27 Aliphcom Biometric identification method and apparatus to authenticate identity of a user of a wearable device that includes sensors
WO2015075664A1 (en) * 2013-11-20 2015-05-28 Zorzan Ivano Silvio Biometric authentication system and biometric authentication method
CN105938526A (en) * 2016-03-07 2016-09-14 李明 Identity authentication method and system
CN113672890A (en) * 2020-05-15 2021-11-19 中移(上海)信息通信科技有限公司 Identity authentication method and device, electronic equipment and computer storage medium
US11200306B1 (en) * 2021-02-25 2021-12-14 Telcom Ventures, Llc Methods, devices, and systems for authenticating user identity for location-based deliveries

Similar Documents

Publication Publication Date Title
US11902254B2 (en) Blockchain joining for a limited processing capability device and device access security
CN105493538B (en) The system and method for NFC access control for safety element center type NFC framework
US11539522B2 (en) Methods and apparatus for authorizing and providing of services
US10277591B2 (en) Protection and verification of user authentication credentials against server compromise
US9674161B2 (en) Data exchange in the internet of things
CN105144670B (en) Enable the person identifier system of Wireless Networking
CN111478918B (en) Device with access control function
US20170142579A1 (en) Quorum-based secure authentication
US20170083882A1 (en) Secure payment method and electronic device adapted thereto
CN107408167A (en) Perform the seamless certification of user
CN108604341A (en) Method of commerce, payment devices, calibration equipment and server
CN107113553A (en) The security protocol of unified near-field communication architecture
KR200494213Y1 (en) Cloud biometric payment and retail management system
US20200036708A1 (en) Biometric credential improvement methods and apparatus
US20210352485A1 (en) Reader device with sensor streaming data and methods
US20230308851A1 (en) Methods and apparatus for presence monitoring
US11562054B2 (en) Authorized gesture control methods and apparatus
US11238683B1 (en) Methods and apparatus for enabling digital identity support on legacy access control systems
CN111949972A (en) Verification method, system, equipment and storage medium of artificial intelligence model
CN111949986A (en) Service processing method, system and storage medium
WO2023108635A1 (en) Authentication method, apparatus, device and system
US20200036709A1 (en) Secure biometric credential authorization methods and apparatus
US11916900B2 (en) Authorized remote control device gesture control methods and apparatus
US20210166224A1 (en) Methods and apparatus for authorizing and providing of goods or services with reduced hardware resources
US20210217008A1 (en) Payment card authentication management

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21967768

Country of ref document: EP

Kind code of ref document: A1