CN104036168A - Authentication method and equipment - Google Patents

Authentication method and equipment Download PDF

Info

Publication number
CN104036168A
CN104036168A CN201410250344.8A CN201410250344A CN104036168A CN 104036168 A CN104036168 A CN 104036168A CN 201410250344 A CN201410250344 A CN 201410250344A CN 104036168 A CN104036168 A CN 104036168A
Authority
CN
China
Prior art keywords
user
authentication
signal
ripple signal
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410250344.8A
Other languages
Chinese (zh)
Other versions
CN104036168B (en
Inventor
杜琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhigu Ruituo Technology Services Co Ltd
Original Assignee
Beijing Zhigu Ruituo Technology Services Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhigu Ruituo Technology Services Co Ltd filed Critical Beijing Zhigu Ruituo Technology Services Co Ltd
Priority to CN201410250344.8A priority Critical patent/CN104036168B/en
Publication of CN104036168A publication Critical patent/CN104036168A/en
Application granted granted Critical
Publication of CN104036168B publication Critical patent/CN104036168B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides an authentication method and authentication equipment, and relates to the field of authentication. The method comprises the following steps: a target part responding to user body contacts with the target position of an object, and a wave signal from the target part is received through the target position; the user is subjected to authentication according to the wave signal. The method and the equipment have the advantages that the user is not required to do any additional operation during the contact between the user and the object, and biological authentication performed on the user is naturally accomplished, so that the user time is saved, and the user experience is improved.

Description

Method for authenticating and equipment
Technical field
The application relates to authentication field, relates in particular to a kind of method for authenticating and equipment.
Background technology
Traditional authentication realizes by password, and each validated user is assigned with a password, in authentication process, judges that according to the password of user's input whether user is legal.Adopt this authentication mode, once password is stolen or loss, will be cumbersome, generally all need to be by keeper's Modify password, before Modify password, also need the identity to user by other means to verify.
The problem existing for traditional authentication, someone has proposed biological authentication techniques, and the physical trait based on user is carried out authentication to user, such as scanning fingerprint, scanning iris etc.Biological authentication has overcome the problem that password in traditional authentication is stolen or lose, but existing biological authentication techniques lays particular emphasis on accuracy and the security of authentication, and general operation step is more complicated, and cost user time is more, and user experiences poor.
Summary of the invention
The application's object is: a kind of method for authenticating and equipment are provided.
According at least one embodiment of the application aspect, a kind of method for authenticating is provided, described method comprises:
Contact the target location of an object in response to a target site of user's body, receive the ripple signal from described target site by described target location;
According to described ripple signal, described user is carried out to authentication.
According to another aspect of at least one embodiment of the application, a kind of authentication device is provided, described equipment comprises:
One receiver module, contacts the target location of an object in response to a target site of user's body, receive the ripple signal from described target site by described target location;
One authentication module, for carrying out authentication according to described ripple signal to described user.
Method and apparatus described in the embodiment of the present application, in the contact process of user and described object, carries out any extra operation without user, naturally described user is completed to biological authentication, thereby has saved user time, has improved user's experience.
Brief description of the drawings
Fig. 1 is the process flow diagram of method for authenticating described in embodiment of the application;
Fig. 2 a is the reflection echo schematic diagram of a ultrasound wave after a fat hand transmission;
Fig. 2 b is the reflection echo schematic diagram of a ultrasound wave after a thin hand transmission;
Fig. 3 is the process flow diagram of method for authenticating described in embodiment of the application;
Fig. 4 is the modular structure schematic diagram of authentication device described in the embodiment of the present application;
Fig. 5 is the modular structure schematic diagram of authentication device described in embodiment of the application;
Fig. 6 is the modular structure schematic diagram of authentication device described in another embodiment of the application;
Fig. 7 is the application scenarios schematic diagram of authentication device described in the application;
Fig. 8 is the hardware configuration schematic diagram of authentication device described in embodiment of the application.
Embodiment
Below in conjunction with drawings and Examples, the application's embodiment is described in further detail.Following examples are used for illustrating the application, but are not used for limiting the application's scope.
Those skilled in the art understand, in the application's embodiment, the size of the sequence number of following each step does not also mean that the priority of execution sequence, and the execution sequence of each step should determine with its function and internal logic, and should not form any restriction to the implementation process of the embodiment of the present application.
In the each embodiment of the application, in first wave signal and Second Wave signal, at least one can adopt ultrasound wave or electromagnetic wave signal.Inventor finds under study for action, and ultrasound wave is the sound wave of frequency higher than 20000Hz, its good directionality, penetration capacity is strong, is easy to obtain more concentrated acoustic energy, in water transmission distance, and the composition of human body about 65% is water, therefore, ultrasound wave is suitable for transmitting taking human body as transmission medium.Meanwhile, hyperacoustic frequency is outside the mankind's earshot, and therefore, user can the hyperacoustic existence of perception, can not produce noise effect to user.In addition, frequency also can be transmitted taking human body as transmission medium preferably lower than the electromagnetic wave signal of 100MHz, goes for the application.
Fig. 1 is the process flow diagram of method for authenticating described in embodiment of the application, and described method can for example realize on an authentication device.As shown in Figure 1, described method comprises:
S120: contact the target location of an object in response to a target site of user's body, receive the ripple signal from described target site by described target location;
S140: described user is carried out to authentication according to described ripple signal.
Method described in the embodiment of the present application, contact the target location of described object in response to the described target site of user's body, receive from ripple signal described in described target site by described target location, and then according to described ripple signal, described user is carried out to authentication, described method is in the contact process of user and described object, such as user's a hand contacts in the process of door handle, carry out any extra operation without user, naturally described user is completed to biological authentication, thereby save user time, improved user's experience.
Below the principle that realizes of method described in the application is briefly described:
Inventor finds in research process, in the time that ripple signal (such as ultrasound wave) transmits along user's body, and user's physical characteristics, fat or thin etc. such as hand size, palm shape, palm, can exert an influence to ripple signal.That is to say, when identical primary wave signal is along the transmission of different user's body in season, due to the difference of the physical characteristics of different user, can cause the ripple signal receiving to there is obvious difference.
Such as, Fig. 2 a is the reflection echo schematic diagram of an initial ultrasound ripple 210 after a fat hand (in palm, the ratio of bone and meat is approximately 6:4) transmission, wherein the first waveform 220 in dotted line frame is reflection echos of corresponding described initial ultrasound ripple 210; Fig. 2 b is the reflection echo schematic diagram of described initial ultrasound ripple 210 after a thin hand (in palm, the ratio of bone and meat is approximately 9:1) transmission, and wherein the second waveform 230 in dotted line frame is reflection echos of corresponding described initial ultrasound ripple 210.Can see, identical initial ultrasound ripple 210 has obvious difference after two fat or thin different palms transmission.That is to say, the physical characteristics information that has comprised user in the ripple signal after user's body transmission, by analyzing this ripple signal, can realize the biological authentication to user.
Below with reference to embodiment, describe the function of described step S120 and S140 in detail.
S120: contact the target location of an object in response to a target site of user's body, receive the ripple signal from described target site by described target location.
Wherein, the target site of described user's body can directly contact described object, can also indirect contact described in object, click described object such as having gloves on.Described object can be the daily objects that may contact of user such as door handle, smart mobile phone, mouse.Described first wave signal can be sent by a Wearable equipment of wearing such as user, such as being sent by an Intelligent spire lamella.
The transmission path of described ripple signal comprises: described Wearable equipment sends described ripple signal, then described ripple signal, along comprising that the media transmission of described target site arrives the target location of described object, is directly received by described authentication device or continues and transmit until received by described authentication device along described object.
S140: described user is carried out to authentication according to described ripple signal.
As mentioned before, ripple signal after user's body transmission, it is described ripple signal, the physical characteristics information that has comprised user, concretely, be that the signal characteristic of described ripple signal is relevant to described target site, and described target site is corresponding with described user, therefore, described step S140 specifically comprises: according to the signal characteristic of described ripple signal, described user is carried out to authentication.In addition, in the amplitude of the signal characteristic of described ripple signal and described ripple signal, phase place, frequency spectrum at least one relevant.Concrete, the signal characteristic of described ripple signal can comprise: at least one item in fingerprint, mean value, difference; Described fingerprint by the amplitude of described ripple signal, phase place, frequency spectrum at least one form; Described mean value is the mean value of at least one in the amplitude, phase place, frequency spectrum of described ripple signal; Described difference is the difference of at least one in the amplitude, phase place, frequency spectrum of described ripple signal.
In one embodiment, according to the signal characteristic of described ripple signal, described user is carried out to authentication, further comprise: according to the signal characteristic of described ripple signal and at least one reference signal characteristics, described user is carried out to authentication.Wherein, described reference signal characteristics, can be predetermined by training, such as, in the training stage, user's tactile door handle that can repeatedly catch, and on described door handle, receive the ripple signal from user's hand, and then obtain described reference signal characteristics according to the ripple signal receiving.Concrete authentication process, can be the actual signal characteristic of described ripple signal receiving and the similarity of described at least one reference signal characteristics, if similarity is greater than a threshold value, what think current contact door handle is validated user, authentication is passed through, otherwise, that think current contact door handle is a disabled user, can point out this user further carry out by other means authentication (such as requiring user to input password) or send warning message etc.
In another embodiment, the quantity of validated user may be also multiple.Such as user A and user B are men and wives, for a lot of objects, they share.At this moment, similarly, in the training stage, multiple users can contact respectively described object, obtain described reference signal characteristics set.As shown in table 1, user A and B be corresponding door handle respectively, can obtain reference signal characteristics set { A1, B1}, taking B1 as example, it can be in the training stage, the user B tactile door handle that catches for many times receives the ripple signal from user B, and then obtains reference signal characteristics B1 according to the signal characteristic of the ripple signal receiving on described door handle.Concrete authentication process, it can be the similarity of each element in signal characteristic and the described reference signal characteristics set of the actual described ripple signal receiving respectively, if be greater than a threshold value with the similarity of certain element, think that relative users is validated user, authentication is passed through, otherwise, authentication is not passed through, and can point out this user further carry out by other means authentication (such as requiring user to input password) or send warning message.Such as, in the present embodiment, user A contact door handle or user B contact door handle all can authentication pass through.
Table 1
? 1
A A1
B B1
, it will be appreciated by those skilled in the art that when described validated user is while being multiple meanwhile, for fear of erroneous judgement, between each element in described reference signal characteristics set, should there is obvious difference, such as the similarity between any two elements is all less than a predetermined value.
Referring to Fig. 3, in another embodiment of the application, described method also comprises:
S150: carry out corresponding operating according to authenticating result.
Situation about not passing through for authentication, can process according to some existing methods, such as prompting user adopts other modes to carry out authentication, or sends warning message etc.The application pays close attention to the situation that authentication is passed through.
In one embodiment, in the situation that authentication is passed through, start corresponding described object and described user's service.The described object of described correspondence and described user's service can be directly the corresponding described user's of described object service, can be also other objects of being associated with described object or the corresponding described user's of equipment service.Such as, contact in the process of oneself door handle at user A, authentication device on described door handle has been carried out described method for authenticating, and authentication is passed through, described authentication device further control gate handle is opened door lock etc., the Smart Home control center that further described authentication device can also be associated with described door handle communicates by letter, and then opens air-conditioning etc.Wherein, described authentication device can be used as the integrated described door handle inside that is arranged at of functional module, or is attached on described door handle as a paster.
In addition, the embodiment of the present application also provides a kind of computer-readable medium, is included in the computer-readable instruction that carries out following operation while being performed: carry out the step S120 of the method in above-mentioned Fig. 1 illustrated embodiment, the operation of S140.
To sum up, method described in the embodiment of the present application, can be the in the situation that of user and object contact, naturally receive the ripple signal from the target site of user's body, according to described ripple signal, described user is carried out to authentication, and can start according to authenticating result the service of corresponding described user and described object, further promote user and experience.
Fig. 4 is the modular structure schematic diagram of authentication device described in the embodiment of the present invention, and as shown in Figure 4, described equipment 400 can comprise:
One receiver module 410, for contact the target location of an object in response to a target site of user's body, receives the ripple signal from described target site by described target location;
One authentication module 420, for carrying out authentication according to described ripple signal to described user.
Authentication device described in the embodiment of the present application, contact the target location of described object in response to the described target site of user's body, receive the described ripple signal from described target site by described target location, and then according to described ripple signal, described user is carried out to authentication, described equipment, in the contact process of user and described object, such as user's a hand contacts in the process of door handle, completes biological authentication to described user naturally, thereby save user time, improved user's experience.
Below with reference to embodiment, describe the function of described receiver module 410 and authentication module 420 in detail.
Described receiver module 410, for contact the target location of an object in response to a target site of user's body, receives the ripple signal from described target site by described target location.
Wherein, the target site of described user's body can directly contact described object, can also indirect contact described in object, click described object such as having gloves on.Described object can be the daily objects that may contact of user such as door handle, smart mobile phone, mouse.Described first wave signal can be sent by a Wearable equipment of wearing such as user, such as being sent by an Intelligent spire lamella.
The transmission path of described ripple signal comprises: described Wearable equipment sends described ripple signal, then described ripple signal, along comprising that the media transmission of described target site arrives the target location of described object, is directly received by described authentication device or continues and transmit until received by described authentication device along described object.
In order to make described receiver module 410 have good receiving directivity, described receiver module 410 can comprise a receiver array.
Described authentication module 420, for carrying out authentication according to described ripple signal to described user.
Described ripple signal after user's body transmission, the physical characteristics information that has comprised user, concretely, the signal characteristic that is described ripple signal is relevant to described target site, and described target site is corresponding with described user, therefore, described authentication module 420, specifically for carrying out authentication according to the signal characteristic of described ripple signal to described user.In addition, in the amplitude of the signal characteristic of described ripple signal and described ripple signal, phase place, frequency spectrum at least one relevant.Concrete, the signal characteristic of described ripple signal can comprise: at least one item in fingerprint, mean value, difference; Described fingerprint by the amplitude of described ripple signal, phase place, frequency spectrum at least one form; Described mean value is the mean value of at least one in the amplitude, phase place, frequency spectrum of described ripple signal; Described difference is the difference of at least one in the amplitude, phase place, frequency spectrum of described ripple signal.
In one embodiment, described authentication module 420, is further used for, according to the signal characteristic of described ripple signal and at least one reference signal characteristics, described user is carried out to authentication.Wherein, described reference signal characteristics, can be predetermined by training, and referring to Fig. 5, in one embodiment, described equipment 400 also comprises: one pre-determines module 430, for pre-determining described at least one reference signal characteristics.Such as, in the training stage, user's tactile door handle that can repeatedly catch, and on described door handle, receive the ripple signal from described user, and then obtain described reference signal characteristics according to the ripple signal receiving.Concrete authentication process, can be the actual signal characteristic of described ripple signal receiving and the similarity of described at least one reference signal characteristics, if similarity is greater than a threshold value, what think current contact door handle is validated user, authentication is passed through, otherwise, that think current contact door handle is a disabled user, can point out this user further carry out by other means authentication (such as requiring user to input password) or send warning message etc.
In another embodiment, the quantity of validated user may be also multiple.Such as user A and user B are men and wives, for a lot of objects, they share.At this moment, similarly, in the training stage, multiple users can contact respectively described object, obtain described reference signal characteristics set.As shown in table 1, user A and B be corresponding door handle respectively, can obtain reference signal characteristics set { A1, B1}, taking B1 as example, it can be in the training stage, the user B tactile door handle that catches for many times receives the ripple signal from user B, and then obtains reference signal characteristics B1 according to the signal characteristic of the ripple signal receiving on described door handle.Concrete authentication process, it can be the similarity of each element in signal characteristic and the described reference signal characteristics set of the actual described ripple signal receiving respectively, if be greater than a threshold value with the similarity of certain element, think that relative users is validated user, authentication is passed through, otherwise, authentication is not passed through, and can point out this user further carry out by other means authentication (such as requiring user to input password) or send warning message.Such as, in the present embodiment, user A contact door handle or user B contact door handle all can authentication pass through.
Simultaneously, it will be appreciated by those skilled in the art that when described validated user or described object are while being multiple, for fear of erroneous judgement, between each element in described reference signal characteristics set, should there is obvious difference, such as the similarity between any two elements is all less than a predetermined value.
Referring to Fig. 6, in one embodiment, described equipment 400 also comprises:
One execution module 440, for carrying out corresponding operating according to authenticating result.
Situation about not passing through for authentication, can process according to some existing methods, such as prompting user adopts other modes to carry out authentication, or sends warning message etc.The application pays close attention to the situation that authentication is passed through.
In one embodiment, described execution module 440, in the situation that authentication is passed through, starts corresponding described object and described user's service.The described object of described correspondence and described user's service can be directly the corresponding described user's of described object service, can be also other objects of being associated with described object or the corresponding described user's of equipment service.Such as, contact in the process of oneself door handle at user A, authentication device on described door handle has been carried out described method for authenticating, and authentication is passed through, described authentication device further control gate handle is opened door lock etc., the Smart Home control center that further described authentication device can also be associated with described door handle communicates by letter, and then opens air-conditioning etc.Wherein, described authentication device can be used as the integrated described door handle inside that is arranged at of functional module, or is attached on described door handle as a paster.
Fig. 7 is the application's method for authenticating and the application scenarios schematic diagram of equipment, as shown in Figure 7, user's the right hand 710 is worn an Intelligent spire lamella 711, when user goes back home middle preparation while opening the door, it can naturally hold door handle 720 with the right hand 710, in this case, described Intelligent spire lamella 711 can send ultrasound wave, ultrasound wave transmits along the right hand 710 and door handle 720, and the authentication device 730 being arranged on door lock receives, described authentication device 730 and then described user is carried out to authentication according to described ultrasound wave, after authentication is passed through, described authentication device can be controlled described door handle 720 and open door lock.
Suppose that another user has stolen described Intelligent spire lamella 711, and described door lock is opened in trial, when this another user also holds described door handle 720 with the right hand, described Intelligent spire lamella 711 sends described ultrasound wave, described ultrasound wave transmits through this another user's the right hand and described door handle 720, and is received by described authentication device 730, is this another user's physical trait information due to what comprise in the ultrasound wave receiving, cannot pass through authentication, described authentication device can send warning message.
Described in embodiment of the application, the hardware configuration of authentication device as shown in Figure 8.The application's specific embodiment does not limit the specific implementation of described authentication device, and referring to Fig. 8, described equipment 800 can comprise:
Processor (processor) 810, communication interface (Communications Interface) 820, storer (memory) 830, and communication bus 840.Wherein:
Processor 810, communication interface 820, and storer 830 completes mutual communication by communication bus 840.
Communication interface 820, for other net element communications.
Processor 810, for executive routine 832, specifically can carry out the correlation step in the embodiment of the method shown in above-mentioned Fig. 1.
Particularly, program 832 can comprise program code, and described program code comprises computer-managed instruction.
Processor 810 may be a central processor CPU, or specific integrated circuit ASIC (Application Specific Integrated Circuit), or is configured to implement one or more integrated circuit of the embodiment of the present application.
Storer 830, for depositing program 832.Storer 830 may comprise high-speed RAM storer, also may also comprise nonvolatile memory (non-volatile memory), for example at least one magnetic disk memory.Program 832 specifically can be carried out following steps:
Contact the target location of an object in response to a target site of user's body, receive the ripple signal from described target site by described target location;
According to described ripple signal, described user is carried out to authentication.
In program 832, the specific implementation of each step can, referring to the corresponding steps in above-described embodiment or module, be not repeated herein.Those skilled in the art can be well understood to, and for convenience and simplicity of description, the specific works process of the equipment of foregoing description and module, can describe with reference to the corresponding process in preceding method embodiment, does not repeat them here.
Those of ordinary skill in the art can recognize, unit and the method step of each example of describing in conjunction with embodiment disclosed herein, can realize with the combination of electronic hardware or computer software and electronic hardware.These functions are carried out with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel can realize described function with distinct methods to each specifically should being used for, but this realization should not thought and exceeds the application's scope.
If described function realizes and during as production marketing independently or use, can be stored in a computer read/write memory medium using the form of SFU software functional unit.Based on such understanding, the part that the application's technical scheme contributes to prior art in essence in other words or the part of this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprise that some instructions (can be personal computers in order to make a computer equipment, controller, or the network equipment etc.) carry out all or part of step of method described in each embodiment of the application.And aforesaid storage medium comprises: USB flash disk, portable hard drive, ROM (read-only memory) (ROM, Read-Only Memory), the various media that can be program code stored such as random access memory (RAM, Random Access Memory), magnetic disc or CD.
Above embodiment is only for illustrating the application; and the not restriction to the application; the those of ordinary skill in relevant technologies field; in the case of not departing from the application's spirit and scope; can also make a variety of changes and modification; therefore all technical schemes that are equal to also belong to the application's category, and the application's scope of patent protection should be defined by the claims.

Claims (18)

1. a method for authenticating, is characterized in that, described method comprises:
Contact the target location of an object in response to a target site of user's body, receive the ripple signal from described target site by described target location;
According to described ripple signal, described user is carried out to authentication.
2. the method for claim 1, is characterized in that, describedly according to described ripple signal, described user is carried out to authentication and comprises:
According to the signal characteristic of described ripple signal, described user is carried out to authentication.
3. method as claimed in claim 2, is characterized in that, the signal characteristic of described ripple signal is relevant to described target site.
4. the method as described in claim 2 to 3 any one, is characterized in that, in the amplitude of the signal characteristic of described ripple signal and described ripple signal, phase place, frequency spectrum at least one relevant.
5. the method as described in claim 2 to 4 any one, is characterized in that, describedly according to the signal characteristic of described ripple signal, described user is carried out to authentication and comprises:
According to the signal characteristic of described ripple signal and at least one reference signal characteristics, described user is carried out to authentication.
6. method as claimed in claim 5, is characterized in that, described method also comprises:
Pre-determine described at least one reference signal characteristics.
7. the method as described in claim 1 to 6 any one, is characterized in that, described method also comprises:
Carry out corresponding operating according to authenticating result.
8. method as claimed in claim 7, is characterized in that, described according to authenticating result carry out corresponding operating comprise:
In the situation that authentication is passed through, start corresponding described object and described user's service.
9. method as claimed in claim 8, is characterized in that, described according to authenticating result carry out corresponding operating comprise:
In the situation that authentication is passed through, start the corresponding described user's of described object service.
10. the method as described in claim 1 to 9 any one, is characterized in that, described ripple signal is ultrasonic signal or electromagnetic wave signal.
11. 1 kinds of authentication devices, is characterized in that, described equipment comprises:
One receiver module, contacts the target location of an object in response to a target site of user's body, receive the ripple signal from described target site by described target location;
One authentication module, for carrying out authentication according to described ripple signal to described user.
12. equipment as claimed in claim 11, is characterized in that, described authentication module, for carrying out authentication according to the signal characteristic of described ripple signal to described user.
13. equipment as claimed in claim 12, is characterized in that, described authentication module, for carrying out authentication according to the signal characteristic of described ripple signal and at least one reference signal characteristics to described user.
14. equipment as claimed in claim 13, is characterized in that, described equipment also comprises:
One pre-determines module, for pre-determining described at least one reference signal characteristics.
15. equipment as described in claim 11 to 14 any one, is characterized in that, described equipment also comprises:
One execution module, for carrying out corresponding operating according to authenticating result.
16. equipment as claimed in claim 15, is characterized in that, described execution module, in the situation that authentication is passed through, starts corresponding described object and described user's service.
17. equipment as claimed in claim 16, is characterized in that, described execution module, in the situation that authentication is passed through, starts the corresponding described user's of described object service.
18. equipment as described in claim 11 to 17 any one, is characterized in that, described receiver module comprises a receiver array.
CN201410250344.8A 2014-06-06 2014-06-06 Method for authenticating and equipment Active CN104036168B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410250344.8A CN104036168B (en) 2014-06-06 2014-06-06 Method for authenticating and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410250344.8A CN104036168B (en) 2014-06-06 2014-06-06 Method for authenticating and equipment

Publications (2)

Publication Number Publication Date
CN104036168A true CN104036168A (en) 2014-09-10
CN104036168B CN104036168B (en) 2019-01-15

Family

ID=51466936

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410250344.8A Active CN104036168B (en) 2014-06-06 2014-06-06 Method for authenticating and equipment

Country Status (1)

Country Link
CN (1) CN104036168B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016187988A1 (en) * 2015-05-26 2016-12-01 中兴通讯股份有限公司 Authentication method, device and terminal
CN111092768A (en) * 2019-12-20 2020-05-01 浙江大华技术股份有限公司 Network configuration method and device, storage medium and electronic device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6724689B2 (en) * 2002-03-08 2004-04-20 Philip Koenig Personal identification method and apparatus using acoustic resonance analysis of body parts
CN1937955A (en) * 2004-03-26 2007-03-28 佳能株式会社 Method of identification of living body and apparatus for identification of living body
CN102289618A (en) * 2011-07-19 2011-12-21 中山大学深圳研究院 Electrocardiosignal-based identity recognition method and device
CN102306493A (en) * 2011-08-18 2012-01-04 鸿富锦精密工业(深圳)有限公司 Terminating machine, voice identification system and voice identification method thereof
CN102955933A (en) * 2011-08-24 2013-03-06 苏州飞锐智能科技有限公司 Household access control method based on face recognition
CN102968865A (en) * 2012-11-23 2013-03-13 广州易联商业服务有限公司 Authentication method and system for mobile payment
CN103198295A (en) * 2013-03-04 2013-07-10 同济大学 Method and system for human body identity identification
CN103809750A (en) * 2014-02-08 2014-05-21 北京智谷睿拓技术服务有限公司 Information interaction method based on wearable device and wearable device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6724689B2 (en) * 2002-03-08 2004-04-20 Philip Koenig Personal identification method and apparatus using acoustic resonance analysis of body parts
CN1937955A (en) * 2004-03-26 2007-03-28 佳能株式会社 Method of identification of living body and apparatus for identification of living body
CN102289618A (en) * 2011-07-19 2011-12-21 中山大学深圳研究院 Electrocardiosignal-based identity recognition method and device
CN102306493A (en) * 2011-08-18 2012-01-04 鸿富锦精密工业(深圳)有限公司 Terminating machine, voice identification system and voice identification method thereof
CN102955933A (en) * 2011-08-24 2013-03-06 苏州飞锐智能科技有限公司 Household access control method based on face recognition
CN102968865A (en) * 2012-11-23 2013-03-13 广州易联商业服务有限公司 Authentication method and system for mobile payment
CN103198295A (en) * 2013-03-04 2013-07-10 同济大学 Method and system for human body identity identification
CN103809750A (en) * 2014-02-08 2014-05-21 北京智谷睿拓技术服务有限公司 Information interaction method based on wearable device and wearable device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ISAO NAKANISHI,EL.: "Performance Evaluation of Intra-Palm Propagation Signals as Biometrics", 《PROC OF INTERNATIONAL CONFERENCE ON BIOMETRICS AND KANSEI ENGINEERING》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016187988A1 (en) * 2015-05-26 2016-12-01 中兴通讯股份有限公司 Authentication method, device and terminal
CN106295283A (en) * 2015-05-26 2017-01-04 中兴通讯股份有限公司 A kind of method, device and terminal realizing authentication
CN111092768A (en) * 2019-12-20 2020-05-01 浙江大华技术股份有限公司 Network configuration method and device, storage medium and electronic device
CN111092768B (en) * 2019-12-20 2022-12-06 浙江大华技术股份有限公司 Network configuration method and device, storage medium and electronic device

Also Published As

Publication number Publication date
CN104036168B (en) 2019-01-15

Similar Documents

Publication Publication Date Title
CN104036179A (en) Authentication method and equipment
Meng et al. Securing consumer IoT in the smart home: Architecture, challenges, and countermeasures
CN103106736B (en) A kind of identity identifying method, terminal and server
US20140115682A1 (en) User Verification Processing Method, User Equipment, and Server
Al Arafat et al. Vr-spy: A side-channel attack on virtual key-logging in vr headsets
CN103533546A (en) Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics
CN106845267B (en) The processing method and mobile terminal of applicating history information
CN103699223A (en) Control method and equipment based on gestures
CN103809750A (en) Information interaction method based on wearable device and wearable device
CN104753765A (en) Automatic short message reply method and device
CN203276380U (en) Distributed door access authentication system based on palm veins
CN104036178A (en) Authentication method and equipment
CN110120928A (en) A kind of identity authentication method, device, server and computer-readable medium
CN103941867A (en) Interaction method and system
CN104935548B (en) Auth method, apparatus and system based on intelligent equipment of tatooing
CN109413057A (en) Smart home sequential authentication user method and system based on fine granularity finger gesture
WO2021077828A1 (en) Near field communication authentication initiating method and related apparatus
Shi et al. Towards environment-independent behavior-based user authentication using wifi
CN104036168A (en) Authentication method and equipment
CN105488871A (en) Entrance guard control method, apparatus, terminal and control server
CN110162957A (en) Method for authenticating and device, storage medium, the electronic device of smart machine
CN108566371A (en) A kind of social activity authentication method, system and terminal device
CN107124457A (en) Application data synchronous method, application data sychronisation and server
CN109492357B (en) Identity authentication method, identity authentication equipment and computer storage medium
Roy et al. Attacking mouse dynamics authentication using novel wasserstein conditional DCGAN

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant