CN104298908A - Information processing method and electronic equipment - Google Patents

Information processing method and electronic equipment Download PDF

Info

Publication number
CN104298908A
CN104298908A CN201310302551.9A CN201310302551A CN104298908A CN 104298908 A CN104298908 A CN 104298908A CN 201310302551 A CN201310302551 A CN 201310302551A CN 104298908 A CN104298908 A CN 104298908A
Authority
CN
China
Prior art keywords
electronic equipment
information
verified
user
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310302551.9A
Other languages
Chinese (zh)
Other versions
CN104298908B (en
Inventor
董强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201310302551.9A priority Critical patent/CN104298908B/en
Publication of CN104298908A publication Critical patent/CN104298908A/en
Application granted granted Critical
Publication of CN104298908B publication Critical patent/CN104298908B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The invention discloses an information processing method and electronic equipment. The method includes the steps that whether a verification operation for verifying a first user exists or not is detected; when the verification operation exists, first biological feature information of the first user is obtained through responding to the verification operation; feature extraction processing is performed on the first biological feature information, so that first information to be verified is obtained; the first information to be verified is sent to second electronic equipment so that the second electronic equipment can match pre-stored first standard information with the first information to be verified to verify the first user.

Description

A kind of information processing method and electronic equipment
Technical field
The application belongs to electronic technology field, is specifically related to a kind of information processing method and electronic equipment.
Background technology
In the current information age; how identity, the protection information safety of a precise Identification people; become a crucial social concern that must solve; traditional authentication is owing to very easily forging and losing, and be difficult to the demand meeting society gradually, the most convenient is at present exactly biological identification technology with the solution of safety undoubtedly; utilize biological identification technology; the identification of identity is carried out according to the biological information of user, not only fast succinct, and safely, reliably, accurately.
Usually, the biological characteristic that can be used for identity verification has fingerprint, iris, vocal print etc.In theory, the standard information for verifying can be stored in the electronic equipment obtaining verification operation, also can be stored in the webserver, such as cloud server etc.
Present inventor, in the process realizing the embodiment of the present application technical scheme, at least finds to there is following technical matters in prior art:
If the biological information of user is stored in high in the clouds, once information is revealed, then can lead to great security incident, therefore, according to state's laws, the biological information storing user is beyond the clouds forbidden, so, there is the technical matters that mobile phone etc. cannot be verified according to the identity of biological information to user between electronic equipment and high in the clouds.
Summary of the invention
The embodiment of the present application provides a kind of information processing method and electronic equipment, for solving in prior art according to state's laws, high in the clouds can not store the biological information of user, thus, there is the technical matters that mobile phone etc. cannot be verified according to the identity of biological information to user between electronic equipment and high in the clouds, achieving the first electronic equipment and the second electronic equipment can according to the technique effect the first biological information being carried out to the identity of the first information to be verified to user that feature extraction obtains and verify, meanwhile, improve the security of proof procedure.
The application provides following technical scheme by the application one embodiment:
A method for information processing, be applied in the first electronic equipment, described method comprises:
Detect and whether there is the verification operation that first user is verified;
When there is described verification operation, responding described verification operation, obtaining the first biological information of described first user;
Feature extraction process is carried out to described first biological information, obtains the first information to be verified;
Send described first information to be verified to the second electronic equipment, the first standard information prestored can be mated with described first information to be verified, to verify described first user by described second electronic equipment.
Further, described feature extraction process is carried out to described first biological information before, described method also comprises:
Determine that the current level of security of described first electronic equipment is the first level of security.
Further, described feature extraction process is carried out to described first biological information, obtains the first information to be verified, be specially:
Based on described first level of security, fisrt feature extraction process is carried out to described first biological information, obtain the first information to be verified comprising the first information amount corresponding with described first level of security.
Further, before whether there is in described detection the verification operation verified first user, described method also comprises:
Detect whether to exist from described first user operation associated for what described first electronic equipment and described second electronic equipment are carried out associating;
Exist described operation associated time, generate and send an associated instructions to described second electronic equipment, make described second electronic equipment can pass through to perform described associated instructions, associate with described first electronic equipment, thus described second electronic equipment can determine described first standard information for verifying described first user prestored.
Further, when described second electronic equipment and described first electronic equipment are dissimilar electronic equipment, and described second electronic equipment is the webserver, when described first electronic equipment is mobile phone, described first information to be verified of described transmission, to the second electronic equipment, is specially:
Send described first information to be verified to the described webserver, the first standard information prestored can be mated with described first information to be verified by the described webserver.
Further, when described second electronic equipment and described first electronic equipment are the electronic equipment of identical type, and described second electronic equipment is the second mobile phone, when described first electronic equipment is the first mobile phone, described first information to be verified of described transmission, to the second electronic equipment, is specially:
Send described first information to be verified to described second mobile phone, the first standard information prestored can be mated with described first information to be verified by described second-hand's machine.
Further, described first biological information is specially finger print information or iris information or voiceprint.
The application provides following technical scheme by another embodiment of the application:
A kind of electronic equipment, described electronic equipment comprises:
Detecting unit, for detecting the verification operation whether existing and verify first user;
First obtains unit, for when there is described verification operation, responding described verification operation, obtaining the first biological information of described first user;
Second obtains unit, for carrying out feature extraction process to described first biological information, obtains the first information to be verified;
Transmitting element, for sending described first information to be verified to the second electronic equipment, makes described second electronic equipment the first standard information prestored can be mated with described first information to be verified, to verify described first user.
Further, described electronic equipment also comprises:
Determining unit, for determining that the current level of security of described first electronic equipment is the first level of security.
Further, described second obtains unit, specifically for:
Based on described first level of security, fisrt feature extraction process is carried out to described first biological information, obtain the first information to be verified comprising the first information amount corresponding with described first level of security.
Further, described electronic equipment also comprises:
Detecting unit, whether for detecting, to exist from described first user operation associated for what described first electronic equipment and described second electronic equipment are carried out associating;
Instruction generation unit, for exist described operation associated time, generate and send an associated instructions to described second electronic equipment, make described second electronic equipment can pass through to perform described associated instructions, associate with described first electronic equipment, thus described second electronic equipment can determine described first standard information for verifying described first user prestored.
Further, when described second electronic equipment and described electronic equipment are dissimilar electronic equipment, and described second electronic equipment is the webserver, when described electronic equipment is mobile phone, and described transmitting element, specifically for:
Send described first information to be verified to the described webserver, the first standard information prestored can be mated with described first information to be verified by the described webserver.
Further, when described second electronic equipment and described electronic equipment are the electronic equipment of identical type, and described second electronic equipment is the second mobile phone, when described electronic equipment is the first mobile phone, and described transmitting element, specifically for:
Send described first information to be verified to described second mobile phone, the first standard information prestored can be mated with described first information to be verified by described second-hand's machine.
Further, described first biological information is specially finger print information or iris information or voiceprint.
The one or more technical schemes provided in the embodiment of the present application, at least have following technique effect or advantage:
The embodiment of the present application is in the process verified the identity of first user, when there is the verification operation of first user, respond described verification operation, obtain the first biological information of first user, then, feature extraction process is carried out to the first biological information, obtain the first information to be verified, and described first information to be verified is sent to the second electronic equipment, the first standard information that second electronic equipment can be prestored is mated with the first information to be verified, to verify first user, solve in prior art according to state's laws, high in the clouds can not store the biological information of user, thus, there is the technical matters that mobile phone etc. cannot be verified according to the identity of biological information to user between electronic equipment and high in the clouds, achieve and only first standard information of carrying out characteristic processing is left in the second electronic equipment, and without the need to complete standard biological characteristic information is left in the second electronic equipment, as high in the clouds, when needs are verified, identical feature extraction process is carried out to the first biological information obtained, obtain the first information to be verified, verify based on the identity of the first information to be verified to user,
And then, solve in prior art and no matter leave standard biological characteristic information in terminal, still leave high in the clouds in and all there is easy leakage, the technical matters that security is low, and the application improves the security of proof procedure, even if other people obtain the first standard information, also cannot restore standard biological characteristic information, the first standard information is only for identity verification;
Again, by carrying out fisrt feature extraction process based on the first level of security to described first biological information, obtain the first information to be verified comprising the first information amount corresponding with described first level of security, make electronic equipment can provide the verification operation with different level of security, user can select according to different demand, improves the experience of user;
Again, whether by detecting, to exist from described first user operation associated for what described first electronic equipment and described second electronic equipment are carried out associating, exist described operation associated time, generate and send an associated instructions to described second electronic equipment, make described second electronic equipment can pass through to perform described associated instructions, associate with described first electronic equipment, make first user can when not using or can not use the second electronic equipment depositing the first standard device, can verify its identity equally and perform corresponding operation, simultaneously, after receiving associated instructions, second electronic equipment can determine the first standard information for verifying first user.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of a kind of information processing method in the application one embodiment;
Fig. 2 is the structural drawing of a kind of electronic equipment in the application one embodiment.
Embodiment
The embodiment of the present application provides a kind of information processing method and electronic equipment, for solving in prior art according to state's laws, high in the clouds can not store the biological information of user, thus, there is the technical matters that mobile phone etc. cannot be verified according to the identity of biological information to user between electronic equipment and high in the clouds, achieving the first electronic equipment and the second electronic equipment can according to the technique effect the first biological information being carried out to the identity of the first information to be verified to user that feature extraction obtains and verify, meanwhile, improve the security of proof procedure.
Technical scheme in the embodiment of the present invention is for solving the problem, and general thought is as follows:
In this application, first, detect and whether there is the verification operation that first user is verified, when there is described verification operation, respond described verification operation, obtain the first biological information of described first user, then, feature extraction process is carried out to described first biological information, obtain the first information to be verified, finally, send described first information to be verified to the second electronic equipment, the first standard information prestored can be mated with described first information to be verified by described second electronic equipment, to verify described first user, solve in prior art according to state's laws, high in the clouds can not store the biological information of user, thus, there is the technical matters that mobile phone etc. cannot be verified according to the identity of biological information to user between electronic equipment and high in the clouds, achieving the first electronic equipment and the second electronic equipment can according to the technique effect the first biological information being extracted to the identity of the first information to be verified to user that obtain and verify, simultaneously, improve the security of proof procedure.
In order to better understand technique scheme, below in conjunction with Figure of description and concrete embodiment, technique scheme is described in detail.
The application one embodiment provides a kind of method of information processing, be applied in the first electronic equipment, wherein, described first electronic equipment can be the terminal electronic device such as mobile phone, panel computer, notebook computer, and the type of the application to the first electronic equipment is not specifically limited.
As shown in Figure 1, in the embodiment of the present application, described method comprises:
Step 101: detect whether there is the verification operation that first user is verified.
Wherein, when the first electronic equipment needs to verify the identity of first user, detect the verification operation whether existed from first user, corresponding to this testing process and the verification operation performed by first user, that is, the testing process that different verification operations is corresponding different, if first user performs verification operation based on finger print information, then whether the first electronic equipment collected finger print information by fingerprint detection unit inspection, if collected finger print information, then showed to there is verification operation; If first user performs verification operation based on iris information, then whether the first electronic equipment collected iris information by iris detection unit inspection, if collected iris information, then show to there is verification operation, in addition, other verification operations that those of ordinary skill in the art can also perform according to first user in reality, correspondence chooses other detection method to detect described verification operation, and the application does not do concrete restriction.
After completing steps 101, the embodiment of the present application performs step 102: when there is described verification operation, responding described verification operation, obtaining the first biological information of described first user.
In specific implementation process, for different verification operations, what gather acquisition has the first dissimilar biological information, as finger print information, iris information, voiceprint etc., those of ordinary skill in the art can also according to the difference of verification operation, gather the biological information obtaining other types, the application repeats no longer one by one.
After completing steps 102, the embodiment of the present application performs step 103: carry out feature extraction process to described first biological information, obtains the first information to be verified.
In specific implementation process, according to the particular type belonging to the first biological information, adopt corresponding feature extraction process.
When the first biological information is finger print information, can adopts and carry out feature extraction process with the following method:
First, for avoiding the impact being subject to extraneous various factors, pre-service can be carried out to the fingerprint collected, as fingerprint segmentation, fingerprint strengthens, the preprocessing process such as binaryzation and refinement, after completing preprocessing process, fingerprint image becomes an auxiliary point line chart, feature extraction process is carried out according to this point and line chart, obtain the first information to be verified comprising the unique point of predetermined number and/or the characteristic curve of predetermined number, wherein, point and line chart can be divided into some regions according to the actual needs of user by the process obtaining the unique point of predetermined number and/or the characteristic curve of predetermined number, in region after division, specify at random or by user and choose some matched positions, and on matched position, obtain described unique point and/or characteristic curve, finally, unique point and/or the characteristic curve of the predetermined number obtained through feature extraction process constitute described first information to be verified.
When the first biological information is iris information, also need first to carry out pre-service to the iris image collected, as image smoothing, Iris Location and extraction, the preprocessing process such as iris image normalization, after completing preprocessing process, obtain a width iris texture figure, feature extraction process is carried out according to iris texture figure, obtain the first information to be verified comprising the feature texture of predetermined number, wherein, also the process obtaining above-mentioned acquisition unique point and/or characteristic curve can be copied, after determining some matched positions, described feature texture is obtained at matched position place, finally, the feature texture of the predetermined number obtained through feature extraction process constitutes described first information to be verified.
When the first biological information is voiceprint, after collecting acoustic information, the process such as noise reduction, end-point detection is comprised to its pre-service carried out, obtain voiceprint, then, the time zone that voiceprint comprises can be divided, and determine some coupling subregions in region after division, in coupling subregion, obtain feature vocal print sequence, eventually pass described first information to be verified of the feature vocal print Sequence composition of the predetermined number that feature extraction process obtains.
It should be noted that, those of ordinary skill in the art can also adopt additive method to carry out extraction process to feature, to obtain the first information to be verified comprising characteristic information, or, for the other types that the first biological information has, adopt additive method to carry out extraction process to feature, the application repeats no longer one by one.
After completing steps 103, the embodiment of the present application performs step 104: send described first information to be verified to the second electronic equipment, the first standard information prestored can be mated with described first information to be verified, to verify described first user by described second electronic equipment.
Wherein, the first standard information for verifying first user identity is previously stored with in described second electronic equipment, described first standard information carries out to standard biological characteristic information the information that characteristic processing obtains, the quantity of information that the quantity of information that described first standard information comprises comprises much smaller than standard biological characteristic information, therefore, standard biological characteristic information can not be restored according to the first standard information.In addition, the quantity of information that described first standard information comprises can be identical with the quantity of information that described first information to be verified comprises, such as, first packets of information to be verified is containing 5 unique points at 5 matched position places, then the first standard information is included in standard feature point/or the characteristic curve at 5 corresponding matched position places, in addition, the quantity of information that described first information to be verified comprises also can be less than the quantity of information that described first standard information comprises, when the match is successful for the first information to be verified and the first standard information, the first matched position place as the first information to be verified is unique point, first matched position place corresponding to the first standard information is standard feature point, and, unique point overlaps with the position of standard feature point, namely the match is successful, show that first user and the Standard User corresponding to the first standard information are same user, be proved to be successful, when the first information to be verified can not be mated with the first standard information, the first matched position place as the first information to be verified is unique point, first matched position place corresponding to the first standard information is standard feature line, or its first matched position place is standard feature point, but standard feature point can not overlap with the unique point in the first information to be verified, namely it fails to match, shows that first user is not the Standard User corresponding to the first standard information, authentication failed.
Preferably, before step 103, in the embodiment of the present application, described method also comprises:
Determine that the current level of security of described first electronic equipment is the first level of security.
Then, in the embodiment of the present application, step 103, namely describedly carries out feature extraction process to described first biological information, obtains the first information to be verified, is specially:
Based on described first level of security, fisrt feature extraction process is carried out to described first biological information, obtain the first information to be verified comprising the first information amount corresponding with described first level of security.
In specific implementation process, user can set different level of securitys to the first electronic equipment according to actual needs, as, level of security-Gao can be set, level of security-in and level of security-low, the feature extraction process that different level of securitys is corresponding different, as level of security-high characteristic of correspondence extraction process can obtain first information to be verified with first information amount, level of security-middle characteristic of correspondence extraction process can obtain first information to be verified with the second quantity of information, preferably, first information amount is greater than the second quantity of information, thus, level of security can be comprised higher, quantity of information to be verified is larger, it is more accurate to verify.
It should be noted that, mode according to level of security is verified, the quantity of information obtaining the first information to be verified when then needing the quantity of information that comprises in guarantee first standard information the highest with level of security is identical, thus, when the first electronic equipment rises to level of security-Gao from level of security-low, first standard information can also be mated with the first information to be verified by the second electronic equipment, completes proof procedure.
Preferably, before step 101, in the embodiment of the present application, described method also comprises:
Detect whether to exist from described first user operation associated for what described first electronic equipment and described second electronic equipment are carried out associating;
Exist described operation associated time, generate and send an associated instructions to described second electronic equipment, make described second electronic equipment can pass through to perform described associated instructions, associate with described first electronic equipment, thus described second electronic equipment can determine described first standard information for verifying described first user prestored.
In specific implementation process, first user can log in the first electronic equipment, associate with the second electronic equipment by logging in, thus, the first standard information in the second electronic equipment can be determined, concrete, if when the first electronic equipment detects operation associated, the i.e. operation of first user for logging in, first electronic equipment generates and sends an associated instructions to the second electronic equipment, second electronic equipment is after receiving and perform described associated instructions, realize associating with the first electronic equipment, now, show first user successful log to the second electronic equipment, thus, second electronic equipment can determine the first standard information for verifying first user identity.
In addition, in the embodiment of the present application, second electronic equipment can be the electronic equipment different from the first electronic device types, and such as, the first electronic equipment is mobile phone, second electronic equipment is the webserver, as high in the clouds, the second electronic equipment also can be the electronic equipment identical with the first electronic device types, such as, first electronic equipment mobile phone, the second electronic equipment is also mobile phone.
Wherein, in the embodiment of the present application, when described second electronic equipment is the webserver, when described first electronic equipment is mobile phone, described first information to be verified of described transmission, to the second electronic equipment, is specially:
Send described first information to be verified to the described webserver, the first standard information prestored can be mated with described first information to be verified by the described webserver.
In specific implementation process, first standard information can leave in the webserver, as high in the clouds, thus, mobile phone can by sending to high in the clouds by the first information to be verified, and the first standard information prestored by high in the clouds and described first information to be verified are verified.
Wherein, in the embodiment of the present application, when described second electronic equipment is the second mobile phone, when described first electronic equipment is the first mobile phone, described first information to be verified of described transmission, to the second electronic equipment, is specially:
Send described first information to be verified to described second mobile phone, the first standard information prestored can be mated with described first information to be verified by described second-hand's machine.
In specific implementation process, first standard information also can be deposited in the electronic device, such as, its first correct standard information is stored in its second mobile phone by user's first, when user's first carries out verification operation on the first mobile phone of user's second, user's first, by performing verification operation, makes first-hand machine can by transmission first message to be verified to the second mobile phone of user's first, and the first standard information prestored by the second mobile phone is mated with described first information to be verified.
Below for more clearly allowing the application person of an ordinary skill in the technical field can understand method in above-described embodiment clearer and fully, by conjunction with in the concrete use procedure of user, the implementation procedure of method is introduced:
Embodiment one,
Suppose that first user is for user's first, first electronic equipment is the first mobile phone, when second electronic equipment is high in the clouds, the first standard information that characteristic processing obtains is carried out to standard biological characteristic information and is stored in high in the clouds, then, when user's first carries out verification operation on the first mobile phone, first mobile phone response verification operation, obtain the first biological information of user's first, then, first mobile phone carries out feature extraction process to the first biological information, obtain the first information to be verified, then, described first information to be verified is sent to high in the clouds by the first mobile phone, high in the clouds is after receiving the first information to be verified, first information to be verified is mated with the first standard information, the identity of user's first is verified, and after coupling completes, matching result is sent to the first mobile phone.
Embodiment two,
Suppose that first user is for user's first, first electronic equipment is the first mobile phone of user's second, second electronic equipment is the second mobile phone of user's first, store in second mobile phone of user's first and the first standard information that characteristic processing obtains is carried out to the standard biological characteristic information of user's first, then, when user's first carries out verification operation on the first mobile phone, first mobile phone response verification operation, obtain the first biological information of user's first, then, first mobile phone carries out feature extraction process to the first biological information, obtain the first information to be verified, then, described first information to be verified is sent to the second mobile phone by the first mobile phone, second mobile phone is after receiving the first information to be verified, first information to be verified is mated with the first standard information, the identity of user's first is verified, have in second mobile phone and the first standard information that characteristic processing obtains has been carried out to the standard biological characteristic information of user's first, then coupling is bound to successfully, and then, first mobile phone is after obtaining showing the matching result that the match is successful, make user's first can check the All Files that the biological characteristic based on user's first is encrypted in the first mobile phone.
In the embodiment of the present application, after the second electronic equipment completes matching process, matching result can be sent to the first electronic equipment, first electronic equipment operates accordingly based on matching result again, for after matching process, which kind of operation first electronic equipment performs, and the application is not specifically limited.
Based on same inventive concept, another embodiment of the application provides a kind of electronic equipment, and as shown in Figure 2, described electronic equipment comprises:
Detecting unit 201, for detecting the verification operation whether existing and verify first user;
First obtains unit 202, for when there is described verification operation, responding described verification operation, obtaining the first biological information of described first user;
Second obtains unit 203, for carrying out feature extraction process to described first biological information, obtains the first information to be verified;
Transmitting element 204, for sending described first information to be verified to the second electronic equipment, makes described second electronic equipment the first standard information prestored can be mated with described first information to be verified, to verify described first user.
Further, described electronic equipment also comprises:
Determining unit, for determining that the current level of security of described first electronic equipment is the first level of security.
Further, described second obtains unit 203, specifically for:
Based on described first level of security, fisrt feature extraction process is carried out to described first biological information, obtain the first information to be verified comprising the first information amount corresponding with described first level of security.
Further, described electronic equipment also comprises:
Detecting unit, whether for detecting, to exist from described first user operation associated for what described first electronic equipment and described second electronic equipment are carried out associating;
Instruction generation unit, for exist described operation associated time, generate and send an associated instructions to described second electronic equipment, make described second electronic equipment can pass through to perform described associated instructions, associate with described first electronic equipment, thus described second electronic equipment can determine described first standard information for verifying described first user prestored.
Further, when described second electronic equipment and described electronic equipment are dissimilar electronic equipment, and described second electronic equipment is the webserver, when described electronic equipment is mobile phone, and described transmitting element 204, specifically for:
Send described first information to be verified to the described webserver, the first standard information prestored can be mated with described first information to be verified by the described webserver.
Further, when described second electronic equipment and described electronic equipment are the electronic equipment of identical type, and described second electronic equipment is the second mobile phone, when described electronic equipment is the first mobile phone, and described transmitting element 204, specifically for:
Send described first information to be verified to described second mobile phone, the first standard information prestored can be mated with described first information to be verified by described second-hand's machine.
Further, described first biological information is specially finger print information or iris information or voiceprint.
The electronic equipment introduced due to the present embodiment is for implementing the electronic equipment that in the embodiment of the present application, information processing method adopts, so based on information processing method in the embodiment of the present application, those skilled in the art can understand embodiment and its various version of electronic equipment in the embodiment of the present application, so introduce no longer in detail for this electronic equipment at this.As long as those skilled in the art implement the electronic equipment that information processing method in the embodiment of the present application adopts, all belong to the application for protection scope.
The one or more technical schemes provided in the embodiment of the present application, at least have following technique effect or advantage:
The embodiment of the present application is in the process verified the identity of first user, when there is the verification operation of first user, respond described verification operation, obtain the first biological information of first user, then, feature extraction process is carried out to the first biological information, obtain the first information to be verified, and described first information to be verified is sent to the second electronic equipment, the first standard information that second electronic equipment can be prestored is mated with the first information to be verified, to verify first user, solve in prior art according to state's laws, high in the clouds can not store the biological information of user, thus, there is the technical matters that mobile phone etc. cannot be verified according to the identity of biological information to user between electronic equipment and high in the clouds, achieve and only first standard information of carrying out characteristic processing is left in the second electronic equipment, and without the need to complete standard biological characteristic information is left in the second electronic equipment, as high in the clouds, when needs are verified, identical feature extraction process is carried out to the first biological information obtained, obtain the first information to be verified, verify based on the identity of the first information to be verified to user,
And then, solve in prior art and no matter leave standard biological characteristic information in terminal, still leave high in the clouds in and all there is easy leakage, the technical matters that security is low, and the application improves the security of proof procedure, even if other people obtain the first standard information, also cannot restore standard biological characteristic information, the first standard information is only for identity verification;
Again, by carrying out fisrt feature extraction process based on the first level of security to described first biological information, obtain the first information to be verified comprising the first information amount corresponding with described first level of security, make electronic equipment can provide the verification operation with different level of security, user can select according to different demand, improves the experience of user;
Again, whether by detecting, to exist from described first user operation associated for what described first electronic equipment and described second electronic equipment are carried out associating, exist described operation associated time, generate and send an associated instructions to described second electronic equipment, make described second electronic equipment can pass through to perform described associated instructions, associate with described first electronic equipment, make first user can when not using or can not use the second electronic equipment depositing the first standard device, can verify its identity equally and perform corresponding operation, simultaneously, after receiving associated instructions, second electronic equipment can determine the first standard information for verifying first user.
Obviously, those skilled in the art can carry out various change and modification to the present invention and not depart from the spirit and scope of the present invention.Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.

Claims (14)

1. an information processing method, is applied in the first electronic equipment, it is characterized in that, described method comprises:
Detect and whether there is the verification operation that first user is verified;
When there is described verification operation, responding described verification operation, obtaining the first biological information of described first user;
Feature extraction process is carried out to described first biological information, obtains the first information to be verified;
Send described first information to be verified to the second electronic equipment, the first standard information prestored can be mated with described first information to be verified, to verify described first user by described second electronic equipment.
2. the method for claim 1, is characterized in that, described feature extraction process is carried out to described first biological information before, described method also comprises:
Determine that the current level of security of described first electronic equipment is the first level of security.
3. method as claimed in claim 2, is characterized in that, describedly carries out feature extraction process to described first biological information, obtains the first information to be verified, is specially:
Based on described first level of security, fisrt feature extraction process is carried out to described first biological information, obtain the first information to be verified comprising the first information amount corresponding with described first level of security.
4. the method for claim 1, is characterized in that, before whether there is in described detection the verification operation verified first user, described method also comprises:
Detect whether to exist from described first user operation associated for what described first electronic equipment and described second electronic equipment are carried out associating;
Exist described operation associated time, generate and send an associated instructions to described second electronic equipment, make described second electronic equipment can pass through to perform described associated instructions, associate with described first electronic equipment, thus described second electronic equipment can determine described first standard information for verifying described first user prestored.
5. the method for claim 1, it is characterized in that, when described second electronic equipment and described first electronic equipment are dissimilar electronic equipment, and described second electronic equipment is the webserver, when described first electronic equipment is mobile phone, described first information to be verified of described transmission, to the second electronic equipment, is specially:
Send described first information to be verified to the described webserver, the first standard information prestored can be mated with described first information to be verified by the described webserver.
6. the method for claim 1, it is characterized in that, when described second electronic equipment and described first electronic equipment are the electronic equipment of identical type, and described second electronic equipment is the second mobile phone, when described first electronic equipment is the first mobile phone, described first information to be verified of described transmission, to the second electronic equipment, is specially:
Send described first information to be verified to described second mobile phone, the first standard information prestored can be mated with described first information to be verified by described second-hand's machine.
7. the method as described in claim arbitrary in claim 1-6, is characterized in that, described first biological information is specially finger print information or iris information or voiceprint.
8. an electronic equipment, is characterized in that, described electronic equipment comprises:
Detecting unit, for detecting the verification operation whether existing and verify first user;
First obtains unit, for when there is described verification operation, responding described verification operation, obtaining the first biological information of described first user;
Second obtains unit, for carrying out feature extraction process to described first biological information, obtains the first information to be verified;
Transmitting element, for sending described first information to be verified to the second electronic equipment, makes described second electronic equipment the first standard information prestored can be mated with described first information to be verified, to verify described first user.
9. electronic equipment as claimed in claim 8, it is characterized in that, described electronic equipment also comprises:
Determining unit, for determining that the current level of security of described first electronic equipment is the first level of security.
10. electronic equipment as claimed in claim 9, is characterized in that, described second obtains unit, specifically for:
Based on described first level of security, fisrt feature extraction process is carried out to described first biological information, obtain the first information to be verified comprising the first information amount corresponding with described first level of security.
11. electronic equipments as claimed in claim 8, it is characterized in that, described electronic equipment also comprises:
Detecting unit, whether for detecting, to exist from described first user operation associated for what described first electronic equipment and described second electronic equipment are carried out associating;
Instruction generation unit, for exist described operation associated time, generate and send an associated instructions to described second electronic equipment, make described second electronic equipment can pass through to perform described associated instructions, associate with described first electronic equipment, thus described second electronic equipment can determine described first standard information for verifying described first user prestored.
12. electronic equipments as claimed in claim 8, is characterized in that, when described second electronic equipment and described electronic equipment are dissimilar electronic equipment, and described second electronic equipment is the webserver, when described electronic equipment is mobile phone, described transmitting element, specifically for:
Send described first information to be verified to the described webserver, the first standard information prestored can be mated with described first information to be verified by the described webserver.
13. electronic equipments as claimed in claim 8, is characterized in that, when described second electronic equipment and described electronic equipment are the electronic equipment of identical type, and described second electronic equipment is the second mobile phone, when described electronic equipment is the first mobile phone, described transmitting element, specifically for:
Send described first information to be verified to described second mobile phone, the first standard information prestored can be mated with described first information to be verified by described second-hand's machine.
14. electronic equipments as described in claim arbitrary in claim 8-13, is characterized in that, described first biological information is specially finger print information or iris information or voiceprint.
CN201310302551.9A 2013-07-15 2013-07-15 A kind of information processing method and electronic equipment Active CN104298908B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310302551.9A CN104298908B (en) 2013-07-15 2013-07-15 A kind of information processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310302551.9A CN104298908B (en) 2013-07-15 2013-07-15 A kind of information processing method and electronic equipment

Publications (2)

Publication Number Publication Date
CN104298908A true CN104298908A (en) 2015-01-21
CN104298908B CN104298908B (en) 2018-04-27

Family

ID=52318631

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310302551.9A Active CN104298908B (en) 2013-07-15 2013-07-15 A kind of information processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN104298908B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104572135A (en) * 2015-02-10 2015-04-29 深圳酷派技术有限公司 Command processing method, command processing device and terminal
CN105577635A (en) * 2015-07-31 2016-05-11 东莞酷派软件技术有限公司 File transmission method and mobile terminals
CN106789918A (en) * 2015-12-08 2017-05-31 腾讯科技(深圳)有限公司 Give account number, protection account number safety, the method and apparatus of account anti-theft for change
WO2017140214A1 (en) * 2016-02-17 2017-08-24 阿里巴巴集团控股有限公司 Communication method and apparatus
CN107493368A (en) * 2017-08-22 2017-12-19 广东欧珀移动通信有限公司 Unlocking method and related product

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070118758A1 (en) * 2005-11-24 2007-05-24 Hitachi, Ltd. Processing device, helper data generating device, terminal device, authentication device and biometrics authentication system
CN101047498A (en) * 2006-03-29 2007-10-03 株式会社日立制作所 Method and system for authenticating by biometric information
CN101087194A (en) * 2006-06-07 2007-12-12 株式会社日立制作所 Organism authenticating method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070118758A1 (en) * 2005-11-24 2007-05-24 Hitachi, Ltd. Processing device, helper data generating device, terminal device, authentication device and biometrics authentication system
CN101047498A (en) * 2006-03-29 2007-10-03 株式会社日立制作所 Method and system for authenticating by biometric information
CN101087194A (en) * 2006-06-07 2007-12-12 株式会社日立制作所 Organism authenticating method and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104572135A (en) * 2015-02-10 2015-04-29 深圳酷派技术有限公司 Command processing method, command processing device and terminal
CN104572135B (en) * 2015-02-10 2018-04-10 深圳酷派技术有限公司 Processing method, the processing unit and terminal of instruction of instruction
CN105577635A (en) * 2015-07-31 2016-05-11 东莞酷派软件技术有限公司 File transmission method and mobile terminals
CN106789918A (en) * 2015-12-08 2017-05-31 腾讯科技(深圳)有限公司 Give account number, protection account number safety, the method and apparatus of account anti-theft for change
WO2017140214A1 (en) * 2016-02-17 2017-08-24 阿里巴巴集团控股有限公司 Communication method and apparatus
CN107493368A (en) * 2017-08-22 2017-12-19 广东欧珀移动通信有限公司 Unlocking method and related product

Also Published As

Publication number Publication date
CN104298908B (en) 2018-04-27

Similar Documents

Publication Publication Date Title
US10216930B2 (en) Authenticating application legitimacy
CN104468249B (en) Account abnormity detection method and device
CN104298908A (en) Information processing method and electronic equipment
CN106469261A (en) A kind of auth method and device
CN108810831A (en) Method for pushing, electronic device and the readable storage medium storing program for executing of short message verification code
CN103533546A (en) Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics
CN106130998A (en) A kind of identifying code transmission method and device
CN104540129A (en) Registration and login method and system for third party application
CN107808127A (en) Face identification method and Related product
CN105046135A (en) Information display method, information display apparatus and terminal
CN104331650A (en) Information processing method and electronic equipment
CN108322366B (en) Method, device and system for accessing network
CN105550627A (en) Fingerprint verification method and apparatus
CN105306202B (en) Auth method, device and server
CN104935548B (en) Auth method, apparatus and system based on intelligent equipment of tatooing
CN105337739B (en) Safe login method, device, server and terminal
CN105791246A (en) Information verification method, device and system
CN104346550A (en) Information processing method and electronic equipment
CN104780042A (en) Two-layer authentication method, device and system for instant messaging
CN103763108B (en) A kind of remote system and method for recognizing mobile device hardware unique sequence numbers
CN107040497B (en) Network account anti-theft method and device
CN104486306A (en) Method for identity authentication based on finger vein recognition and cloud service
CN104778389A (en) Numerical value transferring method, terminal, server and system
CN111104653B (en) User operation processing method and device, electronic equipment and readable storage medium
CN102281291A (en) Log-in method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant