CN105635119A - Anti-counterfeiting method and anti-counterfeiting device for communication content - Google Patents

Anti-counterfeiting method and anti-counterfeiting device for communication content Download PDF

Info

Publication number
CN105635119A
CN105635119A CN201510977543.3A CN201510977543A CN105635119A CN 105635119 A CN105635119 A CN 105635119A CN 201510977543 A CN201510977543 A CN 201510977543A CN 105635119 A CN105635119 A CN 105635119A
Authority
CN
China
Prior art keywords
information
verification
sender
content
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510977543.3A
Other languages
Chinese (zh)
Inventor
韩珺方
刘思音
赵晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201510977543.3A priority Critical patent/CN105635119A/en
Publication of CN105635119A publication Critical patent/CN105635119A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Telephonic Communication Services (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention provides an anti-counterfeiting method and an anti-counterfeiting device for communication content, wherein the method comprises the following steps: by a server, receiving the communication content and verification information sent by a client side; through the verification information, judging whether a sender of the communication content passes through identity verification based on biologic characteristic information or not; if so, adding an anti-counterfeiting label for the communication content and performing communication. With the method and the device provided by the invention, a user receiving the communication content can judge authenticity of identity of the sender of the content according to the anti-counterfeiting label.

Description

Anti-counterfeiting method and device for spreading content
[ technical field ] A method for producing a semiconductor device
The invention relates to the technical field of computer application, in particular to an anti-counterfeiting method and device for spreading contents.
[ background of the invention ]
With the rapid development of internet technology, especially mobile internet, various platforms or applications aiming at content dissemination have become important channels for users to acquire information, and internet products such as posts, microblogs, WeChat and the like have been rapidly developed. However, some problems that follow are also to be solved, for example, account security problems, when a user uses these internet products to transmit content, the content can be transmitted after verification and login are mostly performed through a user name and a password, if the account of a content sender is stolen, the transmitted content often has a relatively bad influence, and the user receiving the content cannot judge the authenticity of the identity of the content sender.
[ summary of the invention ]
In view of this, the present invention provides an anti-counterfeit method and apparatus for content dissemination, so that a user receiving the content dissemination can judge the authenticity of the identity of the content sender.
The specific technical scheme is as follows:
the invention provides an anti-counterfeiting method for spreading contents, which comprises the following steps:
receiving the transmission content and the verification information sent by the client;
judging whether the sender of the broadcast content passes identity authentication based on biological characteristic information by using the authentication information;
and if so, adding the anti-counterfeiting label to the propagation content and propagating.
The invention also provides an anti-counterfeiting method for spreading contents, which comprises the following steps:
generating verification information based on first biological characteristic information input by a sender of the propagation content;
and sending the propagation content and the verification information to a server, so that the server judges that the sender of the propagation content passes the identity verification based on the biological characteristic information by using the verification information, and then adds an anti-counterfeit label to the propagation content and propagates the propagation content.
The invention also provides an anti-counterfeiting method for spreading contents, which comprises the following steps:
receiving the propagation content containing the anti-counterfeiting label sent by the server;
presenting the propagation content;
wherein the anti-counterfeit label indicates that a sender of the disseminated content has passed authentication based on biometric information.
The invention also provides an anti-counterfeiting device for spreading content, which is arranged on the server and comprises:
the receiving unit is used for receiving the propagation content and the verification information sent by the client;
an authentication unit configured to determine, using the authentication information, whether or not a sender of the broadcast content passes authentication based on biometric information;
and the propagation unit is used for adding the anti-counterfeit label to the propagation content and propagating the propagation content when the judgment result of the verification unit is yes.
The invention also provides an anti-counterfeiting device for spreading content, which is arranged at a client side and comprises:
a verification information generation unit configured to generate verification information based on first biometric information input by a sender of the broadcast content;
and the transmitting unit is used for transmitting the propagation content and the verification information to a server, so that the server judges that the sender of the propagation content passes identity verification based on the biological characteristic information by using the verification information, and then adds an anti-counterfeit label to the propagation content and propagates the propagation content.
The invention also provides an anti-counterfeiting device for spreading content, which is arranged at a client and comprises:
the receiving unit is used for receiving the propagation content containing the anti-counterfeiting label sent by the server;
a presentation unit configured to present the broadcast content;
wherein the anti-counterfeit label indicates that a sender of the disseminated content has passed authentication based on biometric information.
According to the technical scheme, the access label is added to the transmitted propagation content and the propagation is carried out on the transmitter passing the identity verification based on the biological characteristic information, so that the user receiving the propagation content can judge the identity authenticity of the content transmitter according to the anti-counterfeiting label.
[ description of the drawings ]
FIG. 1 is a diagram of a system architecture upon which an embodiment of the present invention is based;
FIG. 2 is a flow chart of a main method provided by the embodiment of the present invention;
FIG. 3 is a flow chart of a method for implementing the present invention;
FIG. 4 is a flow chart of another implementation method provided by the embodiment of the invention;
fig. 5 is a structural diagram of a device installed in the server according to an embodiment of the present invention;
fig. 6 is a structural diagram of a device installed on the first client according to an embodiment of the present invention;
fig. 7 is a structural diagram of a device installed on the second client according to an embodiment of the present invention;
FIG. 8 is a diagram of an example of a subject post according to an embodiment of the present invention;
FIG. 9 is a diagram of an example of another subject post according to an embodiment of the present invention;
FIG. 10 is a diagram illustrating an example of a post list according to an embodiment of the present invention;
fig. 11 is a diagram illustrating an example of an instant messaging message according to an embodiment of the present invention;
fig. 12 is a diagram illustrating an example of a mail according to an embodiment of the present invention.
[ detailed description ] embodiments
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in detail with reference to the accompanying drawings and specific embodiments.
The invention has the core idea that the biological verification function is opened for the sender of the propagation content, and if the sender with the opened biological verification function is determined to pass the identity verification based on the biological characteristic information, the propagation content sent by the sender is added with the anti-counterfeiting label and then is allowed to be propagated; otherwise, the propagation of the propagation content is prohibited.
The mode provided by the invention can be based on a C (client)/S (server) architecture and also can be based on a B (browser)/S (server) architecture. Fig. 1 is a system architecture diagram based on an embodiment of the present invention, and as shown in fig. 1, the system mainly includes a server and a client, where the client includes a client of a sender of a broadcast content and a client of a receiver of the broadcast content, and in most scenarios, one client may have both the functions of the client of the sender and the client of the receiver.
Fig. 2 is a flowchart of a main method provided by an embodiment of the present invention, and for convenience of description in this embodiment, a client of a sender is referred to as a first client, and a client of a receiver is referred to as a second client. The sender and the receiver in the embodiment of the invention are a user sending the broadcast content and a user receiving the broadcast content respectively. As shown in fig. 2, the method may essentially comprise the steps of:
in 201, a first client obtains first biometric information input by a sender.
When the first client learns that the sender wants to send the broadcast content, for example, when the sender logs in the client, or after the sender logs in the client, the sending function of the broadcast content is triggered, and if the sender is confirmed to have the biometric verification function activated, the sender can be prompted to input the first biometric information. The first biometric information in the embodiment of the present invention may include, but is not limited to, fingerprint information, iris information, face information, voiceprint information, vein information, and the like. Therefore, it is required that the user equipment where the first client is located has a function of collecting the biometric information, for example, a fingerprint collecting device, a camera, a microphone, and the like are provided. Wherein the user device may be, but is not limited to, a PC (personal computer), a laptop, a smartphone, a tablet, a PDA (personal digital assistant), a smart wearable device, and the like.
At 202, verification information is generated based on the first biometric information.
In the embodiment of the invention, the identity authentication based on the biological characteristic information performed on the sender can be mainly performed by the server, and also can be mainly performed by the user equipment terminal where the client is located.
If the verification is mainly performed by the server, in this step, the first client may determine second biometric information corresponding to the first biometric information input by the sender, and generate verification feature information by using the second biometric information; and then obtaining the verification information from the verification characteristic information and the account information of the sender. In this way, the verification information is actually generated using the first biometric information of the sender, in other words, the verification information embodies the biometric of the sender.
If the verification is mainly performed by the user equipment side where the client is located, in this step, the equipment operating system layer where the first client is located may verify the first biometric information input by the sender when the sender sends the propagation content, by using the first biometric information entered by the sender at the biometric verification activation stage. After the first client determines that the verification is passed, an encrypted feature string can be formed by using a client private key; and generating verification characteristic information by using the encrypted characteristic string, and obtaining the verification information by using the verification characteristic information and the account information of the sender. In this way, the first biometric information of the sender is mainly used for identity verification at the operating system layer, and the generated verification information may not embody the biometric of the sender.
When the verification information is obtained from the verification information and the account information of the sender, the verification information and the account information of the sender can be directly formed into the verification information. In addition, in order to improve security, the first client may encrypt the authentication feature information and the random information by using an encryption algorithm agreed with the server in advance to obtain the distribution key, and then construct the authentication information from the distribution key and the account information of the sender.
The above two implementations will be described in detail with reference to specific embodiments.
In 203, the first client sends the propagated content and the authentication information to the server.
In this step, when the first client sends the broadcast content to the server, the account information and the verification feature information of the sender are also sent together with the broadcast content.
In 204 the server uses the authentication information to determine if the sender passed the authentication based on the biometric information and if so, performs 205. Otherwise, the propagation content may be prohibited from being propagated.
In this step, if the verification information includes the verification feature information and the account information, the server may compare the verification feature information corresponding to the account information stored in the biometric verification activation stage with the received verification feature information, and if the verification feature information is consistent with the received verification feature information, it is determined that the authentication is passed, otherwise, it is determined that the authentication is not passed.
If the verification information contains the release key and the account information, the server can generate the release key by using the verification characteristic information corresponding to the account information stored in the biological verification opening stage; and comparing the generated issuing key with the received issuing key, if the generated issuing key is consistent with the received issuing key, determining that the authentication is passed, and otherwise, determining that the authentication is not passed. The generation mode of the release key is basically consistent with the mode of the first client side for generating the release key, namely, an encryption algorithm agreed in advance with the client side is adopted to encrypt verification characteristic information corresponding to the account information stored in the biological verification opening stage to obtain the release key, wherein the random information is consistent with the random information adopted by the client side for generating the release key.
The specific processing manner will also be described in detail in the following examples.
At 205, the content is augmented with an anti-counterfeit label and distributed.
The anti-counterfeit label can indicate that the sender of the disseminated content has passed authentication based on biometric information.
At 206, the second client presents the propagated content with the added anti-counterfeit label.
When the second client displays the propagation content, the anti-counterfeit label in the propagation content can be rendered into a designated text or an icon. The content and the style of the text content or the icon can be specified at the server side or the second client side. For example, when the server adds the anti-counterfeit label to the broadcast content, the content and the style data of the anti-counterfeit label may be added at the same time, so that the second client directly renders the content and the style data. For another example, only the anti-counterfeit label is added to the propagation content by the server, and when the second client identifies that the propagation content has the anti-counterfeit label, the anti-counterfeit label can be rendered according to the preset content and style, and finally rendered into the preset characters or icons.
The above method is described in detail below by way of specific examples. Fig. 3 is a flowchart of an implementation method provided in an embodiment of the present invention, which mainly includes three stages: the method comprises a biological verification opening stage, a transmission stage of the transmission content and a display stage of the transmission content. In this embodiment, taking fingerprint information as an example, as shown in fig. 3, the method may specifically include the following steps:
in 301, a first client obtains fingerprint information entered by a user.
If the user triggers the activation of the biometric authentication function through the first client, the first client may prompt the user to enter fingerprint information.
The user can trigger the activation of the biometric authentication function by triggering a preset function control in the first client. Or the first client may prompt the user whether to activate the biometric authentication function if it is determined that the user has not activated the biometric authentication function after the user logs in, and prompt the user to enter fingerprint information if the user selects to activate the biometric authentication function. Or, when the user wants to send the broadcast content, if it is determined that the user has not activated the biometric authentication function, the first client may prompt the user whether to activate the biometric authentication function, and if the user selects to activate the biometric authentication function, the first client enters a biometric authentication activation stage to prompt the user to enter fingerprint information.
In 302, the first client encrypts the entered fingerprint information with a first client private key to form a client fingerprint feature string.
The entered fingerprint information corresponds to the first biometric information shown in fig. 2, and the client fingerprint feature string corresponds to the second biometric information shown in fig. 2.
The first client side private key is a private key which can be obtained only by the first client side and can be stored in the safe storage area, and only the first client side can obtain the private key and encrypt the input fingerprint information by using the private key. Therefore, the formed client fingerprint characteristic string can be prevented from being counterfeited and tampered.
In 303, the first client sends the generated client fingerprint feature string and account information of the user to the server.
The account information related in the embodiment of the present invention may be information such as a user name and a password used when the user logs in, or may be a user ID, even an ID of the first client, or an ID of a device used by the user.
In 304, the server stores the corresponding relationship between the received client fingerprint feature string and the account information of the user, and sets a to-be-verified state for the account information of the user.
In the embodiment, corresponding to the case of using the second biometric identifier as the verification feature information in the embodiment shown in fig. 2, the client fingerprint feature string is provided to the server as the verification feature information and stored for subsequent verification use by the server in the transmission phase of the broadcast content.
In order to ensure that the biometric authentication function is indeed activated by a valid user, the server may first set a to-be-authenticated state for account information of the user after receiving and storing authentication feature information (a client fingerprint feature string) and the account information. The server then provides the user with a confirmation link in 305.
In this step, the server may provide the confirmation link to the user through third party communication. For example, the confirmation link is provided for the user in a mode of mailbox, mobile phone number, instant messaging account number and the like provided by the user during registration. After the user receives the confirmation link through the mailbox, the short message of the mobile phone, the instant communication message and the like, the confirmation link can be triggered by clicking or other modes, and the server can know that the user determines to open the biological verification function.
At 306, after receiving the user's confirmation that the biometric authentication function is enabled by the confirmation link, the server sets the enabled biometric authentication for the account information of the user.
In 307, the server pushes a notification to the first client that the account information of the user has opened the biometric authentication function.
In this step, the server actively pushes the notification to the first client, and in addition to this manner, the notification may also be triggered by the user at the first client. For example, the first client may provide a component for checking the activation status on the interface, and when the user triggers the component, the first client may inquire the server whether the account information of the user activates the biometric authentication function, so as to know whether the account information of the user activates the biometric authentication function.
So far, the step of the biometric authentication opening stage is finished, and when the user sends the broadcast content through the first client, the following steps are started to be executed:
in 308, when the first client learns that the user wants to send the broadcast content, if it is determined that the account information of the user has the biometric authentication function enabled, the first client prompts the user to input the fingerprint information.
In this step, the first client may think that the user wants to send the broadcast content when the user logs in, and remind the user to input the fingerprint information. Alternatively, the first client may prompt the user to input the information when the user triggers the transmission of the broadcast content, for example, when the user triggers the transmission function after completing the input of the broadcast content. Still alternatively, the first client may consider that the user wants to send the broadcast content when detecting that the user inputs the broadcast content, and remind the user of inputting the fingerprint information. And the setting of the system or the user can be specifically determined at other occasions.
If the first client determines that the user does not activate the biometric authentication function, the transmission content to be transmitted by the user can be directly transmitted to the server according to the implementation mode in the prior art, and the transmission content is directly transmitted by the server.
Since the gathering of fingerprint information is typically performed by the operating system layer, the first client may invoke an operating system interface prompting the user to enter a fingerprint verification. The fingerprint input by the user can be firstly verified in the operating system, namely the fingerprint information input this time is compared with the fingerprint information input in the biological verification activation stage, and if the fingerprint information input this time is consistent with the fingerprint information input in the biological verification activation stage, the verification is determined to be passed; otherwise, prompting error information.
In 309, the first client calls the operating system interface to acquire the fingerprint information input by the user.
If the authority of fingerprint input is in the operating system layer, the first client needs to call an operating system interface to acquire the fingerprint information input by the user. However, if the authority for inputting the fingerprint can be in the first client, the first client can directly acquire the fingerprint information input by the user.
In 310, the first client determines a client fingerprint feature string corresponding to the fingerprint information input by the user.
In this step, the first client may store the correspondence between the fingerprint information and the client fingerprint feature string at the biometric authentication activation stage, and may directly determine the client fingerprint feature string corresponding to the fingerprint information input by the user in this step.
Or, the first client may also encrypt the fingerprint information input by the user by using the first client private key to generate the client fingerprint feature string, that is, a manner of generating the client fingerprint feature string in real time is adopted. The encryption algorithm adopted by the method is consistent with the encryption algorithm adopted by the first client when the client fingerprint feature string is generated in the biometric verification opening stage.
In 311, the first client encrypts the client fingerprint feature string and the current time by using an encryption algorithm agreed with the server in advance to obtain the release key.
The current time is a kind of random information used in this embodiment, and other random information, such as a random number, may also be used.
At 312, the first client sends the publishing key, the account information of the user, and the propagated content to the server.
In the present embodiment, the authentication information in the embodiment shown in fig. 2 is constituted by the distribution key and the account information of the user. Instead of performing step 311, the client fingerprint feature string and account information may be directly used to form the authentication information.
In 313, the server generates a publishing key by using the client fingerprint feature string corresponding to the account information stored in the biometric authentication activation stage and the current time; the generated distribution key is compared with the received distribution key and if it is consistent, it is determined that the user is authenticated based on the biometric information, 314 may be performed.
Since the current time used by the server and the first client is the respective current time, in order to ensure that the generated distribution key is consistent, an algorithm such as a TOTP (time-based one-time password) algorithm may be used.
If the first client does not execute step 311 and directly forms the client fingerprint feature string and the account information into the verification information, the server may directly compare the client fingerprint feature string corresponding to the account information stored in the biometric verification activation stage with the received client fingerprint feature string in this step, and if the client fingerprint feature string is consistent with the received client fingerprint feature string, it is determined that the user passes the authentication based on the biometric information; otherwise, the verification fails.
If the verification fails, the server may prohibit dissemination of the disseminated content.
At 314, the server propagates the content with the anti-counterfeit label added.
The anti-counterfeit label involved in this step may be obtained by adding a piece of information indicating that the sender of the broadcast content passes the identity authentication based on the biometric information to the broadcast content.
At this point, the transmission phase of the broadcast content is completed. Executing the step of showing the propagation content at the second client end which receives the propagation content:
in 315, the second client renders the anti-counterfeit label into a designated text or icon when presenting the broadcast content.
Fig. 4 is a flowchart of another implementation method provided in the embodiment of the present invention, which also includes three stages: the method comprises a biological verification opening stage, a transmission stage of the transmission content and a display stage of the transmission content. In this embodiment, also taking fingerprint information as an example, as shown in fig. 4, the method may specifically include the following steps:
in step 401, the first client prompts the user to enter fingerprint information by calling an operating system interface.
At 402, the first client encrypts the device ID with a first client private key to obtain an encrypted feature string.
In some cases, the operating system does not provide an interface for acquiring data to the application layer, and the fingerprint information entered by the user cannot be acquired by the first client. The first client may encrypt information other than the fingerprint information using the first client private key resulting in an encrypted feature string. In this embodiment, the ID of the device where the first client is located is taken as an example, and besides, the ID of the first client, the user account information, the random information, and the like may be used for encryption.
In 403, the first client sends the generated encrypted feature string and account information of the user to the server.
The encrypted feature string in this embodiment corresponds to the verification feature information in the embodiment shown in fig. 2, that is, the encrypted feature string is provided to the server as the verification feature information to be stored, so that the server performs verification and use in the transmission phase of the broadcast content.
In 404, the server stores the corresponding relationship between the received encrypted feature string and the account information of the user, and sets a to-be-verified state for the account information of the user.
Steps 405-407 are the same as steps 305-307 in the embodiment shown in FIG. 3, and are not repeated.
So far, the step of the biometric authentication opening stage is finished, and when the user sends the broadcast content through the first client, the following steps are started to be executed:
at 408, as in step 308 in the embodiment of fig. 3.
In 409, after the first client determines that the fingerprint information input by the user is verified by the operating system, the device ID is encrypted by using the first client private key to obtain an encrypted feature string.
In 410, the first client encrypts the encrypted feature string and the current time by using an encryption algorithm agreed with the server in advance to obtain the release key.
In 411, the first client sends the publishing key, the account information of the user, and the broadcast content to the server.
In the present embodiment, the authentication information in the embodiment shown in fig. 2 is constituted by the distribution key and the account information of the user. Instead of performing 410, the encrypted feature string and the account information may be directly used as the authentication information.
At 412, the server generates a publishing key using the encrypted feature string corresponding to the account information stored at the biometric opening stage and the current time; the generated distribution key is compared with the received distribution key, and if they are consistent, it is determined that the user passes the authentication based on the biometric information, and 413 may be performed.
Also, since the current time used by the server and the first client is the respective current time, in order to ensure that the generated distribution key is consistent, an algorithm such as a TOTP algorithm may be used.
If the first client does not execute step 310 and directly forms the encrypted feature string and the account information into the verification information, the server may directly compare the encrypted feature string corresponding to the account information stored in the biometric verification activation stage with the received encrypted feature string in this step, and if the encrypted feature string is consistent with the received encrypted feature string, determine that the user passes the authentication based on the biometric information; otherwise, the verification fails.
If the verification fails, the server may prohibit dissemination of the disseminated content.
Steps 413-414 are the same as steps 314-315 in the embodiment shown in FIG. 3, and are not repeated.
The method provided by the invention is described above, and the device provided by the invention is described in detail below with reference to the embodiment. Fig. 5 is a structural diagram of an apparatus provided in the server according to an embodiment of the present invention, and as shown in fig. 5, the apparatus may include: the receiving unit 01, the verifying unit 02 and the propagating unit 03, and may further include a storing unit 04 and a confirming unit 05. The main functions of each constituent unit are as follows:
the receiving unit 01 is responsible for receiving the broadcast content and the verification information sent by the client.
The authentication unit 02 is responsible for determining whether or not the sender of the broadcast content passes the authentication based on the biometric information, using the authentication information received by the receiving unit 01.
And when the judgment result of the verification unit 02 is yes, the propagation unit 03 is responsible for adding the anti-counterfeit label to the propagation content and propagating the propagation content. When the determination result of the verification unit 02 is no, the dissemination unit 03 may prohibit dissemination of the dissemination content.
The verification information may adopt, but is not limited to, the following two implementation manners:
the first mode is as follows: the authentication information may include a distribution key and account information. At this time, the verification unit 02 may generate the release key by using the verification feature information corresponding to the account information stored in the biometric verification activation stage; and comparing the generated release key with the release key received by the receiving unit, if the generated release key is consistent with the release key, determining that the authentication is passed, and otherwise, determining that the authentication is not passed.
When the verification unit 02 generates the release key, the verification feature information corresponding to the account information stored in the biometric verification activation stage and the random information may be encrypted by using an encryption algorithm agreed with the client in advance to obtain the release key; the random information is consistent with the random information adopted by the client to generate the release key.
In the embodiment of the present invention, the random information used may include, but is not limited to: current time, random number, etc. When the current time is employed, an algorithm such as TOTP may be employed to ensure that the server is the same as the publishing key generated by the first client.
The second mode is as follows: the authentication information includes authentication characteristic information and account information. At this time, the verification unit 02 compares the verification feature information corresponding to the account information stored in the biometric verification opening stage with the verification feature information received by the receiving unit 01, and if the verification feature information is consistent with the verification feature information, the identity verification is determined to be passed, otherwise, the identity verification is determined not to be passed.
In order to implement the function in the biometric authentication activation stage, the receiving unit 01 may receive the account information and the authentication feature information sent by the client in the biometric authentication activation stage. The storage unit 04 stores the correspondence between the account information and the authentication feature information. The confirmation unit 05 provides a confirmation link to the sender; and after the sender determines to open the biological verification function through the confirmation link, setting the opened biological verification aiming at the account information.
The account information related in the embodiment of the present invention may be information such as a user name and a password used when the user logs in, or may be a user ID, even an ID of the first client, or an ID of a device used by the user.
It should be noted that, in the embodiment of the present invention, the server may determine whether the information sent by the client belongs to the biometric authentication activation phase or the transmission phase of the broadcast content, according to the type of the request used by the client to send the information. For example, the client may send a request identifying the biometric verification enablement stage during the biometric verification enablement stage and a request identifying the propagated content transmission stage during the transmission stage of the propagated content.
The verification feature information received by the receiving unit 01 at the verification opening stage may include: the client generates second biological characteristic information by utilizing the first biological characteristic information input by the sender. Correspondingly, the verification feature information included in the verification information includes: the client generates second biometric information using the first biometric information input by the sender when transmitting the broadcast content.
For example, the first biometric information may be fingerprint information entered by the client, and the second biometric information may be a client fingerprint feature string formed by encrypting the fingerprint information with a client private key. This approach may be applied to situations where the client (i.e., the application layer) is able to call an interface of the operating system and obtain fingerprint information obtained by the operating system.
Alternatively, the verification feature information received by the receiving unit 01 in the verification opening stage may include: the client encrypts the encrypted feature string obtained by the identification information by using the client private key, wherein the identification information can be, but is not limited to, the device ID where the client is located, the client ID, the user account information, the random information, and the like. Accordingly, the authentication information may include authentication feature information including: and after the client determines that the first biological characteristic information input by the sender when the transmission content is sent is verified, the client encrypts the encrypted characteristic string obtained by the identification information by using the client private key.
If the receiving unit 01 receives the broadcast content but the biometric authentication function is not activated by the account information of the sender of the broadcast content, the broadcast unit 03 may broadcast the broadcast content without adding the counterfeit-proof label by using a conventional broadcast method.
According to different application scenarios that the present invention can be applied to, the propagation unit 03 can issue the propagation content to the content issuing platform when performing propagation; or forwarding the propagation content to a client of a target user; or, the transmission content is sent to the message queue corresponding to the target user. The specific application scenario will be described in detail later.
Fig. 6 is a structural diagram of an apparatus provided at the first client according to an embodiment of the present invention, and as shown in fig. 6, the apparatus may include: the verification information generating unit 11 and the transmitting unit 12 may further include a biometric authentication opening unit 13 and a prompting unit 14. The main functions of each constituent unit are as follows:
the verification information generation unit 11 is responsible for generating verification information based on first biometric information input by the sender of the broadcast content. The verification information generating unit 11 may adopt, but is not limited to, the following two ways:
the first mode is as follows: the verification information generation unit 11 may first determine second biometric information corresponding to the first biometric information input by the sender; then generating verification characteristic information by using the second biological characteristic information; and obtaining verification information according to the verification characteristic information and the account information of the sender.
When the verification information is obtained from the verification feature information and the account information of the sender, the verification information generation unit 11 may determine the second biometric information corresponding to the first biometric information input by the user according to the correspondence between the first biometric information and the second biometric information stored in the biometric authentication activation stage. Or, the first biological characteristic information input by the user is encrypted by using the client private key to obtain second biological characteristic information.
The second mode is as follows: the verification information generation unit 11 may determine a verification result of verifying the first biometric information input by the sender at the time of sending the broadcast content, using the first biometric information input by the sender at the biometric verification activation stage; if the verification is passed, forming an encrypted feature string by using a client private key; generating verification feature information by using the encrypted feature string; and obtaining the verification information according to the verification characteristic information and the account information of the sender.
In the above two modes, the authentication information generating unit 11 may be configured to configure the authentication information by the authentication feature information and the account information of the sender when the authentication information is obtained from the authentication feature information and the account information of the sender. The authentication feature information and the random information may be encrypted by using an encryption algorithm agreed with the server in advance to obtain an issuing key, and the issuing key and the account information of the sender form authentication information.
The sending unit 12 is responsible for sending the broadcast content and the verification information to the server, so that the server judges that the sender of the broadcast content passes the identity verification based on the biometric information by using the verification information, adds the anti-counterfeit label to the broadcast content and broadcasts the broadcast content.
Corresponding to the first mode, in the biometric authentication activation stage, after the sender inputs the first biometric feature information, the biometric authentication activation unit 13 forms an encrypted feature string by using the client-side private key, and sends the encrypted feature string and the account information of the sender to the server.
Corresponding to the second manner, the biometric authentication provisioning unit 13 obtains the first biometric feature information entered by the sender at the biometric authentication provisioning stage; encrypting the input first biological characteristic information by using a client private key to obtain second biological characteristic information; and sending the second biological characteristic information and the account information of the sender to a server.
The biometric authentication activation unit 13 sets activated biometric authentication for the account information after receiving the confirmation information for activating the biometric authentication function sent by the server.
The prompting unit 14 judges whether the account information of the sender opens the biological verification when determining that the sender wants to send the transmission content, and prompts the user to input first biological characteristic information if the account information of the sender opens the biological verification; otherwise, the user is prompted whether to activate the biometric authentication or not, or the transmission unit 13 is triggered to transmit the transmission content transmitted by the sender to the server.
Fig. 7 is a structural diagram of an apparatus provided at the second client according to an embodiment of the present invention, and as shown in fig. 7, the apparatus may include: a receiving unit 21 and a presentation unit 22. The main functions of each component unit are as follows:
the receiving unit 21 is responsible for receiving the broadcast content sent by the server, which contains the anti-counterfeit label indicating that the sender of the broadcast content has passed the authentication based on the biometric information.
The presentation unit 22 is responsible for presenting the broadcast content. The presentation unit 22 may render the anti-counterfeit label into a designated text or icon when presenting the propagation content.
The content and the style of the text content or the icon can be specified at the server side or the second client side. For example, when the server adds the anti-counterfeit label to the broadcast content, the content and the style data of the anti-counterfeit label may be added at the same time, so that the second client directly renders the content and the style data. For another example, only the anti-counterfeit label is added to the propagation content by the server, and when the second client identifies that the propagation content has the anti-counterfeit label, the anti-counterfeit label can be rendered according to the preset content and style, and finally rendered into the preset characters or icons.
The method and the device provided by the invention can be suitable for various application scenes of the propagation content, and the following examples of the application scenes are shown:
the method is applied to a content publishing platform.
When a user logs in the content publishing platforms by using clients such as a microblog, a blog, a forum and the like, fingerprint information can be input into user equipment, and a biometric authentication function, namely fingerprint authentication, is activated through a flow of a biometric authentication activation stage as shown in fig. 3 or fig. 4. When a user wants to issue a microblog, a blog or a post, the client prompts the user to input fingerprint information again, and after the server determines that the user passes identity authentication based on the fingerprint through a flow of an issuing stage of spreading content as shown in fig. 3 or fig. 4, an anti-counterfeit label is added to the issued microblog, blog or post. After other users who pay attention to the microblog, the blog or view the post log in the client, the client can render the anti-counterfeiting label in the microblog, the blog or the post into a designated character or icon when the microblog, the blog or the post is displayed.
For a post posted by a user after identity authentication based on a fingerprint, the content of the post rendered by a client viewing the post is as shown in fig. 8, in which a fingerprint icon and a text of "post posted by author fingerprint verification" identify that the poster's post has passed identity authentication based on a fingerprint. The display form of the anti-counterfeiting label is various, and the form of a floating layer shown in fig. 9 can also be adopted.
In addition, an anti-counterfeit label may also be presented in the post list, such as shown in fig. 10. If the user inputs a fingerprint and passes fingerprint verification when making a post, the anti-counterfeiting label is shown in the post. However, if the user does not input the fingerprint when posting, only posting can be posted according to the existing method, but the anti-counterfeit label is not revealed. In FIG. 10, the same user, "GrayNoel," published two posts, the first of which revealed the anti-counterfeit label and the second of which revealed no anti-counterfeit label. Therefore, when other users see the two posts, the content of the first post is considered to be real and reliable and has high credibility, and the content of the second post is suspected to be issued by the real user or not, so that the credibility is low. For public figures with certain influence, on one hand, the method has higher account security, and netizens can judge the authenticity of contents issued by the public figures according to the anti-counterfeiting label; on the other hand, public persons with certain influence cannot release the contents with the anti-counterfeiting label issued by the public persons by stealing the accounts of the public persons.
And applying the second scene to an instant messaging tool.
After the user logs in the instant messaging tool, fingerprint information can be input into the user equipment, and a biometric authentication function, namely fingerprint authentication, is activated through a flow of a biometric authentication activation stage as shown in fig. 3 or fig. 4. When a user wants to send a message, the client prompts the user to input fingerprint information again, and through the flow of the distribution stage of the propagation content as shown in fig. 3 or fig. 4, after the server determines that the user passes the identity authentication based on the fingerprint, the server adds an anti-counterfeit label to the message sent by the user, and sends the message to a target user of the message. When the client of the target user presents the message, the anti-counterfeit label in the message can be rendered into a designated text or icon.
As shown in FIG. 11, after a user named "As modified by Harha" passes identity authentication based on fingerprints, the message sent by the user is displayed with a fingerprint icon and a text "this message is sent by fingerprint authentication". Therefore, the user receiving the message can determine that the message is sent by the real user, and the credibility of the message content is high. Therefore, fraudulent content can be prevented from being sent to the communication friends of the user under the condition that the account of the user is stolen.
And application scene three, application to a mail system.
After the user logs in the email system, fingerprint information may be entered at the user equipment, and a biometric authentication function, i.e., fingerprint authentication, may be activated through a flow of a biometric authentication activation stage as shown in fig. 3 or fig. 4. When a user wants to send a mail, the client prompts the user to input fingerprint information again, through the flow of the distribution stage of the propagation content as shown in fig. 3 or fig. 4, after the server determines that the user passes identity authentication based on the fingerprint, the anti-counterfeit label is added to the mail sent by the user, the mail is added into the message queue of the target user, and after the target user logs in the mail system, the mail with the anti-counterfeit label is received. When the mail is displayed by the client of the target user, the anti-counterfeit label in the mail can be rendered into a designated character or icon.
As shown in fig. 12, after the user with the mailbox address "abc × 163. com" passes the identity authentication based on the fingerprint, the mail sent by the user is attached with a fingerprint icon and a text of "this mail is sent by fingerprint verification" when being displayed. Therefore, the user receiving the mail can determine that the mail is sent by the real user, and the credibility of the mail content is higher.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and other divisions may be realized in practice.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (40)

1. An anti-counterfeiting method for propagating content, the method comprising:
receiving the transmission content and the verification information sent by the client;
judging whether the sender of the broadcast content passes identity authentication based on biological characteristic information by using the authentication information;
and if so, adding the anti-counterfeiting label to the propagation content and propagating.
2. The method of claim 1, further comprising:
and if the sender of the propagation content is judged not to pass the identity verification based on the biological characteristic information, the propagation content is prohibited from being propagated.
3. The method of claim 1, wherein the authentication information comprises a distribution key and account information;
determining, using the verification information, whether the publisher of the disseminated content passes authentication based on biometric information includes:
generating a release key by using verification characteristic information corresponding to the account information stored in the biological verification opening stage; and comparing the generated issuing key with the received issuing key, if the generated issuing key is consistent with the received issuing key, determining that the authentication is passed, and otherwise, determining that the authentication is not passed.
4. The method according to claim 3, wherein the generating of the release key by using the verification feature information corresponding to the account information stored in the biometric authentication activation stage comprises:
encrypting verification characteristic information corresponding to the account information stored in the biometric verification activation stage and random information by adopting an encryption algorithm agreed with the client in advance to obtain an issuing key; the random information is consistent with the random information adopted by the client to generate the release key.
5. The method of claim 1, wherein the authentication information comprises authentication characteristic information and account number information;
determining, using the authentication information, whether the sender of the broadcast content passes authentication based on biometric information includes:
and comparing the verification characteristic information corresponding to the account information stored in the biological verification opening stage with the received verification characteristic information, if the verification characteristic information is consistent with the received verification characteristic information, determining that the identity verification is passed, and otherwise, determining that the identity verification is not passed.
6. The method of claim 3 or 5, wherein the biometric verification activation phase comprises:
receiving account information and verification characteristic information sent by the client;
storing the corresponding relation between the account information and the verification characteristic information;
providing a confirmation link to the sender;
and after receiving that the sender determines to open the biological verification function through the confirmation link, setting the opened biological verification aiming at the account information.
7. The method of claim 6, wherein the verification feature information received during the verification open phase comprises: the client generates second biological characteristic information by utilizing the first biological characteristic information input by the sender;
the verification feature information included in the verification information includes: the client generates second biological characteristic information by using first biological characteristic information input by the sender when the transmission content is sent.
8. The method of claim 6, wherein the verification feature information received during the verification open phase comprises: the client side encrypts an encrypted feature string obtained by the identification information by using a client side private key;
the verification feature information included in the verification information includes: and after the client determines that the first biological characteristic information input by the sender when the transmission content is sent is verified, encrypting the encrypted characteristic string obtained by the identification information by using a client private key.
9. The method of claim 6, further comprising:
and if the transmission content is received and the account information of the sender of the transmission content does not open the biological verification function, transmitting the transmission content without the added anti-counterfeiting label.
10. The method of any one of claims 1 to 9, wherein said propagating comprises:
publishing the propagated content to a content publishing platform; or,
forwarding the propagation content to a client of a target user; or,
and sending the propagation content to a message queue corresponding to the target user.
11. An anti-counterfeiting method for propagating content, the method comprising:
generating verification information based on first biological characteristic information input by a sender of the propagation content;
and sending the propagation content and the verification information to a server, so that the server judges that the sender of the propagation content passes the identity verification based on the biological characteristic information by using the verification information, and then adds an anti-counterfeit label to the propagation content and propagates the propagation content.
12. The method of claim 11, wherein generating verification information based on the first biometric information entered by the sender of the propagated content comprises:
determining second biological characteristic information corresponding to the first biological characteristic information input by the sender;
generating verification feature information by using the second biological feature information;
and obtaining the verification information according to the verification characteristic information and the account information of the sender.
13. The method of claim 11, wherein generating verification information based on the first biometric information entered by the sender of the propagated content comprises:
determining a verification result of verifying the first biological characteristic information input by the sender when the sender sends the propagation content by using the first biological characteristic information input by the sender at a biological verification opening stage;
if the verification is passed, forming an encrypted feature string by using a client private key;
generating verification feature information by using the encryption feature string;
and obtaining the verification information according to the verification characteristic information and the account information of the sender.
14. The method of claim 12, wherein determining second biometric information corresponding to the first biometric information input by the sender comprises:
determining second biological characteristic information corresponding to the first biological characteristic information input by the user according to the corresponding relation between the first biological characteristic information and the second biological characteristic information stored in the biological verification opening stage; or,
and encrypting the first biological characteristic information input by the user by using a client private key to obtain the second biological characteristic information.
15. The method of claim 12 or 13, wherein deriving the verification information from the verification feature information and the account information of the sender comprises:
the verification feature information and the account information of the sender form the verification information; or,
and encrypting the verification characteristic information and random information by adopting an encryption algorithm agreed with the server in advance to obtain a release key, wherein the release key and the account information of the sender form the verification information.
16. The method of claim 13, wherein the biometric verification activation phase comprises:
after the sender inputs the first biological characteristic information, an encrypted characteristic string is formed by using a client private key, and the encrypted characteristic string and the account information of the sender are sent to the server.
17. The method of claim 14, wherein the biometric verification activation phase comprises:
acquiring first biological characteristic information input by the sender;
encrypting the input first biological characteristic information by using a client private key to obtain second biological characteristic information;
and sending the second biological characteristic information and the account information of the sender to the server.
18. The method of claim 16 or 17, wherein the biometric verification activation phase further comprises: after confirmation information for opening the biological verification function sent by the server is received, the opened biological verification is set aiming at the account information;
when the sender is determined to send the propagation content, judging whether the account information of the sender opens the biological verification, and if so, prompting the user to input first biological characteristic information; otherwise, prompting the user whether to open the biological verification or sending the transmission content sent by the sender to the server.
19. An anti-counterfeiting method for propagating content, the method comprising:
receiving the propagation content containing the anti-counterfeiting label sent by the server;
presenting the propagation content;
wherein the anti-counterfeit label indicates that a sender of the disseminated content has passed authentication based on biometric information.
20. The method of claim 19, wherein the anti-counterfeit label is rendered as a designated text or icon while the propagated content is being presented.
21. An anti-counterfeiting device for spreading contents, which is arranged on a server, is characterized in that the device comprises:
the receiving unit is used for receiving the propagation content and the verification information sent by the client;
an authentication unit configured to determine, using the authentication information, whether or not a sender of the broadcast content passes authentication based on biometric information;
and the propagation unit is used for adding the anti-counterfeit label to the propagation content and propagating the propagation content when the judgment result of the verification unit is yes.
22. The apparatus according to claim 21, wherein the propagation unit is further configured to prohibit propagation of the propagation content when the determination result of the verification unit is negative.
23. The apparatus of claim 21, wherein the authentication information comprises a distribution key and account information;
the verification unit is specifically used for generating a release key by using verification characteristic information corresponding to the account information stored in the biometric verification opening stage; and comparing the generated release key with the release key received by the receiving unit, if the generated release key is consistent with the release key, determining that the authentication is passed, and otherwise, determining that the authentication is not passed.
24. The apparatus according to claim 23, wherein the verification unit, when generating the distribution key, specifically performs: encrypting verification characteristic information corresponding to the account information stored in the biometric verification activation stage and random information by adopting an encryption algorithm agreed with the client in advance to obtain an issuing key; the random information is consistent with the random information adopted by the client to generate the release key.
25. The apparatus of claim 21, wherein the authentication information comprises authentication feature information and account number information;
the verification unit is specifically configured to compare verification feature information corresponding to the account information stored in the biometric verification activation stage with the verification feature information received by the receiving unit, and if the verification feature information is consistent with the verification feature information, the authentication is determined to pass, otherwise, the authentication is determined not to pass.
26. The apparatus of claim 23 or 25, further comprising: a storage unit and a confirmation unit;
the receiving unit is also used for receiving the account information and the verification characteristic information sent by the client in the biological verification opening stage;
the storage unit is used for storing the corresponding relation between the account information and the verification characteristic information;
the confirmation unit is used for providing a confirmation link to the sender; and after receiving that the sender determines to open the biological verification function through the confirmation link, setting the opened biological verification aiming at the account information.
27. The apparatus of claim 26, wherein the verification feature information received by the receiving unit during the verification opening stage comprises: the client generates second biological characteristic information by utilizing the first biological characteristic information input by the sender;
the verification feature information included in the verification information includes: the client generates second biological characteristic information by using first biological characteristic information input by the sender when the transmission content is sent.
28. The apparatus of claim 26, wherein the verification feature information received by the receiving unit during the verification opening stage comprises: the client side encrypts an encrypted feature string obtained by the identification information by using a client side private key;
the verification feature information included in the verification information includes: and after the client verifies the first biological characteristic information input by the sender when the transmission content is sent, encrypting the encrypted characteristic string obtained by the identification information by using a client private key.
29. The apparatus according to claim 26, wherein the dissemination unit is further configured to disseminate the dissemination content without adding the anti-counterfeit label if the dissemination content is received by the receiving unit and the account information of the sender of the dissemination content does not activate the biometric authentication function.
30. The apparatus according to any one of claims 21 to 29, wherein the propagation unit performs, when propagating, specifically:
publishing the propagated content to a content publishing platform; or,
forwarding the propagation content to a client of a target user; or,
and sending the propagation content to a message queue corresponding to the target user.
31. An anti-counterfeiting device for spreading contents is arranged at a client, and is characterized by comprising:
a verification information generation unit configured to generate verification information based on first biometric information input by a sender of the broadcast content;
and the transmitting unit is used for transmitting the propagation content and the verification information to a server, so that the server judges that the sender of the propagation content passes identity verification based on the biological characteristic information by using the verification information, and then adds an anti-counterfeit label to the propagation content and propagates the propagation content.
32. The apparatus according to claim 31, wherein the verification information generating unit is specifically configured to:
determining second biological characteristic information corresponding to the first biological characteristic information input by the sender;
generating verification feature information by using the second biological feature information;
and obtaining the verification information according to the verification characteristic information and the account information of the sender.
33. The apparatus according to claim 31, wherein the verification information generating unit is specifically configured to:
determining a verification result of verifying the first biological characteristic information input by the sender when the sender sends the propagation content by using the first biological characteristic information input by the sender at a biological verification opening stage;
if the verification is passed, forming an encrypted feature string by using a client private key;
generating verification feature information by using the encryption feature string;
and obtaining the verification information according to the verification characteristic information and the account information of the sender.
34. The apparatus according to claim 32, wherein the authentication information generating unit, when obtaining the authentication information from the authentication feature information and the account information of the sender, specifically performs:
determining second biological characteristic information corresponding to the first biological characteristic information input by the user according to the corresponding relation between the first biological characteristic information and the second biological characteristic information stored in the biological verification opening stage; or,
and encrypting the first biological characteristic information input by the user by using a client private key to obtain the second biological characteristic information.
35. The apparatus according to claim 32 or 33, wherein the authentication information generating unit, when obtaining the authentication information from the authentication feature information and the account information of the sender, specifically performs:
the verification feature information and the account information of the sender form the verification information; or,
and encrypting the verification characteristic information and random information by adopting an encryption algorithm agreed with the server in advance to obtain a release key, wherein the release key and the account information of the sender form the verification information.
36. The apparatus of claim 33, further comprising:
and the biological verification opening unit is used for forming an encrypted feature string by using a client private key after the sender inputs the first biological feature information in the biological verification opening stage, and sending the encrypted feature string and the account information of the sender to the server.
37. The apparatus of claim 34, further comprising:
the biological verification opening unit is used for acquiring first biological characteristic information input by the sender at a biological verification opening stage; encrypting the input first biological characteristic information by using a client private key to obtain second biological characteristic information; and sending the second biological characteristic information and the account information of the sender to the server.
38. The apparatus of claim 36 or 37, further comprising: a presentation unit;
the biometric authentication opening unit is further used for setting opened biometric authentication aiming at the account information after receiving confirmation information of opening the biometric authentication function sent by the server;
the prompting unit is used for judging whether the account information of the sender opens the biological verification or not when the sender is determined to send the propagation content, and prompting the user to input first biological characteristic information if the account information of the sender opens the biological verification; otherwise, prompting the user whether to open the biological verification or triggering the sending unit to send the transmission content sent by the sender to the server.
39. An anti-counterfeiting device for spreading content, the device is arranged at a client, and the device is characterized by comprising:
the receiving unit is used for receiving the propagation content containing the anti-counterfeiting label sent by the server;
a presentation unit configured to present the broadcast content;
wherein the anti-counterfeit label indicates that a sender of the disseminated content has passed authentication based on biometric information.
40. The apparatus of claim 39, wherein the presentation unit renders the anti-counterfeit label into a designated text or icon when presenting the broadcast content.
CN201510977543.3A 2015-12-23 2015-12-23 Anti-counterfeiting method and anti-counterfeiting device for communication content Pending CN105635119A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510977543.3A CN105635119A (en) 2015-12-23 2015-12-23 Anti-counterfeiting method and anti-counterfeiting device for communication content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510977543.3A CN105635119A (en) 2015-12-23 2015-12-23 Anti-counterfeiting method and anti-counterfeiting device for communication content

Publications (1)

Publication Number Publication Date
CN105635119A true CN105635119A (en) 2016-06-01

Family

ID=56049610

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510977543.3A Pending CN105635119A (en) 2015-12-23 2015-12-23 Anti-counterfeiting method and anti-counterfeiting device for communication content

Country Status (1)

Country Link
CN (1) CN105635119A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107171791A (en) * 2017-05-24 2017-09-15 舒翔 A kind of data encryption/decryption method and encrypting and deciphering system based on biological characteristic

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102067103A (en) * 2008-04-14 2011-05-18 隐私数据系统公司 Improved certified email messages and attachments
CN103561000A (en) * 2013-10-18 2014-02-05 北京奇虎科技有限公司 Multimedia data authentication method and device and browser
CN103559221A (en) * 2013-10-18 2014-02-05 北京奇虎科技有限公司 Multi-media data processing method and device and browser
CN103632105A (en) * 2013-11-25 2014-03-12 联想(北京)有限公司 Information displaying method and electronic device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102067103A (en) * 2008-04-14 2011-05-18 隐私数据系统公司 Improved certified email messages and attachments
CN103561000A (en) * 2013-10-18 2014-02-05 北京奇虎科技有限公司 Multimedia data authentication method and device and browser
CN103559221A (en) * 2013-10-18 2014-02-05 北京奇虎科技有限公司 Multi-media data processing method and device and browser
CN103632105A (en) * 2013-11-25 2014-03-12 联想(北京)有限公司 Information displaying method and electronic device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107171791A (en) * 2017-05-24 2017-09-15 舒翔 A kind of data encryption/decryption method and encrypting and deciphering system based on biological characteristic

Similar Documents

Publication Publication Date Title
US10652018B2 (en) Methods and apparatus for providing attestation of information using a centralized or distributed ledger
TWI686075B (en) Identity verification method and device, electronic equipment
US9923876B2 (en) Secure randomized input
Ellison Ceremony design and analysis
JP7118708B2 (en) System and method for communication verification
US8151326B2 (en) Using audio in N-factor authentication
US8108528B2 (en) System and method for verifying the identity of a chat partner during an instant messaging session
US11831680B2 (en) Electronic authentication infrastructure
US8943561B2 (en) Text message authentication system
US20190340352A1 (en) Method for producing dynamic password identification for users such as machines
US9602504B2 (en) Strong Authentication by presentation of a number
US20100242097A1 (en) System and method for managing application program access to a protected resource residing on a mobile device
US20090199272A1 (en) Authentication using a turing test to block automated attacks
US11902464B1 (en) Caller identification trust
US20160241530A1 (en) Systems and methods for managing access to message content
CA2831527A1 (en) Computer-implemented system and method for validating call connections
Jubur et al. Bypassing push-based second factor and passwordless authentication with human-indistinguishable notifications
CN103368831A (en) Anonymous instant messaging system based on frequent visitor recognition
TW201328280A (en) Instant communication identity authentication system and method
CN105635119A (en) Anti-counterfeiting method and anti-counterfeiting device for communication content
EP3350973B1 (en) Method for website authentication and for securing access to a website
US20230169160A1 (en) Method and system for user authentication
Zefferer et al. Harnessing electronic signatures to improve the security of SMS-based services
JP2018074388A (en) Authentication system, method, and program
Szente Using mobile devices’ hardware-backed keystore for universal authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160601