CN105991653A - Identity authentication method and device - Google Patents
Identity authentication method and device Download PDFInfo
- Publication number
- CN105991653A CN105991653A CN201610127230.3A CN201610127230A CN105991653A CN 105991653 A CN105991653 A CN 105991653A CN 201610127230 A CN201610127230 A CN 201610127230A CN 105991653 A CN105991653 A CN 105991653A
- Authority
- CN
- China
- Prior art keywords
- equipment
- information
- biological
- communication connection
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
The invention discloses an identity authentication method and device. The method comprises the steps that first equipment establishes communication connection with second equipment through a biological limb after the biological limb enters the preset range of the first equipment; the first equipment receives data under authentication transmitted by the second equipment through communication connection, wherein the data under authentication include digital authentication information and identity identification; the first equipment acquires biological characteristic information of the biological limb in time duration when the biological limb enters the preset range of the first equipment; and the first equipment acquires an authentication result obtained through authentication of the data under authentication and the biological characteristic information.
Description
Technical field
The present invention relates to a kind of electronic technology field, particularly relate to a kind of identity identifying method and device.
Background technology
E-Payment is compared and is paid in cash, have safely, quickly, the advantage such as reliable.POS is as a kind of payment terminal, quilt
In applying to widely pay by mails.Existing POS has plenty of the holder's magnetic strip information being read bank card by card reader,
POS operating personnel are inputted dealing money, holder's brush bank card in POS, then inputs password, POS again
These information are uploaded to bank backstage, complete on-line transaction.As can be seen here, in existing E-Payment flow process, Yong Huxu
Performing to operate twice, being put into bank card for the first time and be connected with POS foundation in POS, user needs input for the second time
Password, operating process is complicated.
In addition, use electronic equipment to obtain some particular place (for example, Administrative Area, security areas etc.), individual personage user
During the mandate of product (automobile, safety cabinet etc.), dangerous goods (such as firearms and ammunition etc.) etc., electronic equipment be arranged on these places,
Electronic system in personal belongings or dangerous goods sets up communication connection, then the key of storage is sent to electronic system, electronics
Key is authenticated by system.As can be seen here, this authorization of the prior art, other people can use others' electronics
Equipment and then acquisition authorize, and then perform illegal operation, cause property, the information etc. of user to lose.
Content of the invention
Present invention seek to address that one of the problems referred to above.
A kind of identity identifying method of offer is provided.
Another object of the present invention is to provide a kind of identification authentication system.
For reaching above-mentioned purpose, technical scheme is specifically achieved in that
One aspect of the present invention provides a kind of identity identifying method, comprising: after biological limbs enter the preset range of the first equipment,
First equipment sets up communication connection by biological limbs and the second equipment;First equipment receives the second device transmission by communication connection
Data to be certified, wherein, data to be certified include: digital certificate information and identity;Enter first at biological limbs to set
In the duration of standby preset range, the first equipment gathers the biological information of biological limbs;First equipment obtains to treat to be recognized
Card data and biological information are authenticated the authentication result obtaining.
Alternatively, biological information includes: finger print information and/or venous information;First equipment gathers the biological special of biological limbs
Reference breath includes: in the case of biological limbs and the contact of the first equipment, the contact site of the biological limbs of collection and the first equipment
Biological information.
Alternatively, the first equipment is received the data to be certified of the second device transmission by communication connection, comprising: the first equipment passes through
Communication connection receives the data to be certified of the second device broadcasts.
Alternatively, the first equipment is received the data to be certified of the second device transmission by communication connection, comprising: the first equipment passes through
Communication connection sends certification request to the second equipment;First equipment receives the second equipment response certification request by communication connection and sends
Data to be certified.
Alternatively, digital certificate information includes one below: uses signature private key to be digitally signed data to be signed and obtains
Signing messages;Symmetric key is utilized to be encrypted the encryption information obtaining to information to be encrypted;Dynamic password.
Alternatively, the first equipment is set up with the first equipment by biological limbs and is communicated to connect, comprising: the first Equipment Inspection is to away from the
Biological limbs in preset range for the distance of two equipment and the contact of the first equipment, set up with the second equipment by biological limbs and communicate
Connect.
Another aspect of the present invention provides a kind of identification authentication system, is positioned at the first equipment, comprising: set up module, is used for passing through
Biological limbs and the second equipment set up communication connection;Receiver module, for by communication connection receive the second device transmission wait recognize
Card data, wherein, data to be certified include: digital certificate information and identity;Acquisition module, for by biological limb
In the duration that body and the second equipment set up communication connection, gather the biological information of biological limbs;Perform module, be used for
Perform the flow process treating authentication data and biological information is authenticated, obtain authentication result.
Alternatively, biological information includes: finger print information and/or venous information;Acquisition module gathers biology in the following manner
The biological information of limbs: within the duration setting up communication connection by biological limbs and the second equipment, and biological limbs
In the case of contact with the first equipment, the biological information of the contact site of the biological limbs of collection and the first equipment.
Alternatively, receiver module receives the data to be certified of the second device transmission in the following manner: by communication connection reception the
The data to be certified of two device broadcasts.
Alternatively, receiver module receives the data to be certified of the second device transmission in the following manner: by communication connection to second
Equipment sends certification request;Receive the data to be certified that the second equipment response certification request sends by communication connection.
Alternatively, set up module and set up communication connection in the following manner with the first equipment: detect presetting of the second equipment logical
Biological limbs in the range of letter and the contact of the first equipment.
As seen from the above technical solution provided by the invention, in the identity identifying method that the present invention provides, enter at biological limbs
After entering the preset range of the first equipment, the first equipment sets up communication connection by biological limbs and the second equipment, and passes through this communication
Connect the data to be certified sending, and, within the duration of the preset range that biological limbs enter the first equipment, gather biology
The biological information of limbs, treats authentication data and biological information is authenticated.The technical scheme being provided by the present invention,
User has only to by biology limbs close to the first equipment once, and the first equipment can obtain the data to be certified that the second equipment sends,
And the biological information of user, simplify the operation of user, improve Consumer's Experience.Further, the skill providing in the present invention
In art scheme, the first equipment uses the biological information of user as authentication information simultaneously, though so that user's imprudence
Losing the second equipment, other people also cannot use the electronic equipment access authentication of this user, so ensure that user property and
The safety of information.
Brief description
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, the accompanying drawing of required use in embodiment being described below
It is briefly described, it should be apparent that, the accompanying drawing in describing below is only some embodiments of the present invention, for this area
From the point of view of those of ordinary skill, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
The flow chart of the identity identifying method that Fig. 1 provides for the embodiment of the present invention 1;
The structural representation of the identification authentication system that Fig. 2 provides for the embodiment of the present invention 2.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described,
Obviously, described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.Reality based on the present invention
Execute example, the every other embodiment that those of ordinary skill in the art are obtained under the premise of not making creative work, broadly fall into
Protection scope of the present invention.
In describing the invention, it is to be understood that term " " center ", " longitudinally ", " laterally ", " on ", D score, " front ",
The orientation of the instruction such as " afterwards ", "left", "right", " vertically ", " level ", " top ", " end ", " interior ", " outward " or position relationship are base
It in orientation shown in the drawings or position relationship, is for only for ease of the description present invention and simplifies description, rather than instruction or hint institute
The device that refers to or element must have specific orientation, with specific azimuth configuration and operation, therefore it is not intended that to the present invention
Restriction.Additionally, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint relative importance
Or quantity or position.
In describing the invention, it should be noted that unless otherwise clearly defined and limited, term " install ", " being connected ",
" connect " and should be interpreted broadly, for example, it may be fixing connect, it is also possible to be to removably connect, or be integrally connected;Permissible
It is to be mechanically connected, it is also possible to be electrical connection;Can be to be joined directly together, it is also possible to be indirectly connected to by intermediary, can be two
The connection of individual element internal.For the ordinary skill in the art, above-mentioned term can be understood in the present invention with concrete condition
In concrete meaning.
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in further detail.
Embodiment 1
Present embodiments provide a kind of identity identifying method.
Fig. 1 is the flow chart of the identity identifying method that the present embodiment provides, as it is shown in figure 1, the method mainly includes the following steps that
S102 is to step S108.
Step S102, after biological limbs enter the preset range of the first equipment, the first equipment is by biological limbs and the second equipment
Set up communication connection.
In the present embodiment, biological limbs include but is not limited to human body.
In the present embodiment, the first equipment can be barcode scanning terminal, mobile terminal, PDA, the platform such as POS, Alipay application
The terminals such as formula machine, notebook, gate inhibition, the second equipment for implanting in human body or can be worn on the device with human body, implant
Device in human body for example can be the sensors such as the blood flow transducer in implantation human body, pulse transducer, body temperature trans, wears
Being worn over the device with human body can be for example that bracelet, watch, necklace, ring, waistband etc. may be worn on the electronics with user
Equipment.
In an optional embodiment of the embodiment of the present invention, the first equipment sets up communication link by biological limbs and the first equipment
Connecing can be the first Equipment Inspection to biological limbs in preset range for the distance away from the second equipment and the contact of the first equipment, passes through
This biology limbs and the second equipment set up communication connection.For example, detect that the finger of the human body wearing bracelet touches the first equipment,
Thus set up communication connection by human body with bracelet.
In the present embodiment, the second equipment can dress on the health of user or insert user internal on, or be loaded in user
In the clothing dressed or accessories, thus communicate to connect with the second equipment, for example, be worn in the wrist of user, or be contained in user
Dress pocket in, when user need logging in network, open gate inhibition and payment etc. need the operation carrying out authentication when,
User can be by the limbs (such as arm, face) of oneself close to the first equipment (i.e. checking equipment), when limbs set close to first
During standby certain distance (for example, several millimeters), the first equipment sets up communication connection by limbs and second equipment of user.Due to
Human body communication has certain scope, such as 3~5 meters, only enters in this preset range of the first equipment at human body, just can build
Vertical human body communication connects.
As the optional embodiment of the one in the present embodiment, the first equipment sets up communication connection by biological limbs and the second equipment
Can pass through wired mode and wireless mode, for example, the first equipment and the second equipment at least can be by one of following two modes
Realize:
Wired mode:
First equipment and the second equipment are equipped with electrode, the first equipment with implant in human body or be worn on human body second
When the biological limbs (human body) of equipment contact (finger is contacted POS by the user for example, wearing watch), human body is made
For conductor, the electrode connection of both sides forms the path in human body, the communication connection of i.e. so-called wired mode.In this approach,
First equipment needs the human contact with the second equipment of wearing.
Wireless mode:
In wireless mode, whether the electric field that the first equipment and the second equipment (such as POS and watch) all can detect surrounding is sent out
Changing, if the other side enters human body communication permission, just can detect that field intensity changes, and sets up communication with the other side
Connect.Specifically, as a example by the second equipment, the second equipment is worn or is built in human body, utilizes the transmitter of the second equipment
Vibration allows human body produce electric field, and when the distance of the second equipment and the first equipment is in the range of human body communication allows, first sets
Standby receiver detects the change of electric field, sets up communication connection with the second equipment.In this approach, the first equipment do not need with
Wear the human contact of the second equipment.
Aforesaid way utilizes human body as the transmission medium of the signal of telecommunication, it is achieved body surface, internal and the setting of human peripheral (3~5 meters)
Standby information is mutual.Compared with traditional bluetooth, WIFI, radio frequency and the wireless communication technology such as infrared, believe during human body communication
Number through human body transmission, thus electromagnetic noise is very little on its impact, has low-power consumption, high security and the infringement of lower human body
Etc. advantage.Additionally due to there is not the problem that many people communication efficiency rate reduces, it is possible to the line exempting wire communication mode redundancy is stranded
Disturb.
Step S104, the first equipment receives the data to be certified of the second device transmission, wherein, data to be certified by communication connection
Including: digital certificate information and identity.
In the present embodiment, digital certificate information can include at least one of: signing messages, encryption information and dynamic password.
It (can be the signature private key of the second equipment, it is also possible to be with the second equipment even that electronic signature information can utilize signature private key
The private key of the safety means (for example, KEY) connecing) signing messages obtaining is digitally signed to data to be signed, to this
When signing messages is authenticated, obtain and the corresponding public signature key of above-mentioned signature private key, utilize this public signature key to electronic signature letter
Breath carries out sign test, if sign test is passed through, then certification is passed through.Wherein, data to be signed can be above-mentioned identity, it is possible to
To be the random number of the second equipment or the safety means generation being connected with the second equipment, in this case, in data to be certified also
The random number that the second equipment produces can be included, in addition, data to be signed can also be the random number that the first equipment produces, at this
In the case of Zhong, the first equipment first can send a checking request to the second equipment after setting up communication connection with the second equipment,
This request is carried first equipment produce random number, after the second equipment receives this random number, recycling signature private key to this with
Machine number is signed, and obtains above-mentioned signing messages, uses random number as data to be signed, can pre-anti-replay-attack.At this
In optional embodiment, digital certificate information is signing messages, so that may insure that the user of the second equipment when certification
Identity.
The symmetric key that encryption information can be the second equipment utilization consults with the first equipment is treated computing with encrypted data and is obtained
MAC value, when being authenticated this encryption information, treats computing with encrypted data also with this symmetric key and is verified MAC
Value, compares cipher-text information and checking MAC value, if unanimously, then certification is passed through;Or, encryption information also can be second
The ciphertext data that be-encrypted data is obtained by the symmetric key that equipment utilization is consulted with the first equipment, are recognizing to this encryption information
During card, utilize this symmetric key to be decrypted ciphertext data, compare the information that obtains of deciphering whether consistent with be-encrypted data,
If consistent, then certification is passed through.
Dynamic password can be the dynamic password generating based on seed key, when this dynamic password is authenticated, also with
This seed key is calculated validation value, compares dynamic password and validation value, if unanimously, then certification is passed through, wherein, dynamically
Password can be time-based, it is also possible to is based on event, can also be dynamic challenge code, and concrete the present embodiment is not construed as limiting.
In the present embodiment, can be by any of the above-described kind of certification realizing to digital certificate information, to ensure the conjunction of the second equipment
Method.
In the above-described embodiment, the second equipment can calculate above-mentioned digital certificate information with oneself, it is also possible to another equipment (example
As having the electronic equipment of signature function, encryption function or dynamic password function) interact to obtain above-mentioned data authentication
Information, concrete the present embodiment is not construed as limiting.
In a kind of optional embodiment of the present embodiment, identity can be that the device identification of the second equipment, ID etc. can
With unique information identifying user identity, the second user can be uniquely associated to for certification digital certificate information by identity
The certification factor and biological characteristic validation information, in order to double authentication is carried out to digital certificate information and biological information,
Thus, double authentication by after be assured that biological information and digital certificate information both are from same user, protect
The legitimacy of card user.
In the optional embodiment of one of the present embodiment, the second equipment can be after communication connection be set up, actively to the first equipment
Send above-mentioned data to be certified, for example, it is possible to arrange a switch on the second device, after user opens this switch, the
Two equipment start broadcast them data to be certified, and after the first equipment and the second equipment set up communication connection, the first equipment receives the
The data to be certified of two device broadcasts, or, whether the second equipment also can set up communication connection with the first equipment with active detecting,
If it is, actively send above-mentioned data to be certified to the first equipment.Use this embodiment, can improve with simple flow
Certification speed.
In another optional embodiment of the embodiment of the present invention, the second equipment also can be in the request receiving the first equipment
After, send above-mentioned data to be certified.In this optional embodiment, the first equipment can set up communication connection with the second equipment
Afterwards, send certification request to the second equipment, after the second equipment receives this certification request, respond this certification request, to second
Equipment sends this data to be certified.For example, in payment process, Transaction Information can be carried in certification request by the first equipment
It is sent to the second equipment, after the second equipment receives this certification request, respond this certification request, send to be certified to the first equipment
Data, wherein, the second equipment can therefrom extract key message, and show this key message after receiving Transaction Information,
After the user's confirmation is received, just request to be certified is sent to the first equipment, to ensure the safety of transaction.In addition, can at this
Select in embodiment, certification request in can also carry first equipment determine information to be calculated, for example, random number etc., second
This information to be calculated, after receiving this certification request, can be carried out signing, encrypts or generate dynamic password by equipment.
Step S106, within the duration of the preset range that biological limbs enter the first equipment, the first equipment gathers biological limbs
Biological information.
Wherein, biological information includes at least one of: finger print information, iris information, face information and venous information.
In the present embodiment, the first equipment with the biological limbs of the second equipment close contact close to when, gather the biology of this biology limbs
Characteristic information, for example, user's finger touch POS touch parts the of short duration time in (such as 3 seconds), POS with
The watch that user wears sets up communication connection by human body, and passes through this communication connection transmission of authentication information, and, in this touch
In time, the touch parts of POS gather finger print information.Again for example, watch and Alipay payment terminal (this user
Pay terminal and there is camera function, may be used for gathering face information) set up the period that human body communication connects, adopted by payment terminal
Collection face information, thus, the first equipment obtains in the case of can performing one-off (i.e. limbs are close to the first equipment) with user
Data to be certified and biological information, convenient to operation, improve Consumer's Experience.
In the present embodiment, as long as enter the duration interior collection biological information of the preset range of the first equipment at biological limbs
, biological information can be before communication connection be set up, it is also possible to when communication connection is set up or gather afterwards, specifically
The present embodiment is not construed as limiting.
In this step, especially, include at biological information: in the case of finger print information and/or venous information, need raw
Thing limbs and the contact of the first equipment just can collect biological information, as the optional embodiment of one, gather biological limbs
Biological information may include that biological limbs with the contact of the first equipment in the case of, gather biology limbs and the first equipment
The biological information of contact site.For example, the fingerprint collecting portion of finger contact first equipment of user, or the wrist of user
Contact the venous information collection portion of the first equipment.By this optional embodiment, owing to the limbs of user need to connect with the first equipment
Tactile just can collect biological information, therefore, it can keep this certification to be that user permits, and then avoid owing to first sets
Standby and the second equipment accidentally close to and the situation of triggering authentication flow process.
Step S108, the first equipment obtains treats authentication data and biological information is authenticated the authentication result that obtains.
In the present embodiment, the authentication result being authenticated digital certificate information and biological information can be according to certification mark
Know the acquisition of information certification factor and biological characteristic validation information, and utilize the certification factor and biological characteristic validation information to digital authenticating
The authentication result that information and biological information are authenticated.This certification factor and biological characteristic validation information are believed with certification mark
Breath unique association, therefore can be with unique queries to this user corresponding certification factor and biological characteristic validation according to certification identification information
Information, in order to after utilizing the double authentication of digital certificate information and biological information to pass through, it is ensured that the legitimacy of user.
In an optional embodiment of the embodiment of the present invention, the certification to digital certificate information and biological information can be
Performing at the first equipment, the first equipment side preserves the corresponding relation of identity and the certification factor and biological characteristic validation information,
First equipment obtains and this identity corresponding certification factor and biological characteristic validation information according to the identity receiving, profit
With this certification factor and and biological characteristic validation information, respectively to the digital certificate information receiving and collect biological characteristic letter
Breath is authenticated.For example, gate control system can preserve the identity of all users allowing access into and the certification of this user because of
Son and biological characteristic validation information, having user to ask into fashionable, the identity according to this user, the digital authenticating receiving
Information and the biological information collecting are authenticated.
In another optional embodiment of the embodiment of the present invention, the certification to digital certificate information and biological information is permissible
Performing on backstage, data to be certified and biological information are sent to backstage by the first equipment, and identity is preserved on backstage
With the corresponding relation of the certification factor and biological characteristic validation information, backstage obtains and this identity according to the identity receiving
The corresponding certification factor and biological characteristic validation information, utilize this certification factor and and biological characteristic validation information, respectively to reception
To digital certificate information and the biological information collecting be authenticated, authentication result is returned to the first equipment.
In this step, utilize mode and the concrete form according to digital certificate information of the certification of certification factor pair digital certificate information
Related.For example, if digital certificate information (can be the private key of the second equipment, it is also possible to be and second for using signature private key
The private key of the safety means (for example, KEY) that equipment connects) signing messages obtaining of signing is carried out to data to be signed, then recognize
The card factor is the corresponding public signature key with signature private key, when certification digital certificate information, utilizes public signature key to data to be signed
Calculating, obtaining sign test value, compare this sign test value and the signing messages receiving, if unanimously, then certification is passed through,
Otherwise, certification is not passed through.If digital certificate information is to utilize symmetric key to be encrypted the encryption letter obtaining to information to be encrypted
Breath, then the certification factor is symmetric key, when being authenticated digital certificate information, uses symmetric key to enter information to be encrypted
Row encryption, the encrypted authentication information obtaining encryption compares with the encryption information receiving, if unanimously, then certification is passed through,
Otherwise certification is not passed through;Or, it is also possible to utilize symmetric key to be decrypted the encryption information receiving, deciphering is obtained
Cleartext information compares with information to be encrypted, if unanimously, then certification is passed through, and otherwise certification is not passed through;The certification factor includes
Biological characteristic validation information and symmetric key.In the case that digital certificate information is dynamic password, the certification factor is for dynamically
The seed key that password is verified, when being authenticated digital certificate information, uses seed key to generate dynamic password, will
The dynamic password generating compares with the dynamic password receiving, if unanimously, then certification is passed through, and otherwise, certification is not passed through.
The identity identifying method being provided by the embodiment of the present invention, after biological limbs enter the preset range of the first equipment, first
Equipment sets up communication connection, and the data to be certified being sent by this communication connection by biological limbs and the second equipment, and,
Gather the biological information of biological limbs within the duration of the preset range that biological limbs enter the first equipment, to be certified
Data and biological information are authenticated.The technical scheme being provided by the present invention, user has only to biology limbs close to
Once, the first equipment can obtain the data to be certified that the second equipment sends, and the biological information of user, letter to one equipment
Change the operation of user, improve Consumer's Experience.Further, in the technical scheme that the present invention provides, the first equipment uses simultaneously
The biological information of user as authentication information, even if so that user imprudence by second equipment lose, other people also without
Method uses the electronic equipment access authentication of this user, and then ensure that the property of user and the safety of information.
Embodiment two
Present embodiments providing a kind of identification authentication system, this device is positioned at the first equipment, may be used for realizing above-mentioned authentication
Method.
The structural representation of the identification authentication system that Fig. 2 provides for the present embodiment, as in figure 2 it is shown, this identification authentication system is main
Including: set up module 201, for setting up communication connection by biological limbs and the second equipment;Receiver module 202, is used for passing through
Communication connection receives the data to be certified of the second device transmission, and wherein, data to be certified include: digital certificate information and identity mark
Know;Acquisition module 203, for, within the duration setting up communication connection by biological limbs and the second equipment, gathering biology
The biological information of limbs;Acquisition module 204, treats authentication data and stream that biological information is authenticated for obtaining
Journey, obtains authentication result.
In the present embodiment, biological limbs include but is not limited to human body.
In the present embodiment, the first equipment can be barcode scanning terminal, mobile terminal, PDA, the platform such as POS, Alipay application
The terminals such as formula machine, notebook, gate inhibition, the second equipment for implanting in human body or can be worn on the device with human body, implant
Device in human body for example can be the sensors such as the blood flow transducer in implantation human body, pulse transducer, body temperature trans, wears
Being worn over the device with human body can be for example that bracelet, watch, necklace, ring, waistband etc. may be worn on the electronics with user
Equipment.
In an optional embodiment of the embodiment of the present invention, set up module 201 in such a way by biological limbs and the
One equipment sets up communication connection: biological limbs in preset range for the distance away from the second equipment and the contact of the first equipment detected,
Set up communication connection by this biology limbs and the second equipment.For example, detect that the finger of the human body wearing bracelet touches first
Equipment, thus set up communication connection by human body with bracelet.
In the present embodiment, the second equipment can dress on the health of user or insert user internal on, or be loaded in user
In the clothing dressed or accessories, thus communicate to connect with the second equipment, for example, be worn in the wrist of user, or be contained in user
Dress pocket in, when user need logging in network, open gate inhibition and payment etc. need the operation carrying out authentication when,
User can be by the limbs (such as arm, face) of oneself close to the first equipment (i.e. checking equipment), when limbs set close to first
During standby certain distance (for example, several millimeters), set up the limbs by user for the module 201 and the second equipment sets up communication connection.
Owing to human body communication has certain scope, such as 3~5 meters, only enter in this preset range of the first equipment at human body,
Human body communication can be set up connect.
As the optional embodiment of the one in the present embodiment, set up module 201 and set up communication by biological limbs and the second equipment
Connection can pass through wired mode and wireless mode, and for example, setting up module 201 at least can be real by one of following two mode
Existing:
Wired mode:
First equipment and the second equipment are equipped with electrode, the first equipment with implant in human body or be worn on human body second
When the biological limbs (human body) of equipment contact (finger is contacted POS by the user for example, wearing watch), human body is made
For conductor, the electrode connection of both sides forms the path in human body, the communication connection of i.e. so-called wired mode.In this approach,
First equipment needs the human contact with the second equipment of wearing.
Wireless mode:
In wireless mode, whether the electric field that the first equipment and the second equipment (such as POS and watch) all can detect surrounding is sent out
Changing, if the other side enters human body communication permission, just can detect that field intensity changes, and sets up communication with the other side
Connect.Specifically, as a example by the second equipment, the second equipment is worn or is built in human body, utilizes the transmitter of the second equipment
Vibration allows human body produce electric field, and when the distance of the second equipment and the first equipment is in the range of human body communication allows, first sets
Standby receiver detects the change of electric field, and module 201 is set up in instruction and the second equipment sets up communication connection.In this approach,
First equipment does not needs and wears the human contact of the second equipment.
Aforesaid way utilizes human body as the transmission medium of the signal of telecommunication, it is achieved body surface, internal and the setting of human peripheral (3~5 meters)
Standby information is mutual.Compared with traditional bluetooth, WIFI, radio frequency and the wireless communication technology such as infrared, believe during human body communication
Number through human body transmission, thus electromagnetic noise is very little on its impact, has low-power consumption, high security and the infringement of lower human body
Etc. advantage.Additionally due to there is not the problem that many people communication efficiency rate reduces, it is possible to the line exempting wire communication mode redundancy is stranded
Disturb.
In the present embodiment, digital certificate information that receiver module 202 receives can include at least one of: signing messages,
Encryption information and dynamic password.
It (can be the signature private key of the second equipment, it is also possible to be with the second equipment even that electronic signature information can utilize signature private key
The private key of the safety means (for example, KEY) connecing) signing messages obtaining is digitally signed to data to be signed, to this
When signing messages is authenticated, obtain and the corresponding public signature key of above-mentioned signature private key, utilize this public signature key to electronic signature letter
Breath carries out sign test, if sign test is passed through, then certification is passed through.Wherein, data to be signed can be above-mentioned identity, it is possible to
To be the random number of the second equipment or the safety means generation being connected with the second equipment, in this case, in data to be certified also
The random number that the second equipment produces can be included, in addition, data to be signed can also be the random number that the first equipment produces, at this
In the case of Zhong, the first equipment first can send a checking request to the second equipment after setting up communication connection with the second equipment,
This request is carried first equipment produce random number, after the second equipment receives this random number, recycling signature private key to this with
Machine number is signed, and obtains above-mentioned signing messages, uses random number as data to be signed, can pre-anti-replay-attack.At this
In optional embodiment, digital certificate information is signing messages, so that may insure that the user of the second equipment when certification
Identity.
The symmetric key that encryption information can be the second equipment utilization consults with the first equipment is treated computing with encrypted data and is obtained
MAC value, when being authenticated this encryption information, treats computing with encrypted data also with this symmetric key and is verified MAC
Value, compares cipher-text information and checking MAC value, if unanimously, then certification is passed through;Or, encryption information also can be second
The ciphertext data that be-encrypted data is obtained by the symmetric key that equipment utilization is consulted with the first equipment, are recognizing to this encryption information
During card, utilize this symmetric key to be decrypted ciphertext data, compare the information that obtains of deciphering whether consistent with be-encrypted data,
If consistent, then certification is passed through.
Dynamic password can be the dynamic password generating based on seed key, when this dynamic password is authenticated, also with
This seed key is calculated validation value, compares dynamic password and validation value, if unanimously, then certification is passed through, wherein, dynamically
Password can be time-based, it is also possible to is based on event, can also be dynamic challenge code, and concrete the present embodiment is not construed as limiting.
In the present embodiment, can be by any of the above-described kind of certification realizing to digital certificate information, to ensure the conjunction of the second equipment
Method.
In the above-described embodiment, the second equipment can calculate above-mentioned digital certificate information with oneself, it is also possible to another equipment (example
As having the electronic equipment of signature function, encryption function or dynamic password function) interact to obtain above-mentioned data authentication
Information, concrete the present embodiment is not construed as limiting.
In a kind of optional embodiment of the present embodiment, identity can be that the device identification of the second equipment, ID etc. can
With unique information identifying user identity, the second user can be uniquely associated to for certification digital certificate information by identity
The certification factor and biological characteristic validation information, in order to double authentication is carried out to digital certificate information and biological information,
Thus, double authentication by after be assured that biological information and digital certificate information both are from same user, protect
The legitimacy of card user.
In the optional embodiment of one of the present embodiment, the second equipment can be after communication connection be set up, actively to the first equipment
Sending above-mentioned data to be certified, therefore, in this optional embodiment, receiver module 202 can receive in the following manner
The data to be certified of the second device transmission: received the data to be certified of the second device broadcasts by communication connection.For example, it is possible to
Arranging a switch on second equipment, after user opens this switch, the second equipment starts broadcast them data to be certified, is building
After formwork erection block 201 and the second equipment set up communication connection, receiver module 202 receives the data to be certified of the second device broadcasts, or
Person, whether the second equipment also can set up communication connection with the first equipment with active detecting, if it is, actively send out to the first equipment
Serve and state data to be certified.Use this embodiment, certification speed can be improved with simple flow.
In another optional embodiment of the embodiment of the present invention, the second equipment also can be in the request receiving the first equipment
After, send above-mentioned data to be certified.In this optional embodiment, receiver module 202 can receive second in the following manner
The data to be certified of device transmission: send certification request to the second equipment by communication connection;Receive second by communication connection to set
The data to be certified that standby response certification request sends.For example, the first equipment can with second equipment set up communication connection after,
Send certification request to the second equipment, after the second equipment receives this certification request, respond this certification request, send out to the second equipment
Give this data to be certified.For example, in payment process, Transaction Information can be carried and be sent in certification request by the first equipment
Second equipment, after the second equipment receives this certification request, responds this certification request, sends data to be certified to the first equipment,
Wherein, the second equipment can therefrom extract key message, and show this key message after receiving Transaction Information, is receiving
After confirming to user, just send request to be certified to the first equipment, to ensure the safety of transaction.In addition, in this optional enforcement
In mode, can also carry, in certification request, the information to be calculated that the first equipment determines, for example, random number etc., the second equipment exists
After receiving this certification request, can carry out signing to this information to be calculated, encrypt or generate dynamic password.
In the present embodiment, the biological information that acquisition module 203 collects can include at least one of: finger print information,
Iris information, face information and venous information.In the present embodiment, acquisition module 203 can with the second equipment close contact
Biological limbs close to when, gather the biological information of this biology limbs, for example, touch the touch of POS at user's finger
The of short duration time of parts is interior (such as 3 seconds), and the watch that POS and user wear sets up communication connection by human body, and by being somebody's turn to do
Communication connection transmission of authentication information, and, within this touch time, the touch parts of POS gather finger print information.Again for example,
Watch user is set up with Alipay payment terminal (this payment terminal has camera function, may be used for gathering face information)
The period that human body communication connects, gathering face information by payment terminal, thus, identification authentication system can perform one user
Data to be certified and biological information is obtained in the case of secondary action (i.e. limbs are close to the first equipment), convenient to operation,
Improve Consumer's Experience.
In the present embodiment, as long as enter the duration interior collection biological information of the preset range of the first equipment at biological limbs
, biological information can be before communication connection be set up, it is also possible to when communication connection is set up or gather afterwards, specifically
The present embodiment is not construed as limiting.
In an optional embodiment of the embodiment of the present invention, biological information may include that finger print information and/or vein letter
Breath;Then acquisition module 203 can gather the biological information of biological limbs in the following manner: by biological limbs and the
Two equipment were set up in the duration of communication connection, and biological limbs with the contact of the first equipment in the case of, gather biological limbs and
The biological information of the contact site of the first equipment.For example, the fingerprint collecting portion of finger contact first equipment of user, or use
The venous information collection portion of wrist contact first equipment at family.By this optional embodiment, owing to the limbs of user need and the
One equipment contact just can collect biological information, therefore, it can keep this certification to be that user permits, so avoid by
In the first equipment and the second equipment accidentally close to and the situation of triggering authentication flow process.
In the present embodiment, the authentication result that acquisition module 204 obtains is to treat authentication data and biological information is authenticated
Obtain.In the present embodiment, treat the digital certificate information in authentication data and authentication result that biological information is authenticated
Can be to obtain the certification factor and biological characteristic validation information according to certification identification information, and utilize the certification factor and biological characteristic to test
The authentication result that digital certificate information and biological information are authenticated by card information.This certification factor and biological characteristic validation
Information and certification identification information unique association, therefore according to certification identification information can with unique queries to the corresponding certification of this user because of
Son and biological characteristic validation information, in order to after utilizing the double authentication of digital certificate information and biological information to pass through, permissible
Ensure the legitimacy of user.
In an optional embodiment of the embodiment of the present invention, the certification to digital certificate information and biological information can be
Performing at identification authentication system, identification authentication system can preserve identity and the certification factor and biological characteristic validation information
Corresponding relation, acquisition module 204 obtains and the corresponding certification of this identity according to the identity that receiver module 202 receives
The factor and biological characteristic validation information, utilize this certification factor and and biological characteristic validation information, respectively receiver module 202 is connect
The biological information that the digital certificate information receiving and acquisition module 203 collect is authenticated.For example, gate control system is permissible
Preserve the identity of all users allowing access into and the certification factor of this user and biological characteristic validation information, have user
Asking into fashionable, identity according to this user, the digital certificate information receiving and the biological information collecting are carried out
Certification.
In another optional embodiment of the embodiment of the present invention, the certification to digital certificate information and biological information is permissible
Performing on backstage, data to be certified and biological information are sent to backstage by acquisition module 204, and identity is preserved on backstage
Mark and the corresponding relation of the certification factor and biological characteristic validation information, backstage obtains and this identity according to the identity receiving
Identify the corresponding certification factor and biological characteristic validation information, utilize this certification factor and and biological characteristic validation information, right respectively
The digital certificate information receiving and the biological information collecting are authenticated, and authentication result returns to acquisition module 204.
Concrete authentication mode to digital certificate information may refer to the description of embodiment one, does not repeats them here.
The identification authentication system being provided by the embodiment of the present invention, after biological limbs enter the preset range of the first equipment, sets up mould
Block 201 is set up with the second equipment by biological limbs and is communicated to connect, receiver module 202 by this communication connection send to be certified
Data, and, within the duration of the preset range that biological limbs enter the first equipment, acquisition module 203 gathers biological limbs
Biological information, acquisition module 204 obtains treats the authentication result that is authenticated authentication data and biological information.Logical
Crossing the technical scheme that the present invention provides, user has only to by biology limbs close to the first equipment once, and the first equipment can obtain the
The data to be certified that two equipment send, and the biological information of user, simplify the operation of user, improve Consumer's Experience.
Further, in the technical scheme that the present invention provides, the first equipment uses the biological information of user as authentication information simultaneously,
So that even if the second equipment is lost by user's imprudence, other people also cannot use the electronic equipment access authentication of this user,
And then ensure that the property of user and the safety of information.
Any process described otherwise above or method describe and are construed as in flow chart or at this, represent include one or
More are for realizing module, fragment or the part of the code of the executable instruction of the step of specific logical function or process, and
The scope of the preferred embodiment of the present invention includes other realization, wherein can not press order that is shown or that discuss, including root
According to involved function while basic in the way of or in the opposite order, perform function, this should be by embodiments of the invention institute
Belong to those skilled in the art to be understood.
It should be appreciated that each several part of the present invention can be realized by hardware, software, firmware or combinations thereof.In above-mentioned enforcement
In mode, software that multiple steps or method can be performed in memory and by suitable instruction execution system by storage or firmware
Realize.For example, if realized with hardware, and the same in another embodiment, can use following technology well known in the art
In any one or their combination realize: have and patrol for the discrete of logic gates realizing logic function to data-signal
Collect circuit, there is the special IC of suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate
Array (FPGA) etc..
Those skilled in the art are appreciated that and realize that all or part of step that above-described embodiment method is carried is permissible
Instructing related hardware by program to complete, described program can be stored in a kind of computer-readable recording medium, this journey
Sequence upon execution, including one or a combination set of step of embodiment of the method.
Additionally, each functional unit in each embodiment of the present invention can be integrated in a processing module, it is also possible to be each
Unit is individually physically present, it is also possible to two or more unit are integrated in a module.Above-mentioned integrated module is both permissible
The form using hardware realizes, it would however also be possible to employ the form of software function module realizes.If described integrated module is with software work(
Can the form of module realize and as independent production marketing or when using, it is also possible to be stored in the storage of embodied on computer readable and be situated between
In matter.
Storage medium mentioned above can be read-only storage, disk or CD etc..
In the description of this specification, reference term " embodiment ", " some embodiments ", " example ", " specific example ",
Or specific features, structure, material or the feature that the description of " some examples " etc. means to combine this embodiment or example describes comprises
In at least one embodiment or example of the present invention.In this manual, the schematic representation of above-mentioned term is not necessarily referred to
It is identical embodiment or example.And, the specific features of description, structure, material or feature can at any one or
Multiple embodiments or example combine in an appropriate manner.
Although above it has been shown and described that embodiments of the invention, it is to be understood that above-described embodiment is exemplary,
Being not considered as limiting the invention, those of ordinary skill in the art is in the case of without departing from the principle of the present invention and objective
Above-described embodiment can be changed within the scope of the invention, change, replace and modification.The scope of the present invention is by appended power
Profit requires and equivalent restriction.
Claims (11)
1. an identity identifying method, it is characterised in that include:
After biological limbs enter the preset range of the first equipment, described first equipment is built by described biological limbs and the second equipment
Vertical communication connection;
Described first equipment receives the data to be certified of described second device transmission by described communication connection, and wherein, described waiting is recognized
Card data include: digital certificate information and identity;
Within the duration of the preset range that described biological limbs enter the first equipment, described first equipment gathers described biological limb
The biological information of body;
Described first equipment obtains the authentication result being authenticated obtaining to described data to be certified and described biological information.
2. method according to claim 1, it is characterised in that
Described biological information includes: finger print information and/or venous information;
The biological information that described first equipment gathers described biological limbs includes: at described biological limbs and described first equipment
In the case of contact, gather the described biological information of described biological limbs and the contact site of described first equipment.
3. method according to claim 1 and 2, it is characterised in that described first equipment is received by described communication connection
The data to be certified of described second device transmission, comprising:
Described first equipment receives the data described to be certified of described second device broadcasts by described communication connection.
4. method according to claim 1 and 2, it is characterised in that described first equipment is received by described communication connection
The data to be certified of described second device transmission, comprising:
Described first equipment sends certification request by described communication connection to described second equipment;
Described first equipment receives described second equipment by described communication connection and responds the described to be certified of described certification request transmission
Data.
5. the method according to any one of Claims 1-4, it is characterised in that described digital certificate information include following it
One: use signature private key to be digitally signed the signing messages obtaining to data to be signed;Utilize symmetric key to information to be encrypted
It is encrypted the encryption information obtaining;Dynamic password.
6. the method according to any one of claim 1 to 5, it is characterised in that described first equipment is by described biological limb
Body sets up communication connection with described first equipment, comprising:
Described first Equipment Inspection sets to described biological limbs in preset range for the distance away from described second equipment with described first
Standby contact, sets up communication connection by described biological limbs and described second equipment.
7. an identification authentication system, is positioned at the first equipment, it is characterised in that described device includes:
Set up module, for setting up communication connection by described biological limbs and described second equipment;
Receiver module, for being received the data to be certified of described second device transmission by described communication connection, wherein, described is treated
Authentication data includes: digital certificate information and identity;
Acquisition module, for, within the duration setting up communication connection by described biological limbs and described second equipment, gathering
The biological information of described biological limbs;
Perform module, for performing the flow process being authenticated described data to be certified and described biological information, obtain certification
Result.
8. device according to claim 7, it is characterised in that
Described biological information includes: finger print information and/or venous information;
Described acquisition module gathers the biological information of described biological limbs in the following manner: by described biological limbs with
Described second equipment was set up in the duration of communication connection, and in the case that described biological limbs contact with described first equipment,
Gather the described biological information of described biological limbs and the contact site of described first equipment.
9. the device according to claim 7 or 8, it is characterised in that described receiver module receives described in the following manner
The data to be certified of the second device transmission:
Received the data described to be certified of described second device broadcasts by described communication connection.
10. the device according to claim 7 or 8, it is characterised in that described receiver module receives institute in the following manner
State the data to be certified of the second device transmission:
Send certification request by described communication connection to described second equipment;
Receive described second equipment by described communication connection and respond the data described to be certified that described certification request sends.
11. devices according to any one of claim 7 to 10, it is characterised in that described set up module in the following manner
Set up communication connection with described first equipment: the described biological limbs detecting in the default communication range of described second equipment with
Described first equipment contact.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610127230.3A CN105991653A (en) | 2016-03-07 | 2016-03-07 | Identity authentication method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610127230.3A CN105991653A (en) | 2016-03-07 | 2016-03-07 | Identity authentication method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105991653A true CN105991653A (en) | 2016-10-05 |
Family
ID=57044263
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610127230.3A Pending CN105991653A (en) | 2016-03-07 | 2016-03-07 | Identity authentication method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105991653A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017152819A1 (en) * | 2016-03-07 | 2017-09-14 | 李明 | Authorization authentication method, device and system |
WO2017152815A1 (en) * | 2016-03-07 | 2017-09-14 | 李明 | Identity authentication method and system |
CN111901353A (en) * | 2019-07-18 | 2020-11-06 | 创新先进技术有限公司 | Identity recognition preprocessing method, identity recognition method, and equipment and system thereof |
CN112464198A (en) * | 2019-07-18 | 2021-03-09 | 创新先进技术有限公司 | Identity recognition preprocessing and identity recognition method and system |
CN112837459A (en) * | 2019-11-22 | 2021-05-25 | Oppo广东移动通信有限公司 | Entrance guard unlocking method and related equipment |
US11451539B2 (en) * | 2019-07-18 | 2022-09-20 | Advanced New Technologies Co., Ltd. | Identity identification and preprocessing |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101213559A (en) * | 2005-08-05 | 2008-07-02 | 夏普株式会社 | Communication device and communication system |
CN102576264A (en) * | 2009-08-18 | 2012-07-11 | 罗姆股份有限公司 | Input/output device, mobile device, and information displaying device |
CN102855567A (en) * | 2011-06-29 | 2013-01-02 | 现代自动车株式会社 | Payment system and method using human body communication |
US20140051946A1 (en) * | 2008-12-15 | 2014-02-20 | Proteus Digital Health, Inc. | Re-wearable wireless device |
CN104821026A (en) * | 2015-04-30 | 2015-08-05 | 华南理工大学 | Intelligent security hotel entrance guard system based on touch-type erasable wrist-ring key |
CN204796894U (en) * | 2015-06-19 | 2015-11-25 | 曹淼 | Intelligent bracelet |
CN105320450A (en) * | 2014-06-05 | 2016-02-10 | Lg电子株式会社 | Mobile terminal and controlling method thereof |
CN106415427A (en) * | 2014-05-09 | 2017-02-15 | 索尼公司 | Wearable wireless electronic devices and methods of providing communications via wearable wireless electronic devices |
-
2016
- 2016-03-07 CN CN201610127230.3A patent/CN105991653A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101213559A (en) * | 2005-08-05 | 2008-07-02 | 夏普株式会社 | Communication device and communication system |
US20140051946A1 (en) * | 2008-12-15 | 2014-02-20 | Proteus Digital Health, Inc. | Re-wearable wireless device |
CN102576264A (en) * | 2009-08-18 | 2012-07-11 | 罗姆股份有限公司 | Input/output device, mobile device, and information displaying device |
CN102855567A (en) * | 2011-06-29 | 2013-01-02 | 现代自动车株式会社 | Payment system and method using human body communication |
CN106415427A (en) * | 2014-05-09 | 2017-02-15 | 索尼公司 | Wearable wireless electronic devices and methods of providing communications via wearable wireless electronic devices |
CN105320450A (en) * | 2014-06-05 | 2016-02-10 | Lg电子株式会社 | Mobile terminal and controlling method thereof |
CN104821026A (en) * | 2015-04-30 | 2015-08-05 | 华南理工大学 | Intelligent security hotel entrance guard system based on touch-type erasable wrist-ring key |
CN204796894U (en) * | 2015-06-19 | 2015-11-25 | 曹淼 | Intelligent bracelet |
Non-Patent Citations (1)
Title |
---|
罗森林: "《信息系统安全与对抗技术》", 31 August 2005 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017152819A1 (en) * | 2016-03-07 | 2017-09-14 | 李明 | Authorization authentication method, device and system |
WO2017152815A1 (en) * | 2016-03-07 | 2017-09-14 | 李明 | Identity authentication method and system |
US10785218B2 (en) | 2016-03-07 | 2020-09-22 | Tendyron Corporation | Authorization authentication method, device and system |
CN111901353A (en) * | 2019-07-18 | 2020-11-06 | 创新先进技术有限公司 | Identity recognition preprocessing method, identity recognition method, and equipment and system thereof |
CN112464198A (en) * | 2019-07-18 | 2021-03-09 | 创新先进技术有限公司 | Identity recognition preprocessing and identity recognition method and system |
US11451539B2 (en) * | 2019-07-18 | 2022-09-20 | Advanced New Technologies Co., Ltd. | Identity identification and preprocessing |
CN112837459A (en) * | 2019-11-22 | 2021-05-25 | Oppo广东移动通信有限公司 | Entrance guard unlocking method and related equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105938526A (en) | Identity authentication method and system | |
CN105991653A (en) | Identity authentication method and device | |
CN105989495A (en) | Payment method and system | |
CN105991652A (en) | Identity authentication method and system | |
CN105939336A (en) | Identity authentication method and system | |
CN205050141U (en) | Electronic equipment | |
AU2017324615A1 (en) | System and method for supplying security information | |
CN104050402A (en) | Mobile terminal security certification method and system and mobile terminal | |
US9391987B2 (en) | Biometric personal authentication | |
CN105956844A (en) | Payment method and system | |
CN105991654A (en) | Authorization authentication method, device and system | |
JPH11252069A (en) | Mutual authentication device between information devices | |
CN105989497A (en) | Payment method and system | |
US10785218B2 (en) | Authorization authentication method, device and system | |
CN105989488A (en) | Payment method and system | |
CN105939195A (en) | Transaction method and system | |
KR101810945B1 (en) | Wearable device and certification system using it | |
CN107026735A (en) | Method and managed devices that a kind of password is automatically entered | |
CN105989498A (en) | Payment method and system | |
CN105989496A (en) | Trading method and equipment | |
CN105939520A (en) | Method, device and system for establishing communication connection | |
CN107545431A (en) | Transaction authorisation method and system and method for commerce and system | |
CN107026817A (en) | The system that a kind of password is automatically entered | |
CN107026732A (en) | A kind of system that Password Input number of times is reduced by wearable device | |
KR20160006646A (en) | Method for Authenticating Non-Faced Transaction by using Near Field Communication Card for Generating One Time Password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161005 |