CN105991653A - Identity authentication method and device - Google Patents

Identity authentication method and device Download PDF

Info

Publication number
CN105991653A
CN105991653A CN201610127230.3A CN201610127230A CN105991653A CN 105991653 A CN105991653 A CN 105991653A CN 201610127230 A CN201610127230 A CN 201610127230A CN 105991653 A CN105991653 A CN 105991653A
Authority
CN
China
Prior art keywords
equipment
information
biological
communication connection
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610127230.3A
Other languages
Chinese (zh)
Inventor
李明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610127230.3A priority Critical patent/CN105991653A/en
Publication of CN105991653A publication Critical patent/CN105991653A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention discloses an identity authentication method and device. The method comprises the steps that first equipment establishes communication connection with second equipment through a biological limb after the biological limb enters the preset range of the first equipment; the first equipment receives data under authentication transmitted by the second equipment through communication connection, wherein the data under authentication include digital authentication information and identity identification; the first equipment acquires biological characteristic information of the biological limb in time duration when the biological limb enters the preset range of the first equipment; and the first equipment acquires an authentication result obtained through authentication of the data under authentication and the biological characteristic information.

Description

A kind of identity identifying method and device
Technical field
The present invention relates to a kind of electronic technology field, particularly relate to a kind of identity identifying method and device.
Background technology
E-Payment is compared and is paid in cash, have safely, quickly, the advantage such as reliable.POS is as a kind of payment terminal, quilt In applying to widely pay by mails.Existing POS has plenty of the holder's magnetic strip information being read bank card by card reader, POS operating personnel are inputted dealing money, holder's brush bank card in POS, then inputs password, POS again These information are uploaded to bank backstage, complete on-line transaction.As can be seen here, in existing E-Payment flow process, Yong Huxu Performing to operate twice, being put into bank card for the first time and be connected with POS foundation in POS, user needs input for the second time Password, operating process is complicated.
In addition, use electronic equipment to obtain some particular place (for example, Administrative Area, security areas etc.), individual personage user During the mandate of product (automobile, safety cabinet etc.), dangerous goods (such as firearms and ammunition etc.) etc., electronic equipment be arranged on these places, Electronic system in personal belongings or dangerous goods sets up communication connection, then the key of storage is sent to electronic system, electronics Key is authenticated by system.As can be seen here, this authorization of the prior art, other people can use others' electronics Equipment and then acquisition authorize, and then perform illegal operation, cause property, the information etc. of user to lose.
Content of the invention
Present invention seek to address that one of the problems referred to above.
A kind of identity identifying method of offer is provided.
Another object of the present invention is to provide a kind of identification authentication system.
For reaching above-mentioned purpose, technical scheme is specifically achieved in that
One aspect of the present invention provides a kind of identity identifying method, comprising: after biological limbs enter the preset range of the first equipment, First equipment sets up communication connection by biological limbs and the second equipment;First equipment receives the second device transmission by communication connection Data to be certified, wherein, data to be certified include: digital certificate information and identity;Enter first at biological limbs to set In the duration of standby preset range, the first equipment gathers the biological information of biological limbs;First equipment obtains to treat to be recognized Card data and biological information are authenticated the authentication result obtaining.
Alternatively, biological information includes: finger print information and/or venous information;First equipment gathers the biological special of biological limbs Reference breath includes: in the case of biological limbs and the contact of the first equipment, the contact site of the biological limbs of collection and the first equipment Biological information.
Alternatively, the first equipment is received the data to be certified of the second device transmission by communication connection, comprising: the first equipment passes through Communication connection receives the data to be certified of the second device broadcasts.
Alternatively, the first equipment is received the data to be certified of the second device transmission by communication connection, comprising: the first equipment passes through Communication connection sends certification request to the second equipment;First equipment receives the second equipment response certification request by communication connection and sends Data to be certified.
Alternatively, digital certificate information includes one below: uses signature private key to be digitally signed data to be signed and obtains Signing messages;Symmetric key is utilized to be encrypted the encryption information obtaining to information to be encrypted;Dynamic password.
Alternatively, the first equipment is set up with the first equipment by biological limbs and is communicated to connect, comprising: the first Equipment Inspection is to away from the Biological limbs in preset range for the distance of two equipment and the contact of the first equipment, set up with the second equipment by biological limbs and communicate Connect.
Another aspect of the present invention provides a kind of identification authentication system, is positioned at the first equipment, comprising: set up module, is used for passing through Biological limbs and the second equipment set up communication connection;Receiver module, for by communication connection receive the second device transmission wait recognize Card data, wherein, data to be certified include: digital certificate information and identity;Acquisition module, for by biological limb In the duration that body and the second equipment set up communication connection, gather the biological information of biological limbs;Perform module, be used for Perform the flow process treating authentication data and biological information is authenticated, obtain authentication result.
Alternatively, biological information includes: finger print information and/or venous information;Acquisition module gathers biology in the following manner The biological information of limbs: within the duration setting up communication connection by biological limbs and the second equipment, and biological limbs In the case of contact with the first equipment, the biological information of the contact site of the biological limbs of collection and the first equipment.
Alternatively, receiver module receives the data to be certified of the second device transmission in the following manner: by communication connection reception the The data to be certified of two device broadcasts.
Alternatively, receiver module receives the data to be certified of the second device transmission in the following manner: by communication connection to second Equipment sends certification request;Receive the data to be certified that the second equipment response certification request sends by communication connection.
Alternatively, set up module and set up communication connection in the following manner with the first equipment: detect presetting of the second equipment logical Biological limbs in the range of letter and the contact of the first equipment.
As seen from the above technical solution provided by the invention, in the identity identifying method that the present invention provides, enter at biological limbs After entering the preset range of the first equipment, the first equipment sets up communication connection by biological limbs and the second equipment, and passes through this communication Connect the data to be certified sending, and, within the duration of the preset range that biological limbs enter the first equipment, gather biology The biological information of limbs, treats authentication data and biological information is authenticated.The technical scheme being provided by the present invention, User has only to by biology limbs close to the first equipment once, and the first equipment can obtain the data to be certified that the second equipment sends, And the biological information of user, simplify the operation of user, improve Consumer's Experience.Further, the skill providing in the present invention In art scheme, the first equipment uses the biological information of user as authentication information simultaneously, though so that user's imprudence Losing the second equipment, other people also cannot use the electronic equipment access authentication of this user, so ensure that user property and The safety of information.
Brief description
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, the accompanying drawing of required use in embodiment being described below It is briefly described, it should be apparent that, the accompanying drawing in describing below is only some embodiments of the present invention, for this area From the point of view of those of ordinary skill, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
The flow chart of the identity identifying method that Fig. 1 provides for the embodiment of the present invention 1;
The structural representation of the identification authentication system that Fig. 2 provides for the embodiment of the present invention 2.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, Obviously, described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.Reality based on the present invention Execute example, the every other embodiment that those of ordinary skill in the art are obtained under the premise of not making creative work, broadly fall into Protection scope of the present invention.
In describing the invention, it is to be understood that term " " center ", " longitudinally ", " laterally ", " on ", D score, " front ", The orientation of the instruction such as " afterwards ", "left", "right", " vertically ", " level ", " top ", " end ", " interior ", " outward " or position relationship are base It in orientation shown in the drawings or position relationship, is for only for ease of the description present invention and simplifies description, rather than instruction or hint institute The device that refers to or element must have specific orientation, with specific azimuth configuration and operation, therefore it is not intended that to the present invention Restriction.Additionally, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint relative importance Or quantity or position.
In describing the invention, it should be noted that unless otherwise clearly defined and limited, term " install ", " being connected ", " connect " and should be interpreted broadly, for example, it may be fixing connect, it is also possible to be to removably connect, or be integrally connected;Permissible It is to be mechanically connected, it is also possible to be electrical connection;Can be to be joined directly together, it is also possible to be indirectly connected to by intermediary, can be two The connection of individual element internal.For the ordinary skill in the art, above-mentioned term can be understood in the present invention with concrete condition In concrete meaning.
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in further detail.
Embodiment 1
Present embodiments provide a kind of identity identifying method.
Fig. 1 is the flow chart of the identity identifying method that the present embodiment provides, as it is shown in figure 1, the method mainly includes the following steps that S102 is to step S108.
Step S102, after biological limbs enter the preset range of the first equipment, the first equipment is by biological limbs and the second equipment Set up communication connection.
In the present embodiment, biological limbs include but is not limited to human body.
In the present embodiment, the first equipment can be barcode scanning terminal, mobile terminal, PDA, the platform such as POS, Alipay application The terminals such as formula machine, notebook, gate inhibition, the second equipment for implanting in human body or can be worn on the device with human body, implant Device in human body for example can be the sensors such as the blood flow transducer in implantation human body, pulse transducer, body temperature trans, wears Being worn over the device with human body can be for example that bracelet, watch, necklace, ring, waistband etc. may be worn on the electronics with user Equipment.
In an optional embodiment of the embodiment of the present invention, the first equipment sets up communication link by biological limbs and the first equipment Connecing can be the first Equipment Inspection to biological limbs in preset range for the distance away from the second equipment and the contact of the first equipment, passes through This biology limbs and the second equipment set up communication connection.For example, detect that the finger of the human body wearing bracelet touches the first equipment, Thus set up communication connection by human body with bracelet.
In the present embodiment, the second equipment can dress on the health of user or insert user internal on, or be loaded in user In the clothing dressed or accessories, thus communicate to connect with the second equipment, for example, be worn in the wrist of user, or be contained in user Dress pocket in, when user need logging in network, open gate inhibition and payment etc. need the operation carrying out authentication when, User can be by the limbs (such as arm, face) of oneself close to the first equipment (i.e. checking equipment), when limbs set close to first During standby certain distance (for example, several millimeters), the first equipment sets up communication connection by limbs and second equipment of user.Due to Human body communication has certain scope, such as 3~5 meters, only enters in this preset range of the first equipment at human body, just can build Vertical human body communication connects.
As the optional embodiment of the one in the present embodiment, the first equipment sets up communication connection by biological limbs and the second equipment Can pass through wired mode and wireless mode, for example, the first equipment and the second equipment at least can be by one of following two modes Realize:
Wired mode:
First equipment and the second equipment are equipped with electrode, the first equipment with implant in human body or be worn on human body second When the biological limbs (human body) of equipment contact (finger is contacted POS by the user for example, wearing watch), human body is made For conductor, the electrode connection of both sides forms the path in human body, the communication connection of i.e. so-called wired mode.In this approach, First equipment needs the human contact with the second equipment of wearing.
Wireless mode:
In wireless mode, whether the electric field that the first equipment and the second equipment (such as POS and watch) all can detect surrounding is sent out Changing, if the other side enters human body communication permission, just can detect that field intensity changes, and sets up communication with the other side Connect.Specifically, as a example by the second equipment, the second equipment is worn or is built in human body, utilizes the transmitter of the second equipment Vibration allows human body produce electric field, and when the distance of the second equipment and the first equipment is in the range of human body communication allows, first sets Standby receiver detects the change of electric field, sets up communication connection with the second equipment.In this approach, the first equipment do not need with Wear the human contact of the second equipment.
Aforesaid way utilizes human body as the transmission medium of the signal of telecommunication, it is achieved body surface, internal and the setting of human peripheral (3~5 meters) Standby information is mutual.Compared with traditional bluetooth, WIFI, radio frequency and the wireless communication technology such as infrared, believe during human body communication Number through human body transmission, thus electromagnetic noise is very little on its impact, has low-power consumption, high security and the infringement of lower human body Etc. advantage.Additionally due to there is not the problem that many people communication efficiency rate reduces, it is possible to the line exempting wire communication mode redundancy is stranded Disturb.
Step S104, the first equipment receives the data to be certified of the second device transmission, wherein, data to be certified by communication connection Including: digital certificate information and identity.
In the present embodiment, digital certificate information can include at least one of: signing messages, encryption information and dynamic password.
It (can be the signature private key of the second equipment, it is also possible to be with the second equipment even that electronic signature information can utilize signature private key The private key of the safety means (for example, KEY) connecing) signing messages obtaining is digitally signed to data to be signed, to this When signing messages is authenticated, obtain and the corresponding public signature key of above-mentioned signature private key, utilize this public signature key to electronic signature letter Breath carries out sign test, if sign test is passed through, then certification is passed through.Wherein, data to be signed can be above-mentioned identity, it is possible to To be the random number of the second equipment or the safety means generation being connected with the second equipment, in this case, in data to be certified also The random number that the second equipment produces can be included, in addition, data to be signed can also be the random number that the first equipment produces, at this In the case of Zhong, the first equipment first can send a checking request to the second equipment after setting up communication connection with the second equipment, This request is carried first equipment produce random number, after the second equipment receives this random number, recycling signature private key to this with Machine number is signed, and obtains above-mentioned signing messages, uses random number as data to be signed, can pre-anti-replay-attack.At this In optional embodiment, digital certificate information is signing messages, so that may insure that the user of the second equipment when certification Identity.
The symmetric key that encryption information can be the second equipment utilization consults with the first equipment is treated computing with encrypted data and is obtained MAC value, when being authenticated this encryption information, treats computing with encrypted data also with this symmetric key and is verified MAC Value, compares cipher-text information and checking MAC value, if unanimously, then certification is passed through;Or, encryption information also can be second The ciphertext data that be-encrypted data is obtained by the symmetric key that equipment utilization is consulted with the first equipment, are recognizing to this encryption information During card, utilize this symmetric key to be decrypted ciphertext data, compare the information that obtains of deciphering whether consistent with be-encrypted data, If consistent, then certification is passed through.
Dynamic password can be the dynamic password generating based on seed key, when this dynamic password is authenticated, also with This seed key is calculated validation value, compares dynamic password and validation value, if unanimously, then certification is passed through, wherein, dynamically Password can be time-based, it is also possible to is based on event, can also be dynamic challenge code, and concrete the present embodiment is not construed as limiting.
In the present embodiment, can be by any of the above-described kind of certification realizing to digital certificate information, to ensure the conjunction of the second equipment Method.
In the above-described embodiment, the second equipment can calculate above-mentioned digital certificate information with oneself, it is also possible to another equipment (example As having the electronic equipment of signature function, encryption function or dynamic password function) interact to obtain above-mentioned data authentication Information, concrete the present embodiment is not construed as limiting.
In a kind of optional embodiment of the present embodiment, identity can be that the device identification of the second equipment, ID etc. can With unique information identifying user identity, the second user can be uniquely associated to for certification digital certificate information by identity The certification factor and biological characteristic validation information, in order to double authentication is carried out to digital certificate information and biological information, Thus, double authentication by after be assured that biological information and digital certificate information both are from same user, protect The legitimacy of card user.
In the optional embodiment of one of the present embodiment, the second equipment can be after communication connection be set up, actively to the first equipment Send above-mentioned data to be certified, for example, it is possible to arrange a switch on the second device, after user opens this switch, the Two equipment start broadcast them data to be certified, and after the first equipment and the second equipment set up communication connection, the first equipment receives the The data to be certified of two device broadcasts, or, whether the second equipment also can set up communication connection with the first equipment with active detecting, If it is, actively send above-mentioned data to be certified to the first equipment.Use this embodiment, can improve with simple flow Certification speed.
In another optional embodiment of the embodiment of the present invention, the second equipment also can be in the request receiving the first equipment After, send above-mentioned data to be certified.In this optional embodiment, the first equipment can set up communication connection with the second equipment Afterwards, send certification request to the second equipment, after the second equipment receives this certification request, respond this certification request, to second Equipment sends this data to be certified.For example, in payment process, Transaction Information can be carried in certification request by the first equipment It is sent to the second equipment, after the second equipment receives this certification request, respond this certification request, send to be certified to the first equipment Data, wherein, the second equipment can therefrom extract key message, and show this key message after receiving Transaction Information, After the user's confirmation is received, just request to be certified is sent to the first equipment, to ensure the safety of transaction.In addition, can at this Select in embodiment, certification request in can also carry first equipment determine information to be calculated, for example, random number etc., second This information to be calculated, after receiving this certification request, can be carried out signing, encrypts or generate dynamic password by equipment.
Step S106, within the duration of the preset range that biological limbs enter the first equipment, the first equipment gathers biological limbs Biological information.
Wherein, biological information includes at least one of: finger print information, iris information, face information and venous information. In the present embodiment, the first equipment with the biological limbs of the second equipment close contact close to when, gather the biology of this biology limbs Characteristic information, for example, user's finger touch POS touch parts the of short duration time in (such as 3 seconds), POS with The watch that user wears sets up communication connection by human body, and passes through this communication connection transmission of authentication information, and, in this touch In time, the touch parts of POS gather finger print information.Again for example, watch and Alipay payment terminal (this user Pay terminal and there is camera function, may be used for gathering face information) set up the period that human body communication connects, adopted by payment terminal Collection face information, thus, the first equipment obtains in the case of can performing one-off (i.e. limbs are close to the first equipment) with user Data to be certified and biological information, convenient to operation, improve Consumer's Experience.
In the present embodiment, as long as enter the duration interior collection biological information of the preset range of the first equipment at biological limbs , biological information can be before communication connection be set up, it is also possible to when communication connection is set up or gather afterwards, specifically The present embodiment is not construed as limiting.
In this step, especially, include at biological information: in the case of finger print information and/or venous information, need raw Thing limbs and the contact of the first equipment just can collect biological information, as the optional embodiment of one, gather biological limbs Biological information may include that biological limbs with the contact of the first equipment in the case of, gather biology limbs and the first equipment The biological information of contact site.For example, the fingerprint collecting portion of finger contact first equipment of user, or the wrist of user Contact the venous information collection portion of the first equipment.By this optional embodiment, owing to the limbs of user need to connect with the first equipment Tactile just can collect biological information, therefore, it can keep this certification to be that user permits, and then avoid owing to first sets Standby and the second equipment accidentally close to and the situation of triggering authentication flow process.
Step S108, the first equipment obtains treats authentication data and biological information is authenticated the authentication result that obtains.
In the present embodiment, the authentication result being authenticated digital certificate information and biological information can be according to certification mark Know the acquisition of information certification factor and biological characteristic validation information, and utilize the certification factor and biological characteristic validation information to digital authenticating The authentication result that information and biological information are authenticated.This certification factor and biological characteristic validation information are believed with certification mark Breath unique association, therefore can be with unique queries to this user corresponding certification factor and biological characteristic validation according to certification identification information Information, in order to after utilizing the double authentication of digital certificate information and biological information to pass through, it is ensured that the legitimacy of user.
In an optional embodiment of the embodiment of the present invention, the certification to digital certificate information and biological information can be Performing at the first equipment, the first equipment side preserves the corresponding relation of identity and the certification factor and biological characteristic validation information, First equipment obtains and this identity corresponding certification factor and biological characteristic validation information according to the identity receiving, profit With this certification factor and and biological characteristic validation information, respectively to the digital certificate information receiving and collect biological characteristic letter Breath is authenticated.For example, gate control system can preserve the identity of all users allowing access into and the certification of this user because of Son and biological characteristic validation information, having user to ask into fashionable, the identity according to this user, the digital authenticating receiving Information and the biological information collecting are authenticated.
In another optional embodiment of the embodiment of the present invention, the certification to digital certificate information and biological information is permissible Performing on backstage, data to be certified and biological information are sent to backstage by the first equipment, and identity is preserved on backstage With the corresponding relation of the certification factor and biological characteristic validation information, backstage obtains and this identity according to the identity receiving The corresponding certification factor and biological characteristic validation information, utilize this certification factor and and biological characteristic validation information, respectively to reception To digital certificate information and the biological information collecting be authenticated, authentication result is returned to the first equipment.
In this step, utilize mode and the concrete form according to digital certificate information of the certification of certification factor pair digital certificate information Related.For example, if digital certificate information (can be the private key of the second equipment, it is also possible to be and second for using signature private key The private key of the safety means (for example, KEY) that equipment connects) signing messages obtaining of signing is carried out to data to be signed, then recognize The card factor is the corresponding public signature key with signature private key, when certification digital certificate information, utilizes public signature key to data to be signed Calculating, obtaining sign test value, compare this sign test value and the signing messages receiving, if unanimously, then certification is passed through, Otherwise, certification is not passed through.If digital certificate information is to utilize symmetric key to be encrypted the encryption letter obtaining to information to be encrypted Breath, then the certification factor is symmetric key, when being authenticated digital certificate information, uses symmetric key to enter information to be encrypted Row encryption, the encrypted authentication information obtaining encryption compares with the encryption information receiving, if unanimously, then certification is passed through, Otherwise certification is not passed through;Or, it is also possible to utilize symmetric key to be decrypted the encryption information receiving, deciphering is obtained Cleartext information compares with information to be encrypted, if unanimously, then certification is passed through, and otherwise certification is not passed through;The certification factor includes Biological characteristic validation information and symmetric key.In the case that digital certificate information is dynamic password, the certification factor is for dynamically The seed key that password is verified, when being authenticated digital certificate information, uses seed key to generate dynamic password, will The dynamic password generating compares with the dynamic password receiving, if unanimously, then certification is passed through, and otherwise, certification is not passed through.
The identity identifying method being provided by the embodiment of the present invention, after biological limbs enter the preset range of the first equipment, first Equipment sets up communication connection, and the data to be certified being sent by this communication connection by biological limbs and the second equipment, and, Gather the biological information of biological limbs within the duration of the preset range that biological limbs enter the first equipment, to be certified Data and biological information are authenticated.The technical scheme being provided by the present invention, user has only to biology limbs close to Once, the first equipment can obtain the data to be certified that the second equipment sends, and the biological information of user, letter to one equipment Change the operation of user, improve Consumer's Experience.Further, in the technical scheme that the present invention provides, the first equipment uses simultaneously The biological information of user as authentication information, even if so that user imprudence by second equipment lose, other people also without Method uses the electronic equipment access authentication of this user, and then ensure that the property of user and the safety of information.
Embodiment two
Present embodiments providing a kind of identification authentication system, this device is positioned at the first equipment, may be used for realizing above-mentioned authentication Method.
The structural representation of the identification authentication system that Fig. 2 provides for the present embodiment, as in figure 2 it is shown, this identification authentication system is main Including: set up module 201, for setting up communication connection by biological limbs and the second equipment;Receiver module 202, is used for passing through Communication connection receives the data to be certified of the second device transmission, and wherein, data to be certified include: digital certificate information and identity mark Know;Acquisition module 203, for, within the duration setting up communication connection by biological limbs and the second equipment, gathering biology The biological information of limbs;Acquisition module 204, treats authentication data and stream that biological information is authenticated for obtaining Journey, obtains authentication result.
In the present embodiment, biological limbs include but is not limited to human body.
In the present embodiment, the first equipment can be barcode scanning terminal, mobile terminal, PDA, the platform such as POS, Alipay application The terminals such as formula machine, notebook, gate inhibition, the second equipment for implanting in human body or can be worn on the device with human body, implant Device in human body for example can be the sensors such as the blood flow transducer in implantation human body, pulse transducer, body temperature trans, wears Being worn over the device with human body can be for example that bracelet, watch, necklace, ring, waistband etc. may be worn on the electronics with user Equipment.
In an optional embodiment of the embodiment of the present invention, set up module 201 in such a way by biological limbs and the One equipment sets up communication connection: biological limbs in preset range for the distance away from the second equipment and the contact of the first equipment detected, Set up communication connection by this biology limbs and the second equipment.For example, detect that the finger of the human body wearing bracelet touches first Equipment, thus set up communication connection by human body with bracelet.
In the present embodiment, the second equipment can dress on the health of user or insert user internal on, or be loaded in user In the clothing dressed or accessories, thus communicate to connect with the second equipment, for example, be worn in the wrist of user, or be contained in user Dress pocket in, when user need logging in network, open gate inhibition and payment etc. need the operation carrying out authentication when, User can be by the limbs (such as arm, face) of oneself close to the first equipment (i.e. checking equipment), when limbs set close to first During standby certain distance (for example, several millimeters), set up the limbs by user for the module 201 and the second equipment sets up communication connection. Owing to human body communication has certain scope, such as 3~5 meters, only enter in this preset range of the first equipment at human body, Human body communication can be set up connect.
As the optional embodiment of the one in the present embodiment, set up module 201 and set up communication by biological limbs and the second equipment Connection can pass through wired mode and wireless mode, and for example, setting up module 201 at least can be real by one of following two mode Existing:
Wired mode:
First equipment and the second equipment are equipped with electrode, the first equipment with implant in human body or be worn on human body second When the biological limbs (human body) of equipment contact (finger is contacted POS by the user for example, wearing watch), human body is made For conductor, the electrode connection of both sides forms the path in human body, the communication connection of i.e. so-called wired mode.In this approach, First equipment needs the human contact with the second equipment of wearing.
Wireless mode:
In wireless mode, whether the electric field that the first equipment and the second equipment (such as POS and watch) all can detect surrounding is sent out Changing, if the other side enters human body communication permission, just can detect that field intensity changes, and sets up communication with the other side Connect.Specifically, as a example by the second equipment, the second equipment is worn or is built in human body, utilizes the transmitter of the second equipment Vibration allows human body produce electric field, and when the distance of the second equipment and the first equipment is in the range of human body communication allows, first sets Standby receiver detects the change of electric field, and module 201 is set up in instruction and the second equipment sets up communication connection.In this approach, First equipment does not needs and wears the human contact of the second equipment.
Aforesaid way utilizes human body as the transmission medium of the signal of telecommunication, it is achieved body surface, internal and the setting of human peripheral (3~5 meters) Standby information is mutual.Compared with traditional bluetooth, WIFI, radio frequency and the wireless communication technology such as infrared, believe during human body communication Number through human body transmission, thus electromagnetic noise is very little on its impact, has low-power consumption, high security and the infringement of lower human body Etc. advantage.Additionally due to there is not the problem that many people communication efficiency rate reduces, it is possible to the line exempting wire communication mode redundancy is stranded Disturb.
In the present embodiment, digital certificate information that receiver module 202 receives can include at least one of: signing messages, Encryption information and dynamic password.
It (can be the signature private key of the second equipment, it is also possible to be with the second equipment even that electronic signature information can utilize signature private key The private key of the safety means (for example, KEY) connecing) signing messages obtaining is digitally signed to data to be signed, to this When signing messages is authenticated, obtain and the corresponding public signature key of above-mentioned signature private key, utilize this public signature key to electronic signature letter Breath carries out sign test, if sign test is passed through, then certification is passed through.Wherein, data to be signed can be above-mentioned identity, it is possible to To be the random number of the second equipment or the safety means generation being connected with the second equipment, in this case, in data to be certified also The random number that the second equipment produces can be included, in addition, data to be signed can also be the random number that the first equipment produces, at this In the case of Zhong, the first equipment first can send a checking request to the second equipment after setting up communication connection with the second equipment, This request is carried first equipment produce random number, after the second equipment receives this random number, recycling signature private key to this with Machine number is signed, and obtains above-mentioned signing messages, uses random number as data to be signed, can pre-anti-replay-attack.At this In optional embodiment, digital certificate information is signing messages, so that may insure that the user of the second equipment when certification Identity.
The symmetric key that encryption information can be the second equipment utilization consults with the first equipment is treated computing with encrypted data and is obtained MAC value, when being authenticated this encryption information, treats computing with encrypted data also with this symmetric key and is verified MAC Value, compares cipher-text information and checking MAC value, if unanimously, then certification is passed through;Or, encryption information also can be second The ciphertext data that be-encrypted data is obtained by the symmetric key that equipment utilization is consulted with the first equipment, are recognizing to this encryption information During card, utilize this symmetric key to be decrypted ciphertext data, compare the information that obtains of deciphering whether consistent with be-encrypted data, If consistent, then certification is passed through.
Dynamic password can be the dynamic password generating based on seed key, when this dynamic password is authenticated, also with This seed key is calculated validation value, compares dynamic password and validation value, if unanimously, then certification is passed through, wherein, dynamically Password can be time-based, it is also possible to is based on event, can also be dynamic challenge code, and concrete the present embodiment is not construed as limiting.
In the present embodiment, can be by any of the above-described kind of certification realizing to digital certificate information, to ensure the conjunction of the second equipment Method.
In the above-described embodiment, the second equipment can calculate above-mentioned digital certificate information with oneself, it is also possible to another equipment (example As having the electronic equipment of signature function, encryption function or dynamic password function) interact to obtain above-mentioned data authentication Information, concrete the present embodiment is not construed as limiting.
In a kind of optional embodiment of the present embodiment, identity can be that the device identification of the second equipment, ID etc. can With unique information identifying user identity, the second user can be uniquely associated to for certification digital certificate information by identity The certification factor and biological characteristic validation information, in order to double authentication is carried out to digital certificate information and biological information, Thus, double authentication by after be assured that biological information and digital certificate information both are from same user, protect The legitimacy of card user.
In the optional embodiment of one of the present embodiment, the second equipment can be after communication connection be set up, actively to the first equipment Sending above-mentioned data to be certified, therefore, in this optional embodiment, receiver module 202 can receive in the following manner The data to be certified of the second device transmission: received the data to be certified of the second device broadcasts by communication connection.For example, it is possible to Arranging a switch on second equipment, after user opens this switch, the second equipment starts broadcast them data to be certified, is building After formwork erection block 201 and the second equipment set up communication connection, receiver module 202 receives the data to be certified of the second device broadcasts, or Person, whether the second equipment also can set up communication connection with the first equipment with active detecting, if it is, actively send out to the first equipment Serve and state data to be certified.Use this embodiment, certification speed can be improved with simple flow.
In another optional embodiment of the embodiment of the present invention, the second equipment also can be in the request receiving the first equipment After, send above-mentioned data to be certified.In this optional embodiment, receiver module 202 can receive second in the following manner The data to be certified of device transmission: send certification request to the second equipment by communication connection;Receive second by communication connection to set The data to be certified that standby response certification request sends.For example, the first equipment can with second equipment set up communication connection after, Send certification request to the second equipment, after the second equipment receives this certification request, respond this certification request, send out to the second equipment Give this data to be certified.For example, in payment process, Transaction Information can be carried and be sent in certification request by the first equipment Second equipment, after the second equipment receives this certification request, responds this certification request, sends data to be certified to the first equipment, Wherein, the second equipment can therefrom extract key message, and show this key message after receiving Transaction Information, is receiving After confirming to user, just send request to be certified to the first equipment, to ensure the safety of transaction.In addition, in this optional enforcement In mode, can also carry, in certification request, the information to be calculated that the first equipment determines, for example, random number etc., the second equipment exists After receiving this certification request, can carry out signing to this information to be calculated, encrypt or generate dynamic password.
In the present embodiment, the biological information that acquisition module 203 collects can include at least one of: finger print information, Iris information, face information and venous information.In the present embodiment, acquisition module 203 can with the second equipment close contact Biological limbs close to when, gather the biological information of this biology limbs, for example, touch the touch of POS at user's finger The of short duration time of parts is interior (such as 3 seconds), and the watch that POS and user wear sets up communication connection by human body, and by being somebody's turn to do Communication connection transmission of authentication information, and, within this touch time, the touch parts of POS gather finger print information.Again for example, Watch user is set up with Alipay payment terminal (this payment terminal has camera function, may be used for gathering face information) The period that human body communication connects, gathering face information by payment terminal, thus, identification authentication system can perform one user Data to be certified and biological information is obtained in the case of secondary action (i.e. limbs are close to the first equipment), convenient to operation, Improve Consumer's Experience.
In the present embodiment, as long as enter the duration interior collection biological information of the preset range of the first equipment at biological limbs , biological information can be before communication connection be set up, it is also possible to when communication connection is set up or gather afterwards, specifically The present embodiment is not construed as limiting.
In an optional embodiment of the embodiment of the present invention, biological information may include that finger print information and/or vein letter Breath;Then acquisition module 203 can gather the biological information of biological limbs in the following manner: by biological limbs and the Two equipment were set up in the duration of communication connection, and biological limbs with the contact of the first equipment in the case of, gather biological limbs and The biological information of the contact site of the first equipment.For example, the fingerprint collecting portion of finger contact first equipment of user, or use The venous information collection portion of wrist contact first equipment at family.By this optional embodiment, owing to the limbs of user need and the One equipment contact just can collect biological information, therefore, it can keep this certification to be that user permits, so avoid by In the first equipment and the second equipment accidentally close to and the situation of triggering authentication flow process.
In the present embodiment, the authentication result that acquisition module 204 obtains is to treat authentication data and biological information is authenticated Obtain.In the present embodiment, treat the digital certificate information in authentication data and authentication result that biological information is authenticated Can be to obtain the certification factor and biological characteristic validation information according to certification identification information, and utilize the certification factor and biological characteristic to test The authentication result that digital certificate information and biological information are authenticated by card information.This certification factor and biological characteristic validation Information and certification identification information unique association, therefore according to certification identification information can with unique queries to the corresponding certification of this user because of Son and biological characteristic validation information, in order to after utilizing the double authentication of digital certificate information and biological information to pass through, permissible Ensure the legitimacy of user.
In an optional embodiment of the embodiment of the present invention, the certification to digital certificate information and biological information can be Performing at identification authentication system, identification authentication system can preserve identity and the certification factor and biological characteristic validation information Corresponding relation, acquisition module 204 obtains and the corresponding certification of this identity according to the identity that receiver module 202 receives The factor and biological characteristic validation information, utilize this certification factor and and biological characteristic validation information, respectively receiver module 202 is connect The biological information that the digital certificate information receiving and acquisition module 203 collect is authenticated.For example, gate control system is permissible Preserve the identity of all users allowing access into and the certification factor of this user and biological characteristic validation information, have user Asking into fashionable, identity according to this user, the digital certificate information receiving and the biological information collecting are carried out Certification.
In another optional embodiment of the embodiment of the present invention, the certification to digital certificate information and biological information is permissible Performing on backstage, data to be certified and biological information are sent to backstage by acquisition module 204, and identity is preserved on backstage Mark and the corresponding relation of the certification factor and biological characteristic validation information, backstage obtains and this identity according to the identity receiving Identify the corresponding certification factor and biological characteristic validation information, utilize this certification factor and and biological characteristic validation information, right respectively The digital certificate information receiving and the biological information collecting are authenticated, and authentication result returns to acquisition module 204.
Concrete authentication mode to digital certificate information may refer to the description of embodiment one, does not repeats them here.
The identification authentication system being provided by the embodiment of the present invention, after biological limbs enter the preset range of the first equipment, sets up mould Block 201 is set up with the second equipment by biological limbs and is communicated to connect, receiver module 202 by this communication connection send to be certified Data, and, within the duration of the preset range that biological limbs enter the first equipment, acquisition module 203 gathers biological limbs Biological information, acquisition module 204 obtains treats the authentication result that is authenticated authentication data and biological information.Logical Crossing the technical scheme that the present invention provides, user has only to by biology limbs close to the first equipment once, and the first equipment can obtain the The data to be certified that two equipment send, and the biological information of user, simplify the operation of user, improve Consumer's Experience. Further, in the technical scheme that the present invention provides, the first equipment uses the biological information of user as authentication information simultaneously, So that even if the second equipment is lost by user's imprudence, other people also cannot use the electronic equipment access authentication of this user, And then ensure that the property of user and the safety of information.
Any process described otherwise above or method describe and are construed as in flow chart or at this, represent include one or More are for realizing module, fragment or the part of the code of the executable instruction of the step of specific logical function or process, and The scope of the preferred embodiment of the present invention includes other realization, wherein can not press order that is shown or that discuss, including root According to involved function while basic in the way of or in the opposite order, perform function, this should be by embodiments of the invention institute Belong to those skilled in the art to be understood.
It should be appreciated that each several part of the present invention can be realized by hardware, software, firmware or combinations thereof.In above-mentioned enforcement In mode, software that multiple steps or method can be performed in memory and by suitable instruction execution system by storage or firmware Realize.For example, if realized with hardware, and the same in another embodiment, can use following technology well known in the art In any one or their combination realize: have and patrol for the discrete of logic gates realizing logic function to data-signal Collect circuit, there is the special IC of suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate Array (FPGA) etc..
Those skilled in the art are appreciated that and realize that all or part of step that above-described embodiment method is carried is permissible Instructing related hardware by program to complete, described program can be stored in a kind of computer-readable recording medium, this journey Sequence upon execution, including one or a combination set of step of embodiment of the method.
Additionally, each functional unit in each embodiment of the present invention can be integrated in a processing module, it is also possible to be each Unit is individually physically present, it is also possible to two or more unit are integrated in a module.Above-mentioned integrated module is both permissible The form using hardware realizes, it would however also be possible to employ the form of software function module realizes.If described integrated module is with software work( Can the form of module realize and as independent production marketing or when using, it is also possible to be stored in the storage of embodied on computer readable and be situated between In matter.
Storage medium mentioned above can be read-only storage, disk or CD etc..
In the description of this specification, reference term " embodiment ", " some embodiments ", " example ", " specific example ", Or specific features, structure, material or the feature that the description of " some examples " etc. means to combine this embodiment or example describes comprises In at least one embodiment or example of the present invention.In this manual, the schematic representation of above-mentioned term is not necessarily referred to It is identical embodiment or example.And, the specific features of description, structure, material or feature can at any one or Multiple embodiments or example combine in an appropriate manner.
Although above it has been shown and described that embodiments of the invention, it is to be understood that above-described embodiment is exemplary, Being not considered as limiting the invention, those of ordinary skill in the art is in the case of without departing from the principle of the present invention and objective Above-described embodiment can be changed within the scope of the invention, change, replace and modification.The scope of the present invention is by appended power Profit requires and equivalent restriction.

Claims (11)

1. an identity identifying method, it is characterised in that include:
After biological limbs enter the preset range of the first equipment, described first equipment is built by described biological limbs and the second equipment Vertical communication connection;
Described first equipment receives the data to be certified of described second device transmission by described communication connection, and wherein, described waiting is recognized Card data include: digital certificate information and identity;
Within the duration of the preset range that described biological limbs enter the first equipment, described first equipment gathers described biological limb The biological information of body;
Described first equipment obtains the authentication result being authenticated obtaining to described data to be certified and described biological information.
2. method according to claim 1, it is characterised in that
Described biological information includes: finger print information and/or venous information;
The biological information that described first equipment gathers described biological limbs includes: at described biological limbs and described first equipment In the case of contact, gather the described biological information of described biological limbs and the contact site of described first equipment.
3. method according to claim 1 and 2, it is characterised in that described first equipment is received by described communication connection The data to be certified of described second device transmission, comprising:
Described first equipment receives the data described to be certified of described second device broadcasts by described communication connection.
4. method according to claim 1 and 2, it is characterised in that described first equipment is received by described communication connection The data to be certified of described second device transmission, comprising:
Described first equipment sends certification request by described communication connection to described second equipment;
Described first equipment receives described second equipment by described communication connection and responds the described to be certified of described certification request transmission Data.
5. the method according to any one of Claims 1-4, it is characterised in that described digital certificate information include following it One: use signature private key to be digitally signed the signing messages obtaining to data to be signed;Utilize symmetric key to information to be encrypted It is encrypted the encryption information obtaining;Dynamic password.
6. the method according to any one of claim 1 to 5, it is characterised in that described first equipment is by described biological limb Body sets up communication connection with described first equipment, comprising:
Described first Equipment Inspection sets to described biological limbs in preset range for the distance away from described second equipment with described first Standby contact, sets up communication connection by described biological limbs and described second equipment.
7. an identification authentication system, is positioned at the first equipment, it is characterised in that described device includes:
Set up module, for setting up communication connection by described biological limbs and described second equipment;
Receiver module, for being received the data to be certified of described second device transmission by described communication connection, wherein, described is treated Authentication data includes: digital certificate information and identity;
Acquisition module, for, within the duration setting up communication connection by described biological limbs and described second equipment, gathering The biological information of described biological limbs;
Perform module, for performing the flow process being authenticated described data to be certified and described biological information, obtain certification Result.
8. device according to claim 7, it is characterised in that
Described biological information includes: finger print information and/or venous information;
Described acquisition module gathers the biological information of described biological limbs in the following manner: by described biological limbs with Described second equipment was set up in the duration of communication connection, and in the case that described biological limbs contact with described first equipment, Gather the described biological information of described biological limbs and the contact site of described first equipment.
9. the device according to claim 7 or 8, it is characterised in that described receiver module receives described in the following manner The data to be certified of the second device transmission:
Received the data described to be certified of described second device broadcasts by described communication connection.
10. the device according to claim 7 or 8, it is characterised in that described receiver module receives institute in the following manner State the data to be certified of the second device transmission:
Send certification request by described communication connection to described second equipment;
Receive described second equipment by described communication connection and respond the data described to be certified that described certification request sends.
11. devices according to any one of claim 7 to 10, it is characterised in that described set up module in the following manner Set up communication connection with described first equipment: the described biological limbs detecting in the default communication range of described second equipment with Described first equipment contact.
CN201610127230.3A 2016-03-07 2016-03-07 Identity authentication method and device Pending CN105991653A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610127230.3A CN105991653A (en) 2016-03-07 2016-03-07 Identity authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610127230.3A CN105991653A (en) 2016-03-07 2016-03-07 Identity authentication method and device

Publications (1)

Publication Number Publication Date
CN105991653A true CN105991653A (en) 2016-10-05

Family

ID=57044263

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610127230.3A Pending CN105991653A (en) 2016-03-07 2016-03-07 Identity authentication method and device

Country Status (1)

Country Link
CN (1) CN105991653A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017152819A1 (en) * 2016-03-07 2017-09-14 李明 Authorization authentication method, device and system
WO2017152815A1 (en) * 2016-03-07 2017-09-14 李明 Identity authentication method and system
CN111901353A (en) * 2019-07-18 2020-11-06 创新先进技术有限公司 Identity recognition preprocessing method, identity recognition method, and equipment and system thereof
CN112464198A (en) * 2019-07-18 2021-03-09 创新先进技术有限公司 Identity recognition preprocessing and identity recognition method and system
CN112837459A (en) * 2019-11-22 2021-05-25 Oppo广东移动通信有限公司 Entrance guard unlocking method and related equipment
US11451539B2 (en) * 2019-07-18 2022-09-20 Advanced New Technologies Co., Ltd. Identity identification and preprocessing

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101213559A (en) * 2005-08-05 2008-07-02 夏普株式会社 Communication device and communication system
CN102576264A (en) * 2009-08-18 2012-07-11 罗姆股份有限公司 Input/output device, mobile device, and information displaying device
CN102855567A (en) * 2011-06-29 2013-01-02 现代自动车株式会社 Payment system and method using human body communication
US20140051946A1 (en) * 2008-12-15 2014-02-20 Proteus Digital Health, Inc. Re-wearable wireless device
CN104821026A (en) * 2015-04-30 2015-08-05 华南理工大学 Intelligent security hotel entrance guard system based on touch-type erasable wrist-ring key
CN204796894U (en) * 2015-06-19 2015-11-25 曹淼 Intelligent bracelet
CN105320450A (en) * 2014-06-05 2016-02-10 Lg电子株式会社 Mobile terminal and controlling method thereof
CN106415427A (en) * 2014-05-09 2017-02-15 索尼公司 Wearable wireless electronic devices and methods of providing communications via wearable wireless electronic devices

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101213559A (en) * 2005-08-05 2008-07-02 夏普株式会社 Communication device and communication system
US20140051946A1 (en) * 2008-12-15 2014-02-20 Proteus Digital Health, Inc. Re-wearable wireless device
CN102576264A (en) * 2009-08-18 2012-07-11 罗姆股份有限公司 Input/output device, mobile device, and information displaying device
CN102855567A (en) * 2011-06-29 2013-01-02 现代自动车株式会社 Payment system and method using human body communication
CN106415427A (en) * 2014-05-09 2017-02-15 索尼公司 Wearable wireless electronic devices and methods of providing communications via wearable wireless electronic devices
CN105320450A (en) * 2014-06-05 2016-02-10 Lg电子株式会社 Mobile terminal and controlling method thereof
CN104821026A (en) * 2015-04-30 2015-08-05 华南理工大学 Intelligent security hotel entrance guard system based on touch-type erasable wrist-ring key
CN204796894U (en) * 2015-06-19 2015-11-25 曹淼 Intelligent bracelet

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
罗森林: "《信息系统安全与对抗技术》", 31 August 2005 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017152819A1 (en) * 2016-03-07 2017-09-14 李明 Authorization authentication method, device and system
WO2017152815A1 (en) * 2016-03-07 2017-09-14 李明 Identity authentication method and system
US10785218B2 (en) 2016-03-07 2020-09-22 Tendyron Corporation Authorization authentication method, device and system
CN111901353A (en) * 2019-07-18 2020-11-06 创新先进技术有限公司 Identity recognition preprocessing method, identity recognition method, and equipment and system thereof
CN112464198A (en) * 2019-07-18 2021-03-09 创新先进技术有限公司 Identity recognition preprocessing and identity recognition method and system
US11451539B2 (en) * 2019-07-18 2022-09-20 Advanced New Technologies Co., Ltd. Identity identification and preprocessing
CN112837459A (en) * 2019-11-22 2021-05-25 Oppo广东移动通信有限公司 Entrance guard unlocking method and related equipment

Similar Documents

Publication Publication Date Title
CN105938526A (en) Identity authentication method and system
CN105991653A (en) Identity authentication method and device
CN105989495A (en) Payment method and system
CN105991652A (en) Identity authentication method and system
CN105939336A (en) Identity authentication method and system
CN205050141U (en) Electronic equipment
AU2017324615A1 (en) System and method for supplying security information
CN104050402A (en) Mobile terminal security certification method and system and mobile terminal
US9391987B2 (en) Biometric personal authentication
CN105956844A (en) Payment method and system
CN105991654A (en) Authorization authentication method, device and system
JPH11252069A (en) Mutual authentication device between information devices
CN105989497A (en) Payment method and system
US10785218B2 (en) Authorization authentication method, device and system
CN105989488A (en) Payment method and system
CN105939195A (en) Transaction method and system
KR101810945B1 (en) Wearable device and certification system using it
CN107026735A (en) Method and managed devices that a kind of password is automatically entered
CN105989498A (en) Payment method and system
CN105989496A (en) Trading method and equipment
CN105939520A (en) Method, device and system for establishing communication connection
CN107545431A (en) Transaction authorisation method and system and method for commerce and system
CN107026817A (en) The system that a kind of password is automatically entered
CN107026732A (en) A kind of system that Password Input number of times is reduced by wearable device
KR20160006646A (en) Method for Authenticating Non-Faced Transaction by using Near Field Communication Card for Generating One Time Password

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161005