CN109359601A - Authentication recognition methods, electronic device and computer readable storage medium - Google Patents
Authentication recognition methods, electronic device and computer readable storage medium Download PDFInfo
- Publication number
- CN109359601A CN109359601A CN201811221432.XA CN201811221432A CN109359601A CN 109359601 A CN109359601 A CN 109359601A CN 201811221432 A CN201811221432 A CN 201811221432A CN 109359601 A CN109359601 A CN 109359601A
- Authority
- CN
- China
- Prior art keywords
- biological characteristic
- identity information
- user
- target user
- ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000010200 validation analysis Methods 0.000 claims description 17
- 230000004044 response Effects 0.000 claims description 12
- 239000011800 void material Substances 0.000 claims 1
- 230000000694 effects Effects 0.000 abstract description 6
- 230000001737 promoting effect Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 7
- 238000013475 authorization Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000001815 facial effect Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000009825 accumulation Methods 0.000 description 2
- 238000012850 discrimination method Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 230000001755 vocal effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/18—Eye characteristics, e.g. of the iris
- G06V40/197—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/50—Maintenance of biometric data or enrolment thereof
- G06V40/53—Measures to keep reference information secret, e.g. cancellable biometrics
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Ophthalmology & Optometry (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of authentication recognition methods, electronic device and computer readable storage mediums, wherein, this method comprises: the biological characteristic recorded on the biological characteristic of acquisition and block chain is matched, it determines to be associated with the biological characteristic recorded on matched chain with the biological characteristic of the acquisition, wherein, the biological characteristic recorded on the block chain is added by the nodes sharing in the block chain;Obtain the corresponding virtual identity mark of the biological characteristic recorded on matched chain and ciphertext identity information;By the ciphertext identity information, user side is pushed to based on virtual identity mark;User is received to the authorized order of ciphertext identity information, to complete the authentication identification to the target user.It solves the user controllable property of existing user biological characteristic information during existing identity identifying and authenticating and the technical problem that versatility is not strong through the above scheme, reaches the technical effect for effectively promoting biological characteristic versatility and security reliability.
Description
Technical field
The present invention relates to block chain technical fields, and in particular to a kind of authentication recognition methods, electronic device and calculating
Machine readable storage medium storing program for executing.
Background technique
Currently, the application scenarios of bio-identification in daily life are increasingly extensive.Bio-identification is referred to by individual
The biological characteristics such as fingerprint, face, vocal print, iris are acquired and identify, are then based on different comparison retrieval methods and carry out body
Part verifying (proving that you are you), identification (proving that who are you), identity extract (identifying that who is you).
Currently there are many channel and mode to obtain user biological identification feature, however, the bio-identification of each company is special
Sign data acquisition is not shared, this results in each company to promote the accuracy rate and recognition capability of bio-identification, in addition into
The training of row algorithm optimization is outer, with greater need for the biological attribute data of extensive accumulation user, this will result in Data duplication accumulation without
It can effectively be multiplexed.Secondly, user is using bio-identification when being serviced, default user true identity and biological attribute data by
Commercial company's acquisition is retained, and user has no control to own biological characteristic.
In view of the above-mentioned problems, currently no effective solution has been proposed.
Summary of the invention
The purpose of the present invention is to provide a kind of authentication recognition methods, electronic device and computer-readable storage mediums
Matter, and then solve the user controllable property of existing user biological characteristic information and the technical problem that versatility is not strong.
The present invention is to solve above-mentioned technical problem by following technical proposals:
According to an aspect of the invention, there is provided a kind of authentication recognition methods, includes the following steps:
It is requested in response to identity validation, obtains the biological characteristic of target user;
The biological characteristic recorded on the biological characteristic of acquisition and block chain is matched, determines the life with the acquisition
The biological characteristic recorded on the matched chain of object feature association, wherein the biological characteristic recorded on the block chain is added described
Nodes sharing in block chain;
Obtain the corresponding virtual identity mark of the biological characteristic recorded on matched chain and ciphertext identity information;
By the ciphertext identity information, user side is pushed to based on virtual identity mark;
User is received to the authorized order of ciphertext identity information, to complete the authentication identification to the target user.
In one embodiment, the biological characteristic recorded on the biological characteristic of acquisition and block chain is matched, really
It makes and is associated with the biological characteristic recorded on matched chain with the biological characteristic of the acquisition, comprising:
Certification demand end matches the biological characteristic recorded on the biological characteristic of acquisition and block chain, determines and institute
The biological characteristic for stating acquisition is associated with the biological characteristic recorded on matched chain, wherein certification demand end is the block chain
In node.
In one embodiment, the biological characteristic of target user includes at least one of: the fingerprint of target user is special
Sign, the iris feature of target user, target user facial five features.
In one embodiment, the above method further include:
Receive the typing request of target user's typing biological characteristic;
It is requested in response to the typing, the virtual identity mark based on block chain is created for the target user, wherein institute
Virtual identity mark is stated for target user described in unique identification;
The true identity information of the target user is obtained, and the true identity information is carried out by asymmetric encryption
Data encryption;
Encrypted data save into chain, corresponding to the virtual identity mark as target user described on chain
Ciphertext identity information;
The biological characteristic for obtaining target user's typing identifies the biological characteristic and described with the virtual identity
Ciphertext identity information is associated, and forms the biological characteristic set for corresponding to the target user.
In one embodiment, in the case where identity validation request is authentication, user is received to ciphertext
After the authorized order of identity information, the method also includes:
The ciphertext identity information is compared;
In the case where comparing successful situation, determine that authentication passes through;
The messaging that authentication is passed through is to system, to complete authentication;
In the case where comparing failure, determine that authentication fails;
Authentication failure news is sent to system, to show not completing authentication.
In one embodiment, in the case where identity validation request is identification, user is received to ciphertext
After the authorized order of identity information, the method also includes:
The cipher-text information is compared;
In the case where comparing successful situation, the ciphertext identity information is decrypted by the user key of target user,
Obtain the true identity information of the target user;
The true identity information is sent to system, to complete identification.
On the other hand, a kind of electronic device, including memory and processor are provided, the memory can quilt for storing
The authentication identifying system that the processor executes, the authentication identifying system include:
Acquisition module acquires the biological characteristic of target user for requesting in response to identity validation;
Matching module is determined for matching the biological characteristic recorded on the biological characteristic of acquisition and block chain
The biological characteristic recorded on matched chain is associated with the biological characteristic of the acquisition;
First obtains module, for obtaining the corresponding virtual identity mark of biological characteristic and ciphertext that record on matched chain
Identity information;
Pushing module, for pushing to user side based on virtual identity mark for the ciphertext identity information;
First receiving module, for receiving user to the authorized order of ciphertext identity information, to complete to use the target
The authentication at family identifies.
In one embodiment, the biological characteristic of target user includes at least one of: the fingerprint of target user is special
Sign, the iris feature of target user, target user facial five features.
In one embodiment, above-mentioned electronic device further include:
Second receiving module, the typing for receiving target user's typing biological characteristic are requested;
Creation module creates the virtual body based on block chain for requesting in response to the typing for the target user
Part mark, wherein the virtual identity mark is for target user described in unique identification;
Second obtains module, for obtaining the true identity information of the target user, and to the true identity information
Data encryption is carried out by asymmetric encryption;
Preserving module, for encrypted data save into chain, the virtual body as target user described on chain
The corresponding ciphertext identity information of part mark;
Relating module, for obtaining the biological characteristic of target user's typing, by the biological characteristic and described virtual
Identity and the ciphertext identity information are associated, and form the biological characteristic set for corresponding to the target user.
In one embodiment, above-mentioned electronic equipment further include:
Contrast module, for receiving user to ciphertext identity in the case where identity validation request is identification
After the authorized order of information, the cipher-text information is compared;
Deciphering module is used in the case where comparing successful situation, by the user key of target user to the ciphertext identity
Information is decrypted, and obtains the true identity information of the target user;
Delivery module, for the true identity information to be sent to system, to complete identification.
Another aspect additionally provides a kind of computer equipment, comprising: memory and processor, wherein the processor is used
In the step of executing the above method.
Another aspect additionally provides a kind of non-volatile computer readable storage medium storing program for executing, is stored thereon with computer instruction,
Described instruction is performed the step of realizing the above method.
The positive effect of the present invention is that: the biological characteristic of user is carried out to save into chain in block chain, thus
It, can be based in block catenary system such that regardless of being which system or application or merchant request carry out authentication identification
Biological characteristic carry out verifying identification, so as to avoid each party in request from carrying out the typing of biological characteristic, and user to from
The controllability of body biological characteristic also effectively improves.Solves institute during existing identity identifying and authenticating through the above scheme
The not strong technical problem of the user controllable property and versatility of existing user biological characteristic information reaches and effectively promotes biological characteristic
The technical effect of versatility and security reliability.
Detailed description of the invention
Fig. 1 is the method flow diagram of authentication recognition methods according to an embodiment of the present invention;
Fig. 2 is the structural block diagram of authentication identifying system according to an embodiment of the present invention;
Fig. 3 is the structural block diagram of authentication identifying system according to an embodiment of the present invention;
Fig. 4 is a kind of optional hardware structure schematic diagram of electronic device according to an embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work
Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
In view of that can realize a kind of life of user's autonomous control by combining block chain technology and bio-identification scene
Object identifying system, based on the delegatable biological attribute data access of user, is realized with protecting the safety of user biological characteristic
The effect of authentication and identification.Further, which can provide open access capability, because without respectively adopting
Collection safeguards duplicate biological attribute data.
For this purpose, providing a kind of authentication recognition methods, electronic equipment in this example, this method and electronics are set below
It is as follows for being specifically described:
Embodiment one
Authentication recognition methods provided by the invention is illustrated with reference to the accompanying drawing.
Fig. 1 is a kind of optional flow diagram of authentication recognition methods of the present invention, as shown in Figure 1, this method can
With the following steps are included:
Step 101: being requested in response to identity validation, obtain the biological characteristic of target user;
That is, system can be by preceding when user carries out feature identification using the system by integrating the headend equipment of sdk
It is corresponding to find the biological characteristic for carrying out algorithmic match with the biological characteristic recorded on chain for acquisition user biological feature in end
Identity and ciphertext identity information.
Step 102: the biological characteristic recorded on the biological characteristic of acquisition and block chain is matched, determine with it is described
The biological characteristic of acquisition is associated with the biological characteristic recorded on matched chain, wherein the biological characteristic recorded on the block chain adds
Enter by the nodes sharing in the block chain;
For example, the biological characteristic of collected user is fingerprint characteristic, then can be by the fingerprint characteristic and block chain
On multiple fingerprint characteristics compare, to determine fingerprint characteristic identical with collected fingerprint characteristic.It is collected
It can be the iris feature of user, then the iris feature can be compared with the iris feature on block chain, with true
Make fingerprint characteristic identical with the iris feature of acquisition.The collected face's five features for being also possible to user, then just
The five features and the five features on block chain can be compared, it is identical with collected five features to determine
Five features.It should be noted, however, that above-mentioned cited biometric matches are only a kind of exemplary descriptions.It is realizing
When, it can also be using other biological characteristics, it is only necessary to by the biological characteristic in collected biological characteristic and block chain
It carries out comparing the matching that identity can be realized one by one.
Further, the biological characteristic recorded on block chain can be and is shared by the node in block chain, example
As there is ten nodes for needing to be provided authentication services in block catenary system, then this is that a node can share block
Biological information in chain, these biological characteristics only need collected primary, so that it may are total to by multiple nodes or party in request
It enjoys.
Step 103: obtaining the corresponding virtual identity mark of the biological characteristic recorded on matched chain and ciphertext identity information;
Step 104: by the ciphertext identity information, user side being pushed to based on virtual identity mark;
Step 105: receiving user to the authorized order of ciphertext identity information, to complete to test the identity of the target user
Card identification.
Because increasing the operation of user's authorization, for ciphertext identity information so as to which user ID data is effectively ensured
Safety.
User information in above-mentioned block chain can be typing in the following way:
S1: the typing request of target user's typing biological characteristic is received;
S2: requesting in response to the typing, creates the virtual identity mark based on block chain for the target user,
In, the virtual identity mark is for target user described in unique identification;
S3: the true identity information of the target user is obtained, and asymmetric encryption is passed through to the true identity information
Carry out data encryption;
Because the biological characteristic set has concealed user real identification, just as people in public can be seen appearance or
Sound is heard, but identity information does not expose directly, so as to farthest protect privacy of user.
S4: encrypted data save into chain, and the virtual identity mark institute as target user described on chain is right
The ciphertext identity information answered;
S5: obtaining the biological characteristic of target user's typing, the biological characteristic and the virtual identity are identified and
The ciphertext identity information is associated, and forms the biological characteristic set for corresponding to the target user.
When actually realizing, the request of above-mentioned identity validation, which can be identification request and be also possible to authentication, is asked
It asks, for both requests, can be handled respectively according to the following two kinds mode:
1) it in the case where identity validation request is authentication, receives user and the authorization of ciphertext identity information is referred to
After order, the ciphertext identity information can be compared;In the case where comparing successful situation, determine that authentication passes through;It will
The messaging that authentication passes through is to system, to complete authentication;In the case where comparing failure, determine that authentication is lost
It loses;Authentication failure news is sent to system, to show not completing authentication.
2) it in the case where identity validation request is identification, receives user and the authorization of ciphertext identity information is referred to
After order, the cipher-text information can be compared;In the case where comparing successful situation, pass through the user key pair of target user
The ciphertext identity information is decrypted, and obtains the true identity information of the target user;The true identity information is passed
It send to system, to complete identification.
The above method is illustrated below with reference to a specific embodiment, it is important to note, however, that the specific implementation
Example is not constituted an undue limitation on the present application in order to which the application is better described.
In this example, by realizing a kind of life of user's autonomous control for block chain technology and the combination of bio-identification scene
Object identifying system, based on the delegatable biological attribute data access of user, is realized with protecting the safety of user biological characteristic
The effect of authentication and identification.Further, which can provide open access capability, because without respectively adopting
Collection safeguards duplicate biological attribute data.
A kind of biological recognition system based on block chain is provided in this example, which may include: that block chain biology is special
Levy the APP in library and front end sdk and user hand generator terminal, in which:
1) block chain biological characteristic library, the biological attribute data being encrypted for storing user;
2) sdk, which can integrate, directly interacts with user in needs such as mobile phone, tablet computer, desktop ends to acquire biological spy
Sign carries out the headend equipment of verifying identification;
3) collecting biological feature information and secondary verifying of the APP for realizing user.
Based on the system, a kind of biometric discrimination method based on block chain is proposed, the personalization that user biological is identified
Data carry out encryption cochain, carry out data encryption by Cryptography Principles.It is only authorized by user, personal data could be made
With improving user data secret protection.In block chain network, data can not be distorted, and can not export data in batches, and data are equal
There is cryptography protection, to improve the safety of privacy of user data, while avoiding the risk of centralized management.
The biometric discrimination method may include steps of:
S1: user's first passage APP typing biological information creates the virtual identity mark based on block chain, wherein
The identity can be a string of meaningless random characters, to hide true user identity in the biological recognition system
Information.
Further, system can provide a group key for the user, and private key is saved by user terminal APP, passes through the private key
Secret protection can be carried out to the user information acquired in follow-up system.
S2: when system acquires user real identification information by APP, identity information is by asymmetric encryption mode in user
End carries out data encryption, and encrypted data are submitted and are saved into chain, as the ciphertext identity information under identity on chain.
S3: collected biological attribute data is associated with by system with identity and ciphertext identity information, forms block chain
The upper biological characteristic set for a user.
Because the biological characteristic set has concealed user real identification, just as people in public can be seen appearance or
Sound is heard, but identity information does not expose directly, so as to farthest protect privacy of user.
S4: when user carries out feature identification using the system by integrating the headend equipment of sdk, system is adopted by front end
The biological characteristic that records carries out algorithmic match in collection user biological feature and chain, find the corresponding identity of the biological characteristic and
Ciphertext identity information.
S5: the ciphertext identity information matched is pushed to the APP of corresponding mobile terminal by system according to User Identity, with
Wait user's authorization.
S6: user hand generator terminal APP pop-up authorization requests notice, identification demand may is that authentication, or, identification:
When selecting authentication (proving that you are you), APP user side compare ciphertext identity information, and return comparison at
Function/failure information completes authentication process itself to system at this time.
When selecting identification (proving that who are you), APP uses use after user side completes the comparison of ciphertext identity information
The decryption of family key pair ciphertext identity information, and system is submitted to, identification procedure is completed at this time.
Specifically, user can decide whether according to the specifically used demand of different identification scenes during realization
Real information after identification is submitted into related side, for system, the true identity of record user is not believed for itself
Breath.
In upper example, the biometric feature of user is written in block chain, so that for different users
Do not need repeat the biometric feature of user is acquired, and biometric feature using user be can be with autonomous control
, thus repeated acquisition and the uncontrollable technology of user in the presence of solving existing biometric feature use process
Problem has reached the technical effect for being simple and efficient and being stored and being used to biometric feature.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.
Embodiment two
The authentication recognition methods provided in one based on the above embodiment provides a kind of authentication in the present embodiment and knows
Other system, specifically, Fig. 2 and Fig. 3 show the optional structural block diagram of the authentication identifying system, authentication identifications
System is divided into one or more program modules, one or more program module is stored in storage medium, and by one
Performed by a or multiple processors, to complete the present invention.The so-called program module of the present invention refers to complete specific function
Series of computation machine program instruction section is more suitable for describing execution of the authentication identifying system in storage medium than program itself
Process, the function of each program module of the present embodiment will specifically be introduced by being described below:
As shown in Fig. 2, authentication identifying system 20 includes:
First obtains module 201, for requesting in response to identity validation, obtains the biological characteristic of target user;
Matching module 202 is determined for matching the biological characteristic recorded on the biological characteristic of acquisition and block chain
The biological characteristic recorded on matched chain is associated with the biological characteristic of the acquisition out, wherein the life recorded on the block chain
Object feature is added by the nodes sharing in the block chain;
Second obtains module 203, for obtain the corresponding virtual identity mark of the biological characteristic that is recorded on matched chain and
Ciphertext identity information;
Pushing module 204, for pushing to user side based on virtual identity mark for the ciphertext identity information;
First receiving module 205, for receiving user to the authorized order of ciphertext identity information, to complete to the target
The authentication of user identifies.
In one embodiment, the biological characteristic of target user can include but is not limited at least one of: target
The fingerprint characteristic of user, the iris feature of target user, target user facial five features.
In one embodiment, above-mentioned authentication identifying system is as shown in figure 3, can also include: the second reception mould
Block 301, the typing for receiving target user's typing biological characteristic are requested;Creation module 302, for being asked in response to the typing
It asks, the virtual identity mark based on block chain is created for the target user, wherein the virtual identity mark is for uniquely marking
Know the target user;Third obtains module 303, for obtaining the true identity information of the target user, and to described true
Real identity information carries out data encryption by asymmetric encryption;Preserving module 304, for protect into chain by encrypted data
It deposits, the ciphertext identity information corresponding as the virtual identity mark of target user described on chain;Management module 305, for obtaining
The biological characteristic and the virtual identity are identified and the ciphertext identity are believed by the biological characteristic for taking target user's typing
Breath is associated, and forms the biological characteristic set for corresponding to the target user.
In one embodiment, in the case where identity validation request is authentication, user is received to ciphertext
After the authorized order of identity information, above-mentioned authentication identifying system can also compare ciphertext identity information;Right
Than determining that authentication passes through in successful situation;The messaging that authentication is passed through is tested to system with completing identity
Card;In the case where comparing failure, determine that authentication fails;Authentication failure news is sent to system, to show
Authentication is not completed.
In one embodiment, in the case where identity validation request is identification, user is received to ciphertext
After the authorized order of identity information, above-mentioned authentication identifying system can also compare the cipher-text information;Right
Than being decrypted by the user key of target user to the ciphertext identity information, obtaining the target in successful situation
The true identity information of user;The true identity information is sent to system, to complete identification.
About the device in above-described embodiment, wherein each unit, module execute the concrete mode of operation related
It is described in detail in the embodiment of this method, no detailed explanation will be given here.
In each embodiment of the present embodiment, the biological characteristic of user is carried out to save into chain in block chain, from
And such that regardless of being which system or application or merchant request carry out authentication identification, block catenary system can be based on
In biological characteristic carry out verifying identification, so as to avoid each party in request from carrying out the typing of biological characteristic, and user couple
The controllability of own biological feature also effectively improves.During solving existing identity identifying and authenticating through the above scheme
The not strong technical problem of the user controllable property and versatility of existing user biological characteristic information reaches and effectively promotes biology spy
Levy the technical effect of versatility and security reliability.
Embodiment three
A kind of electronic device is provided in the preferred embodiment of the invention three.Fig. 4 is that electronic device one is real according to the present invention
Apply the hardware structure schematic diagram of example.In the present embodiment, electronic device 2 is that one kind can be according to the finger for being previously set or storing
It enables, the automatic equipment for carrying out numerical value calculating and/or information processing.For example, it may be smart phone, tablet computer, notebook are electric
Brain, desktop computer, rack-mount server, blade server, tower server or Cabinet-type server (including independent clothes
Server cluster composed by business device or multiple servers) etc..As shown, electronic device 2 includes, but is not limited to:
Connection memory 21, processor 22, network interface 23 and authentication identifying system can be in communication with each other by system bus
20.Wherein:
Memory 21 includes at least a type of computer readable storage medium, and readable storage medium storing program for executing includes flash memory, hard
Disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access
Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), may be programmed read-only storage at read-only memory (ROM)
Device (PROM), magnetic storage, disk, CD etc..In some embodiments, memory 21 can be the inside of electronic device 2
Memory module, such as the hard disk or memory of the electronic device 2.In further embodiments, memory 21 is also possible to electronics dress
Set the plug-in type hard disk being equipped on 2 External memory equipment, such as the electronic device 2, intelligent memory card (Smart Media
Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Certainly, memory 21 is gone back
Can both including electronic device 2 storage inside module and also including its External memory equipment.In the present embodiment, memory 21 is usual
For storing the operating system and types of applications software that are installed on electronic device 2, such as the program of authentication identifying system 20
Code etc..In addition, memory 21 can be also used for temporarily storing the Various types of data that has exported or will export.
Processor 22 can be in some embodiments central processing unit (Central Processing Unit, CPU),
Controller, microcontroller, microprocessor or other data processing chips.The processor 22 is commonly used in control electronic device 2
Overall operation, such as execute control relevant to the progress data interaction of electronic device 2 or communication and processing etc..The present embodiment
In, program code or processing data of the processor 22 for storing in run memory 21, such as the authentication of operation are known
Other system 20 etc..
Network interface 23 may include radio network interface or wired network interface, which is commonly used in electronics
Communication connection is established between device 2 and other electronic devices.For example, network interface 23 be used for by network by electronic device 2 with
Exterior terminal is connected, and establishes data transmission channel and communication connection etc. between electronic device 2 and exterior terminal.Network can be with
It is intranet (Intranet), internet (Internet), global system for mobile communications (Global System of
Mobile communication, GSM), wideband code division multiple access (Wideband Code Division Multiple
Access, WCDMA), 4G network, 5G network, bluetooth (Bluetooth), the wirelessly or non-wirelessly network such as Wi-Fi.
It should be pointed out that Fig. 4 illustrates only the electronic device with component 21-23, it should be understood that simultaneously should not
Realistic to apply all components shown, the implementation that can be substituted is more or less component.
In the present embodiment, the authentication identifying system 20 being stored in memory 21 can also be divided into one or
The multiple program modules of person, one or more program module are stored in memory 21, and by one or more processors (this
Embodiment is processor 22) it is performed, to complete the present invention.
Example IV
The present embodiment also provides a kind of computer readable storage medium, is stored with identity in computer readable storage medium and tests
Identifying system is demonstrate,proved, authentication identifying system can be performed by least one processor, so that at least one processor executes such as
The step of authentication recognition methods of embodiment one.
In the present embodiment, computer readable storage medium include flash memory, hard disk, multimedia card, card-type memory (for example,
SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory (ROM),
Electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD
Deng.In some embodiments, computer readable storage medium can be the internal storage unit of computer equipment, such as the calculating
The hard disk or memory of machine equipment.In further embodiments, computer readable storage medium is also possible to the outer of computer equipment
The plug-in type hard disk being equipped in portion's storage equipment, such as the computer equipment, intelligent memory card (Smart Media Card,
SMC), secure digital (Secure Digital, SD) blocks, flash card (Flash Card) etc..Certainly, computer-readable storage medium
Matter can also both including computer equipment internal storage unit and also including its External memory equipment.In the present embodiment, computer
Readable storage medium storing program for executing is installed on the operating system and types of applications software of computer equipment, such as embodiment two commonly used in storage
Client ensure analysis system program code etc..In addition, computer readable storage medium can be also used for temporarily storing
Various types of data through exporting or will export.
Obviously, those skilled in the art should be understood that each module of the above-mentioned embodiment of the present invention or each step can be with
It is realized with general computing device, they can be concentrated on a single computing device, or be distributed in multiple computing devices
On composed network, optionally, they can be realized with the program code that computing device can perform, it is thus possible to by it
Store and be performed by computing device in the storage device, and in some cases, can be held with the sequence for being different from herein
The shown or described step of row, perhaps they are fabricated to each integrated circuit modules or will be multiple in them
Module or step are fabricated to single integrated circuit module to realize.In this way, the embodiment of the present invention be not limited to it is any specific hard
Part and software combine.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of authentication recognition methods, which comprises the steps of:
It is requested in response to identity validation, obtains the biological characteristic of target user;
The biological characteristic recorded on the biological characteristic of acquisition and block chain is matched, is determined special with the biology of the acquisition
Sign is associated with the biological characteristic recorded on matched chain, wherein the biological characteristic recorded on the block chain is added by the block
Nodes sharing in chain;
Obtain the corresponding virtual identity mark of the biological characteristic recorded on matched chain and ciphertext identity information;
By the ciphertext identity information, user side is pushed to based on virtual identity mark;
User is received to the authorized order of ciphertext identity information, to complete the authentication identification to the target user.
2. the method according to claim 1, wherein the biology that will be recorded on the biological characteristic of acquisition and block chain
Feature is matched, and determines to be associated with the biological characteristic recorded on matched chain with the biological characteristic of the acquisition, comprising:
Certification demand end matches the biological characteristic recorded on the biological characteristic of acquisition and block chain, determines to adopt with described
The biological characteristic of collection is associated with the biological characteristic recorded on matched chain, wherein certification demand end is in the block chain
Node.
3. the method according to claim 1, wherein further include:
Receive the typing request of target user's typing biological characteristic;
It is requested in response to the typing, the virtual identity mark based on block chain is created for the target user, wherein the void
Quasi- identity is for target user described in unique identification;
The true identity information of the target user is obtained, and data are carried out by asymmetric encryption to the true identity information
Encryption;
Encrypted data save into chain, the ciphertext corresponding as the virtual identity mark of target user described on chain
Identity information;
The biological characteristic for obtaining target user's typing, by the biological characteristic and the virtual identity identifies and the ciphertext
Identity information is associated, and forms the biological characteristic set for corresponding to the target user.
4. the method according to claim 1, wherein the case where identity validation request is authentication
Under, after receiving user to the authorized order of ciphertext identity information, the method also includes:
The ciphertext identity information is compared;
In the case where comparing successful situation, determine that authentication passes through;
The messaging that authentication is passed through is to system, to complete authentication;
In the case where comparing failure, determine that authentication fails;
Authentication failure news is sent to system, to show not completing authentication.
5. the method according to claim 1, wherein the case where identity validation request is identification
Under, after receiving user to the authorized order of ciphertext identity information, the method also includes:
The cipher-text information is compared;
In the case where comparing successful situation, the ciphertext identity information is decrypted by the user key of target user, is obtained
The true identity information of the target user;
The true identity information is sent to system, to complete identification.
6. a kind of electronic device, including memory and processor, which is characterized in that the memory can be by the place for storing
The authentication identifying system that device executes is managed, the authentication identifying system includes:
Acquisition module obtains the biological characteristic of target user for requesting in response to identity validation;
Matching module is determined and institute for matching the biological characteristic recorded on the biological characteristic of acquisition and block chain
The biological characteristic for stating acquisition is associated with the biological characteristic recorded on matched chain;
First obtains module, for obtaining the corresponding virtual identity mark of biological characteristic and ciphertext identity that record on matched chain
Information;
Pushing module, for pushing to user side based on virtual identity mark for the ciphertext identity information;
First receiving module, for receiving user to the authorized order of ciphertext identity information, to complete to the target user's
Authentication identification.
7. electronic device according to claim 6, which is characterized in that further include:
Second receiving module, the typing for receiving target user's typing biological characteristic are requested;
Creation module creates the virtual identity mark based on block chain for requesting in response to the typing for the target user
Know, wherein the virtual identity mark is for target user described in unique identification;
Second obtains module, passes through for obtaining the true identity information of the target user, and to the true identity information
Asymmetric encryption carries out data encryption;
Preserving module, for encrypted data save into chain, the virtual identity mark as target user described on chain
Know corresponding ciphertext identity information;
Relating module, for obtaining the biological characteristic of target user's typing, by the biological characteristic and the virtual identity
Mark and the ciphertext identity information are associated, and form the biological characteristic set for corresponding to the target user.
8. electronic device according to claim 6, which is characterized in that further include:
Contrast module, for receiving user to ciphertext identity information in the case where identity validation request is identification
Authorized order after, the cipher-text information is compared;
Deciphering module is used in the case where comparing successful situation, by the user key of target user to the ciphertext identity information
It is decrypted, obtains the true identity information of the target user;
Delivery module, for the true identity information to be sent to system, to complete identification.
9. a kind of computer equipment, comprising: memory and processor, wherein the processor requires 1 to 5 for perform claim
Any one of the method the step of.
10. a kind of non-volatile computer readable storage medium storing program for executing, is stored thereon with computer instruction, which is characterized in that the finger
Order is performed the step of realizing any one of claims 1 to 5 the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811221432.XA CN109359601A (en) | 2018-10-19 | 2018-10-19 | Authentication recognition methods, electronic device and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811221432.XA CN109359601A (en) | 2018-10-19 | 2018-10-19 | Authentication recognition methods, electronic device and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109359601A true CN109359601A (en) | 2019-02-19 |
Family
ID=65345861
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811221432.XA Pending CN109359601A (en) | 2018-10-19 | 2018-10-19 | Authentication recognition methods, electronic device and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109359601A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110110990A (en) * | 2019-04-30 | 2019-08-09 | 德稻全球创新网络(北京)有限公司 | A kind of mobile communication system of interfirm cooperation Project cooperation |
CN110298328A (en) * | 2019-07-03 | 2019-10-01 | 中国工商银行股份有限公司 | Test data forming method, test data form device, electronic equipment and medium |
CN110447023A (en) * | 2019-03-14 | 2019-11-12 | 阿里巴巴集团控股有限公司 | For obtain and on block chain record tracking information method and apparatus |
CN110753029A (en) * | 2019-09-16 | 2020-02-04 | 中国联合网络通信集团有限公司 | Identity verification method and biological identification platform |
RU196279U1 (en) * | 2019-08-01 | 2020-02-21 | Общество с ограниченной ответственностью "Научно-производственная компания "Техника дела" (ООО "НПК "Техника Дела") | BIOMETRIC USER IDENTIFICATION DEVICE |
CN111488800A (en) * | 2020-03-13 | 2020-08-04 | 北京迈格威科技有限公司 | Model training and image processing method and device, terminal and storage medium |
CN111506591A (en) * | 2020-04-13 | 2020-08-07 | 名商科技有限公司 | Block chain-based vehicle identity authentication method, device, computer and medium |
CN111859339A (en) * | 2020-07-13 | 2020-10-30 | 唐山师范学院 | Identity verification system based on computer network |
CN112052458A (en) * | 2020-07-28 | 2020-12-08 | 华控清交信息科技(北京)有限公司 | Information processing method, device, equipment and medium |
CN112926092A (en) * | 2021-03-30 | 2021-06-08 | 支付宝(杭州)信息技术有限公司 | Privacy-protecting identity information storage and identity authentication method and device |
CN112989300A (en) * | 2021-03-15 | 2021-06-18 | 京东数科海益信息科技有限公司 | Digital identity information processing method and device and electronic equipment |
CN113449568A (en) * | 2020-03-27 | 2021-09-28 | 富泰华工业(深圳)有限公司 | Identity authentication method, computer device and readable storage medium |
TWI777148B (en) * | 2020-03-27 | 2022-09-11 | 鴻海精密工業股份有限公司 | Identity verification method, computer device, and readable storage medium |
CN115051856A (en) * | 2022-06-16 | 2022-09-13 | 中国银行股份有限公司 | Block chain-based biological verification information input method, device and equipment |
US20230125083A1 (en) * | 2020-04-22 | 2023-04-27 | China Unionpay Co., Ltd. | Blockchain data access authorization method, apparatus, and device |
CN116644401A (en) * | 2023-07-21 | 2023-08-25 | 山东知临信息技术有限责任公司 | Identity verification method, device, equipment and medium based on blockchain technology |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
CN107025397A (en) * | 2016-01-29 | 2017-08-08 | 阿里巴巴集团控股有限公司 | The acquisition methods and device of identity information |
CN107566116A (en) * | 2017-06-15 | 2018-01-09 | 中国银联股份有限公司 | The method and device of registration is really weighed for digital asset |
CN107579817A (en) * | 2017-09-12 | 2018-01-12 | 广州广电运通金融电子股份有限公司 | User ID authentication method, apparatus and system based on block chain |
CN107688940A (en) * | 2017-05-10 | 2018-02-13 | 平安科技(深圳)有限公司 | Bio-identification transaction processing method and system |
US20180255055A1 (en) * | 2016-03-28 | 2018-09-06 | Black Gold Coin, Inc. | SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION |
CN108521418A (en) * | 2018-04-04 | 2018-09-11 | 广州广电运通金融电子股份有限公司 | A kind of identity identifying method and system merging block chain and living things feature recognition |
CN108650231A (en) * | 2018-04-04 | 2018-10-12 | 广州广电运通金融电子股份有限公司 | Physical characteristics collecting method and system based on block chain |
-
2018
- 2018-10-19 CN CN201811221432.XA patent/CN109359601A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
CN107025397A (en) * | 2016-01-29 | 2017-08-08 | 阿里巴巴集团控股有限公司 | The acquisition methods and device of identity information |
US20180255055A1 (en) * | 2016-03-28 | 2018-09-06 | Black Gold Coin, Inc. | SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION |
CN107688940A (en) * | 2017-05-10 | 2018-02-13 | 平安科技(深圳)有限公司 | Bio-identification transaction processing method and system |
CN107566116A (en) * | 2017-06-15 | 2018-01-09 | 中国银联股份有限公司 | The method and device of registration is really weighed for digital asset |
CN107579817A (en) * | 2017-09-12 | 2018-01-12 | 广州广电运通金融电子股份有限公司 | User ID authentication method, apparatus and system based on block chain |
CN108521418A (en) * | 2018-04-04 | 2018-09-11 | 广州广电运通金融电子股份有限公司 | A kind of identity identifying method and system merging block chain and living things feature recognition |
CN108650231A (en) * | 2018-04-04 | 2018-10-12 | 广州广电运通金融电子股份有限公司 | Physical characteristics collecting method and system based on block chain |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110447023B (en) * | 2019-03-14 | 2024-03-15 | 创新先进技术有限公司 | Method and apparatus for acquiring and recording tracking information on a blockchain |
CN110447023A (en) * | 2019-03-14 | 2019-11-12 | 阿里巴巴集团控股有限公司 | For obtain and on block chain record tracking information method and apparatus |
CN110110990A (en) * | 2019-04-30 | 2019-08-09 | 德稻全球创新网络(北京)有限公司 | A kind of mobile communication system of interfirm cooperation Project cooperation |
CN110298328A (en) * | 2019-07-03 | 2019-10-01 | 中国工商银行股份有限公司 | Test data forming method, test data form device, electronic equipment and medium |
CN110298328B (en) * | 2019-07-03 | 2021-08-20 | 中国工商银行股份有限公司 | Test data forming method, test data forming apparatus, electronic device, and medium |
RU196279U1 (en) * | 2019-08-01 | 2020-02-21 | Общество с ограниченной ответственностью "Научно-производственная компания "Техника дела" (ООО "НПК "Техника Дела") | BIOMETRIC USER IDENTIFICATION DEVICE |
CN110753029B (en) * | 2019-09-16 | 2021-09-14 | 中国联合网络通信集团有限公司 | Identity verification method and biological identification platform |
CN110753029A (en) * | 2019-09-16 | 2020-02-04 | 中国联合网络通信集团有限公司 | Identity verification method and biological identification platform |
CN111488800A (en) * | 2020-03-13 | 2020-08-04 | 北京迈格威科技有限公司 | Model training and image processing method and device, terminal and storage medium |
CN113449568A (en) * | 2020-03-27 | 2021-09-28 | 富泰华工业(深圳)有限公司 | Identity authentication method, computer device and readable storage medium |
TWI777148B (en) * | 2020-03-27 | 2022-09-11 | 鴻海精密工業股份有限公司 | Identity verification method, computer device, and readable storage medium |
CN111506591A (en) * | 2020-04-13 | 2020-08-07 | 名商科技有限公司 | Block chain-based vehicle identity authentication method, device, computer and medium |
US20230125083A1 (en) * | 2020-04-22 | 2023-04-27 | China Unionpay Co., Ltd. | Blockchain data access authorization method, apparatus, and device |
CN111859339A (en) * | 2020-07-13 | 2020-10-30 | 唐山师范学院 | Identity verification system based on computer network |
CN112052458A (en) * | 2020-07-28 | 2020-12-08 | 华控清交信息科技(北京)有限公司 | Information processing method, device, equipment and medium |
CN112052458B (en) * | 2020-07-28 | 2024-02-23 | 华控清交信息科技(北京)有限公司 | Information processing method, device, equipment and medium |
CN112989300A (en) * | 2021-03-15 | 2021-06-18 | 京东数科海益信息科技有限公司 | Digital identity information processing method and device and electronic equipment |
CN112926092A (en) * | 2021-03-30 | 2021-06-08 | 支付宝(杭州)信息技术有限公司 | Privacy-protecting identity information storage and identity authentication method and device |
CN112926092B (en) * | 2021-03-30 | 2024-07-02 | 支付宝(杭州)信息技术有限公司 | Privacy-protecting identity information storage and identity authentication method and device |
CN115051856A (en) * | 2022-06-16 | 2022-09-13 | 中国银行股份有限公司 | Block chain-based biological verification information input method, device and equipment |
CN116644401A (en) * | 2023-07-21 | 2023-08-25 | 山东知临信息技术有限责任公司 | Identity verification method, device, equipment and medium based on blockchain technology |
CN116644401B (en) * | 2023-07-21 | 2023-10-20 | 山东知临信息技术有限责任公司 | Identity verification method, device, equipment and medium based on blockchain technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109359601A (en) | Authentication recognition methods, electronic device and computer readable storage medium | |
CN109660501B (en) | System and method for providing blockchain based multi-factor personal identity verification | |
CN107079034B (en) | Identity authentication method, terminal equipment, authentication server and electronic equipment | |
CN103856472B (en) | A kind of method and device of Account Logon | |
CN110086608A (en) | User authen method, device, computer equipment and computer readable storage medium | |
CN111931144B (en) | Unified safe login authentication method and device for operating system and service application | |
WO2020015487A1 (en) | Identity verification method, login method, apparatuses, and computer device | |
CN111431719A (en) | Mobile terminal password protection module, mobile terminal and password protection method | |
CN107294900A (en) | Identity registration method and apparatus based on biological characteristic | |
CN105868970B (en) | authentication method and electronic equipment | |
CN109639723A (en) | A kind of micro services access method and server based on ERP system | |
CN109150547A (en) | A kind of system and method for the digital asset real name registration based on block chain | |
CN108462700A (en) | Background server, terminal device, safe early warning method and storage medium suitable for recognition of face | |
CN109379360A (en) | Auditing method, electronic device and computer readable storage medium | |
CN109815669A (en) | Authentication method and server based on recognition of face | |
US20230208637A1 (en) | Key management method and apparatus | |
CN105337739B (en) | Safe login method, device, server and terminal | |
CN108512660B (en) | Virtual card verification method | |
CN110266653A (en) | A kind of method for authenticating, system and terminal device | |
KR20220075723A (en) | Personal authentication method and system using decentralized identifiers | |
Vallent et al. | Three factor authentication protocol based on bilinear pairing | |
CN112948786B (en) | Identity verification method and device, electronic equipment and storage medium | |
CN117332396A (en) | Identity verification method, device, equipment and storage medium | |
CN115378710A (en) | Cross-region multi-party cooperative office identity authentication system based on block chain | |
CN113868625A (en) | Identity authentication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |