CN109359601A - Authentication recognition methods, electronic device and computer readable storage medium - Google Patents

Authentication recognition methods, electronic device and computer readable storage medium Download PDF

Info

Publication number
CN109359601A
CN109359601A CN201811221432.XA CN201811221432A CN109359601A CN 109359601 A CN109359601 A CN 109359601A CN 201811221432 A CN201811221432 A CN 201811221432A CN 109359601 A CN109359601 A CN 109359601A
Authority
CN
China
Prior art keywords
biological characteristic
identity information
user
target user
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811221432.XA
Other languages
Chinese (zh)
Inventor
金龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811221432.XA priority Critical patent/CN109359601A/en
Publication of CN109359601A publication Critical patent/CN109359601A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris
    • G06V40/197Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/50Maintenance of biometric data or enrolment thereof
    • G06V40/53Measures to keep reference information secret, e.g. cancellable biometrics

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Ophthalmology & Optometry (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of authentication recognition methods, electronic device and computer readable storage mediums, wherein, this method comprises: the biological characteristic recorded on the biological characteristic of acquisition and block chain is matched, it determines to be associated with the biological characteristic recorded on matched chain with the biological characteristic of the acquisition, wherein, the biological characteristic recorded on the block chain is added by the nodes sharing in the block chain;Obtain the corresponding virtual identity mark of the biological characteristic recorded on matched chain and ciphertext identity information;By the ciphertext identity information, user side is pushed to based on virtual identity mark;User is received to the authorized order of ciphertext identity information, to complete the authentication identification to the target user.It solves the user controllable property of existing user biological characteristic information during existing identity identifying and authenticating and the technical problem that versatility is not strong through the above scheme, reaches the technical effect for effectively promoting biological characteristic versatility and security reliability.

Description

Authentication recognition methods, electronic device and computer readable storage medium
Technical field
The present invention relates to block chain technical fields, and in particular to a kind of authentication recognition methods, electronic device and calculating Machine readable storage medium storing program for executing.
Background technique
Currently, the application scenarios of bio-identification in daily life are increasingly extensive.Bio-identification is referred to by individual The biological characteristics such as fingerprint, face, vocal print, iris are acquired and identify, are then based on different comparison retrieval methods and carry out body Part verifying (proving that you are you), identification (proving that who are you), identity extract (identifying that who is you).
Currently there are many channel and mode to obtain user biological identification feature, however, the bio-identification of each company is special Sign data acquisition is not shared, this results in each company to promote the accuracy rate and recognition capability of bio-identification, in addition into The training of row algorithm optimization is outer, with greater need for the biological attribute data of extensive accumulation user, this will result in Data duplication accumulation without It can effectively be multiplexed.Secondly, user is using bio-identification when being serviced, default user true identity and biological attribute data by Commercial company's acquisition is retained, and user has no control to own biological characteristic.
In view of the above-mentioned problems, currently no effective solution has been proposed.
Summary of the invention
The purpose of the present invention is to provide a kind of authentication recognition methods, electronic device and computer-readable storage mediums Matter, and then solve the user controllable property of existing user biological characteristic information and the technical problem that versatility is not strong.
The present invention is to solve above-mentioned technical problem by following technical proposals:
According to an aspect of the invention, there is provided a kind of authentication recognition methods, includes the following steps:
It is requested in response to identity validation, obtains the biological characteristic of target user;
The biological characteristic recorded on the biological characteristic of acquisition and block chain is matched, determines the life with the acquisition The biological characteristic recorded on the matched chain of object feature association, wherein the biological characteristic recorded on the block chain is added described Nodes sharing in block chain;
Obtain the corresponding virtual identity mark of the biological characteristic recorded on matched chain and ciphertext identity information;
By the ciphertext identity information, user side is pushed to based on virtual identity mark;
User is received to the authorized order of ciphertext identity information, to complete the authentication identification to the target user.
In one embodiment, the biological characteristic recorded on the biological characteristic of acquisition and block chain is matched, really It makes and is associated with the biological characteristic recorded on matched chain with the biological characteristic of the acquisition, comprising:
Certification demand end matches the biological characteristic recorded on the biological characteristic of acquisition and block chain, determines and institute The biological characteristic for stating acquisition is associated with the biological characteristic recorded on matched chain, wherein certification demand end is the block chain In node.
In one embodiment, the biological characteristic of target user includes at least one of: the fingerprint of target user is special Sign, the iris feature of target user, target user facial five features.
In one embodiment, the above method further include:
Receive the typing request of target user's typing biological characteristic;
It is requested in response to the typing, the virtual identity mark based on block chain is created for the target user, wherein institute Virtual identity mark is stated for target user described in unique identification;
The true identity information of the target user is obtained, and the true identity information is carried out by asymmetric encryption Data encryption;
Encrypted data save into chain, corresponding to the virtual identity mark as target user described on chain Ciphertext identity information;
The biological characteristic for obtaining target user's typing identifies the biological characteristic and described with the virtual identity Ciphertext identity information is associated, and forms the biological characteristic set for corresponding to the target user.
In one embodiment, in the case where identity validation request is authentication, user is received to ciphertext After the authorized order of identity information, the method also includes:
The ciphertext identity information is compared;
In the case where comparing successful situation, determine that authentication passes through;
The messaging that authentication is passed through is to system, to complete authentication;
In the case where comparing failure, determine that authentication fails;
Authentication failure news is sent to system, to show not completing authentication.
In one embodiment, in the case where identity validation request is identification, user is received to ciphertext After the authorized order of identity information, the method also includes:
The cipher-text information is compared;
In the case where comparing successful situation, the ciphertext identity information is decrypted by the user key of target user, Obtain the true identity information of the target user;
The true identity information is sent to system, to complete identification.
On the other hand, a kind of electronic device, including memory and processor are provided, the memory can quilt for storing The authentication identifying system that the processor executes, the authentication identifying system include:
Acquisition module acquires the biological characteristic of target user for requesting in response to identity validation;
Matching module is determined for matching the biological characteristic recorded on the biological characteristic of acquisition and block chain The biological characteristic recorded on matched chain is associated with the biological characteristic of the acquisition;
First obtains module, for obtaining the corresponding virtual identity mark of biological characteristic and ciphertext that record on matched chain Identity information;
Pushing module, for pushing to user side based on virtual identity mark for the ciphertext identity information;
First receiving module, for receiving user to the authorized order of ciphertext identity information, to complete to use the target The authentication at family identifies.
In one embodiment, the biological characteristic of target user includes at least one of: the fingerprint of target user is special Sign, the iris feature of target user, target user facial five features.
In one embodiment, above-mentioned electronic device further include:
Second receiving module, the typing for receiving target user's typing biological characteristic are requested;
Creation module creates the virtual body based on block chain for requesting in response to the typing for the target user Part mark, wherein the virtual identity mark is for target user described in unique identification;
Second obtains module, for obtaining the true identity information of the target user, and to the true identity information Data encryption is carried out by asymmetric encryption;
Preserving module, for encrypted data save into chain, the virtual body as target user described on chain The corresponding ciphertext identity information of part mark;
Relating module, for obtaining the biological characteristic of target user's typing, by the biological characteristic and described virtual Identity and the ciphertext identity information are associated, and form the biological characteristic set for corresponding to the target user.
In one embodiment, above-mentioned electronic equipment further include:
Contrast module, for receiving user to ciphertext identity in the case where identity validation request is identification After the authorized order of information, the cipher-text information is compared;
Deciphering module is used in the case where comparing successful situation, by the user key of target user to the ciphertext identity Information is decrypted, and obtains the true identity information of the target user;
Delivery module, for the true identity information to be sent to system, to complete identification.
Another aspect additionally provides a kind of computer equipment, comprising: memory and processor, wherein the processor is used In the step of executing the above method.
Another aspect additionally provides a kind of non-volatile computer readable storage medium storing program for executing, is stored thereon with computer instruction, Described instruction is performed the step of realizing the above method.
The positive effect of the present invention is that: the biological characteristic of user is carried out to save into chain in block chain, thus It, can be based in block catenary system such that regardless of being which system or application or merchant request carry out authentication identification Biological characteristic carry out verifying identification, so as to avoid each party in request from carrying out the typing of biological characteristic, and user to from The controllability of body biological characteristic also effectively improves.Solves institute during existing identity identifying and authenticating through the above scheme The not strong technical problem of the user controllable property and versatility of existing user biological characteristic information reaches and effectively promotes biological characteristic The technical effect of versatility and security reliability.
Detailed description of the invention
Fig. 1 is the method flow diagram of authentication recognition methods according to an embodiment of the present invention;
Fig. 2 is the structural block diagram of authentication identifying system according to an embodiment of the present invention;
Fig. 3 is the structural block diagram of authentication identifying system according to an embodiment of the present invention;
Fig. 4 is a kind of optional hardware structure schematic diagram of electronic device according to an embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
In view of that can realize a kind of life of user's autonomous control by combining block chain technology and bio-identification scene Object identifying system, based on the delegatable biological attribute data access of user, is realized with protecting the safety of user biological characteristic The effect of authentication and identification.Further, which can provide open access capability, because without respectively adopting Collection safeguards duplicate biological attribute data.
For this purpose, providing a kind of authentication recognition methods, electronic equipment in this example, this method and electronics are set below It is as follows for being specifically described:
Embodiment one
Authentication recognition methods provided by the invention is illustrated with reference to the accompanying drawing.
Fig. 1 is a kind of optional flow diagram of authentication recognition methods of the present invention, as shown in Figure 1, this method can With the following steps are included:
Step 101: being requested in response to identity validation, obtain the biological characteristic of target user;
That is, system can be by preceding when user carries out feature identification using the system by integrating the headend equipment of sdk It is corresponding to find the biological characteristic for carrying out algorithmic match with the biological characteristic recorded on chain for acquisition user biological feature in end Identity and ciphertext identity information.
Step 102: the biological characteristic recorded on the biological characteristic of acquisition and block chain is matched, determine with it is described The biological characteristic of acquisition is associated with the biological characteristic recorded on matched chain, wherein the biological characteristic recorded on the block chain adds Enter by the nodes sharing in the block chain;
For example, the biological characteristic of collected user is fingerprint characteristic, then can be by the fingerprint characteristic and block chain On multiple fingerprint characteristics compare, to determine fingerprint characteristic identical with collected fingerprint characteristic.It is collected It can be the iris feature of user, then the iris feature can be compared with the iris feature on block chain, with true Make fingerprint characteristic identical with the iris feature of acquisition.The collected face's five features for being also possible to user, then just The five features and the five features on block chain can be compared, it is identical with collected five features to determine Five features.It should be noted, however, that above-mentioned cited biometric matches are only a kind of exemplary descriptions.It is realizing When, it can also be using other biological characteristics, it is only necessary to by the biological characteristic in collected biological characteristic and block chain It carries out comparing the matching that identity can be realized one by one.
Further, the biological characteristic recorded on block chain can be and is shared by the node in block chain, example As there is ten nodes for needing to be provided authentication services in block catenary system, then this is that a node can share block Biological information in chain, these biological characteristics only need collected primary, so that it may are total to by multiple nodes or party in request It enjoys.
Step 103: obtaining the corresponding virtual identity mark of the biological characteristic recorded on matched chain and ciphertext identity information;
Step 104: by the ciphertext identity information, user side being pushed to based on virtual identity mark;
Step 105: receiving user to the authorized order of ciphertext identity information, to complete to test the identity of the target user Card identification.
Because increasing the operation of user's authorization, for ciphertext identity information so as to which user ID data is effectively ensured Safety.
User information in above-mentioned block chain can be typing in the following way:
S1: the typing request of target user's typing biological characteristic is received;
S2: requesting in response to the typing, creates the virtual identity mark based on block chain for the target user, In, the virtual identity mark is for target user described in unique identification;
S3: the true identity information of the target user is obtained, and asymmetric encryption is passed through to the true identity information Carry out data encryption;
Because the biological characteristic set has concealed user real identification, just as people in public can be seen appearance or Sound is heard, but identity information does not expose directly, so as to farthest protect privacy of user.
S4: encrypted data save into chain, and the virtual identity mark institute as target user described on chain is right The ciphertext identity information answered;
S5: obtaining the biological characteristic of target user's typing, the biological characteristic and the virtual identity are identified and The ciphertext identity information is associated, and forms the biological characteristic set for corresponding to the target user.
When actually realizing, the request of above-mentioned identity validation, which can be identification request and be also possible to authentication, is asked It asks, for both requests, can be handled respectively according to the following two kinds mode:
1) it in the case where identity validation request is authentication, receives user and the authorization of ciphertext identity information is referred to After order, the ciphertext identity information can be compared;In the case where comparing successful situation, determine that authentication passes through;It will The messaging that authentication passes through is to system, to complete authentication;In the case where comparing failure, determine that authentication is lost It loses;Authentication failure news is sent to system, to show not completing authentication.
2) it in the case where identity validation request is identification, receives user and the authorization of ciphertext identity information is referred to After order, the cipher-text information can be compared;In the case where comparing successful situation, pass through the user key pair of target user The ciphertext identity information is decrypted, and obtains the true identity information of the target user;The true identity information is passed It send to system, to complete identification.
The above method is illustrated below with reference to a specific embodiment, it is important to note, however, that the specific implementation Example is not constituted an undue limitation on the present application in order to which the application is better described.
In this example, by realizing a kind of life of user's autonomous control for block chain technology and the combination of bio-identification scene Object identifying system, based on the delegatable biological attribute data access of user, is realized with protecting the safety of user biological characteristic The effect of authentication and identification.Further, which can provide open access capability, because without respectively adopting Collection safeguards duplicate biological attribute data.
A kind of biological recognition system based on block chain is provided in this example, which may include: that block chain biology is special Levy the APP in library and front end sdk and user hand generator terminal, in which:
1) block chain biological characteristic library, the biological attribute data being encrypted for storing user;
2) sdk, which can integrate, directly interacts with user in needs such as mobile phone, tablet computer, desktop ends to acquire biological spy Sign carries out the headend equipment of verifying identification;
3) collecting biological feature information and secondary verifying of the APP for realizing user.
Based on the system, a kind of biometric discrimination method based on block chain is proposed, the personalization that user biological is identified Data carry out encryption cochain, carry out data encryption by Cryptography Principles.It is only authorized by user, personal data could be made With improving user data secret protection.In block chain network, data can not be distorted, and can not export data in batches, and data are equal There is cryptography protection, to improve the safety of privacy of user data, while avoiding the risk of centralized management.
The biometric discrimination method may include steps of:
S1: user's first passage APP typing biological information creates the virtual identity mark based on block chain, wherein The identity can be a string of meaningless random characters, to hide true user identity in the biological recognition system Information.
Further, system can provide a group key for the user, and private key is saved by user terminal APP, passes through the private key Secret protection can be carried out to the user information acquired in follow-up system.
S2: when system acquires user real identification information by APP, identity information is by asymmetric encryption mode in user End carries out data encryption, and encrypted data are submitted and are saved into chain, as the ciphertext identity information under identity on chain.
S3: collected biological attribute data is associated with by system with identity and ciphertext identity information, forms block chain The upper biological characteristic set for a user.
Because the biological characteristic set has concealed user real identification, just as people in public can be seen appearance or Sound is heard, but identity information does not expose directly, so as to farthest protect privacy of user.
S4: when user carries out feature identification using the system by integrating the headend equipment of sdk, system is adopted by front end The biological characteristic that records carries out algorithmic match in collection user biological feature and chain, find the corresponding identity of the biological characteristic and Ciphertext identity information.
S5: the ciphertext identity information matched is pushed to the APP of corresponding mobile terminal by system according to User Identity, with Wait user's authorization.
S6: user hand generator terminal APP pop-up authorization requests notice, identification demand may is that authentication, or, identification:
When selecting authentication (proving that you are you), APP user side compare ciphertext identity information, and return comparison at Function/failure information completes authentication process itself to system at this time.
When selecting identification (proving that who are you), APP uses use after user side completes the comparison of ciphertext identity information The decryption of family key pair ciphertext identity information, and system is submitted to, identification procedure is completed at this time.
Specifically, user can decide whether according to the specifically used demand of different identification scenes during realization Real information after identification is submitted into related side, for system, the true identity of record user is not believed for itself Breath.
In upper example, the biometric feature of user is written in block chain, so that for different users Do not need repeat the biometric feature of user is acquired, and biometric feature using user be can be with autonomous control , thus repeated acquisition and the uncontrollable technology of user in the presence of solving existing biometric feature use process Problem has reached the technical effect for being simple and efficient and being stored and being used to biometric feature.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.
Embodiment two
The authentication recognition methods provided in one based on the above embodiment provides a kind of authentication in the present embodiment and knows Other system, specifically, Fig. 2 and Fig. 3 show the optional structural block diagram of the authentication identifying system, authentication identifications System is divided into one or more program modules, one or more program module is stored in storage medium, and by one Performed by a or multiple processors, to complete the present invention.The so-called program module of the present invention refers to complete specific function Series of computation machine program instruction section is more suitable for describing execution of the authentication identifying system in storage medium than program itself Process, the function of each program module of the present embodiment will specifically be introduced by being described below:
As shown in Fig. 2, authentication identifying system 20 includes:
First obtains module 201, for requesting in response to identity validation, obtains the biological characteristic of target user;
Matching module 202 is determined for matching the biological characteristic recorded on the biological characteristic of acquisition and block chain The biological characteristic recorded on matched chain is associated with the biological characteristic of the acquisition out, wherein the life recorded on the block chain Object feature is added by the nodes sharing in the block chain;
Second obtains module 203, for obtain the corresponding virtual identity mark of the biological characteristic that is recorded on matched chain and Ciphertext identity information;
Pushing module 204, for pushing to user side based on virtual identity mark for the ciphertext identity information;
First receiving module 205, for receiving user to the authorized order of ciphertext identity information, to complete to the target The authentication of user identifies.
In one embodiment, the biological characteristic of target user can include but is not limited at least one of: target The fingerprint characteristic of user, the iris feature of target user, target user facial five features.
In one embodiment, above-mentioned authentication identifying system is as shown in figure 3, can also include: the second reception mould Block 301, the typing for receiving target user's typing biological characteristic are requested;Creation module 302, for being asked in response to the typing It asks, the virtual identity mark based on block chain is created for the target user, wherein the virtual identity mark is for uniquely marking Know the target user;Third obtains module 303, for obtaining the true identity information of the target user, and to described true Real identity information carries out data encryption by asymmetric encryption;Preserving module 304, for protect into chain by encrypted data It deposits, the ciphertext identity information corresponding as the virtual identity mark of target user described on chain;Management module 305, for obtaining The biological characteristic and the virtual identity are identified and the ciphertext identity are believed by the biological characteristic for taking target user's typing Breath is associated, and forms the biological characteristic set for corresponding to the target user.
In one embodiment, in the case where identity validation request is authentication, user is received to ciphertext After the authorized order of identity information, above-mentioned authentication identifying system can also compare ciphertext identity information;Right Than determining that authentication passes through in successful situation;The messaging that authentication is passed through is tested to system with completing identity Card;In the case where comparing failure, determine that authentication fails;Authentication failure news is sent to system, to show Authentication is not completed.
In one embodiment, in the case where identity validation request is identification, user is received to ciphertext After the authorized order of identity information, above-mentioned authentication identifying system can also compare the cipher-text information;Right Than being decrypted by the user key of target user to the ciphertext identity information, obtaining the target in successful situation The true identity information of user;The true identity information is sent to system, to complete identification.
About the device in above-described embodiment, wherein each unit, module execute the concrete mode of operation related It is described in detail in the embodiment of this method, no detailed explanation will be given here.
In each embodiment of the present embodiment, the biological characteristic of user is carried out to save into chain in block chain, from And such that regardless of being which system or application or merchant request carry out authentication identification, block catenary system can be based on In biological characteristic carry out verifying identification, so as to avoid each party in request from carrying out the typing of biological characteristic, and user couple The controllability of own biological feature also effectively improves.During solving existing identity identifying and authenticating through the above scheme The not strong technical problem of the user controllable property and versatility of existing user biological characteristic information reaches and effectively promotes biology spy Levy the technical effect of versatility and security reliability.
Embodiment three
A kind of electronic device is provided in the preferred embodiment of the invention three.Fig. 4 is that electronic device one is real according to the present invention Apply the hardware structure schematic diagram of example.In the present embodiment, electronic device 2 is that one kind can be according to the finger for being previously set or storing It enables, the automatic equipment for carrying out numerical value calculating and/or information processing.For example, it may be smart phone, tablet computer, notebook are electric Brain, desktop computer, rack-mount server, blade server, tower server or Cabinet-type server (including independent clothes Server cluster composed by business device or multiple servers) etc..As shown, electronic device 2 includes, but is not limited to: Connection memory 21, processor 22, network interface 23 and authentication identifying system can be in communication with each other by system bus 20.Wherein:
Memory 21 includes at least a type of computer readable storage medium, and readable storage medium storing program for executing includes flash memory, hard Disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), may be programmed read-only storage at read-only memory (ROM) Device (PROM), magnetic storage, disk, CD etc..In some embodiments, memory 21 can be the inside of electronic device 2 Memory module, such as the hard disk or memory of the electronic device 2.In further embodiments, memory 21 is also possible to electronics dress Set the plug-in type hard disk being equipped on 2 External memory equipment, such as the electronic device 2, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Certainly, memory 21 is gone back Can both including electronic device 2 storage inside module and also including its External memory equipment.In the present embodiment, memory 21 is usual For storing the operating system and types of applications software that are installed on electronic device 2, such as the program of authentication identifying system 20 Code etc..In addition, memory 21 can be also used for temporarily storing the Various types of data that has exported or will export.
Processor 22 can be in some embodiments central processing unit (Central Processing Unit, CPU), Controller, microcontroller, microprocessor or other data processing chips.The processor 22 is commonly used in control electronic device 2 Overall operation, such as execute control relevant to the progress data interaction of electronic device 2 or communication and processing etc..The present embodiment In, program code or processing data of the processor 22 for storing in run memory 21, such as the authentication of operation are known Other system 20 etc..
Network interface 23 may include radio network interface or wired network interface, which is commonly used in electronics Communication connection is established between device 2 and other electronic devices.For example, network interface 23 be used for by network by electronic device 2 with Exterior terminal is connected, and establishes data transmission channel and communication connection etc. between electronic device 2 and exterior terminal.Network can be with It is intranet (Intranet), internet (Internet), global system for mobile communications (Global System of Mobile communication, GSM), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), 4G network, 5G network, bluetooth (Bluetooth), the wirelessly or non-wirelessly network such as Wi-Fi.
It should be pointed out that Fig. 4 illustrates only the electronic device with component 21-23, it should be understood that simultaneously should not Realistic to apply all components shown, the implementation that can be substituted is more or less component.
In the present embodiment, the authentication identifying system 20 being stored in memory 21 can also be divided into one or The multiple program modules of person, one or more program module are stored in memory 21, and by one or more processors (this Embodiment is processor 22) it is performed, to complete the present invention.
Example IV
The present embodiment also provides a kind of computer readable storage medium, is stored with identity in computer readable storage medium and tests Identifying system is demonstrate,proved, authentication identifying system can be performed by least one processor, so that at least one processor executes such as The step of authentication recognition methods of embodiment one.
In the present embodiment, computer readable storage medium include flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory (ROM), Electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD Deng.In some embodiments, computer readable storage medium can be the internal storage unit of computer equipment, such as the calculating The hard disk or memory of machine equipment.In further embodiments, computer readable storage medium is also possible to the outer of computer equipment The plug-in type hard disk being equipped in portion's storage equipment, such as the computer equipment, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) blocks, flash card (Flash Card) etc..Certainly, computer-readable storage medium Matter can also both including computer equipment internal storage unit and also including its External memory equipment.In the present embodiment, computer Readable storage medium storing program for executing is installed on the operating system and types of applications software of computer equipment, such as embodiment two commonly used in storage Client ensure analysis system program code etc..In addition, computer readable storage medium can be also used for temporarily storing Various types of data through exporting or will export.
Obviously, those skilled in the art should be understood that each module of the above-mentioned embodiment of the present invention or each step can be with It is realized with general computing device, they can be concentrated on a single computing device, or be distributed in multiple computing devices On composed network, optionally, they can be realized with the program code that computing device can perform, it is thus possible to by it Store and be performed by computing device in the storage device, and in some cases, can be held with the sequence for being different from herein The shown or described step of row, perhaps they are fabricated to each integrated circuit modules or will be multiple in them Module or step are fabricated to single integrated circuit module to realize.In this way, the embodiment of the present invention be not limited to it is any specific hard Part and software combine.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of authentication recognition methods, which comprises the steps of:
It is requested in response to identity validation, obtains the biological characteristic of target user;
The biological characteristic recorded on the biological characteristic of acquisition and block chain is matched, is determined special with the biology of the acquisition Sign is associated with the biological characteristic recorded on matched chain, wherein the biological characteristic recorded on the block chain is added by the block Nodes sharing in chain;
Obtain the corresponding virtual identity mark of the biological characteristic recorded on matched chain and ciphertext identity information;
By the ciphertext identity information, user side is pushed to based on virtual identity mark;
User is received to the authorized order of ciphertext identity information, to complete the authentication identification to the target user.
2. the method according to claim 1, wherein the biology that will be recorded on the biological characteristic of acquisition and block chain Feature is matched, and determines to be associated with the biological characteristic recorded on matched chain with the biological characteristic of the acquisition, comprising:
Certification demand end matches the biological characteristic recorded on the biological characteristic of acquisition and block chain, determines to adopt with described The biological characteristic of collection is associated with the biological characteristic recorded on matched chain, wherein certification demand end is in the block chain Node.
3. the method according to claim 1, wherein further include:
Receive the typing request of target user's typing biological characteristic;
It is requested in response to the typing, the virtual identity mark based on block chain is created for the target user, wherein the void Quasi- identity is for target user described in unique identification;
The true identity information of the target user is obtained, and data are carried out by asymmetric encryption to the true identity information Encryption;
Encrypted data save into chain, the ciphertext corresponding as the virtual identity mark of target user described on chain Identity information;
The biological characteristic for obtaining target user's typing, by the biological characteristic and the virtual identity identifies and the ciphertext Identity information is associated, and forms the biological characteristic set for corresponding to the target user.
4. the method according to claim 1, wherein the case where identity validation request is authentication Under, after receiving user to the authorized order of ciphertext identity information, the method also includes:
The ciphertext identity information is compared;
In the case where comparing successful situation, determine that authentication passes through;
The messaging that authentication is passed through is to system, to complete authentication;
In the case where comparing failure, determine that authentication fails;
Authentication failure news is sent to system, to show not completing authentication.
5. the method according to claim 1, wherein the case where identity validation request is identification Under, after receiving user to the authorized order of ciphertext identity information, the method also includes:
The cipher-text information is compared;
In the case where comparing successful situation, the ciphertext identity information is decrypted by the user key of target user, is obtained The true identity information of the target user;
The true identity information is sent to system, to complete identification.
6. a kind of electronic device, including memory and processor, which is characterized in that the memory can be by the place for storing The authentication identifying system that device executes is managed, the authentication identifying system includes:
Acquisition module obtains the biological characteristic of target user for requesting in response to identity validation;
Matching module is determined and institute for matching the biological characteristic recorded on the biological characteristic of acquisition and block chain The biological characteristic for stating acquisition is associated with the biological characteristic recorded on matched chain;
First obtains module, for obtaining the corresponding virtual identity mark of biological characteristic and ciphertext identity that record on matched chain Information;
Pushing module, for pushing to user side based on virtual identity mark for the ciphertext identity information;
First receiving module, for receiving user to the authorized order of ciphertext identity information, to complete to the target user's Authentication identification.
7. electronic device according to claim 6, which is characterized in that further include:
Second receiving module, the typing for receiving target user's typing biological characteristic are requested;
Creation module creates the virtual identity mark based on block chain for requesting in response to the typing for the target user Know, wherein the virtual identity mark is for target user described in unique identification;
Second obtains module, passes through for obtaining the true identity information of the target user, and to the true identity information Asymmetric encryption carries out data encryption;
Preserving module, for encrypted data save into chain, the virtual identity mark as target user described on chain Know corresponding ciphertext identity information;
Relating module, for obtaining the biological characteristic of target user's typing, by the biological characteristic and the virtual identity Mark and the ciphertext identity information are associated, and form the biological characteristic set for corresponding to the target user.
8. electronic device according to claim 6, which is characterized in that further include:
Contrast module, for receiving user to ciphertext identity information in the case where identity validation request is identification Authorized order after, the cipher-text information is compared;
Deciphering module is used in the case where comparing successful situation, by the user key of target user to the ciphertext identity information It is decrypted, obtains the true identity information of the target user;
Delivery module, for the true identity information to be sent to system, to complete identification.
9. a kind of computer equipment, comprising: memory and processor, wherein the processor requires 1 to 5 for perform claim Any one of the method the step of.
10. a kind of non-volatile computer readable storage medium storing program for executing, is stored thereon with computer instruction, which is characterized in that the finger Order is performed the step of realizing any one of claims 1 to 5 the method.
CN201811221432.XA 2018-10-19 2018-10-19 Authentication recognition methods, electronic device and computer readable storage medium Pending CN109359601A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811221432.XA CN109359601A (en) 2018-10-19 2018-10-19 Authentication recognition methods, electronic device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811221432.XA CN109359601A (en) 2018-10-19 2018-10-19 Authentication recognition methods, electronic device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109359601A true CN109359601A (en) 2019-02-19

Family

ID=65345861

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811221432.XA Pending CN109359601A (en) 2018-10-19 2018-10-19 Authentication recognition methods, electronic device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109359601A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110110990A (en) * 2019-04-30 2019-08-09 德稻全球创新网络(北京)有限公司 A kind of mobile communication system of interfirm cooperation Project cooperation
CN110298328A (en) * 2019-07-03 2019-10-01 中国工商银行股份有限公司 Test data forming method, test data form device, electronic equipment and medium
CN110447023A (en) * 2019-03-14 2019-11-12 阿里巴巴集团控股有限公司 For obtain and on block chain record tracking information method and apparatus
CN110753029A (en) * 2019-09-16 2020-02-04 中国联合网络通信集团有限公司 Identity verification method and biological identification platform
RU196279U1 (en) * 2019-08-01 2020-02-21 Общество с ограниченной ответственностью "Научно-производственная компания "Техника дела" (ООО "НПК "Техника Дела") BIOMETRIC USER IDENTIFICATION DEVICE
CN111488800A (en) * 2020-03-13 2020-08-04 北京迈格威科技有限公司 Model training and image processing method and device, terminal and storage medium
CN111506591A (en) * 2020-04-13 2020-08-07 名商科技有限公司 Block chain-based vehicle identity authentication method, device, computer and medium
CN111859339A (en) * 2020-07-13 2020-10-30 唐山师范学院 Identity verification system based on computer network
CN112052458A (en) * 2020-07-28 2020-12-08 华控清交信息科技(北京)有限公司 Information processing method, device, equipment and medium
CN112926092A (en) * 2021-03-30 2021-06-08 支付宝(杭州)信息技术有限公司 Privacy-protecting identity information storage and identity authentication method and device
CN112989300A (en) * 2021-03-15 2021-06-18 京东数科海益信息科技有限公司 Digital identity information processing method and device and electronic equipment
CN113449568A (en) * 2020-03-27 2021-09-28 富泰华工业(深圳)有限公司 Identity authentication method, computer device and readable storage medium
TWI777148B (en) * 2020-03-27 2022-09-11 鴻海精密工業股份有限公司 Identity verification method, computer device, and readable storage medium
CN115051856A (en) * 2022-06-16 2022-09-13 中国银行股份有限公司 Block chain-based biological verification information input method, device and equipment
US20230125083A1 (en) * 2020-04-22 2023-04-27 China Unionpay Co., Ltd. Blockchain data access authorization method, apparatus, and device
CN116644401A (en) * 2023-07-21 2023-08-25 山东知临信息技术有限责任公司 Identity verification method, device, equipment and medium based on blockchain technology

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN107025397A (en) * 2016-01-29 2017-08-08 阿里巴巴集团控股有限公司 The acquisition methods and device of identity information
CN107566116A (en) * 2017-06-15 2018-01-09 中国银联股份有限公司 The method and device of registration is really weighed for digital asset
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
CN107688940A (en) * 2017-05-10 2018-02-13 平安科技(深圳)有限公司 Bio-identification transaction processing method and system
US20180255055A1 (en) * 2016-03-28 2018-09-06 Black Gold Coin, Inc. SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION
CN108521418A (en) * 2018-04-04 2018-09-11 广州广电运通金融电子股份有限公司 A kind of identity identifying method and system merging block chain and living things feature recognition
CN108650231A (en) * 2018-04-04 2018-10-12 广州广电运通金融电子股份有限公司 Physical characteristics collecting method and system based on block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN107025397A (en) * 2016-01-29 2017-08-08 阿里巴巴集团控股有限公司 The acquisition methods and device of identity information
US20180255055A1 (en) * 2016-03-28 2018-09-06 Black Gold Coin, Inc. SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION
CN107688940A (en) * 2017-05-10 2018-02-13 平安科技(深圳)有限公司 Bio-identification transaction processing method and system
CN107566116A (en) * 2017-06-15 2018-01-09 中国银联股份有限公司 The method and device of registration is really weighed for digital asset
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
CN108521418A (en) * 2018-04-04 2018-09-11 广州广电运通金融电子股份有限公司 A kind of identity identifying method and system merging block chain and living things feature recognition
CN108650231A (en) * 2018-04-04 2018-10-12 广州广电运通金融电子股份有限公司 Physical characteristics collecting method and system based on block chain

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110447023B (en) * 2019-03-14 2024-03-15 创新先进技术有限公司 Method and apparatus for acquiring and recording tracking information on a blockchain
CN110447023A (en) * 2019-03-14 2019-11-12 阿里巴巴集团控股有限公司 For obtain and on block chain record tracking information method and apparatus
CN110110990A (en) * 2019-04-30 2019-08-09 德稻全球创新网络(北京)有限公司 A kind of mobile communication system of interfirm cooperation Project cooperation
CN110298328A (en) * 2019-07-03 2019-10-01 中国工商银行股份有限公司 Test data forming method, test data form device, electronic equipment and medium
CN110298328B (en) * 2019-07-03 2021-08-20 中国工商银行股份有限公司 Test data forming method, test data forming apparatus, electronic device, and medium
RU196279U1 (en) * 2019-08-01 2020-02-21 Общество с ограниченной ответственностью "Научно-производственная компания "Техника дела" (ООО "НПК "Техника Дела") BIOMETRIC USER IDENTIFICATION DEVICE
CN110753029B (en) * 2019-09-16 2021-09-14 中国联合网络通信集团有限公司 Identity verification method and biological identification platform
CN110753029A (en) * 2019-09-16 2020-02-04 中国联合网络通信集团有限公司 Identity verification method and biological identification platform
CN111488800A (en) * 2020-03-13 2020-08-04 北京迈格威科技有限公司 Model training and image processing method and device, terminal and storage medium
CN113449568A (en) * 2020-03-27 2021-09-28 富泰华工业(深圳)有限公司 Identity authentication method, computer device and readable storage medium
TWI777148B (en) * 2020-03-27 2022-09-11 鴻海精密工業股份有限公司 Identity verification method, computer device, and readable storage medium
CN111506591A (en) * 2020-04-13 2020-08-07 名商科技有限公司 Block chain-based vehicle identity authentication method, device, computer and medium
US20230125083A1 (en) * 2020-04-22 2023-04-27 China Unionpay Co., Ltd. Blockchain data access authorization method, apparatus, and device
CN111859339A (en) * 2020-07-13 2020-10-30 唐山师范学院 Identity verification system based on computer network
CN112052458A (en) * 2020-07-28 2020-12-08 华控清交信息科技(北京)有限公司 Information processing method, device, equipment and medium
CN112052458B (en) * 2020-07-28 2024-02-23 华控清交信息科技(北京)有限公司 Information processing method, device, equipment and medium
CN112989300A (en) * 2021-03-15 2021-06-18 京东数科海益信息科技有限公司 Digital identity information processing method and device and electronic equipment
CN112926092A (en) * 2021-03-30 2021-06-08 支付宝(杭州)信息技术有限公司 Privacy-protecting identity information storage and identity authentication method and device
CN112926092B (en) * 2021-03-30 2024-07-02 支付宝(杭州)信息技术有限公司 Privacy-protecting identity information storage and identity authentication method and device
CN115051856A (en) * 2022-06-16 2022-09-13 中国银行股份有限公司 Block chain-based biological verification information input method, device and equipment
CN116644401A (en) * 2023-07-21 2023-08-25 山东知临信息技术有限责任公司 Identity verification method, device, equipment and medium based on blockchain technology
CN116644401B (en) * 2023-07-21 2023-10-20 山东知临信息技术有限责任公司 Identity verification method, device, equipment and medium based on blockchain technology

Similar Documents

Publication Publication Date Title
CN109359601A (en) Authentication recognition methods, electronic device and computer readable storage medium
CN109660501B (en) System and method for providing blockchain based multi-factor personal identity verification
CN107079034B (en) Identity authentication method, terminal equipment, authentication server and electronic equipment
CN103856472B (en) A kind of method and device of Account Logon
CN110086608A (en) User authen method, device, computer equipment and computer readable storage medium
CN111931144B (en) Unified safe login authentication method and device for operating system and service application
WO2020015487A1 (en) Identity verification method, login method, apparatuses, and computer device
CN111431719A (en) Mobile terminal password protection module, mobile terminal and password protection method
CN107294900A (en) Identity registration method and apparatus based on biological characteristic
CN105868970B (en) authentication method and electronic equipment
CN109639723A (en) A kind of micro services access method and server based on ERP system
CN109150547A (en) A kind of system and method for the digital asset real name registration based on block chain
CN108462700A (en) Background server, terminal device, safe early warning method and storage medium suitable for recognition of face
CN109379360A (en) Auditing method, electronic device and computer readable storage medium
CN109815669A (en) Authentication method and server based on recognition of face
US20230208637A1 (en) Key management method and apparatus
CN105337739B (en) Safe login method, device, server and terminal
CN108512660B (en) Virtual card verification method
CN110266653A (en) A kind of method for authenticating, system and terminal device
KR20220075723A (en) Personal authentication method and system using decentralized identifiers
Vallent et al. Three factor authentication protocol based on bilinear pairing
CN112948786B (en) Identity verification method and device, electronic equipment and storage medium
CN117332396A (en) Identity verification method, device, equipment and storage medium
CN115378710A (en) Cross-region multi-party cooperative office identity authentication system based on block chain
CN113868625A (en) Identity authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination