CN109960915A - A kind of identity authentication method - Google Patents

A kind of identity authentication method Download PDF

Info

Publication number
CN109960915A
CN109960915A CN201811295266.8A CN201811295266A CN109960915A CN 109960915 A CN109960915 A CN 109960915A CN 201811295266 A CN201811295266 A CN 201811295266A CN 109960915 A CN109960915 A CN 109960915A
Authority
CN
China
Prior art keywords
identity
authorization system
information
identity authorization
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811295266.8A
Other languages
Chinese (zh)
Inventor
李扬渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Mairui Microelectronic Co Ltd
Original Assignee
Suzhou Mairui Microelectronic Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Mairui Microelectronic Co Ltd filed Critical Suzhou Mairui Microelectronic Co Ltd
Publication of CN109960915A publication Critical patent/CN109960915A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

Present invention discloses a kind of identity authentication methods, comprising steps of being pre-stored identification information and biological information in the first identity authorization system;User typing biological information and identification information in the second identity authorization system;The biological information of second identity authorization system user's typing and identification information and the biological information and identification information of the first identity authorization system are verified;The identification information of user's typing and biological information are stored in the second identity authorization system if described be proved to be successful, the progress of the present invention compared with the prior art is that the pressure at authentication center can be reduced, while identity pretends to be problem caused by avoiding because of identity information leakage.

Description

A kind of identity authentication method
Technical field
The present invention relates to identification safety authentication fields, in particular to the improvement of authentication method.
Background technique
In existing identity authorization system, identity authorization system is mostly centered on server, when there is authentication demand Subscriber identity information is verified by sending authentication request to server, it can be right when there is multiple authentication requests concurrent Server causes certain pressure.In addition, the information that verifying is sent is identification information without closing with the biological information of user Connection, if identification information loss is likely to result in the behavior that other people pretend to be.
State ministry of public security has the fingerprint collecting of oneself, storage system, has been associated with user identity card number and user refers to Line information, but it is that biological information can not be downloaded to outside and verifies by a kind of closed system.If by the user of the public Authentication request, which is all placed in public security system, certainly will pose a big pressure to its system, there is also leakage public's privacy can It can property.
Summary of the invention
The present invention provides a kind of identity authentication method to solve above-mentioned technical problem, comprising steps of recognizing in the first identity Card system is pre-stored identification information and biological information;User typing biological information and identity in the second identity authorization system Identification information;By the biological information of second identity authorization system user's typing and identification information and the first identity authorization system Biological information and identification information verified;By the identification information of user's typing if described be proved to be successful The second identity authorization system is stored in biological information.
Preferably, the biological information of second identity authorization system user's typing and identification information are recognized with the first identity The biological information and identification information of card system carry out verifying: second identity authorization system is according to user The identification information of typing obtains the biological information being pre-stored in first identity authorization system, the second identity authorization system The biological information of user's typing is verified with the biological information obtained from the first identity authorization system.
Preferably, if the second identity authorization system will be biological in the biological information of user's typing and the first identity authorization system Information Authentication failure, then abandon the biological information and identification information of typing in second identity authorization system.
Preferably, recognize if the second identity authorization system obtains first identity according to the identification information of user's typing The biological information failure being pre-stored in card system, then abandon the biological information and identity of typing in second identity authorization system Identification information.
Preferably, the biological information of second identity authorization system user's typing and identification information are recognized with the first identity The biological information and identification information of card system carry out verifying: second identity authorization system is according to user The biological information of typing obtains the identification information being pre-stored in first identity authorization system, the second identity authorization system The thin information of biological identification that the identification information of user's typing is pre-stored with first identity authorization system is verified.
Preferably, if the second identity authorization system will be in the identification information of user's typing and the first identity authorization system Identification information authentication failed then abandons the biological information of typing and identity letter in second identity authorization system Breath.
Preferably, if the second identity authorization system obtains first authentication system according to the biological information of user's typing The User Identity information failure being pre-stored in system, then abandon in second identity authorization system biological information of typing and Identification information.
Preferably, the biological information of second identity authorization system user's typing and identification information are recognized with the first identity The identification information and identification information of card system carry out verifying: second identity authorization system will be used The identification information and biological information of family typing are sent to the first identity authorization system;First identity authorization system according to The identification information searches pre-stored biological information, and the biological information and lookup that the second identity authorization system is sent To biological information verified;If not finding the biological information or life that first identity authorization system is found The biometric information verification that object information and the second identity authorization system are sent fails, then loses to the second identity authorization system feedback validation It loses, otherwise to the success of the second identity authorization system feedback validation.
Preferably, the biological information of second identity authorization system user's typing and identification information and identity are believed It ceases verify with the identification information and identification information of the first identity authorization system and further comprises: second body The identification information of user's typing and biological information are sent the first identity authorization system by part Verification System;First body Part Verification System searches pre-stored User Identity information according to the biological information, and the second identity authorization system is sent out The User Identity information sent is verified with the User Identity information found;If not finding the user identity The body that the User Identity and the second identity authorization system that identification information or first identity authorization system are found are sent Part identification information authentication failed, then fail to the second identity authorization system feedback validation, otherwise anti-to the second identity authorization system Feedback is proved to be successful.
Preferably, if second identity authorization system receive the first identity authorization system feedback validation failure as a result, Then abandon the biological information and identification information of typing in second identity authorization system.
It preferably, include believable typing terminal in second identity authorization system for user's progress authentication When typing User Identity information.
Preferably, the pre-stored identification information of first identity authorization system and biological information are by believable Terminal typing, and logic association relationship is formed in the first identity authorization system;Second identity authorization system is pre-stored Identification information and biological information be to be formed by believable typing terminal typing, and in the second identity authorization system Logic association relationship.
Preferably, the biological information includes but is not limited to finger print data, human face data, iris data.
Preferably, the identification information includes but is not limited to ID card No., drivers license number and social security coding.
The progress of the present invention compared with the prior art is, user in the second identity authorization system typing identification information and After biological information, can once it be matched with the first identity authorization system, the second identity authorization system if the successful match Store the User Identity information and biological information;It can be directly with second if when same user carries out authentication again The identification information and biological information stored in identity authorization system is verified, and the ID authentication request having is avoided It was passed in the first identity authorization system, to reduce the pressure of the first identity authorization system.The second identity is recognized simultaneously Card system is associated storage to the identification information and biological information, prevents from carrying out personation body by identification information The behavior of part.
Detailed description of the invention
Fig. 1 is auth method flow diagram of the present invention.
Fig. 2 is auth method schematic illustration of the present invention.
Fig. 3 is biological information identification information logical relation schematic diagram of the present invention.
Fig. 4 a and 4b are two kinds of embodiment schematic diagrames of biological information and identification information verification method of the present invention.
Fig. 5 is biological information and identification information storage method schematic diagram of the present invention.
Fig. 6 biological information of the present invention and identification information verification method another embodiment schematic diagram.
Fig. 7 is the first identity authorization system and the second identity authorization system schematic diagram of the invention.
Specific embodiment
Identity identifying method flow diagram shown in referring to Figures 1 and 2, the identity identifying method include the first identity Verification System 100 and the second identity authorization system 200;First identity authorization system 100 and the second identity authorization system 200 can Typing, storage, matching biological information 101 and identification information 102.The identity identifying method includes step S1 in the first body Part Verification System 100 is pre-stored identification information 101 and biological information 102;S2 user is in the second identity authorization system 200 Middle typing biological information 101 and identification information 102;S3 is by the biological information 201 of second identity authorization system user's typing It is verified with identification information 202 and the biological information 101 and 102 information of identity of the first identity authorization system;S4 The identification information of user's typing and biological information are stored in the second identity authorization system if described be proved to be successful. Above-mentioned step S1 to S4 respectively corresponds step S1 typing in Fig. 2, S2 typing, S3 verifying, S4 storage
First identity authorization system 100 and the second identity authorization system 200 are being capable of typing, storage, inquiry, deletion The information processing system of the biological information and identification information.Second identity authorization system and the first authentication system After system carries out an authentication and is proved to be successful;Second identity authorization system by user's typing, identification information and Biological information is stored in the second identity authorization system.When same user carries out authentication again, there is no need to recognize described The process of card is transferred to first authentication, to mitigate the pressure of the first identity authorization system.
In the first, second identity authorization system, identification information can for ID card No. ID, drivers license number and Social security coding, biological information can be finger print data, human face data, iris data.The identification information 102 and biology letter Breath is logically interrelated, and by taking finger print information as an example, finger print information is deposited after user's typing finger print information in the form of template 101 In the first identity authorization system, storage file may include fingerprint template information 101 and User Identity Information ID, user for storage Identification information can be stored together by way of table.Such as User Identity information can be with relevant database number It is stored in the database according to the form of table 105, User Identity Information ID is major key field in the table, other fields can deposit Store up other identity informations of user such as name NAME, gender GENDER etc..Pass through this identification information data and biology letter It ceases data and forms data relationship mapping table, i.e., be associated in logic with the biological information of the user.
The biological data template referring to described in Fig. 3 can be to be individually stored in the first authentication system in the form of file 104 It is logical when needing with the pointer of the associated biological data template file of identification information in identification information table 105 in system When crossing the identity identification information inquiry biological data template of user, passes through the file pointer POINTER and access biological number According to template file.
The biological information 201 of 200 user's typing of the second identity authorization system and identity are believed in above-mentioned steps S3 Breath 202 and the biological information 101 and identification information 102 of the first identity authorization system are verified.According to the process of verifying The method of verifying can be divided into two kinds by the position difference of execution, and the verification process of first method is in the second identity authorization system It is executed in 200 i.e.: the biological information 101 that will be prestored in first identity authorization system 100 by the information of 203 typing of user Or identification information 102 is transmitted in the second identity authorization system 200, and is recognized in the second identity authorization system 200 Card.The positive process of the verifying of second method executes i.e. in the first identity authorization system 100: the second identity authorization system is to first Identity authorization system transmits identification information or biological information, and the first identity authorization system 100 is according to the identity of the transmission Identification information 202 or the corresponding biological confidence of biological information inquiry and identification information are simultaneously verified, and verification result is anti- It feeds second identity authorization system 200.
In first referring to shown in Fig. 4 a in verification method, second identity authorization system 200 is according to user's typing Identity id information obtains the biological information being pre-stored in first identity authorization system 100, it should be noted that due to The information for the process user input for not completing certification is stored in 204 in a temporary memory space.Obtain the step of biological information Suddenly user can be inputted identification information 202 for the second identity authorization system of S31 200 and is sent to the first identity authorization system 100.First identity authorization system 100 described in S32 retrieves biological information 101 by identification information 202 and is sent to second Identity authorization system 200, retrieving is according to storing data mapping table 105.Second identity authorization system 200 is by user's typing Biological information 201 and the biological information 101 obtained from the first identity authorization system are verified i.e. step S33.The verifying Process i.e. the biological information that the first identity heat symptom-complex system is transmitted is matched with the identity information of the second identity authorization system.
Referring to Fig. 5, above-mentioned matching result judges whether the told user identity information of storage and biological information as step S4 If the foundation successful match 41 of storage, then it is assumed that authentication is consistent, and the subscriber identity information of the temporary storage area is deposited Storage forms data memory map assignments 205 and makes the biological information and use 42 in the memory space of the first identity authorization system Family identity information forms logical mappings relationship (referring to Fig. 2).If it fails to match, abandons and recorded in second identity authorization system The biological information and identification information 43 entered is deleted from the temporary memory space 204.It should be noted that in step 32 If the second identity authorization system is obtained in first identity authorization system according to the identification information of user's typing and is prestored in The biological information of storage fails, then abandons the biological information and identification information of typing in second identity authorization system.This It is also just to be not present and the identity mark because the identification information that user provides is not present in the first identity authorization system The biological information for knowing information association, cannot further match work for the second identity authorization system and provide biological information.
In the first verification method, second identity authorization system 200 can also be believed according to the biology of user's typing Breath obtains the identification information 102 being pre-stored in first identity authorization system 100.Obtain biological information the step of be User's input biological information 201 is sent to the first identity authorization system by the second identity authorization system of S31 '.S32 ' described first Identity authorization system 100 obtains corresponding identification information by retrieving biological information 101, and is sent to the second authentication System 200.The process that first identity authorization system 100 is retrieved by biological information, i.e., by the second identity authorization system The biological information 201 of 200 typings is matched with the biological information 101 of the first identity authorization system one by one, and crosses data relationship all Mapping table 105 obtains User Identity Information ID.Second identity authorization system 200 by the identification information of user's typing with The identification information obtained from the first identity authorization system is verified i.e. step S33 '.The identification information tests ID Card is the comparison procedure of number or character, such as the identification card number and the first identity authorization system of the second identity authorization system typing The identification card number prestored is identical, thinks to be verified.
Likewise, if identification information is verified in the identification information ID and the first identity authorization system of user's typing Failure, if or the second identity authorization system 200 first authentication obtained according to the biological information 201 of 203 typing of user The User Identity information 102 being pre-stored in system 100 fails, then abandons the life of typing in second identity authorization system Object information and identification information.
In second of verification method, the second identity authorization system 200 by 202 information of identity of user's typing and Biological information 201 is sent to simultaneously in the first identity authorization system 100, executes the body in the first identity authorization system 100 The verifying of part identifier 202 and biological information 201.First identity authorization system 100 is only anti-to the second identity authorization system 200 Verification result is presented, the second identity authorization system 200 decides whether to store the identity of user's typing according to verification result Information or biological information.
Referring to Fig. 6, specific steps include the second identity authorization system of SI31 by user's typing in second of verification method Identification information and biological information are sent to the first identity authorization system;The first identity authorization system is according to described in SI32 Identification information searches pre-stored biological information;SI33 judges whether to find the biological information, if otherwise executing SI37 fails to the second identity authorization system feedback validation;If finding the biological information, SI34 is by the second identity authorization system The biological information of transmission is verified with the biological information found;Whether SI35 judgment step SI34 is proved to be successful, if described The biometric information verification that the biological information and the second identity authorization system that first identity authorization system is found are sent fails, then holds Row step SI37 fails to the second identity authorization system feedback validation, otherwise executes SI36 and tests to the second identity authorization system feedback It demonstrate,proves successfully.
A kind of version is readily apparent that according to Fig. 6, by the second identity authorization system 200 by the identity of user's typing Information 202 and biological information 201 are sent to the first identity authorization system 100;First identity authorization system 100 is according to the biology Information 201 searches pre-stored User Identity information 100, and the user identity that the second identity authorization system 200 is sent Identification information 202 is verified with the User Identity information 102 found;If not finding the User Identity The User Identity information 102 and the second identity authorization system that information 102 or first identity authorization system are found are sent out 202 authentication failed of identification information sent then fails to the second identity authorization system feedback validation, otherwise recognizes to the second identity Card system feedback is proved to be successful.
Referring to Fig. 5, decide whether to store according to the verification result that above-mentioned first identity authorization system is fed back in step s 4 The identification information and biological information.If second identity authorization system receives the first identity authorization system feedback validation Failure as a result, then abandoning the biological information and identification information of typing in second identity authorization system.
In above-mentioned the first identity authorization system 100 and the second identity authorization system 200, first authentication system The pre-stored identification information of system and biological information are entered by believable terminal record (106,206), and in the first identity Verification System, which neutralizes, forms logic association relationship in the second identity authorization system.
Referring to invention the first identity authorization system 100 shown in Fig. 7 and the second identity authorization system 200, concrete application field Scape.In the reference scene, shown first identity authorization system 100 is server, which is capable of providing storage verifying institute State the function of identification information 102 and biological information 101.Second identity authorization system is handheld mobile device 200.With For banking system, the behavior of from user to mobile device input card number ID are to input the behavior of identification information 202.Bank Card number ID is entered into bank server by the authorization terminal 106 of bank in advance when user opens an account, the authorized machine As believable terminal 106, and being stored in tables of data 105, other fields of the tables of data 105 also store other people of user Information.If i.e. 201. user of biological information of instruction user's input fingerprint makes for the first time after mobile device 200 obtains the card number ID With the bank card, automatic teller machine sends server-side for the finger print information of user's typing and verifies, the server if being proved to be successful Other operations such as 100 to the success of 200 feedback validation of mobile device, and user can transfer accounts, withdraw the money, while mobile device 200 will The fingerprint of user and the card number associated storage are inside mobile device 200, such as the memory block trust zone207.Work as user It can directly be verified in mobile device 200 when reusing same card number, without initiating to verify to server 100 again Request.It is to be noted that due to mobile device itself can typing fingerprint, fingerprint can be stored by having, thus its i.e. have can The function of the typing terminal of letter has the function of the first identity authorization system again.It is readily apparent that, if changing the card number into identity Card number and finger print information associated storage in the inside of mobile device, even if mobile device lose can not only by identification card number into The behavior that row identity is pretended to be.

Claims (14)

1. a kind of identity authentication method, which is characterized in that comprising steps of being pre-stored identity in the first identity authorization system Information and biological information;User typing biological information and identification information in the second identity authorization system;By the second identity The biological information and identification information of Verification System user's typing and the biological information and identity mark of the first identity authorization system Know information to be verified;The identification information of user's typing and biological information are stored in if described be proved to be successful Two identity authorization systems.
2. a kind of identity authentication method as described in claim 1, which is characterized in that record the second identity authorization system user The biological information and identification information entered and the biological information and identification information of the first identity authorization system are verified Further comprise: second identity authorization system obtains first authentication according to the identification information of user's typing The biological information being pre-stored in system, the second identity authorization system by the biological information of user's typing with from the first authentication system The biological information obtained in system is verified.
3. such as power 2, if the second identity authorization system believes biology in the biological information of user's typing and the first identity authorization system Authentication failed is ceased, then abandons the biological information and identification information of typing in second identity authorization system.
4. a kind of identity authentication method as claimed in claim 2, which is characterized in that if the second identity authorization system according to The identification information of family typing obtains the biological information failure being pre-stored in first identity authorization system, then described in discarding The biological information and identification information of typing in second identity authorization system.
5. a kind of identity authentication method as described in claim 1, which is characterized in that record the second identity authorization system user The biological information and identification information entered and the biological information and identification information of the first identity authorization system are verified Further comprise: second identity authorization system obtains first identity authorization system according to the biological information of user's typing In the identification information that is pre-stored, the second identity authorization system is by the identification information of user's typing and first identity The pre-stored thin information of biological identification of Verification System is verified.
6. a kind of identity authentication method as claimed in claim 5, which is characterized in that if the second identity authorization system is by user Identification information authentication failed in the identification information of typing and the first identity authorization system, then abandon second identity The biological information and identification information of typing in Verification System.
7. a kind of identity authentication method as claimed in claim 5, which is characterized in that if the second identity authorization system according to The biological information of family typing obtains the User Identity information failure being pre-stored in first identity authorization system, then abandons The biological information and identification information of typing in second identity authorization system.
8. a kind of identity authentication method as described in claim 1, which is characterized in that record the second identity authorization system user The identification information and identification information of the biological information and identification information and the first identity authorization system that enter carry out Verifying further comprises: second identity authorization system sends for the identification information of user's typing and biological information One identity authorization system;First identity authorization system searches pre-stored biological information according to the identification information, And the biological information that the second identity authorization system is sent is verified with the biological information found;If not finding the life The biological information that the biological information and the second identity authorization system that object information or first identity authorization system are found are sent Authentication failed then fails to the second identity authorization system feedback validation, otherwise to the success of the second identity authorization system feedback validation.
9. a kind of identity authentication method as described in claim 1, which is characterized in that record the second identity authorization system user The identification information and body of the biological information and identification information and identification information and the first identity authorization system that enter Part identification information carries out verifying: second identity authorization system is by the identification information and life of user's typing Object information is sent to the first identity authorization system;First identity authorization system is pre-stored according to biological information lookup User Identity information, and the User Identity information that the second identity authorization system is sent and the user identity that finds Identification information is verified;If not finding the User Identity information or first identity authorization system being found User Identity and the second identity authorization system send identification information authentication failed, then to the second authentication system Feedback validation of uniting fails, otherwise to the success of the second identity authorization system feedback validation.
10. a kind of identity authentication method as claimed in claim 8 or 9, which is characterized in that if second authentication system System receive the first identity authorization system feedback validation failure as a result, then abandoning the life of typing in second identity authorization system Object information and identification information.
11. a kind of identity authentication method as claimed in any one of claims 1 to 8, which is characterized in that in second identity It include that believable typing terminal is used for typing User Identity information when user's progress authentication in Verification System.
12. a kind of identity authentication method as claimed in any one of claims 1 to 8, which is characterized in that first identity is recognized The pre-stored identification information of card system and biological information are by believable terminal typing, and in the first authentication system Logic association relationship is formed in system;The pre-stored identification information of second identity authorization system and biological information are to pass through Believable typing terminal typing, and logic association relationship is formed in the second identity authorization system.
13. a kind of identity authentication method as claimed in any one of claims 1 to 8, which is characterized in that the biological information packet It includes but is not limited to, finger print data, human face data, iris data.
14. a kind of identity authentication method as claimed in any one of claims 1 to 8, which is characterized in that the identity letter Breath includes but is not limited to ID card No., drivers license number and social security coding.
CN201811295266.8A 2017-12-22 2018-11-01 A kind of identity authentication method Pending CN109960915A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2017114086711 2017-12-22
CN201711408671 2017-12-22

Publications (1)

Publication Number Publication Date
CN109960915A true CN109960915A (en) 2019-07-02

Family

ID=67023280

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811295266.8A Pending CN109960915A (en) 2017-12-22 2018-11-01 A kind of identity authentication method

Country Status (1)

Country Link
CN (1) CN109960915A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112084475A (en) * 2020-09-23 2020-12-15 广州小鹏汽车科技有限公司 Authentication method and server

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345625A (en) * 2008-08-15 2009-01-14 西安电子科技大学 Remote authentication method based on biological characteristic
CN101355527A (en) * 2008-08-15 2009-01-28 深圳市中兴移动通信有限公司 Method for implementing single-point LOG striding domain name
US20120066758A1 (en) * 2010-09-13 2012-03-15 Srinivas Kasturi Online User Authentication
CN102769531A (en) * 2012-08-13 2012-11-07 鹤山世达光电科技有限公司 Identity authentication device and method thereof
CN103714315A (en) * 2013-12-10 2014-04-09 柳州译海网络科技有限公司 Identity authentication method based on biological feature information
CN104486314A (en) * 2014-12-05 2015-04-01 北京众享比特科技有限公司 Identity authentication system and identity authentication method based on peer-to-peer network
CN105245529A (en) * 2015-10-21 2016-01-13 四川省宁潮科技有限公司 User biological characteristic code-based distributed authentication method, terminal and system
CN105790951A (en) * 2016-02-26 2016-07-20 浙江维尔科技股份有限公司 Identity authentication device and intelligent terminal
CN106412116A (en) * 2016-11-17 2017-02-15 上海斐讯数据通信技术有限公司 Method and device for distributed processing on logging in of user by cloud access controller
CN106453311A (en) * 2016-10-11 2017-02-22 掌握科技无锡有限公司 Register and login system and method for biological characteristic distributed identity authentication
CN106549763A (en) * 2015-09-23 2017-03-29 中国移动通信集团公司 A kind of method and device for realizing real-name authentication
CN106657072A (en) * 2016-12-26 2017-05-10 深圳怡化电脑股份有限公司 Identity authentication method and system
CN106656906A (en) * 2015-10-28 2017-05-10 北京天诚盛业科技有限公司 Biological identification system based on cloud platform, and method thereof
CN107455003A (en) * 2016-01-26 2017-12-08 华为技术有限公司 A kind of method for authenticating user identity and server

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355527A (en) * 2008-08-15 2009-01-28 深圳市中兴移动通信有限公司 Method for implementing single-point LOG striding domain name
CN101345625A (en) * 2008-08-15 2009-01-14 西安电子科技大学 Remote authentication method based on biological characteristic
US20120066758A1 (en) * 2010-09-13 2012-03-15 Srinivas Kasturi Online User Authentication
CN102769531A (en) * 2012-08-13 2012-11-07 鹤山世达光电科技有限公司 Identity authentication device and method thereof
CN103714315A (en) * 2013-12-10 2014-04-09 柳州译海网络科技有限公司 Identity authentication method based on biological feature information
CN104486314A (en) * 2014-12-05 2015-04-01 北京众享比特科技有限公司 Identity authentication system and identity authentication method based on peer-to-peer network
CN106549763A (en) * 2015-09-23 2017-03-29 中国移动通信集团公司 A kind of method and device for realizing real-name authentication
CN105245529A (en) * 2015-10-21 2016-01-13 四川省宁潮科技有限公司 User biological characteristic code-based distributed authentication method, terminal and system
CN106656906A (en) * 2015-10-28 2017-05-10 北京天诚盛业科技有限公司 Biological identification system based on cloud platform, and method thereof
CN107455003A (en) * 2016-01-26 2017-12-08 华为技术有限公司 A kind of method for authenticating user identity and server
CN105790951A (en) * 2016-02-26 2016-07-20 浙江维尔科技股份有限公司 Identity authentication device and intelligent terminal
CN106453311A (en) * 2016-10-11 2017-02-22 掌握科技无锡有限公司 Register and login system and method for biological characteristic distributed identity authentication
CN106412116A (en) * 2016-11-17 2017-02-15 上海斐讯数据通信技术有限公司 Method and device for distributed processing on logging in of user by cloud access controller
CN106657072A (en) * 2016-12-26 2017-05-10 深圳怡化电脑股份有限公司 Identity authentication method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112084475A (en) * 2020-09-23 2020-12-15 广州小鹏汽车科技有限公司 Authentication method and server

Similar Documents

Publication Publication Date Title
US9544308B2 (en) Compliant authentication based on dynamically-updated credentials
US8433921B2 (en) Object authentication system
CN110297923B (en) Information processing method, information processing device, electronic equipment and computer readable storage medium
US20080065895A1 (en) Method and System for Implementing Authentication on Information Security
US10755237B2 (en) Method for creating, registering, revoking authentication information and server using the same
WO2018184433A1 (en) Internet-of-things authentication system and internet-of-things authentication method
CN105141619A (en) Account login method and device
US20190280862A1 (en) System and method for managing id
CN108900536B (en) Authentication method, authentication device, computer equipment and storage medium
JP2002259345A (en) Method/device for authentication for preventing unauthorized use of physical feature data, and program
CN110995661B (en) Network card platform
KR20170052126A (en) Method for Non-faced Multi-authenticating for Creating Financial Information
CN109960915A (en) A kind of identity authentication method
Alliance Smart Cards and Biometrics
US8392721B2 (en) Method and system to electronically identify and verify an individual presenting himself for such identification and verification
CN110838196B (en) Intelligent door lock control method, intelligent door lock control system and intelligent door lock
CN111475793A (en) Access control method, user registration method, user login method, device and equipment
EP3392790A1 (en) Method for authentication via a combination of biometric parameters
EP3217593A1 (en) Two-factor authentication method for increasing the security of transactions between a user and a transaction point or system
KR20030052194A (en) A system for user verification using biometric information, a method for registering certificates in the system and a user verification method
CN114036482A (en) Block chain-based data management method, electronic device and storage medium
JP2010066917A (en) Personal identification system and personal identification method
JP5075675B2 (en) Biometric authentication system and biometric authentication device
KR102566445B1 (en) Admission control system based on phone authentication
KR101642035B1 (en) Apparatus and method for generating authentication information using iris data, authentication system with the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190702

RJ01 Rejection of invention patent application after publication