CN111144896A - Identity verification method and device - Google Patents

Identity verification method and device Download PDF

Info

Publication number
CN111144896A
CN111144896A CN202010174588.8A CN202010174588A CN111144896A CN 111144896 A CN111144896 A CN 111144896A CN 202010174588 A CN202010174588 A CN 202010174588A CN 111144896 A CN111144896 A CN 111144896A
Authority
CN
China
Prior art keywords
information
verification
identity
user
somatosensory interaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010174588.8A
Other languages
Chinese (zh)
Inventor
邵莉莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Publication of CN111144896A publication Critical patent/CN111144896A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/174Facial expression recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/40Spoof detection, e.g. liveness detection
    • G06V40/45Detection of the body part being alive

Abstract

The embodiment of the invention discloses an identity authentication method and an identity authentication device, wherein the method comprises the following steps: the authentication client displays a plurality of randomly generated points on a display screen; the authentication client is placed in a trusted execution environment in advance; prompting the verification user to perform somatosensory interaction; acquiring the somatosensory interaction action information; and verifying whether the somatosensory interaction action information is matched with the prompt information or not, and if so, successfully verifying the identity. By the identity authentication method provided by the embodiment of the application, the identity authentication client is placed in the trusted execution environment, and the trusted execution environment can ensure that information is not tampered in the process of acquiring the identity information of the authenticated user. The prompt information consisting of the random points is used for prompting the user to perform random somatosensory interaction, so that the fact that the verification user is a living body instead of a photo can be guaranteed, the fact that the verification user is a living body instead of a video can be guaranteed, information is effectively prevented from being falsely used, and the credibility of identity verification is improved.

Description

Identity verification method and device
The present application claims priority of chinese patent application having application number 201911295956.8 entitled "method and apparatus for identity verification" filed in 2019 at 16.12.2019, the entire contents of which are incorporated herein by reference.
Technical Field
The invention relates to the field of information security, in particular to an identity authentication method and device.
Background
With the development of information technology, internet finance is also in progress. As the name implies, internet finance is the online financial transaction over the internet. Because internet finance cannot be authenticated in an offline and opposite manner like a traditional financial method, the risk of fraud in internet finance is extremely high. For example, in the remittance service of cross-border remittance, the remittance certificate informed by the remitter can complete the remittance process through a third-party channel such as a bank counter, a mobile phone bank, an internet bank, or a payer, and the identity verification of the remittance is particularly important.
In the prior art, people are usually authenticated by adopting a biological verification mode such as fingerprints, passwords or human faces, or by adding short message verification codes. It still does not guarantee that the payee's identity will not be tampered with or falsely used. For example, if the authenticated program code is tampered, the collected biometric information is false, or the attacker uses a replay attack means to use the recorded video for identity masquerading.
Therefore, how to ensure the accuracy of identity information of a payee in internet finance becomes a problem to be solved urgently.
Disclosure of Invention
In order to solve the problems, the application provides an identity verification method and device which can ensure that the information of a payee is not falsified or falsely used in internet finance, so that the accuracy of the identity information of the payee is ensured.
In a first aspect of the present application, there is provided an identity verification method, the method comprising:
the authentication client displays a plurality of randomly generated points on a display screen; the authentication client is placed in a trusted execution environment in advance;
prompting the verification user to perform somatosensory interaction; the interaction is used as a somatosensory interaction action which is carried out by the verification user according to prompt information consisting of a plurality of randomly generated points;
acquiring the somatosensory interaction action information;
and verifying whether the somatosensory interaction action information is matched with the prompt information or not, and if so, successfully verifying the identity.
Optionally, the prompt information includes:
and prompting the verification user to perform eyeball tracking interactive action according to a dynamic continuous path formed by random points.
Optionally, the prompt information includes:
and prompting the verification user to perform interactive actions of facial expression recurrence according to expression patterns formed by the random points.
Optionally, the prompt information includes:
and prompting the verification user to perform head tracking and shaking interactive actions according to the bouncing direction of the random point.
Optionally, the acquiring the somatosensory interaction information further includes:
acquiring the face information of the front of the verified user so as to assist in user identity verification;
verifying whether the somatosensory interaction action information is matched with the prompt information or not, if so, successfully verifying the identity, and further comprising:
and verifying whether the face information is matched with the user identity, and if so, successfully verifying the user identity.
Optionally, before verifying whether the somatosensory interaction information is matched with the prompt information, the method further includes:
encrypting the acquired information by using an encryption algorithm;
sending the encrypted information to an authentication server through an identity verification client agent; the identity authentication client agent is a middle communication device between the authentication server and the identity authentication client;
and the authentication server decrypts the encrypted information by using a corresponding decryption algorithm and then performs identity verification.
Optionally, the acquiring the somatosensory interaction information further includes:
collecting the user's decoding information;
and when the verification and the identity verification of the user on the authentication server are successful, performing the payment releasing operation.
In a second aspect of the present application there is provided an authentication apparatus, the apparatus comprising:
the device comprises a display unit, a prompt unit, a collection unit and a verification unit;
the display unit is used for displaying a plurality of randomly generated points on a display screen by the authentication client; the authentication client is placed in a trusted execution environment in advance;
the prompting unit is used for prompting the verification user to perform somatosensory interaction; the interaction is used as a somatosensory interaction action which is carried out by the verification user according to prompt information consisting of a plurality of randomly generated points;
the acquisition unit is used for acquiring the somatosensory interaction action information;
and the verification unit is used for verifying whether the somatosensory interaction action information is matched with the prompt information or not, and if so, the identity verification is successful.
Optionally, the collecting unit further includes:
the face information acquisition unit is used for acquiring the face information of the front face of the authenticated user so as to assist in user identity authentication;
the verification unit further includes:
and the face information verification unit is used for verifying whether the face information is matched with the user identity, and if so, the user identity is verified successfully.
Optionally, the method further includes:
the encryption unit is used for encrypting the acquired information by using an encryption algorithm;
the sending unit is used for sending the encrypted information to the authentication server through the identity verification client agent; the trusted client agent is an intermediate communication device of the authentication server and the identity verification client;
and the decryption unit is used for carrying out identity verification after the authentication server decrypts the encrypted information by using a corresponding decryption algorithm.
Compared with the prior art, the technical scheme of the application has the advantages that:
according to the technical method, firstly, an identity authentication client displays a plurality of randomly generated points on a display screen, then prompts an authentication user to perform somatosensory interaction, acquires somatosensory interaction information, and finally verifies whether the somatosensory interaction information is matched with the prompt information, and if the somatosensory interaction information is matched with the prompt information, identity authentication is successful. By the technical scheme, the identity authentication client is placed in the trusted execution environment, and the trusted execution environment can ensure that information is not tampered in the process of acquiring the identity information of the authenticated user. The prompt information consisting of the random points is used for prompting the user to perform random somatosensory interaction, so that the fact that the verification user is a living body instead of a photo can be guaranteed, the fact that the verification user is a living body instead of a video can be guaranteed, information is effectively prevented from being falsely used, and the credibility of identity verification is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of an authentication method provided in the present application;
fig. 2 is a schematic diagram of an authentication device structure provided in the present application.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart of an authentication method provided in the present application, which may include the following steps 101-104.
Step 101: the authentication client displays a plurality of randomly generated points on a display screen; the authentication client is pre-placed in the trusted execution environment.
The authentication client displays a plurality of randomly generated points on the display screen, and the randomly generated points can be combined into a dynamic snake-shaped continuous path, a dynamic triangle-shaped continuous path, a dynamic zigzag-shaped continuous path and the like according to the sequence change of the points, or bounce with uncertain directions on the display screen like a ball and the like. These randomly generated points may also be stacked in terms of points and dots, combining facial expressions for adults, such as mouth opening, blinking, smiling, split teeth, and the like.
The authentication client is pre-placed in the trusted execution environment, for example, ARM TrustZone is used as the underlying technology for supporting the trusted execution environment. The trusted execution environment can ensure that the information collected by the subsequent authentication client is not tampered and is trusted data. Because trusted execution environments are often used to guarantee the trustworthiness of operating systems, running programs, i.e., executing as intended, without tampering by attackers. The trusted execution environment is also assisted by hardware, but does not need to guarantee the security of the bottom operating system, and a secure trusted execution environment is established by utilizing a coprocessor or an extra instruction set mode in a processor of the device, so that programs, data and the like in the trusted execution environment cannot be touched even by the bottom management software, the operating system and the like of the device.
When the embodiment of the application is used in a banking scene, the credibility of verification data can be ensured at the source, the reliability of identity verification can be ensured, and the benefits of customers can be protected to the greatest extent. For example, in a remittance service of cross-border remittance, if the remittance is received through a third-party channel such as a payer, since the third-party application is not placed in a trusted execution environment, an unsafe environment may be maliciously attacked by an attacker, so that when information is subsequently collected, even if an identity thief tampers, by tampering with a collection program, originally wrong information is tampered with correct information, and the identity thief becomes a real payee. Specifically, the trusted execution environment verifies the validity of the currently executing program, ensures the correctness of the program, and provides a certification report. Namely, the trusted execution environment is adopted to ensure that the information is not tampered in the process of acquiring the person identity information by the third-party platform, so that the accuracy of the payee identity information is ensured.
Step 102: prompting the verification user to perform somatosensory interaction; and the interaction is used as a somatosensory interaction action which is carried out by the verification user according to the prompt information consisting of the plurality of randomly generated points.
The identity authentication client can display prompt information on a display screen to prompt an authentication user to perform somatosensory interaction according to random points displayed on the screen. For example, when the random points are combined into a dynamic snake-shaped continuous path according to the sequence change of the points and the points, the verification user can be prompted to keep the head still, and the eyeball tracks the snake-shaped continuous path along the sequence of the random points; when the random points are combined into the facial expression of the adult, the verification user can be prompted to reproduce the same expression according to the expression formed by the random points; when the random point bounces on the display screen in an uncertain direction like a ball, the verification user can perform head tracking motion according to the bouncing direction of the random point.
The user is verified to perform somatosensory interaction through prompting, and because the interaction is random, the verification user does not only blink, turn around and the like, but also performs random somatosensory interaction. The method and the system can not only prove that the verification user is a living body, but also avoid that other people adopt videos of actual real users to prove that the users are dynamic instead of photos, thereby improving the credibility of authentication.
Step 103: and acquiring the somatosensory interaction information.
The TrustedZone can directly and safely read the data of the camera which is not tampered with by IO, and the somatosensory interaction action is acquired.
It should be noted that after the somatosensory interaction information is collected, the face information of the front of the verification user can be collected, so as to assist in user identity verification.
Step 104: and verifying whether the somatosensory interaction action information is matched with the prompt information or not, and if so, successfully verifying the identity.
Comparing the acquired somatosensory interaction information with prompt information consisting of random points, and if the patterns and the sequence of the somatosensory interaction information and the prompt information are the same, successfully verifying the identity at this time; if not, the authentication is unsuccessful.
As an embodiment, if the face information of the front of the verified user is collected, it is further required to verify whether the face information matches the user identity, and if so, the user identity is successfully verified. The face matching is combined with the identity verification, namely multi-factor verification. Thereby increasing more safety for guaranteeing the accuracy of the character.
As an embodiment, before verification, the collected information may be encrypted by using an encryption algorithm, and the encrypted information is sent to the authentication server through the authentication client agent; the identity authentication client agent is a middle communication device between the authentication server and the identity authentication client; and the authentication server decrypts the encrypted information by using a corresponding decryption algorithm and then performs identity verification.
For security reasons, the trusted services in SGX and trustedzzone cannot directly perform system IO operations, i.e., cannot perform mutual communication. Thus, architecturally, the authentication client and authentication server are performed in two parts. The information can be sent only through the authentication client agent because the trusted execution environment and the authentication server cannot be connected together, so that the information is forwarded through the authentication client agent. But the identity authentication client-side agent is not in a trusted execution environment, in order to ensure the credibility of the acquired information in the transmission process, the information is encrypted and then transmitted, and the authentication server receives the information and then decrypts the information to verify the authenticity of the information. The authentication server is typically hosted on a cloud computing platform, using Intel SGX technology as the underlying trusted execution environment.
It should be noted that, when the embodiment of the present application is used in a remittance service of remittance across the border, the user's decryption information may also be collected; and when the verification is successful in the identity verification of the user on the authentication server, performing the payment releasing operation, thereby completing the identity certification of the payee in the process of remote identity verification. The embodiment of the application mainly utilizes a trusted execution environment and combines a multi-mode authentication technology, so that the safety problem in the remote proving process of a receiver in the cross-border remittance receiving business process is solved.
In addition to the authentication method, an embodiment of the present invention further provides an authentication apparatus, as shown in fig. 2, including:
display element 210, suggestion unit 220, acquisition unit 230 and verification unit 240, wherein:
the display unit 210 is configured to display a plurality of randomly generated points on a display screen by the authentication client; the authentication client is placed in a trusted execution environment in advance;
the prompting unit 220 is used for prompting the verification user to perform somatosensory interaction; the interaction is used as a somatosensory interaction action which is carried out by the verification user according to prompt information consisting of a plurality of randomly generated points;
the acquisition unit 230 is configured to acquire the somatosensory interaction information;
the verification unit 240 is configured to verify whether the somatosensory interaction information is matched with the prompt information, and if so, the identity verification is successful.
As an embodiment, the acquiring unit 230 may further include a face information acquiring unit, configured to acquire face information of the front of the authenticated user, so as to assist in user identity authentication;
the verification unit further includes:
and the face information verification unit is used for verifying whether the face information is matched with the user identity, and if so, the user identity is verified successfully.
As an embodiment, the authentication apparatus may further include:
the encryption unit is used for encrypting the acquired information by using an encryption algorithm;
the sending unit is used for sending the encrypted information to the authentication server through the identity verification client agent; the trusted client agent is an intermediate communication device of the authentication server and the identity verification client;
and the decryption unit is used for carrying out identity verification after the authentication server decrypts the encrypted information by using a corresponding decryption algorithm.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the apparatus embodiment, since it is substantially similar to the method embodiment, it is relatively simple to describe, and reference may be made to some descriptions of the method embodiment for relevant points. The above-described apparatus embodiments are merely illustrative, and the units and modules described as separate components may or may not be physically separate. In addition, some or all of the units and modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The foregoing is directed to embodiments of the present invention, and it is understood that various modifications and improvements can be made by those skilled in the art without departing from the spirit of the invention.

Claims (10)

1. An identity verification method, the method comprising:
the authentication client displays a plurality of randomly generated points on a display screen; the authentication client is placed in a trusted execution environment in advance;
prompting the verification user to perform somatosensory interaction; the interaction is used as a somatosensory interaction action which is carried out by the verification user according to prompt information consisting of a plurality of randomly generated points;
acquiring the somatosensory interaction action information;
and verifying whether the somatosensory interaction action information is matched with the prompt information or not, and if so, successfully verifying the identity.
2. The method of claim 1, wherein the prompting message comprises:
and prompting the verification user to perform eyeball tracking interactive action according to a dynamic continuous path formed by random points.
3. The method of claim 1, wherein the prompting message comprises:
and prompting the verification user to perform interactive actions of facial expression recurrence according to expression patterns formed by the random points.
4. The method of claim 1, wherein the prompting message comprises:
and prompting the verification user to perform head tracking and shaking interactive actions according to the bouncing direction of the random point.
5. The method of claim 1, wherein the collecting the somatosensory interaction information further comprises:
acquiring the face information of the front of the verified user so as to assist in user identity verification;
verifying whether the somatosensory interaction action information is matched with the prompt information or not, if so, successfully verifying the identity, and further comprising:
and verifying whether the face information is matched with the user identity, and if so, successfully verifying the user identity.
6. The method of any of claims 1-5, wherein verifying whether the somatosensory interaction information matches the reminder information further comprises:
encrypting the acquired information by using an encryption algorithm;
sending the encrypted information to an authentication server through an identity verification client agent; the identity authentication client agent is a middle communication device between the authentication server and the identity authentication client;
and the authentication server decrypts the encrypted information by using a corresponding decryption algorithm and then performs identity verification.
7. The method of claim 6, wherein the collecting the somatosensory interaction information further comprises:
collecting the user's decoding information;
and when the verification and the identity verification of the user on the authentication server are successful, performing the payment releasing operation.
8. An authentication apparatus, the apparatus comprising:
the device comprises a display unit, a prompt unit, a collection unit and a verification unit;
the display unit is used for displaying a plurality of randomly generated points on a display screen by the authentication client; the authentication client is placed in a trusted execution environment in advance;
the prompting unit is used for prompting the verification user to perform somatosensory interaction; the interaction is used as a somatosensory interaction action which is carried out by the verification user according to prompt information consisting of a plurality of randomly generated points;
the acquisition unit is used for acquiring the somatosensory interaction action information;
and the verification unit is used for verifying whether the somatosensory interaction action information is matched with the prompt information or not, and if so, the identity verification is successful.
9. The apparatus of claim 8, wherein the acquisition unit further comprises:
the face information acquisition unit is used for acquiring the face information of the front face of the authenticated user so as to assist in user identity authentication;
the verification unit further includes:
and the face information verification unit is used for verifying whether the face information is matched with the user identity, and if so, the user identity is verified successfully.
10. The apparatus of claim 8, further comprising:
the encryption unit is used for encrypting the acquired information by using an encryption algorithm;
the sending unit is used for sending the encrypted information to the authentication server through the identity verification client agent; the trusted client agent is an intermediate communication device of the authentication server and the identity verification client;
and the decryption unit is used for carrying out identity verification after the authentication server decrypts the encrypted information by using a corresponding decryption algorithm.
CN202010174588.8A 2019-12-16 2020-03-13 Identity verification method and device Pending CN111144896A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2019112959568 2019-12-16
CN201911295956 2019-12-16

Publications (1)

Publication Number Publication Date
CN111144896A true CN111144896A (en) 2020-05-12

Family

ID=70528535

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010174588.8A Pending CN111144896A (en) 2019-12-16 2020-03-13 Identity verification method and device

Country Status (1)

Country Link
CN (1) CN111144896A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112099634A (en) * 2020-09-17 2020-12-18 珠海格力电器股份有限公司 Interactive operation method and device based on head action, storage medium and terminal
CN112287909A (en) * 2020-12-24 2021-01-29 四川新网银行股份有限公司 Double-random in-vivo detection method for randomly generating detection points and interactive elements

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104298909A (en) * 2013-07-19 2015-01-21 富泰华工业(深圳)有限公司 Electronic device and identity verifying system and method
CN105468950A (en) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 Identity authentication method and apparatus, terminal and server
CN106203019A (en) * 2016-07-21 2016-12-07 北京光年无限科技有限公司 A kind of user ID authentication method for robot and robot
US20170310653A1 (en) * 2016-04-22 2017-10-26 Sony Corporation Client, server, method and identity verification system
CN108428135A (en) * 2017-11-28 2018-08-21 深圳萨摩耶互联网金融服务有限公司 Auth method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104298909A (en) * 2013-07-19 2015-01-21 富泰华工业(深圳)有限公司 Electronic device and identity verifying system and method
CN105468950A (en) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 Identity authentication method and apparatus, terminal and server
US20170310653A1 (en) * 2016-04-22 2017-10-26 Sony Corporation Client, server, method and identity verification system
CN106203019A (en) * 2016-07-21 2016-12-07 北京光年无限科技有限公司 A kind of user ID authentication method for robot and robot
CN108428135A (en) * 2017-11-28 2018-08-21 深圳萨摩耶互联网金融服务有限公司 Auth method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112099634A (en) * 2020-09-17 2020-12-18 珠海格力电器股份有限公司 Interactive operation method and device based on head action, storage medium and terminal
CN112287909A (en) * 2020-12-24 2021-01-29 四川新网银行股份有限公司 Double-random in-vivo detection method for randomly generating detection points and interactive elements

Similar Documents

Publication Publication Date Title
US11777726B2 (en) Methods and systems for recovering data using dynamic passwords
US11895225B2 (en) Systems and methods for trustworthy electronic authentication using a computing device
US10979227B2 (en) Blockchain ID connect
US10498541B2 (en) Electronic identification verification methods and systems
CN106575416B (en) System and method for authenticating a client to a device
US9577999B1 (en) Enhanced security for registration of authentication devices
WO2017032263A1 (en) Identity authentication method and apparatus
Gupta et al. Demystifying authentication concepts in smartphones: Ways and types to secure access
US10148630B2 (en) System and method for implementing a hosted authentication service
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US20230351388A1 (en) System, Device, and Method of User Authentication and Transaction Verification
WO2018072588A1 (en) Approval signature verification method, mobile device, terminal device, and system
US20230230085A1 (en) User Authentication and Transaction Verification via a Shared Video Stream
US20210125194A1 (en) Method and system for completing cross-channel transactions
CN111144896A (en) Identity verification method and device
US20230368206A1 (en) System, Device, and Method of Transaction Verification Based on Auxiliary Signals and Modulations
US20210194919A1 (en) System and method for protection against malicious program code injection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination