CN111144896A - Identity verification method and device - Google Patents
Identity verification method and device Download PDFInfo
- Publication number
- CN111144896A CN111144896A CN202010174588.8A CN202010174588A CN111144896A CN 111144896 A CN111144896 A CN 111144896A CN 202010174588 A CN202010174588 A CN 202010174588A CN 111144896 A CN111144896 A CN 111144896A
- Authority
- CN
- China
- Prior art keywords
- information
- verification
- identity
- user
- somatosensory interaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/174—Facial expression recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/20—Movements or behaviour, e.g. gesture recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/40—Spoof detection, e.g. liveness detection
- G06V40/45—Detection of the body part being alive
Abstract
The embodiment of the invention discloses an identity authentication method and an identity authentication device, wherein the method comprises the following steps: the authentication client displays a plurality of randomly generated points on a display screen; the authentication client is placed in a trusted execution environment in advance; prompting the verification user to perform somatosensory interaction; acquiring the somatosensory interaction action information; and verifying whether the somatosensory interaction action information is matched with the prompt information or not, and if so, successfully verifying the identity. By the identity authentication method provided by the embodiment of the application, the identity authentication client is placed in the trusted execution environment, and the trusted execution environment can ensure that information is not tampered in the process of acquiring the identity information of the authenticated user. The prompt information consisting of the random points is used for prompting the user to perform random somatosensory interaction, so that the fact that the verification user is a living body instead of a photo can be guaranteed, the fact that the verification user is a living body instead of a video can be guaranteed, information is effectively prevented from being falsely used, and the credibility of identity verification is improved.
Description
The present application claims priority of chinese patent application having application number 201911295956.8 entitled "method and apparatus for identity verification" filed in 2019 at 16.12.2019, the entire contents of which are incorporated herein by reference.
Technical Field
The invention relates to the field of information security, in particular to an identity authentication method and device.
Background
With the development of information technology, internet finance is also in progress. As the name implies, internet finance is the online financial transaction over the internet. Because internet finance cannot be authenticated in an offline and opposite manner like a traditional financial method, the risk of fraud in internet finance is extremely high. For example, in the remittance service of cross-border remittance, the remittance certificate informed by the remitter can complete the remittance process through a third-party channel such as a bank counter, a mobile phone bank, an internet bank, or a payer, and the identity verification of the remittance is particularly important.
In the prior art, people are usually authenticated by adopting a biological verification mode such as fingerprints, passwords or human faces, or by adding short message verification codes. It still does not guarantee that the payee's identity will not be tampered with or falsely used. For example, if the authenticated program code is tampered, the collected biometric information is false, or the attacker uses a replay attack means to use the recorded video for identity masquerading.
Therefore, how to ensure the accuracy of identity information of a payee in internet finance becomes a problem to be solved urgently.
Disclosure of Invention
In order to solve the problems, the application provides an identity verification method and device which can ensure that the information of a payee is not falsified or falsely used in internet finance, so that the accuracy of the identity information of the payee is ensured.
In a first aspect of the present application, there is provided an identity verification method, the method comprising:
the authentication client displays a plurality of randomly generated points on a display screen; the authentication client is placed in a trusted execution environment in advance;
prompting the verification user to perform somatosensory interaction; the interaction is used as a somatosensory interaction action which is carried out by the verification user according to prompt information consisting of a plurality of randomly generated points;
acquiring the somatosensory interaction action information;
and verifying whether the somatosensory interaction action information is matched with the prompt information or not, and if so, successfully verifying the identity.
Optionally, the prompt information includes:
and prompting the verification user to perform eyeball tracking interactive action according to a dynamic continuous path formed by random points.
Optionally, the prompt information includes:
and prompting the verification user to perform interactive actions of facial expression recurrence according to expression patterns formed by the random points.
Optionally, the prompt information includes:
and prompting the verification user to perform head tracking and shaking interactive actions according to the bouncing direction of the random point.
Optionally, the acquiring the somatosensory interaction information further includes:
acquiring the face information of the front of the verified user so as to assist in user identity verification;
verifying whether the somatosensory interaction action information is matched with the prompt information or not, if so, successfully verifying the identity, and further comprising:
and verifying whether the face information is matched with the user identity, and if so, successfully verifying the user identity.
Optionally, before verifying whether the somatosensory interaction information is matched with the prompt information, the method further includes:
encrypting the acquired information by using an encryption algorithm;
sending the encrypted information to an authentication server through an identity verification client agent; the identity authentication client agent is a middle communication device between the authentication server and the identity authentication client;
and the authentication server decrypts the encrypted information by using a corresponding decryption algorithm and then performs identity verification.
Optionally, the acquiring the somatosensory interaction information further includes:
collecting the user's decoding information;
and when the verification and the identity verification of the user on the authentication server are successful, performing the payment releasing operation.
In a second aspect of the present application there is provided an authentication apparatus, the apparatus comprising:
the device comprises a display unit, a prompt unit, a collection unit and a verification unit;
the display unit is used for displaying a plurality of randomly generated points on a display screen by the authentication client; the authentication client is placed in a trusted execution environment in advance;
the prompting unit is used for prompting the verification user to perform somatosensory interaction; the interaction is used as a somatosensory interaction action which is carried out by the verification user according to prompt information consisting of a plurality of randomly generated points;
the acquisition unit is used for acquiring the somatosensory interaction action information;
and the verification unit is used for verifying whether the somatosensory interaction action information is matched with the prompt information or not, and if so, the identity verification is successful.
Optionally, the collecting unit further includes:
the face information acquisition unit is used for acquiring the face information of the front face of the authenticated user so as to assist in user identity authentication;
the verification unit further includes:
and the face information verification unit is used for verifying whether the face information is matched with the user identity, and if so, the user identity is verified successfully.
Optionally, the method further includes:
the encryption unit is used for encrypting the acquired information by using an encryption algorithm;
the sending unit is used for sending the encrypted information to the authentication server through the identity verification client agent; the trusted client agent is an intermediate communication device of the authentication server and the identity verification client;
and the decryption unit is used for carrying out identity verification after the authentication server decrypts the encrypted information by using a corresponding decryption algorithm.
Compared with the prior art, the technical scheme of the application has the advantages that:
according to the technical method, firstly, an identity authentication client displays a plurality of randomly generated points on a display screen, then prompts an authentication user to perform somatosensory interaction, acquires somatosensory interaction information, and finally verifies whether the somatosensory interaction information is matched with the prompt information, and if the somatosensory interaction information is matched with the prompt information, identity authentication is successful. By the technical scheme, the identity authentication client is placed in the trusted execution environment, and the trusted execution environment can ensure that information is not tampered in the process of acquiring the identity information of the authenticated user. The prompt information consisting of the random points is used for prompting the user to perform random somatosensory interaction, so that the fact that the verification user is a living body instead of a photo can be guaranteed, the fact that the verification user is a living body instead of a video can be guaranteed, information is effectively prevented from being falsely used, and the credibility of identity verification is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of an authentication method provided in the present application;
fig. 2 is a schematic diagram of an authentication device structure provided in the present application.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart of an authentication method provided in the present application, which may include the following steps 101-104.
Step 101: the authentication client displays a plurality of randomly generated points on a display screen; the authentication client is pre-placed in the trusted execution environment.
The authentication client displays a plurality of randomly generated points on the display screen, and the randomly generated points can be combined into a dynamic snake-shaped continuous path, a dynamic triangle-shaped continuous path, a dynamic zigzag-shaped continuous path and the like according to the sequence change of the points, or bounce with uncertain directions on the display screen like a ball and the like. These randomly generated points may also be stacked in terms of points and dots, combining facial expressions for adults, such as mouth opening, blinking, smiling, split teeth, and the like.
The authentication client is pre-placed in the trusted execution environment, for example, ARM TrustZone is used as the underlying technology for supporting the trusted execution environment. The trusted execution environment can ensure that the information collected by the subsequent authentication client is not tampered and is trusted data. Because trusted execution environments are often used to guarantee the trustworthiness of operating systems, running programs, i.e., executing as intended, without tampering by attackers. The trusted execution environment is also assisted by hardware, but does not need to guarantee the security of the bottom operating system, and a secure trusted execution environment is established by utilizing a coprocessor or an extra instruction set mode in a processor of the device, so that programs, data and the like in the trusted execution environment cannot be touched even by the bottom management software, the operating system and the like of the device.
When the embodiment of the application is used in a banking scene, the credibility of verification data can be ensured at the source, the reliability of identity verification can be ensured, and the benefits of customers can be protected to the greatest extent. For example, in a remittance service of cross-border remittance, if the remittance is received through a third-party channel such as a payer, since the third-party application is not placed in a trusted execution environment, an unsafe environment may be maliciously attacked by an attacker, so that when information is subsequently collected, even if an identity thief tampers, by tampering with a collection program, originally wrong information is tampered with correct information, and the identity thief becomes a real payee. Specifically, the trusted execution environment verifies the validity of the currently executing program, ensures the correctness of the program, and provides a certification report. Namely, the trusted execution environment is adopted to ensure that the information is not tampered in the process of acquiring the person identity information by the third-party platform, so that the accuracy of the payee identity information is ensured.
Step 102: prompting the verification user to perform somatosensory interaction; and the interaction is used as a somatosensory interaction action which is carried out by the verification user according to the prompt information consisting of the plurality of randomly generated points.
The identity authentication client can display prompt information on a display screen to prompt an authentication user to perform somatosensory interaction according to random points displayed on the screen. For example, when the random points are combined into a dynamic snake-shaped continuous path according to the sequence change of the points and the points, the verification user can be prompted to keep the head still, and the eyeball tracks the snake-shaped continuous path along the sequence of the random points; when the random points are combined into the facial expression of the adult, the verification user can be prompted to reproduce the same expression according to the expression formed by the random points; when the random point bounces on the display screen in an uncertain direction like a ball, the verification user can perform head tracking motion according to the bouncing direction of the random point.
The user is verified to perform somatosensory interaction through prompting, and because the interaction is random, the verification user does not only blink, turn around and the like, but also performs random somatosensory interaction. The method and the system can not only prove that the verification user is a living body, but also avoid that other people adopt videos of actual real users to prove that the users are dynamic instead of photos, thereby improving the credibility of authentication.
Step 103: and acquiring the somatosensory interaction information.
The TrustedZone can directly and safely read the data of the camera which is not tampered with by IO, and the somatosensory interaction action is acquired.
It should be noted that after the somatosensory interaction information is collected, the face information of the front of the verification user can be collected, so as to assist in user identity verification.
Step 104: and verifying whether the somatosensory interaction action information is matched with the prompt information or not, and if so, successfully verifying the identity.
Comparing the acquired somatosensory interaction information with prompt information consisting of random points, and if the patterns and the sequence of the somatosensory interaction information and the prompt information are the same, successfully verifying the identity at this time; if not, the authentication is unsuccessful.
As an embodiment, if the face information of the front of the verified user is collected, it is further required to verify whether the face information matches the user identity, and if so, the user identity is successfully verified. The face matching is combined with the identity verification, namely multi-factor verification. Thereby increasing more safety for guaranteeing the accuracy of the character.
As an embodiment, before verification, the collected information may be encrypted by using an encryption algorithm, and the encrypted information is sent to the authentication server through the authentication client agent; the identity authentication client agent is a middle communication device between the authentication server and the identity authentication client; and the authentication server decrypts the encrypted information by using a corresponding decryption algorithm and then performs identity verification.
For security reasons, the trusted services in SGX and trustedzzone cannot directly perform system IO operations, i.e., cannot perform mutual communication. Thus, architecturally, the authentication client and authentication server are performed in two parts. The information can be sent only through the authentication client agent because the trusted execution environment and the authentication server cannot be connected together, so that the information is forwarded through the authentication client agent. But the identity authentication client-side agent is not in a trusted execution environment, in order to ensure the credibility of the acquired information in the transmission process, the information is encrypted and then transmitted, and the authentication server receives the information and then decrypts the information to verify the authenticity of the information. The authentication server is typically hosted on a cloud computing platform, using Intel SGX technology as the underlying trusted execution environment.
It should be noted that, when the embodiment of the present application is used in a remittance service of remittance across the border, the user's decryption information may also be collected; and when the verification is successful in the identity verification of the user on the authentication server, performing the payment releasing operation, thereby completing the identity certification of the payee in the process of remote identity verification. The embodiment of the application mainly utilizes a trusted execution environment and combines a multi-mode authentication technology, so that the safety problem in the remote proving process of a receiver in the cross-border remittance receiving business process is solved.
In addition to the authentication method, an embodiment of the present invention further provides an authentication apparatus, as shown in fig. 2, including:
the display unit 210 is configured to display a plurality of randomly generated points on a display screen by the authentication client; the authentication client is placed in a trusted execution environment in advance;
the prompting unit 220 is used for prompting the verification user to perform somatosensory interaction; the interaction is used as a somatosensory interaction action which is carried out by the verification user according to prompt information consisting of a plurality of randomly generated points;
the acquisition unit 230 is configured to acquire the somatosensory interaction information;
the verification unit 240 is configured to verify whether the somatosensory interaction information is matched with the prompt information, and if so, the identity verification is successful.
As an embodiment, the acquiring unit 230 may further include a face information acquiring unit, configured to acquire face information of the front of the authenticated user, so as to assist in user identity authentication;
the verification unit further includes:
and the face information verification unit is used for verifying whether the face information is matched with the user identity, and if so, the user identity is verified successfully.
As an embodiment, the authentication apparatus may further include:
the encryption unit is used for encrypting the acquired information by using an encryption algorithm;
the sending unit is used for sending the encrypted information to the authentication server through the identity verification client agent; the trusted client agent is an intermediate communication device of the authentication server and the identity verification client;
and the decryption unit is used for carrying out identity verification after the authentication server decrypts the encrypted information by using a corresponding decryption algorithm.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the apparatus embodiment, since it is substantially similar to the method embodiment, it is relatively simple to describe, and reference may be made to some descriptions of the method embodiment for relevant points. The above-described apparatus embodiments are merely illustrative, and the units and modules described as separate components may or may not be physically separate. In addition, some or all of the units and modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The foregoing is directed to embodiments of the present invention, and it is understood that various modifications and improvements can be made by those skilled in the art without departing from the spirit of the invention.
Claims (10)
1. An identity verification method, the method comprising:
the authentication client displays a plurality of randomly generated points on a display screen; the authentication client is placed in a trusted execution environment in advance;
prompting the verification user to perform somatosensory interaction; the interaction is used as a somatosensory interaction action which is carried out by the verification user according to prompt information consisting of a plurality of randomly generated points;
acquiring the somatosensory interaction action information;
and verifying whether the somatosensory interaction action information is matched with the prompt information or not, and if so, successfully verifying the identity.
2. The method of claim 1, wherein the prompting message comprises:
and prompting the verification user to perform eyeball tracking interactive action according to a dynamic continuous path formed by random points.
3. The method of claim 1, wherein the prompting message comprises:
and prompting the verification user to perform interactive actions of facial expression recurrence according to expression patterns formed by the random points.
4. The method of claim 1, wherein the prompting message comprises:
and prompting the verification user to perform head tracking and shaking interactive actions according to the bouncing direction of the random point.
5. The method of claim 1, wherein the collecting the somatosensory interaction information further comprises:
acquiring the face information of the front of the verified user so as to assist in user identity verification;
verifying whether the somatosensory interaction action information is matched with the prompt information or not, if so, successfully verifying the identity, and further comprising:
and verifying whether the face information is matched with the user identity, and if so, successfully verifying the user identity.
6. The method of any of claims 1-5, wherein verifying whether the somatosensory interaction information matches the reminder information further comprises:
encrypting the acquired information by using an encryption algorithm;
sending the encrypted information to an authentication server through an identity verification client agent; the identity authentication client agent is a middle communication device between the authentication server and the identity authentication client;
and the authentication server decrypts the encrypted information by using a corresponding decryption algorithm and then performs identity verification.
7. The method of claim 6, wherein the collecting the somatosensory interaction information further comprises:
collecting the user's decoding information;
and when the verification and the identity verification of the user on the authentication server are successful, performing the payment releasing operation.
8. An authentication apparatus, the apparatus comprising:
the device comprises a display unit, a prompt unit, a collection unit and a verification unit;
the display unit is used for displaying a plurality of randomly generated points on a display screen by the authentication client; the authentication client is placed in a trusted execution environment in advance;
the prompting unit is used for prompting the verification user to perform somatosensory interaction; the interaction is used as a somatosensory interaction action which is carried out by the verification user according to prompt information consisting of a plurality of randomly generated points;
the acquisition unit is used for acquiring the somatosensory interaction action information;
and the verification unit is used for verifying whether the somatosensory interaction action information is matched with the prompt information or not, and if so, the identity verification is successful.
9. The apparatus of claim 8, wherein the acquisition unit further comprises:
the face information acquisition unit is used for acquiring the face information of the front face of the authenticated user so as to assist in user identity authentication;
the verification unit further includes:
and the face information verification unit is used for verifying whether the face information is matched with the user identity, and if so, the user identity is verified successfully.
10. The apparatus of claim 8, further comprising:
the encryption unit is used for encrypting the acquired information by using an encryption algorithm;
the sending unit is used for sending the encrypted information to the authentication server through the identity verification client agent; the trusted client agent is an intermediate communication device of the authentication server and the identity verification client;
and the decryption unit is used for carrying out identity verification after the authentication server decrypts the encrypted information by using a corresponding decryption algorithm.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2019112959568 | 2019-12-16 | ||
CN201911295956 | 2019-12-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111144896A true CN111144896A (en) | 2020-05-12 |
Family
ID=70528535
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010174588.8A Pending CN111144896A (en) | 2019-12-16 | 2020-03-13 | Identity verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111144896A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112099634A (en) * | 2020-09-17 | 2020-12-18 | 珠海格力电器股份有限公司 | Interactive operation method and device based on head action, storage medium and terminal |
CN112287909A (en) * | 2020-12-24 | 2021-01-29 | 四川新网银行股份有限公司 | Double-random in-vivo detection method for randomly generating detection points and interactive elements |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104298909A (en) * | 2013-07-19 | 2015-01-21 | 富泰华工业(深圳)有限公司 | Electronic device and identity verifying system and method |
CN105468950A (en) * | 2014-09-03 | 2016-04-06 | 阿里巴巴集团控股有限公司 | Identity authentication method and apparatus, terminal and server |
CN106203019A (en) * | 2016-07-21 | 2016-12-07 | 北京光年无限科技有限公司 | A kind of user ID authentication method for robot and robot |
US20170310653A1 (en) * | 2016-04-22 | 2017-10-26 | Sony Corporation | Client, server, method and identity verification system |
CN108428135A (en) * | 2017-11-28 | 2018-08-21 | 深圳萨摩耶互联网金融服务有限公司 | Auth method |
-
2020
- 2020-03-13 CN CN202010174588.8A patent/CN111144896A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104298909A (en) * | 2013-07-19 | 2015-01-21 | 富泰华工业(深圳)有限公司 | Electronic device and identity verifying system and method |
CN105468950A (en) * | 2014-09-03 | 2016-04-06 | 阿里巴巴集团控股有限公司 | Identity authentication method and apparatus, terminal and server |
US20170310653A1 (en) * | 2016-04-22 | 2017-10-26 | Sony Corporation | Client, server, method and identity verification system |
CN106203019A (en) * | 2016-07-21 | 2016-12-07 | 北京光年无限科技有限公司 | A kind of user ID authentication method for robot and robot |
CN108428135A (en) * | 2017-11-28 | 2018-08-21 | 深圳萨摩耶互联网金融服务有限公司 | Auth method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112099634A (en) * | 2020-09-17 | 2020-12-18 | 珠海格力电器股份有限公司 | Interactive operation method and device based on head action, storage medium and terminal |
CN112287909A (en) * | 2020-12-24 | 2021-01-29 | 四川新网银行股份有限公司 | Double-random in-vivo detection method for randomly generating detection points and interactive elements |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11777726B2 (en) | Methods and systems for recovering data using dynamic passwords | |
US11895225B2 (en) | Systems and methods for trustworthy electronic authentication using a computing device | |
US10979227B2 (en) | Blockchain ID connect | |
US10498541B2 (en) | Electronic identification verification methods and systems | |
CN106575416B (en) | System and method for authenticating a client to a device | |
US9577999B1 (en) | Enhanced security for registration of authentication devices | |
WO2017032263A1 (en) | Identity authentication method and apparatus | |
Gupta et al. | Demystifying authentication concepts in smartphones: Ways and types to secure access | |
US10148630B2 (en) | System and method for implementing a hosted authentication service | |
WO2018145127A1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
US20230351388A1 (en) | System, Device, and Method of User Authentication and Transaction Verification | |
WO2018072588A1 (en) | Approval signature verification method, mobile device, terminal device, and system | |
US20230230085A1 (en) | User Authentication and Transaction Verification via a Shared Video Stream | |
US20210125194A1 (en) | Method and system for completing cross-channel transactions | |
CN111144896A (en) | Identity verification method and device | |
US20230368206A1 (en) | System, Device, and Method of Transaction Verification Based on Auxiliary Signals and Modulations | |
US20210194919A1 (en) | System and method for protection against malicious program code injection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |