CN112598424A - Authentication method and system based on action password - Google Patents

Authentication method and system based on action password Download PDF

Info

Publication number
CN112598424A
CN112598424A CN202011589845.0A CN202011589845A CN112598424A CN 112598424 A CN112598424 A CN 112598424A CN 202011589845 A CN202011589845 A CN 202011589845A CN 112598424 A CN112598424 A CN 112598424A
Authority
CN
China
Prior art keywords
beacon
authentication module
theta
action
motion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011589845.0A
Other languages
Chinese (zh)
Inventor
赵东
周晶
董逢华
何涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Tianyu Julian Technology Co ltd
Original Assignee
Wuhan Tianyu Julian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Tianyu Julian Technology Co ltd filed Critical Wuhan Tianyu Julian Technology Co ltd
Priority to CN202011589845.0A priority Critical patent/CN112598424A/en
Publication of CN112598424A publication Critical patent/CN112598424A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Lock And Its Accessories (AREA)

Abstract

An authentication method and system based on action password comprises an authentication module and a beacon, and the method comprises the following steps: a user sets an unlocking action characteristic value on an authentication module in advance; when the beacon reaches the identification range of the authentication module, acquiring the action track information of the beacon, and calculating the action characteristic value of the beacon based on the action track information of the beacon; and comparing the acquired action characteristic value of the beacon with an unlocking action characteristic value preset on the authentication module, and if the comparison is passed, the authentication is passed. The authentication module is also bound with the unique identification of all beacon which can be authorized in advance, when the beacon reaches the identification range of the authentication module, the unique identification of the beacon is identified, and whether the beacon is the beacon which can be authorized is judged. The action password is not objective authentication data such as passwords, fingerprints and MAC, and is more virtual; and the binding of a beacon-action password is combined, so that the cracking significance becomes smaller and the value is more useless.

Description

Authentication method and system based on action password
Technical Field
The invention relates to the field of password authentication, in particular to an authentication method and system based on an action password.
Background
The existing indoor positioning technology is mature day by day, but the cost of large-area laying is high, and effective commercial use cannot be formed.
Such as an intelligent door lock, NFC bump-on-bump payment, code scanning payment, or face opening, which are all authentication procedures in nature. But the use experience has no small limitation. For example, code scanning payment requires a user to take out a mobile phone and call a two-dimensional code to be scanned or payment software actively focuses on code scanning; and in the NFC payment, the NFC equipment or the card also needs to be taken out and pasted on a card reader for confirmation transaction. The keyless entry technology of the vehicle achieves the experience of noninductive entry, but the only authentication means is the RFID key, once the key is lost, the only authentication constraint is lost, and other people can obtain the door opening authority when taking the key. The face opens the door, has reached the experience of noninductive to a certain extent, trails the seizure based on the camera, need not the people and carries out too much operation. But the only element of the authentication is limited, the authentication based on the biological identification technology is determined, the transfer of the authentication cannot be carried out, and only the new authenticator can be added in an adding mode. In some non-network environments such as vehicles and smart locks, the newly added users lose the experience of non-sensitive authentication.
If authentication such as identity authentication or unlocking authentication and payment authentication can be carried out under the condition of ensuring noninductivity, and the privacy effect is kept, others cannot imitate the authentication or cannot imitate the authentication under the condition of having a key, further, the flexible transfer of the authentication capability is supported, and the use experience of a user can be greatly improved.
Disclosure of Invention
In view of the technical defects and technical drawbacks in the prior art, embodiments of the present invention provide an authentication method and system based on an action password, which overcome the above problems or at least partially solve the above problems, and the specific scheme is as follows:
as a first aspect of the present invention, there is provided an authentication method based on an action password, including an authentication module and a beacon, the method including:
step 1, a user sets an unlocking action characteristic value on an authentication module in advance;
step 2, when the beacon reaches the identification range of the authentication module, acquiring the action track information of the beacon, and calculating the action characteristic value of the beacon based on the action track information of the beacon;
and 3, comparing the acquired action characteristic value of the beacon with an unlocking action characteristic value preset on the authentication module, and if the comparison is passed, the authentication is passed.
Further, in step 2: the method comprises the steps that unique identifications of all beacon capable of being authorized are bound in advance in an authentication module, when the beacon reaches the identification range of the authentication module, the unique identification of the beacon is identified, whether the beacon is the beacon capable of being authorized is judged through the unique identification, if yes, the motion track information of the beacon is obtained, the motion characteristic value of the beacon is calculated based on the motion track information of the beacon, and if not, the authentication is judged to be failed.
Further, step 2 specifically comprises:
when the beacon reaches the identification range of the authentication module, acquiring a direction angle theta 1 and a position elevation angle theta 2 of the beacon relative to the authentication module in real time, calculating an arrival angle theta (theta 1 and theta 2) between the beacon and an antenna of the authentication module through the theta 1 and the theta 2, acquiring a distance S between the beacon and the antenna of the authentication module in real time, and calculating a relative position A of the beacon in a coordinate system of the authentication module in real time by combining the theta (theta 1, theta 2) and the S;
when a user holds the beacon and makes an action, forming action track information of the beacon based on the relative position A of the beacon acquired at each moment in the coordinate system of the authentication module;
the action track information of the beacon consists of n time-continuous track points, namely A1, A2, … and An, wherein Ai is the relative position of the beacon acquired at the ith moment in a coordinate system of the authentication module, namely the track point at the ith moment;
and finding out all motion inflection points from the motion track information, determining track points corresponding to each motion inflection point, and sequentially connecting the track points corresponding to all the motion inflection points according to a time sequence to form a simplest graph as a motion characteristic value of the beacon based on the motion trend.
Further, finding out a motion inflection point from the motion trajectory information specifically includes: and (3) setting the trace point at the ith moment as Ai, determining the trace point at the ith moment as an arrival angle theta i corresponding to the Ai, judging whether the arrival angle theta i corresponding to the trace point Ai at the ith moment is greater than or less than the arrival angle theta i corresponding to the trace point at the left and right adjacent moments, namely judging whether the theta i is greater than or less than theta (i-1) and theta (i +1) at the same time, if so, setting the trace point Ai corresponding to the theta i as a motion inflection point, and traversing all the trace points according to the motion inflection point to find out all the motion inflection points.
Further, the method further comprises: in order to improve the accuracy of authentication, avoid the identification obstacle in the angle and increase the compensation algorithm of inflection point extraction, the following steps are specifically performed:
extracting all motion inflection points, wherein j operation inflection points are A1, A2, … and Aj respectively;
selecting a first motion inflection point A1 as a benchmark reference point, connecting a point O in the authentication module coordinate system with the benchmark reference point to form a benchmark reference line, and taking a surface which is vertical to the reference line and passes through A1 as a reference surface P;
connecting the second motion inflection point A2 with the point O, passing through the reference plane P as the projected point A2 of A22(θ22,S22);
Obtaining the relative distances S21 and A2 of A2 and A12Relative distance to A1S 212Thereby calculating the scale L as S21/S212
Obtaining the relative distance S32 between A3 and A2, and calculating the relative distance S32 of the similar graph after being reduced based on the scaling L2(ii) a And calculating the relative distance S31 between the A3 and the A1 after the A3 is zoomed2(ii) a Combining the coordinates of A1, A22Relative distance S322Relative distance S312Projected on the P plane, A3 is calculated2New coordinates of (2);
similarly, the relative distance Si (i-1) between Ai and A (i-1) is obtained, and the reduced relative distance Si (i-1) of the similar graph is calculated based on the scaling L2(ii) a Calculate Ai scaled phase with A1For distance Si12(ii) a Combining the coordinates of A1, A (i-1)2Relative distance Si (i-1)2Relative distance Si12Projected on the P plane, and then calculated to obtain Ai2Wherein i is greater than or equal to 3;
all motion inflection points are traversed accordingly to finish A1, A2, …, Aj to A1 and A22,…,Aj2The space conversion ensures the planar reduction degree of the action characteristic value.
As a second aspect of the present invention, an authentication system based on an action password is provided, the system includes an authentication module, a beacon, a setting unit, a feature value calculating unit, and a comparing unit;
the setting unit is used for setting an unlocking action characteristic value on the authentication module in advance by a user;
the characteristic value calculating unit is used for acquiring the action track information of the beacon when the beacon reaches the identification range of the authentication module, and calculating the action characteristic value of the beacon based on the action track information of the beacon;
the comparison unit is used for comparing the acquired action characteristic value of the beacon with an unlocking action characteristic value which is preset on the authentication module, and if the comparison is passed, the authentication is passed.
The system further comprises an identification recognition unit, wherein unique identifications of all beacon capable of being authorized are bound in the authentication module in advance, the identification recognition unit is used for recognizing the unique identification of the beacon when the beacon reaches the identification range of the authentication module, and whether the beacon is the beacon capable of being authorized is judged through the unique identification.
Further, the feature value calculation unit is specifically configured to:
when the beacon reaches the identification range of the authentication module, acquiring a direction angle theta 1 and a position elevation angle theta 2 of the beacon relative to the authentication module in real time, calculating an arrival angle theta (theta 1 and theta 2) between the beacon and an antenna of the authentication module through the theta 1 and the theta 2, acquiring a distance S between the beacon and the antenna of the authentication module in real time, and calculating a relative position A of the beacon in a coordinate system of the authentication module in real time by combining the theta (theta 1, theta 2) and the S;
when a user holds the beacon and makes an action, forming action track information of the beacon based on the relative position A of the beacon acquired at each moment in the coordinate system of the authentication module;
the action track information of the beacon consists of n time-continuous track points, namely A1, A2, … and An, wherein Ai is the relative position of the beacon acquired at the ith moment in a coordinate system of the authentication module, namely the track point at the ith moment;
and finding out all motion inflection points from the motion track information, determining track points corresponding to each motion inflection point, and sequentially connecting the track points corresponding to all the motion inflection points according to a time sequence to form a simplest graph as a motion characteristic value of the beacon based on the motion trend.
Further, finding out a motion inflection point from the motion trajectory information specifically includes: and (3) setting the trace point at the ith moment as Ai, determining the trace point at the ith moment as an arrival angle theta i corresponding to the Ai, judging whether the arrival angle theta i corresponding to the trace point Ai at the ith moment is greater than or less than the arrival angle theta i corresponding to the trace point at the left and right adjacent moments, namely judging whether the theta i is greater than or less than theta (i-1) and theta (i +1) at the same time, if so, setting the trace point Ai corresponding to the theta i as a motion inflection point, and traversing all the trace points according to the motion inflection point to find out all the motion inflection points.
Further, the system further includes an inflection point compensation unit, where the inflection point compensation unit is used for compensation of inflection point extraction, and specifically includes the following steps:
extracting all motion inflection points, wherein j operation inflection points are A1, A2, … and Aj respectively;
selecting a first motion inflection point A1 as a benchmark reference point, connecting a point O in the authentication module coordinate system with the benchmark reference point to form a benchmark reference line, and taking a surface which is vertical to the reference line and passes through A1 as a reference surface P;
connecting the second motion inflection point A2 with the point O, passing through the reference plane P as the projected point A2 of A22(θ22,S22);
Obtaining the relative distances S21 and A2 of A2 and A12Relative distance to A1S 212Thereby calculating a ratioExample L-S21/S212
Obtaining the relative distance S32 between A3 and A2, and calculating the relative distance S32 of the similar graph after being reduced based on the scaling L2(ii) a And calculating the relative distance S31 between the A3 and the A1 after the A3 is zoomed2(ii) a Combining the coordinates of A1, A22Relative distance S322Relative distance S312Projected on the P plane, A3 is calculated2New coordinates of (2);
similarly, the relative distance Si (i-1) between Ai and A (i-1) is obtained, and the reduced relative distance Si (i-1) of the similar graph is calculated based on the scaling L2(ii) a Calculating the relative distance Si1 between the scaled Ai and A12(ii) a Combining the coordinates of A1, A (i-1)2Relative distance Si (i-1)2Relative distance Si12Projected on the P plane, and then calculated to obtain Ai2New coordinates of (2);
all motion inflection points are traversed accordingly to obtain A22,…,Aj2Thus, A1, A2, …, Aj to A1, A2 were completed2,…,Aj2The space conversion ensures the planar reduction degree of the action characteristic value.
The invention has the following beneficial effects:
1. the payment scene is more convenient, the support of ambient light is not needed, and the scene requirement is low;
2. in the existing payment scene, particularly focusing of a camera needs to consider focusing and equipment placement positions no matter a code or a face is scanned, but an action password of the invention does not need precise focusing and does not select equipment height and placement positions;
3. the payment scene of the invention supports authorization, if a temporary password is set and is invalid after being transferred to other people for use, the payment scene can be safely used by a host, the payment scene is more flexible than the code scanning payment for dependence on the unique password of the mobile phone and disclosure risk, and the limitation that face recognition cannot be transferred is compared, the action password is more flexible 4. the invention is not afraid of beacon loss, has secondary protection of the motion password, can ensure safety even if the beacon is lost, and can not enable the picked-up personnel to obtain illegal authentication capability;
5. the password is difficult to be solved, and the action password is not objective authentication data such as passwords, fingerprints and MAC, and is more virtual; and the binding of a beacon-action password is combined, so that the cracking significance becomes smaller and the value is more useless.
Drawings
Fig. 1 is a flowchart of an authentication method based on an action password according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a relative position a in a coordinate system of a beacon and an authentication module according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, as a first embodiment of the present invention, there is provided an authentication method based on an action password, including an authentication module and a beacon, the method including:
step 1, a user sets an unlocking action characteristic value on an authentication module in advance;
step 2, when the beacon reaches the identification range of the authentication module, acquiring the action track information of the beacon, and calculating the action characteristic value of the beacon based on the action track information of the beacon;
and 3, comparing the acquired action characteristic value of the beacon with an unlocking action characteristic value preset on the authentication module, and if the comparison is passed, the authentication is passed.
The authentication module can be any intelligent terminal with UWB (ultra wide band) or Bluetooth AOA (automatic optical access), such as a UWB base station, a Bluetooth base station, a money receiving terminal with UWB or Bluetooth AOA, a lockset and the like, the positioning algorithm of UWB and Bluetooth AOA is mature, and the positioning algorithm is not repeated and is only described based on authentication.
Preferably, in step 2: the method comprises the steps that unique identifications of all beacon capable of being authorized are bound in advance in an authentication module, when the beacon reaches the identification range of the authentication module, the unique identification of the beacon is identified, whether the beacon is the beacon capable of being authorized is judged through the unique identification, if yes, the motion track information of the beacon is obtained, the motion characteristic value of the beacon is calculated based on the motion track information of the beacon, and if not, the authentication is judged to be failed.
Preferably, step 2 is specifically:
when a beacon reaches the identification range of an authentication module, acquiring a direction angle theta 1 and a position elevation angle theta 2 of the beacon relative to the authentication module in real time, calculating an arrival angle theta (theta 1, theta 2) between the beacon and an antenna of the authentication module through the theta 1 and the theta 2, acquiring a distance S between the beacon and the antenna of the authentication module in real time, and calculating a relative position A of the beacon in a coordinate system of the authentication module in real time by combining the theta (theta 1, theta 2) and the S, as shown in fig. 2, it needs to be explained that a positioning algorithm is mature, and description is not repeated herein but only based on authentication;
when a user holds the beacon and makes an action, forming action track information of the beacon based on the relative position A of the beacon acquired at each moment in the coordinate system of the authentication module;
the action track information of the beacon consists of n time-continuous track points, namely A1, A2, … and An, wherein Ai is the relative position of the beacon acquired at the ith moment in a coordinate system of the authentication module, namely the track point at the ith moment;
and finding out all motion inflection points from the motion track information, determining track points corresponding to each motion inflection point, and sequentially connecting the track points corresponding to all the motion inflection points according to a time sequence to form a simplest graph as a motion characteristic value of the beacon based on the motion trend.
Preferably, finding out a motion inflection point from the motion trajectory information specifically includes: and (3) setting the trace point at the ith moment as Ai, determining the trace point at the ith moment as an arrival angle theta i corresponding to the Ai, judging whether the arrival angle theta i corresponding to the trace point Ai at the ith moment is greater than or less than the arrival angle theta i corresponding to the trace point at the left and right adjacent moments, namely judging whether the theta i is greater than or less than theta (i-1) and theta (i +1) at the same time, if so, setting the trace point Ai corresponding to the theta i as a motion inflection point, and traversing all the trace points according to the motion inflection point to find out all the motion inflection points.
For example, a triangle is drawn in the air with the beacon, and it is clear that the triangle is calculated from a number of relative position points, from θ 1-S1, A1, and so on, from θ n-Sn, An is calculated. Through permutation calculation, finding out an inflection point, namely the angle theta of the inflection point is greater than or less than the angles of coordinate points on left and right adjacent time axes, and judging the inflection point as the angle theta of three vertexes of a triangle: aa (theta a, Sa), Ab (theta b, Sb) and Ac (theta c, Sc), judging inflection points and motion trends thereof, recording the inflection points and the motion trends into the simplest graph, and storing the motion characteristic values
It should be noted that the above calculation may be distance sensing based on the ranging and direction finding functions of the authentication module and the beacon itself, or distance sensing may be performed by means of other means such as BLE and 2.4G, Wi-Fi probes, so as to achieve sleep at ordinary times and wake up when in use, thereby improving the cruising ability of the authentication module and the beacon itself.
Because the position of the authentication module is fixed, and the position of the beacon is usually not fixed, for example, a triangle is drawn, if the standing posture is drawn by the triangle and the equilateral triangle is drawn, the position identified by the authentication module may be only an isosceles triangle; the equilateral triangle drawn in the squatting posture is identified by the authentication module and is the equilateral triangle, if the equilateral triangle is identified by the authentication module, the equilateral triangle is the triangle, but the equilateral triangle is identified by the side face, and only two straight lines can be obtained. Therefore, in order to improve the accuracy of authentication and avoid the identification obstacle in the angle, a compensation algorithm for inflection point extraction and projection compensation are added, the distance and the angle from the authentication module to the beacon can be extracted, but only one type of entered characteristic value is used, or a triangle is taken as an example for explanation, which is specifically described as follows.
1. Extracting three corners of a triangle, namely A1 (theta 1, S1), A2 (theta 2, S2) and A3 (theta 3, S3);
2. selecting a point, such as the nearest point A1 (theta 1, S1), as a benchmark reference point, connecting a point O in the authentication module coordinate system with the benchmark reference point to form a benchmark reference line, and taking a plane which is perpendicular to the reference line and passes through A1 as a reference plane P;
3. connecting A2 with O point, passing through reference plane P as projection point A2 of A22(θ22,S22);
Relative distances S21 of A2 and A1, and A22Relative distance S21 from A2The scale L can be calculated as S21/S212
5. Combining the relative distance S32 between A3 and A2 and the scaling L, calculating the relative distance S32 of the similar graph after being reduced2
6. Similarly, the relative distance S31 from A1 after A3 is zoomed can be calculated2
7. Combining the coordinates of A1, A22Relative distance S322Relative distance S312After the projection on the P plane can be calculated, A3 can be obtained by calculation2New coordinates of (theta 3)2,S32) To complete A1, A2, A3 to A1, A22,A32The space conversion of the characteristic value ensures the planar reduction degree of the characteristic value.
When the action password is complex, such as a three-dimensional combined action, the action can be disassembled into a plurality of sections of passwords for the rapid judgment.
As a second embodiment of the present invention, there is also provided an authentication system based on an action password, the system including an authentication module, a beacon, a setting unit, a feature value calculation unit, and a comparison unit;
the setting unit is used for setting an unlocking action characteristic value on the authentication module in advance by a user;
the characteristic value calculating unit is used for acquiring the action track information of the beacon when the beacon reaches the identification range of the authentication module, and calculating the action characteristic value of the beacon based on the action track information of the beacon;
the comparison unit is used for comparing the acquired action characteristic value of the beacon with an unlocking action characteristic value which is preset on the authentication module, and if the comparison is passed, the authentication is passed.
Preferably, the system further includes an identification recognition unit, the authentication module is further pre-bound with unique identifications of all beacons that can be authorized, and the identification recognition unit is configured to recognize the unique identification of the beacon when the beacon reaches the recognition range of the authentication module, and determine whether the beacon is a beacon that can be authorized through the unique identification.
Preferably, the feature value calculation unit is specifically configured to:
when the beacon reaches the identification range of the authentication module, acquiring a direction angle theta 1 and a position elevation angle theta 2 of the beacon relative to the authentication module in real time, calculating an arrival angle theta (theta 1 and theta 2) between the beacon and an antenna of the authentication module through the theta 1 and the theta 2, acquiring a distance S between the beacon and the antenna of the authentication module in real time, and calculating a relative position A of the beacon in a coordinate system of the authentication module in real time by combining the theta (theta 1, theta 2) and the S;
when a user holds the beacon and makes an action, forming action track information of the beacon based on the relative position A of the beacon acquired at each moment in the coordinate system of the authentication module;
the action track information of the beacon consists of n time-continuous track points, namely A1, A2, … and An, wherein Ai is the relative position of the beacon acquired at the ith moment in a coordinate system of the authentication module, namely the track point at the ith moment;
and finding out all motion inflection points from the motion track information, determining track points corresponding to each motion inflection point, and sequentially connecting the track points corresponding to all the motion inflection points according to a time sequence to form a simplest graph as a motion characteristic value of the beacon based on the motion trend.
Preferably, finding out a motion inflection point from the motion trajectory information specifically includes: and (3) setting the trace point at the ith moment as Ai, determining the trace point at the ith moment as an arrival angle theta i corresponding to the Ai, judging whether the arrival angle theta i corresponding to the trace point Ai at the ith moment is greater than or less than the arrival angle theta i corresponding to the trace point at the left and right adjacent moments, namely judging whether the theta i is greater than or less than theta (i-1) and theta (i +1) at the same time, if so, setting the trace point Ai corresponding to the theta i as a motion inflection point, and traversing all the trace points according to the motion inflection point to find out all the motion inflection points.
Preferably, the system further includes an inflection point compensation unit, which is used for compensation of inflection point extraction, and specifically includes the following steps:
extracting all motion inflection points, wherein j operation inflection points are A1, A2, … and Aj respectively;
selecting a first motion inflection point A1 as a benchmark reference point, connecting a point O in the authentication module coordinate system with the benchmark reference point to form a benchmark reference line, and taking a surface which is vertical to the reference line and passes through A1 as a reference surface P;
connecting the second motion inflection point A2 with the point O, passing through the reference plane P as the projected point A2 of A22(θ22,S22);
Obtaining the relative distances S21 and A2 of A2 and A12Relative distance to A1S 212Thereby calculating the scale L as S21/S212
Obtaining the relative distance S32 between A3 and A2, and calculating the relative distance S32 of the similar graph after being reduced based on the scaling L2(ii) a And calculating the relative distance S31 between the A3 and the A1 after the A3 is zoomed2(ii) a Combining the coordinates of A1, A22Relative distance S322Relative distance S312Projected on the P plane, A3 is calculated2New coordinates of (2);
similarly, the relative distance Si (i-1) between Ai and A (i-1) is obtained, and the reduced relative distance Si (i-1) of the similar graph is calculated based on the scaling L2(ii) a Calculating the relative distance Si1 between the scaled Ai and A12(ii) a Combining the coordinates of A1, A (i-1)2Relative distance Si (i-1)2Relative distance Si12Projected on the P plane, and then calculated to obtain Ai2New coordinates of (2);
all motion inflection points are traversed accordingly to obtain A22,…,Aj2Thus, A1, A2, …, Aj to A1, A2 were completed2,…,Aj2The space conversion ensures the planar reduction degree of the action characteristic value.
The following two use scenarios of payment and unlocking are specifically analyzed:
in the payment scene, a user side performs authentication judgment, a beacon needs to acquire position information of the beacon, acquire an action characteristic value and confirm a payment password, so that the payment scene is realized based on an AOD (angle of departure) and a ToF (ToF) algorithm. At this time, the position of the authentication module of the merchant end is fixed, the beacon of the user moves, and the beacon executes authentication. The beacon of the user can be an integrated device such as a mobile phone or a separate beacon type article, and has three characteristics: encrypting transmission, digital currency or financial payment carriers, identifying own characteristic value and converting the characteristic value into a payment instruction, wherein the specific steps comprise;
1. the user performs ID binding based on the beacon;
2. the user sets a payment password, namely an action characteristic value, and if the action characteristic value is shaken up and down for 2 times, the payment password is used as a password for confirming payment by a beacon;
3. the merchant initiates a payment operation on the payment terminal, and the authentication module broadcasts the operation and controls power according to an actual scene to lock an area to be paid;
4. when a user arrives at an area to be paid, searching the information of the authentication module, and preparing to obtain an action characteristic value based on the position of the authentication module;
5. the user confirms the amount of money and executes the action characteristic value, such as shaking up and down for 2 times;
6. the beacon acquires a user action password, and initiates payment when the user action password is matched with a preset password;
7. the collection terminal is connected with the digital currency carrier in an encryption manner, and payment confirmation and automatic deduction are completed;
8. and when the transaction is completed, the authentication module of the cash register stops broadcasting.
In the unlocking scene, the lock performs authentication judgment, acquires position information of a beacon, further acquires an action characteristic value and confirms unlocking, so that the unlocking is realized based on AOA (angle of arrival) and ToF (ToF) algorithms, at the moment, the position of an authentication module of the lock is fixed, the beacon of a user moves, and the lock performs authentication.
Setting an unlocking password on a lockset by a user, namely acquiring an action characteristic value, for example, walking an L-shaped step;
2. a fixed unlocking password can be uniformly set based on the lockset, and one password is executed by a plurality of beacons; the unlocking password of each beacon can be set one to one based on the ID code number of the beacon;
3. the user brings the beacon to reach the identification range of the lock authentication module;
4. the lockset obtains the ID code of the beacon and judges whether the unlocking authority exists;
5. identifying a beacon and grabbing an unlocking password thereof, such as walking an L-shaped step;
6. comparing the password with a preset characteristic value;
7. and if the comparison is successful, unlocking and stopping broadcasting.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (10)

1. An authentication method based on action password, which is characterized by comprising a beacon and an authentication module for identifying and authenticating the beacon, wherein the method comprises the following steps:
step 1, a user sets an unlocking action characteristic value on an authentication module in advance;
step 2, when the beacon reaches the identification range of the authentication module, acquiring the action track information of the beacon, and calculating the action characteristic value of the beacon based on the action track information of the beacon;
and 3, comparing the acquired action characteristic value of the beacon with an unlocking action characteristic value preset on the authentication module, and if the comparison is passed, the authentication is passed.
2. The method for authenticating based on an action password as claimed in claim 1, wherein in step 2: the method comprises the steps that unique identifications of all beacon capable of being authorized are bound in advance in an authentication module, when the beacon reaches the identification range of the authentication module, the unique identification of the beacon is identified, whether the beacon is the beacon capable of being authorized is judged through the unique identification, if yes, the motion track information of the beacon is obtained, the motion characteristic value of the beacon is calculated based on the motion track information of the beacon, and if not, the authentication is judged to be failed.
3. The authentication method based on the action password as claimed in claim 1, wherein the step 2 is specifically:
when the beacon reaches the identification range of the authentication module, acquiring a direction angle theta 1 and a position elevation angle theta 2 of the beacon relative to the authentication module in real time, calculating an arrival angle theta (theta 1 and theta 2) between the beacon and an antenna of the authentication module through the theta 1 and the theta 2, acquiring a distance S between the beacon and the antenna of the authentication module in real time, and calculating a relative position A of the beacon in a coordinate system of the authentication module in real time by combining the theta (theta 1, theta 2) and the S;
when a user holds the beacon and makes an action, forming action track information of the beacon based on the relative position A of the beacon acquired at each moment in the coordinate system of the authentication module;
the action track information of the beacon consists of n time-continuous track points, namely A1, A2, … and An, wherein Ai is the relative position of the beacon acquired at the ith moment in a coordinate system of the authentication module, namely the track point at the ith moment;
and finding out all motion inflection points from the motion track information, determining track points corresponding to each motion inflection point, and sequentially connecting the track points corresponding to all the motion inflection points according to a time sequence to form a simplest graph as a motion characteristic value of the beacon based on the motion trend.
4. The authentication method based on the action password as claimed in claim 3, wherein the finding of the motion inflection point from the action trajectory information specifically comprises: and (3) setting the trace point at the ith moment as Ai, determining the trace point at the ith moment as an arrival angle theta i corresponding to the Ai, judging whether the arrival angle theta i corresponding to the trace point Ai at the ith moment is greater than or less than the arrival angle theta i corresponding to the trace point at the left and right adjacent moments, namely judging whether the theta i is greater than or less than theta (i-1) and theta (i +1) at the same time, if so, setting the trace point Ai corresponding to the theta i as a motion inflection point, and traversing all the trace points according to the motion inflection point to find out all the motion inflection points.
5. The method of authentication based on an action password according to claim 4, wherein the method further comprises: in order to improve the accuracy of authentication, avoid the identification obstacle in the angle and increase the compensation algorithm of inflection point extraction, the following steps are specifically performed:
extracting all motion inflection points, wherein j operation inflection points are A1, A2, … and Aj respectively;
selecting a first motion inflection point A1 as a benchmark reference point, connecting a point O in the authentication module coordinate system with the benchmark reference point to form a benchmark reference line, and taking a surface which is vertical to the reference line and passes through A1 as a reference surface P;
connecting the second motion inflection point A2 with the point O, passing through the reference plane P as the projected point A2 of A22(θ22,S22);
Obtaining the relative distances S21 and A2 of A2 and A12Relative distance to A1S 212Thereby calculating the scale L as S21/S212
Obtaining the relative distance S32 between A3 and A2, and calculating the relative distance S32 of the similar graph after being reduced based on the scaling L2(ii) a And calculating the relative distance S31 between the A3 and the A1 after the A3 is zoomed2(ii) a Combining the coordinates of A1, A22Relative distance S322Relative distance S312Projected on the P plane, A3 is calculated2New coordinates of (2);
similarly, the relative distance Si (i-1) between Ai and A (i-1) is obtained, and the reduced relative distance Si (i-1) of the similar graph is calculated based on the scaling L2(ii) a Calculating the relative distance Si1 between the scaled Ai and A12(ii) a Combining the coordinates of A1, A (i-1)2Relative distance Si (i-1)2Relative distance Si12Projected on the P plane, and then calculated to obtain Ai2New coordinates of (2);
all motion inflection points are traversed accordingly to finish A1, A2, …, Aj to A1 and A22,…,Aj2The space conversion ensures the planar reduction degree of the action characteristic value.
6. An authentication system based on an action password is characterized by comprising an authentication module, a beacon, a setting unit, a characteristic value calculation unit and a comparison unit;
the setting unit is used for setting an unlocking action characteristic value on the authentication module in advance by a user;
the characteristic value calculating unit is used for acquiring the action track information of the beacon when the beacon reaches the identification range of the authentication module, and calculating the action characteristic value of the beacon based on the action track information of the beacon;
the comparison unit is used for comparing the acquired action characteristic value of the beacon with an unlocking action characteristic value which is preset on the authentication module, and if the comparison is passed, the authentication is passed.
7. The system according to claim 6, further comprising an identification recognition unit, wherein the unique identifications of all authorized beacons are bound in the authentication module in advance, the identification recognition unit is configured to recognize the unique identification of the beacon when the beacon reaches the recognition range of the authentication module, and determine whether the beacon is an authorized beacon according to the unique identification.
8. The action password-based authentication system according to claim 6, wherein the feature value calculating unit is specifically configured to:
when the beacon reaches the identification range of the authentication module, acquiring a direction angle theta 1 and a position elevation angle theta 2 of the beacon relative to the authentication module in real time, calculating an arrival angle theta (theta 1 and theta 2) between the beacon and an antenna of the authentication module through the theta 1 and the theta 2, acquiring a distance S between the beacon and the antenna of the authentication module in real time, and calculating a relative position A of the beacon in a coordinate system of the authentication module in real time by combining the theta (theta 1, theta 2) and the S;
when a user holds the beacon and makes an action, forming action track information of the beacon based on the relative position A of the beacon acquired at each moment in the coordinate system of the authentication module;
the action track information of the beacon consists of n time-continuous track points, namely A1, A2, … and An, wherein Ai is the relative position of the beacon acquired at the ith moment in a coordinate system of the authentication module, namely the track point at the ith moment;
and finding out all motion inflection points from the motion track information, determining track points corresponding to each motion inflection point, and sequentially connecting the track points corresponding to all the motion inflection points according to a time sequence to form a simplest graph as a motion characteristic value of the beacon based on the motion trend.
9. The authentication system based on the action password as claimed in claim 8, wherein the finding of the motion inflection point from the action trajectory information specifically comprises: and (3) setting the trace point at the ith moment as Ai, determining the trace point at the ith moment as an arrival angle theta i corresponding to the Ai, judging whether the arrival angle theta i corresponding to the trace point Ai at the ith moment is greater than or less than the arrival angle theta i corresponding to the trace point at the left and right adjacent moments, namely judging whether the theta i is greater than or less than theta (i-1) and theta (i +1) at the same time, if so, setting the trace point Ai corresponding to the theta i as a motion inflection point, and traversing all the trace points according to the motion inflection point to find out all the motion inflection points.
10. The action password-based authentication system according to claim 9, further comprising an inflection point compensation unit for compensation of inflection point extraction, specifically as follows:
extracting all motion inflection points, wherein j operation inflection points are A1, A2, … and Aj respectively;
selecting a first motion inflection point A1 as a benchmark reference point, connecting a point O in the authentication module coordinate system with the benchmark reference point to form a benchmark reference line, and taking a surface which is vertical to the reference line and passes through A1 as a reference surface P;
connecting the second motion inflection point A2 with the point O, passing through the reference plane P as the projected point A2 of A22(θ22,S22);
Obtaining the relative distances S21 and A2 of A2 and A12Relative distance to A1S 212Thereby calculating the scale L as S21/S212
Obtaining the relative distance S32 between A3 and A2, and calculating the relative distance S32 of the similar graph after being reduced based on the scaling L2(ii) a And calculating the relative distance S31 between the A3 and the A1 after the A3 is zoomed2(ii) a Combining the coordinates of A1, A22Relative distance S322Relative distance S312Projected on the P plane, A3 is calculated2New coordinates of (2);
similarly, the relative distance Si (i-1) between Ai and A (i-1) is obtained, and the reduced relative distance Si (i-1) of the similar graph is calculated based on the scaling L2(ii) a Calculating the relative distance Si1 between the scaled Ai and A12(ii) a Combining the coordinates of A1, A (i-1)2Relative distance Si (i-1)2Relative distance Si12Projected on the P plane, and then calculated to obtain Ai2New coordinates of (2);
all motion inflection points are traversed accordingly to obtain A22,…,Aj2Thus, A1, A2, …, Aj to A1, A2 were completed2,…,Aj2The space conversion ensures the planar reduction degree of the action characteristic value.
CN202011589845.0A 2020-12-29 2020-12-29 Authentication method and system based on action password Pending CN112598424A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011589845.0A CN112598424A (en) 2020-12-29 2020-12-29 Authentication method and system based on action password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011589845.0A CN112598424A (en) 2020-12-29 2020-12-29 Authentication method and system based on action password

Publications (1)

Publication Number Publication Date
CN112598424A true CN112598424A (en) 2021-04-02

Family

ID=75203579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011589845.0A Pending CN112598424A (en) 2020-12-29 2020-12-29 Authentication method and system based on action password

Country Status (1)

Country Link
CN (1) CN112598424A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140007225A1 (en) * 2011-12-15 2014-01-02 France Telecom Multi-person gestural authentication and authorization system and method of operation thereof
KR101439966B1 (en) * 2014-03-06 2014-09-12 (주) 골프존 Image processing method for image reconstitution using depth information and image processing device using the same
CN104933408A (en) * 2015-06-09 2015-09-23 深圳先进技术研究院 Hand gesture recognition method and system
US9374672B1 (en) * 2015-08-11 2016-06-21 International Business Machines Corporation Detection of unauthorized wireless personal area network low energy devices
CN106778202A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The unlocking method of terminal device, device and equipment
CN108536314A (en) * 2017-03-06 2018-09-14 华为技术有限公司 Method for identifying ID and device
US20200028684A1 (en) * 2018-06-15 2020-01-23 Proxy, Inc. Method and apparatus for obtaining multiple user credentials
CN111104886A (en) * 2019-12-10 2020-05-05 北京集创北方科技股份有限公司 Gesture recognition method, device, equipment and storage medium
CN111873942A (en) * 2020-07-24 2020-11-03 上海纳恩汽车技术有限公司 Automobile door handle module based on UWB technology and implementation method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140007225A1 (en) * 2011-12-15 2014-01-02 France Telecom Multi-person gestural authentication and authorization system and method of operation thereof
KR101439966B1 (en) * 2014-03-06 2014-09-12 (주) 골프존 Image processing method for image reconstitution using depth information and image processing device using the same
CN104933408A (en) * 2015-06-09 2015-09-23 深圳先进技术研究院 Hand gesture recognition method and system
US9374672B1 (en) * 2015-08-11 2016-06-21 International Business Machines Corporation Detection of unauthorized wireless personal area network low energy devices
CN106778202A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The unlocking method of terminal device, device and equipment
CN108536314A (en) * 2017-03-06 2018-09-14 华为技术有限公司 Method for identifying ID and device
US20200028684A1 (en) * 2018-06-15 2020-01-23 Proxy, Inc. Method and apparatus for obtaining multiple user credentials
CN111104886A (en) * 2019-12-10 2020-05-05 北京集创北方科技股份有限公司 Gesture recognition method, device, equipment and storage medium
CN111873942A (en) * 2020-07-24 2020-11-03 上海纳恩汽车技术有限公司 Automobile door handle module based on UWB technology and implementation method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
蒋纬中: "GPS信号拒止环境中无人车的类人导航方法研究", pages 22, Retrieved from the Internet <URL:www.doc88.com/p-69916934198440.html> *

Similar Documents

Publication Publication Date Title
US7333638B2 (en) Minutiae fingerprint transactions
CN1972186B (en) A mobile identity authentication system and its authentication method
CN112912752B (en) Position specifying system, position specifying device, position specifying method, position specifying program, computer-readable recording medium, and recorded apparatus
CN110546977A (en) Wireless authentication based on location data
CN101315710B (en) Mobile based identification in security and asset management systems
CN108830592A (en) A kind of subscriber authentication and authority recognition method and system
KR100874067B1 (en) User equipment, certify system, certify method, certify program and write medium
CN105913527A (en) Intelligent visitor two-dimensional code verification system and intelligent visitor two-dimensional code verification method based on community cloud
WO2017136160A1 (en) System and method for controlling access to an access point
US20160203478A1 (en) System and method for comparing electronic transaction records for enhanced security
CN109840973A (en) A kind of shared bicycle auto-unlocking method and control system based on recognition of face
CN102385766A (en) Palmprint-based authentication unlocking method, terminal and system
JP2011032782A (en) Keyless entry device
CA2787721C (en) Method of biometric authentication, corresponding authentication system and program
WO2018136260A1 (en) Systems and methods for location-based automated authentication
JP2004140779A (en) System and communication method
JP6969730B2 (en) How to check access permissions using an access control system
CN112598424A (en) Authentication method and system based on action password
CN107516371B (en) Verification and identification method and hotel intelligent card system
CN101443722A (en) Wireless telecommunication device with output control function and transaction authentication system using the same
JP4500585B2 (en) Authentication system and authentication server
CN115331331B (en) Data processing method, system and terminal equipment based on digital key
AU2022435296B2 (en) Trusted seamless authentication method for access control
CN110070014A (en) Recognition methods and its device, equipment and storage medium based on biometric feature
CN114996540B (en) Identity filtering method and system based on movement track tracking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination