Disclosure of Invention
In view of the technical defects and technical drawbacks in the prior art, embodiments of the present invention provide an authentication method and system based on an action password, which overcome the above problems or at least partially solve the above problems, and the specific scheme is as follows:
as a first aspect of the present invention, there is provided an authentication method based on an action password, including an authentication module and a beacon, the method including:
step 1, a user sets an unlocking action characteristic value on an authentication module in advance;
step 2, when the beacon reaches the identification range of the authentication module, acquiring the action track information of the beacon, and calculating the action characteristic value of the beacon based on the action track information of the beacon;
and 3, comparing the acquired action characteristic value of the beacon with an unlocking action characteristic value preset on the authentication module, and if the comparison is passed, the authentication is passed.
Further, in step 2: the method comprises the steps that unique identifications of all beacon capable of being authorized are bound in advance in an authentication module, when the beacon reaches the identification range of the authentication module, the unique identification of the beacon is identified, whether the beacon is the beacon capable of being authorized is judged through the unique identification, if yes, the motion track information of the beacon is obtained, the motion characteristic value of the beacon is calculated based on the motion track information of the beacon, and if not, the authentication is judged to be failed.
Further, step 2 specifically comprises:
when the beacon reaches the identification range of the authentication module, acquiring a direction angle theta 1 and a position elevation angle theta 2 of the beacon relative to the authentication module in real time, calculating an arrival angle theta (theta 1 and theta 2) between the beacon and an antenna of the authentication module through the theta 1 and the theta 2, acquiring a distance S between the beacon and the antenna of the authentication module in real time, and calculating a relative position A of the beacon in a coordinate system of the authentication module in real time by combining the theta (theta 1, theta 2) and the S;
when a user holds the beacon and makes an action, forming action track information of the beacon based on the relative position A of the beacon acquired at each moment in the coordinate system of the authentication module;
the action track information of the beacon consists of n time-continuous track points, namely A1, A2, … and An, wherein Ai is the relative position of the beacon acquired at the ith moment in a coordinate system of the authentication module, namely the track point at the ith moment;
and finding out all motion inflection points from the motion track information, determining track points corresponding to each motion inflection point, and sequentially connecting the track points corresponding to all the motion inflection points according to a time sequence to form a simplest graph as a motion characteristic value of the beacon based on the motion trend.
Further, finding out a motion inflection point from the motion trajectory information specifically includes: and (3) setting the trace point at the ith moment as Ai, determining the trace point at the ith moment as an arrival angle theta i corresponding to the Ai, judging whether the arrival angle theta i corresponding to the trace point Ai at the ith moment is greater than or less than the arrival angle theta i corresponding to the trace point at the left and right adjacent moments, namely judging whether the theta i is greater than or less than theta (i-1) and theta (i +1) at the same time, if so, setting the trace point Ai corresponding to the theta i as a motion inflection point, and traversing all the trace points according to the motion inflection point to find out all the motion inflection points.
Further, the method further comprises: in order to improve the accuracy of authentication, avoid the identification obstacle in the angle and increase the compensation algorithm of inflection point extraction, the following steps are specifically performed:
extracting all motion inflection points, wherein j operation inflection points are A1, A2, … and Aj respectively;
selecting a first motion inflection point A1 as a benchmark reference point, connecting a point O in the authentication module coordinate system with the benchmark reference point to form a benchmark reference line, and taking a surface which is vertical to the reference line and passes through A1 as a reference surface P;
connecting the second motion inflection point A2 with the point O, passing through the reference plane P as the projected point A2 of A22(θ22,S22);
Obtaining the relative distances S21 and A2 of A2 and A12Relative distance to A1S 212Thereby calculating the scale L as S21/S212;
Obtaining the relative distance S32 between A3 and A2, and calculating the relative distance S32 of the similar graph after being reduced based on the scaling L2(ii) a And calculating the relative distance S31 between the A3 and the A1 after the A3 is zoomed2(ii) a Combining the coordinates of A1, A22Relative distance S322Relative distance S312Projected on the P plane, A3 is calculated2New coordinates of (2);
similarly, the relative distance Si (i-1) between Ai and A (i-1) is obtained, and the reduced relative distance Si (i-1) of the similar graph is calculated based on the scaling L2(ii) a Calculate Ai scaled phase with A1For distance Si12(ii) a Combining the coordinates of A1, A (i-1)2Relative distance Si (i-1)2Relative distance Si12Projected on the P plane, and then calculated to obtain Ai2Wherein i is greater than or equal to 3;
all motion inflection points are traversed accordingly to finish A1, A2, …, Aj to A1 and A22,…,Aj2The space conversion ensures the planar reduction degree of the action characteristic value.
As a second aspect of the present invention, an authentication system based on an action password is provided, the system includes an authentication module, a beacon, a setting unit, a feature value calculating unit, and a comparing unit;
the setting unit is used for setting an unlocking action characteristic value on the authentication module in advance by a user;
the characteristic value calculating unit is used for acquiring the action track information of the beacon when the beacon reaches the identification range of the authentication module, and calculating the action characteristic value of the beacon based on the action track information of the beacon;
the comparison unit is used for comparing the acquired action characteristic value of the beacon with an unlocking action characteristic value which is preset on the authentication module, and if the comparison is passed, the authentication is passed.
The system further comprises an identification recognition unit, wherein unique identifications of all beacon capable of being authorized are bound in the authentication module in advance, the identification recognition unit is used for recognizing the unique identification of the beacon when the beacon reaches the identification range of the authentication module, and whether the beacon is the beacon capable of being authorized is judged through the unique identification.
Further, the feature value calculation unit is specifically configured to:
when the beacon reaches the identification range of the authentication module, acquiring a direction angle theta 1 and a position elevation angle theta 2 of the beacon relative to the authentication module in real time, calculating an arrival angle theta (theta 1 and theta 2) between the beacon and an antenna of the authentication module through the theta 1 and the theta 2, acquiring a distance S between the beacon and the antenna of the authentication module in real time, and calculating a relative position A of the beacon in a coordinate system of the authentication module in real time by combining the theta (theta 1, theta 2) and the S;
when a user holds the beacon and makes an action, forming action track information of the beacon based on the relative position A of the beacon acquired at each moment in the coordinate system of the authentication module;
the action track information of the beacon consists of n time-continuous track points, namely A1, A2, … and An, wherein Ai is the relative position of the beacon acquired at the ith moment in a coordinate system of the authentication module, namely the track point at the ith moment;
and finding out all motion inflection points from the motion track information, determining track points corresponding to each motion inflection point, and sequentially connecting the track points corresponding to all the motion inflection points according to a time sequence to form a simplest graph as a motion characteristic value of the beacon based on the motion trend.
Further, finding out a motion inflection point from the motion trajectory information specifically includes: and (3) setting the trace point at the ith moment as Ai, determining the trace point at the ith moment as an arrival angle theta i corresponding to the Ai, judging whether the arrival angle theta i corresponding to the trace point Ai at the ith moment is greater than or less than the arrival angle theta i corresponding to the trace point at the left and right adjacent moments, namely judging whether the theta i is greater than or less than theta (i-1) and theta (i +1) at the same time, if so, setting the trace point Ai corresponding to the theta i as a motion inflection point, and traversing all the trace points according to the motion inflection point to find out all the motion inflection points.
Further, the system further includes an inflection point compensation unit, where the inflection point compensation unit is used for compensation of inflection point extraction, and specifically includes the following steps:
extracting all motion inflection points, wherein j operation inflection points are A1, A2, … and Aj respectively;
selecting a first motion inflection point A1 as a benchmark reference point, connecting a point O in the authentication module coordinate system with the benchmark reference point to form a benchmark reference line, and taking a surface which is vertical to the reference line and passes through A1 as a reference surface P;
connecting the second motion inflection point A2 with the point O, passing through the reference plane P as the projected point A2 of A22(θ22,S22);
Obtaining the relative distances S21 and A2 of A2 and A12Relative distance to A1S 212Thereby calculating a ratioExample L-S21/S212;
Obtaining the relative distance S32 between A3 and A2, and calculating the relative distance S32 of the similar graph after being reduced based on the scaling L2(ii) a And calculating the relative distance S31 between the A3 and the A1 after the A3 is zoomed2(ii) a Combining the coordinates of A1, A22Relative distance S322Relative distance S312Projected on the P plane, A3 is calculated2New coordinates of (2);
similarly, the relative distance Si (i-1) between Ai and A (i-1) is obtained, and the reduced relative distance Si (i-1) of the similar graph is calculated based on the scaling L2(ii) a Calculating the relative distance Si1 between the scaled Ai and A12(ii) a Combining the coordinates of A1, A (i-1)2Relative distance Si (i-1)2Relative distance Si12Projected on the P plane, and then calculated to obtain Ai2New coordinates of (2);
all motion inflection points are traversed accordingly to obtain A22,…,Aj2Thus, A1, A2, …, Aj to A1, A2 were completed2,…,Aj2The space conversion ensures the planar reduction degree of the action characteristic value.
The invention has the following beneficial effects:
1. the payment scene is more convenient, the support of ambient light is not needed, and the scene requirement is low;
2. in the existing payment scene, particularly focusing of a camera needs to consider focusing and equipment placement positions no matter a code or a face is scanned, but an action password of the invention does not need precise focusing and does not select equipment height and placement positions;
3. the payment scene of the invention supports authorization, if a temporary password is set and is invalid after being transferred to other people for use, the payment scene can be safely used by a host, the payment scene is more flexible than the code scanning payment for dependence on the unique password of the mobile phone and disclosure risk, and the limitation that face recognition cannot be transferred is compared, the action password is more flexible 4. the invention is not afraid of beacon loss, has secondary protection of the motion password, can ensure safety even if the beacon is lost, and can not enable the picked-up personnel to obtain illegal authentication capability;
5. the password is difficult to be solved, and the action password is not objective authentication data such as passwords, fingerprints and MAC, and is more virtual; and the binding of a beacon-action password is combined, so that the cracking significance becomes smaller and the value is more useless.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, as a first embodiment of the present invention, there is provided an authentication method based on an action password, including an authentication module and a beacon, the method including:
step 1, a user sets an unlocking action characteristic value on an authentication module in advance;
step 2, when the beacon reaches the identification range of the authentication module, acquiring the action track information of the beacon, and calculating the action characteristic value of the beacon based on the action track information of the beacon;
and 3, comparing the acquired action characteristic value of the beacon with an unlocking action characteristic value preset on the authentication module, and if the comparison is passed, the authentication is passed.
The authentication module can be any intelligent terminal with UWB (ultra wide band) or Bluetooth AOA (automatic optical access), such as a UWB base station, a Bluetooth base station, a money receiving terminal with UWB or Bluetooth AOA, a lockset and the like, the positioning algorithm of UWB and Bluetooth AOA is mature, and the positioning algorithm is not repeated and is only described based on authentication.
Preferably, in step 2: the method comprises the steps that unique identifications of all beacon capable of being authorized are bound in advance in an authentication module, when the beacon reaches the identification range of the authentication module, the unique identification of the beacon is identified, whether the beacon is the beacon capable of being authorized is judged through the unique identification, if yes, the motion track information of the beacon is obtained, the motion characteristic value of the beacon is calculated based on the motion track information of the beacon, and if not, the authentication is judged to be failed.
Preferably, step 2 is specifically:
when a beacon reaches the identification range of an authentication module, acquiring a direction angle theta 1 and a position elevation angle theta 2 of the beacon relative to the authentication module in real time, calculating an arrival angle theta (theta 1, theta 2) between the beacon and an antenna of the authentication module through the theta 1 and the theta 2, acquiring a distance S between the beacon and the antenna of the authentication module in real time, and calculating a relative position A of the beacon in a coordinate system of the authentication module in real time by combining the theta (theta 1, theta 2) and the S, as shown in fig. 2, it needs to be explained that a positioning algorithm is mature, and description is not repeated herein but only based on authentication;
when a user holds the beacon and makes an action, forming action track information of the beacon based on the relative position A of the beacon acquired at each moment in the coordinate system of the authentication module;
the action track information of the beacon consists of n time-continuous track points, namely A1, A2, … and An, wherein Ai is the relative position of the beacon acquired at the ith moment in a coordinate system of the authentication module, namely the track point at the ith moment;
and finding out all motion inflection points from the motion track information, determining track points corresponding to each motion inflection point, and sequentially connecting the track points corresponding to all the motion inflection points according to a time sequence to form a simplest graph as a motion characteristic value of the beacon based on the motion trend.
Preferably, finding out a motion inflection point from the motion trajectory information specifically includes: and (3) setting the trace point at the ith moment as Ai, determining the trace point at the ith moment as an arrival angle theta i corresponding to the Ai, judging whether the arrival angle theta i corresponding to the trace point Ai at the ith moment is greater than or less than the arrival angle theta i corresponding to the trace point at the left and right adjacent moments, namely judging whether the theta i is greater than or less than theta (i-1) and theta (i +1) at the same time, if so, setting the trace point Ai corresponding to the theta i as a motion inflection point, and traversing all the trace points according to the motion inflection point to find out all the motion inflection points.
For example, a triangle is drawn in the air with the beacon, and it is clear that the triangle is calculated from a number of relative position points, from θ 1-S1, A1, and so on, from θ n-Sn, An is calculated. Through permutation calculation, finding out an inflection point, namely the angle theta of the inflection point is greater than or less than the angles of coordinate points on left and right adjacent time axes, and judging the inflection point as the angle theta of three vertexes of a triangle: aa (theta a, Sa), Ab (theta b, Sb) and Ac (theta c, Sc), judging inflection points and motion trends thereof, recording the inflection points and the motion trends into the simplest graph, and storing the motion characteristic values
It should be noted that the above calculation may be distance sensing based on the ranging and direction finding functions of the authentication module and the beacon itself, or distance sensing may be performed by means of other means such as BLE and 2.4G, Wi-Fi probes, so as to achieve sleep at ordinary times and wake up when in use, thereby improving the cruising ability of the authentication module and the beacon itself.
Because the position of the authentication module is fixed, and the position of the beacon is usually not fixed, for example, a triangle is drawn, if the standing posture is drawn by the triangle and the equilateral triangle is drawn, the position identified by the authentication module may be only an isosceles triangle; the equilateral triangle drawn in the squatting posture is identified by the authentication module and is the equilateral triangle, if the equilateral triangle is identified by the authentication module, the equilateral triangle is the triangle, but the equilateral triangle is identified by the side face, and only two straight lines can be obtained. Therefore, in order to improve the accuracy of authentication and avoid the identification obstacle in the angle, a compensation algorithm for inflection point extraction and projection compensation are added, the distance and the angle from the authentication module to the beacon can be extracted, but only one type of entered characteristic value is used, or a triangle is taken as an example for explanation, which is specifically described as follows.
1. Extracting three corners of a triangle, namely A1 (theta 1, S1), A2 (theta 2, S2) and A3 (theta 3, S3);
2. selecting a point, such as the nearest point A1 (theta 1, S1), as a benchmark reference point, connecting a point O in the authentication module coordinate system with the benchmark reference point to form a benchmark reference line, and taking a plane which is perpendicular to the reference line and passes through A1 as a reference plane P;
3. connecting A2 with O point, passing through reference plane P as projection point A2 of A22(θ22,S22);
Relative distances S21 of A2 and A1, and A22Relative distance S21 from A2The scale L can be calculated as S21/S212;
5. Combining the relative distance S32 between A3 and A2 and the scaling L, calculating the relative distance S32 of the similar graph after being reduced2;
6. Similarly, the relative distance S31 from A1 after A3 is zoomed can be calculated2;
7. Combining the coordinates of A1, A22Relative distance S322Relative distance S312After the projection on the P plane can be calculated, A3 can be obtained by calculation2New coordinates of (theta 3)2,S32) To complete A1, A2, A3 to A1, A22,A32The space conversion of the characteristic value ensures the planar reduction degree of the characteristic value.
When the action password is complex, such as a three-dimensional combined action, the action can be disassembled into a plurality of sections of passwords for the rapid judgment.
As a second embodiment of the present invention, there is also provided an authentication system based on an action password, the system including an authentication module, a beacon, a setting unit, a feature value calculation unit, and a comparison unit;
the setting unit is used for setting an unlocking action characteristic value on the authentication module in advance by a user;
the characteristic value calculating unit is used for acquiring the action track information of the beacon when the beacon reaches the identification range of the authentication module, and calculating the action characteristic value of the beacon based on the action track information of the beacon;
the comparison unit is used for comparing the acquired action characteristic value of the beacon with an unlocking action characteristic value which is preset on the authentication module, and if the comparison is passed, the authentication is passed.
Preferably, the system further includes an identification recognition unit, the authentication module is further pre-bound with unique identifications of all beacons that can be authorized, and the identification recognition unit is configured to recognize the unique identification of the beacon when the beacon reaches the recognition range of the authentication module, and determine whether the beacon is a beacon that can be authorized through the unique identification.
Preferably, the feature value calculation unit is specifically configured to:
when the beacon reaches the identification range of the authentication module, acquiring a direction angle theta 1 and a position elevation angle theta 2 of the beacon relative to the authentication module in real time, calculating an arrival angle theta (theta 1 and theta 2) between the beacon and an antenna of the authentication module through the theta 1 and the theta 2, acquiring a distance S between the beacon and the antenna of the authentication module in real time, and calculating a relative position A of the beacon in a coordinate system of the authentication module in real time by combining the theta (theta 1, theta 2) and the S;
when a user holds the beacon and makes an action, forming action track information of the beacon based on the relative position A of the beacon acquired at each moment in the coordinate system of the authentication module;
the action track information of the beacon consists of n time-continuous track points, namely A1, A2, … and An, wherein Ai is the relative position of the beacon acquired at the ith moment in a coordinate system of the authentication module, namely the track point at the ith moment;
and finding out all motion inflection points from the motion track information, determining track points corresponding to each motion inflection point, and sequentially connecting the track points corresponding to all the motion inflection points according to a time sequence to form a simplest graph as a motion characteristic value of the beacon based on the motion trend.
Preferably, finding out a motion inflection point from the motion trajectory information specifically includes: and (3) setting the trace point at the ith moment as Ai, determining the trace point at the ith moment as an arrival angle theta i corresponding to the Ai, judging whether the arrival angle theta i corresponding to the trace point Ai at the ith moment is greater than or less than the arrival angle theta i corresponding to the trace point at the left and right adjacent moments, namely judging whether the theta i is greater than or less than theta (i-1) and theta (i +1) at the same time, if so, setting the trace point Ai corresponding to the theta i as a motion inflection point, and traversing all the trace points according to the motion inflection point to find out all the motion inflection points.
Preferably, the system further includes an inflection point compensation unit, which is used for compensation of inflection point extraction, and specifically includes the following steps:
extracting all motion inflection points, wherein j operation inflection points are A1, A2, … and Aj respectively;
selecting a first motion inflection point A1 as a benchmark reference point, connecting a point O in the authentication module coordinate system with the benchmark reference point to form a benchmark reference line, and taking a surface which is vertical to the reference line and passes through A1 as a reference surface P;
connecting the second motion inflection point A2 with the point O, passing through the reference plane P as the projected point A2 of A22(θ22,S22);
Obtaining the relative distances S21 and A2 of A2 and A12Relative distance to A1S 212Thereby calculating the scale L as S21/S212;
Obtaining the relative distance S32 between A3 and A2, and calculating the relative distance S32 of the similar graph after being reduced based on the scaling L2(ii) a And calculating the relative distance S31 between the A3 and the A1 after the A3 is zoomed2(ii) a Combining the coordinates of A1, A22Relative distance S322Relative distance S312Projected on the P plane, A3 is calculated2New coordinates of (2);
similarly, the relative distance Si (i-1) between Ai and A (i-1) is obtained, and the reduced relative distance Si (i-1) of the similar graph is calculated based on the scaling L2(ii) a Calculating the relative distance Si1 between the scaled Ai and A12(ii) a Combining the coordinates of A1, A (i-1)2Relative distance Si (i-1)2Relative distance Si12Projected on the P plane, and then calculated to obtain Ai2New coordinates of (2);
all motion inflection points are traversed accordingly to obtain A22,…,Aj2Thus, A1, A2, …, Aj to A1, A2 were completed2,…,Aj2The space conversion ensures the planar reduction degree of the action characteristic value.
The following two use scenarios of payment and unlocking are specifically analyzed:
in the payment scene, a user side performs authentication judgment, a beacon needs to acquire position information of the beacon, acquire an action characteristic value and confirm a payment password, so that the payment scene is realized based on an AOD (angle of departure) and a ToF (ToF) algorithm. At this time, the position of the authentication module of the merchant end is fixed, the beacon of the user moves, and the beacon executes authentication. The beacon of the user can be an integrated device such as a mobile phone or a separate beacon type article, and has three characteristics: encrypting transmission, digital currency or financial payment carriers, identifying own characteristic value and converting the characteristic value into a payment instruction, wherein the specific steps comprise;
1. the user performs ID binding based on the beacon;
2. the user sets a payment password, namely an action characteristic value, and if the action characteristic value is shaken up and down for 2 times, the payment password is used as a password for confirming payment by a beacon;
3. the merchant initiates a payment operation on the payment terminal, and the authentication module broadcasts the operation and controls power according to an actual scene to lock an area to be paid;
4. when a user arrives at an area to be paid, searching the information of the authentication module, and preparing to obtain an action characteristic value based on the position of the authentication module;
5. the user confirms the amount of money and executes the action characteristic value, such as shaking up and down for 2 times;
6. the beacon acquires a user action password, and initiates payment when the user action password is matched with a preset password;
7. the collection terminal is connected with the digital currency carrier in an encryption manner, and payment confirmation and automatic deduction are completed;
8. and when the transaction is completed, the authentication module of the cash register stops broadcasting.
In the unlocking scene, the lock performs authentication judgment, acquires position information of a beacon, further acquires an action characteristic value and confirms unlocking, so that the unlocking is realized based on AOA (angle of arrival) and ToF (ToF) algorithms, at the moment, the position of an authentication module of the lock is fixed, the beacon of a user moves, and the lock performs authentication.
Setting an unlocking password on a lockset by a user, namely acquiring an action characteristic value, for example, walking an L-shaped step;
2. a fixed unlocking password can be uniformly set based on the lockset, and one password is executed by a plurality of beacons; the unlocking password of each beacon can be set one to one based on the ID code number of the beacon;
3. the user brings the beacon to reach the identification range of the lock authentication module;
4. the lockset obtains the ID code of the beacon and judges whether the unlocking authority exists;
5. identifying a beacon and grabbing an unlocking password thereof, such as walking an L-shaped step;
6. comparing the password with a preset characteristic value;
7. and if the comparison is successful, unlocking and stopping broadcasting.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.