CN113204749A - Near field information authentication method and device based on time control - Google Patents
Near field information authentication method and device based on time control Download PDFInfo
- Publication number
- CN113204749A CN113204749A CN202110515813.4A CN202110515813A CN113204749A CN 113204749 A CN113204749 A CN 113204749A CN 202110515813 A CN202110515813 A CN 202110515813A CN 113204749 A CN113204749 A CN 113204749A
- Authority
- CN
- China
- Prior art keywords
- information
- authorized merchant
- authorized
- server
- merchant
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 91
- 210000003462 vein Anatomy 0.000 claims description 23
- 230000008859 change Effects 0.000 claims description 21
- 238000013475 authorization Methods 0.000 claims description 16
- 230000033001 locomotion Effects 0.000 claims description 14
- 230000003068 static effect Effects 0.000 claims description 13
- 230000005484 gravity Effects 0.000 claims description 10
- 238000012508 change request Methods 0.000 claims description 4
- 230000004048 modification Effects 0.000 claims description 4
- 238000012986 modification Methods 0.000 claims description 4
- 239000002609 medium Substances 0.000 description 11
- 238000001514 detection method Methods 0.000 description 9
- 230000006870 function Effects 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 8
- 230000001133 acceleration Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 238000005265 energy consumption Methods 0.000 description 5
- 239000003086 colorant Substances 0.000 description 2
- 230000008921 facial expression Effects 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 239000012120 mounting media Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008707 rearrangement Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000029305 taxis Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Educational Administration (AREA)
- General Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- General Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Mobile Radio Communication Systems (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The embodiment of the application discloses a near field information authentication method and device based on time management and control. According to the technical scheme provided by the embodiment of the application, when the terminal device detects that the current time meets the effective affirmation time period and the current position is within the range of the effective authorized merchant device, the identity information authentication can be started, so that convenience is provided, the safety of the identity information and the account safety are further guaranteed, when the terminal device meets the set time period and the set position limit, the terminal device sends the position information to the server periodically, the power consumption of the terminal device for detecting the position information is reduced, the set time period is used as a switch, the application is more energy-saving, the effective range and the effective time of a user account are controlled, the user account is controlled intelligently, the effectiveness and the ineffectiveness are achieved, and the account safety is guaranteed.
Description
Technical Field
The embodiment of the application relates to the technical field of information authentication, in particular to a near field information authentication method and device based on time management and control.
Background
With the continuous development of network technology and automation equipment technology, various electronic self-service terminals such as banks, electronic taxes, electronic police, electronic vehicle management centers, airports, high-speed railway stations and hotels are continuously developed and used in various places, so that the operating expenditure is saved, the work efficiency is improved, and the convenience for people to work is improved.
When business is transacted in the electronic era at present, the identity is often confirmed by showing the entity identity card, if the entity identity card is not carried, the transaction of the business is influenced, and the inconvenience of transacting the business by citizens is greatly caused.
The scheme for solving the problem at present is to provide a method for detecting position information based on terminal equipment, feed the position information back to a server, the server stores the position information of each merchant equipment, when the terminal equipment is located in a set range of the merchant equipment, the comparison of user biological characteristic information is carried out between effective terminal equipment in the set range and the merchant equipment, and identity authentication is completed based on the comparison to obtain an identity authentication result, so that identity information authentication can be realized without an entity identity card, and the convenience of travel and handling of people is improved. However, this method requires the terminal device to continuously detect its own position, which consumes power consumption of the device and memory of the device, and only determines that there are certain unsafe factors in the valid terminal device based on the position.
Disclosure of Invention
The embodiment of the application provides a near field information authentication method, device, equipment and storage medium based on time management and control, and aims to solve the problems that an existing identity information authentication mode is inconvenient, high in power consumption and not safe enough.
In a first aspect, an embodiment of the present application provides a near field information authentication method based on time management and control, including:
when detecting that the current time meets an effective determination time period and the current position is within an effective authorized merchant hotspot range, the terminal equipment periodically sends position information to a server, and the terminal equipment is associated with an object to be authenticated;
the authorized merchant equipment sends an information authentication request to a server, wherein the information authentication request comprises identification information of the authorized merchant equipment and collected at least one type of living body biological characteristic information of the object to be authenticated;
the server determines valid users in a preset range of the authorized merchant equipment based on the identification information of the authorized merchant equipment and the position information uploaded by each terminal equipment;
and the server compares the at least one living body biological characteristic information with the corresponding biological characteristic information pre-stored by each determined effective user to obtain an information authentication result of the object to be authenticated.
Further, the method also comprises the following steps:
when detecting that the hot spots of the authorized merchants meet the set conditions, the terminal equipment downloads at least one piece of hot spot information of the authorized merchants corresponding to the authorized merchants from the server and adds the hot spot information to the display interface, wherein one authorized merchant is associated with one or more hot spots of the authorized merchants, and one hot spot of the authorized merchants is associated with one or more pieces of equipment of the authorized merchants.
Further, the setting condition is that the position information of the authorized merchant hot spot is located within a preset range of the current position or the virtual position of the terminal device.
Further, the method also comprises the following steps:
and when the terminal equipment detects that the terminal equipment is located within the preset geographic boundary line based on the current position information, acquiring authorized merchant hotspots corresponding to all authorized merchants within the preset range of the current position in real time, downloading the authorized merchant hotspot information from the server and updating the authorized merchant hotspot information into a display interface in real time.
Further, the method also comprises the following steps:
when detecting that the terminal equipment is associated with an authorized merchant application program, an APP or an applet, the server adds and stores an authorized merchant hotspot corresponding to the authorized merchant and a default preset time period setting to a display interface, wherein the authorized merchant application program, the APP or the applet is associated with the authorized merchant.
Further, the method also comprises the following steps:
when receiving and verifying a change request of an authorized merchant application program, APP or applet to an authorized merchant hotspot of the authorized merchant application program, APP or applet by an operator to which the authorized merchant application program, APP or applet belongs, the server stores the changed authorized merchant hotspot, generates authorized merchant hotspot change information and sends the authorized merchant hotspot change information to the terminal equipment;
and the terminal equipment downloads and stores the modified authorized merchant hotspot to a display interface from the server based on the authorized merchant hotspot modification information.
Further, the method also comprises the following steps:
the method comprises the steps that when a terminal device detects that an authorized merchant hotspot corresponding to a current authorized merchant is not loaded on a current display interface, a temporary user authorization interface is opened, and when the fact that the number of times of identity authentication of an object to be authenticated based on the temporary user authorization interface within a set time interval reaches a threshold value is detected, authorized merchant hotspot information corresponding to the authorized merchant is downloaded from a server and added to the display interface, wherein the adding mode comprises automatic adding and manual adding.
Further, the authorized merchant hotspot includes an authorized merchant hotspot name, information of an affiliated operator, an affiliated application program, an affiliated item in the affiliated application program, location information, a preset range, default preset time, visibility to a user, validity of the authorized merchant hotspot, one or more set time periods, and validity of each time period.
Further, the authorized merchant hotspot sets a merchant hotspot name, information of an affiliated operator, an affiliated application program, an affiliated item in the affiliated application program, position information, a preset range, default preset time, and whether a user can see through a setting interface provided by the authorized merchant application program, the APP, or the applet.
Further, the setting of the authorized merchant hotspot includes setting whether the authorized merchant hotspot is valid, time period, whether each time period is valid, and restoring the default preset time through a setting interface provided by an application program in the terminal device, where the application program includes a plurality of authorized merchant application programs, APPs, or applets.
Further, the authorized merchant hotspots are displayed on a display interface corresponding to the application program in at least one display mode of map display, list display and classification display, the classification display shows that the authorized merchant hotspots are respectively classified into corresponding category sets according to preset classification rules, and different category sets are displayed on the display interface of the application program.
Further, the set time period of the authorized merchant hotspot includes a start time parameter, an end time parameter, a sustainable time parameter, and whether the set time period is valid, a time length corresponding to the set time period is formed between the start time parameter and the end time parameter, the sustainable time parameter is used for indicating a duration for continuously sending the location information to the server after the terminal device meets the set valid time period, the current location is within the valid authorized merchant hotspot range, and the identity authentication is completed once, and whether the sustainable time period is valid is used for indicating whether the set time period participates in the actual operation of the terminal device.
Further, valid identification time periods of different authorized merchant hotspots are mapped to a time table, and the time table is used for representing the corresponding relation between the authorized merchant hotspots and the set time periods.
Furthermore, the schedule is respectively provided with matched identification information corresponding to different set time periods, and the identification information is used for indicating general attributes or individual attributes of the different set time periods.
Further, before detecting that the current time meets the valid determination time period and the current location is within the range of the authorized merchant device, the terminal device further includes:
the terminal equipment detects the self state and whether the current time meets the effective determination time period every set period;
when detecting that the current time meets an effective determination time period and the self state is motion, the terminal equipment acquires the current position meeting at least one effective authorized merchant hotspot range and sends the current position information to a server;
when the terminal equipment detects that the current time meets the effective determination time period and the self state is static, the terminal equipment sends the position information to the server after the time interval from the last time of sending the position information to the server meets the preset interval, and otherwise, the terminal equipment does not send the position information.
Further, the terminal device confirms that the current state is moving or static through the attitude sensor and/or the magnetic field sensor.
Further, the detecting, by the terminal device, whether the state of the terminal device is moving or stationary includes:
the terminal equipment acquires current state information and compares the current state information with the last state information;
and when the change value between the current state information and the last state information is larger than a preset value, defining the terminal to be in motion, otherwise, defining the terminal equipment to be static.
Furthermore, the position information detected by the terminal device is acquired in real time through a satellite positioning device in the terminal device, or is calculated through real-time data acquired by a gravity sensor and a magnetic field sensor in the terminal device.
Further, the server compares the at least one living body biometric information with the corresponding biometric information pre-stored by each determined valid user to obtain the information authentication result of the object to be authenticated, and the method includes:
the server calculates the similarity between the at least one living body biological characteristic information and the corresponding biological characteristic information pre-stored by each determined effective user;
and the server obtains the information authentication result of the object to be authenticated according to the similarity.
Further, the method also comprises the following steps:
the terminal equipment receives a mandatory position information reporting notification instruction, and determines a corresponding position reporting area according to the mandatory position information reporting notification instruction;
and when the terminal equipment detects that the terminal equipment is positioned in the position reporting area range, reporting the current position information.
Further, the server compares the at least one living body biometric information with the corresponding biometric information pre-stored by each determined valid user to obtain the information authentication result of the object to be authenticated, and the method includes:
a user presets a user-defined expression and a corresponding execution instruction;
the server calculates face similarity and expression similarity between the at least one living body biological characteristic information and corresponding biological characteristic information pre-stored by each determined effective user;
and the server obtains an information authentication result of the object to be authenticated and a corresponding execution instruction according to the face similarity and the expression similarity.
Further, the server compares the at least one living body biometric information with the corresponding biometric information pre-stored by each determined valid user to obtain the information authentication result of the object to be authenticated, and the method includes:
the user presets a user-defined finger characteristic, a palm print characteristic, a palm vein characteristic and/or a palm print and palm vein characteristic and a corresponding execution instruction;
the server calculates the similarity between the living finger characteristics, the palm print characteristics, the palm vein characteristics and/or the palm print and palm vein characteristic information and the corresponding biological characteristic information pre-stored by each determined effective user;
and the server obtains an information authentication result of the object to be authenticated and a corresponding execution instruction according to the finger characteristics, the palm print characteristics, the palm vein characteristics and/or the similarity of the palm print characteristics and the palm vein characteristics.
Further, the method also comprises the following steps:
the user presets a user-defined expression and a corresponding execution instruction, the user-defined expression and the corresponding execution instruction are set through a setting interface provided by an application program in the terminal equipment, and the application program comprises a plurality of authorized merchant application programs, APP or applets.
In a second aspect, an embodiment of the present application provides a near field information authentication apparatus based on time management, including:
a position sending module: the terminal equipment is used for periodically sending identification information to the server when detecting that the current time meets an effective determination time period and the current position is within an effective authorized merchant equipment range, and the terminal equipment is associated with an object to be authenticated;
an authentication request module: the authorization merchant device is used for sending an information authentication request to a server, wherein the information authentication request comprises identification information of the authorization merchant device and at least one acquired living body biological characteristic information of the object to be authenticated;
a user determination module: the server is used for determining valid users in a preset range of the authorized merchant equipment based on the identification information of the authorized merchant equipment and the position information uploaded by each terminal equipment;
a feature comparison module: and the server is used for comparing the at least one living body biological characteristic information with the corresponding biological characteristic information prestored by each determined effective user to obtain the information authentication result of the object to be authenticated.
In a third aspect, an embodiment of the present application provides a computer device, including: a memory and one or more processors;
the memory for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors implement the time-based-regulation near-field-information authentication method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a storage medium containing computer-executable instructions for performing the time-based steering near-field information authentication method according to the first aspect when executed by a computer processor.
According to the method and the device, when the terminal device detects that the current time meets the effective determination time period and the current position is within the hot spot range of the effective authorized merchant, the terminal device periodically sends the position information to the server, the authorized merchant device sends the information authentication request to the server, and then the server determines the effective users within the preset range of the authorized merchant device based on the identification information of the authorized merchant device and the position information uploaded by each terminal device; the server compares the at least one type of living body biological characteristic information with the corresponding biological characteristic information prestored by each determined effective user, and finally obtains an information authentication result of the object to be authenticated; in the embodiment, the double consideration of the set time period and the current position is combined, and the identity information authentication can be started only when the object to be authenticated meets the requirements of time and position of the authorized merchant equipment at the same time, so that convenience is provided and the safety of the identity information is further ensured; in the embodiment, when the terminal device detects that the current time meets the valid determination time period and the state of the terminal device is motion, the terminal device acquires the current position meeting at least one valid authorized merchant hotspot range and sends the current position information to the server, so that the energy consumption is further reduced, and the energy consumption is kept at the lowest level; in the embodiment, when the number of times of identity authentication of the object to be authenticated based on the temporary user authorization interface reaches the threshold value within the set time interval is detected, the hot spot information of the authorized merchant corresponding to the authorized merchant is downloaded from the server and added to the display interface, so that the intelligent learning function is provided, and the use is more convenient; in addition, in this embodiment, whether the set merchant hotspot of the authorized merchant hotspot is valid, the time period, whether each time period is valid, and the default preset time is recovered are set through a setting interface provided by an application program in the terminal device, further, the authorized merchant hotspot is displayed on a display interface corresponding to the application program through at least one display mode of map display, list display, and classification display, where the classification display indicates that the authorized merchant hotspot is respectively classified into corresponding category sets according to preset classification rules, and different category sets are displayed on the display interface of the application program, so that a simpler, faster, and more intuitive visual management function is provided, and user operation is facilitated.
Drawings
Fig. 1 is a flowchart of a near field information authentication method based on time management and control according to an embodiment of the present application;
fig. 2 is a flowchart of another time-based near field information authentication method provided in an embodiment of the present application;
fig. 3 is a flowchart of another time-based near field information authentication method provided in an embodiment of the present application;
fig. 4 is a flowchart of another time-based near field information authentication method provided by an embodiment of the present application;
fig. 5 is a flowchart of another time-based near field information authentication method provided in an embodiment of the present application;
fig. 6 is a schematic structural diagram of a near field information authentication device based on time management and control according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of another near field information authentication device based on time control according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of another near field information authentication device based on time control according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, specific embodiments of the present application will be described in detail with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some but not all of the relevant portions of the present application are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The embodiment of the application provides a near field information authentication method, device, equipment and storage medium based on time management and control. According to the method and the device, when the terminal device detects that the current time meets the effective affirmation time period and the current position is within the effective authorized merchant hotspot range, the terminal device periodically sends the position information to the server, the authorized merchant device sends the information authentication request to the server, and then the server determines the effective users within the preset range of the authorized merchant device based on the identification information of the authorized merchant device and the position information uploaded by each terminal device, so that whether the user account is effective or not is intelligently controlled; the server compares the at least one type of living body biological characteristic information with the corresponding biological characteristic information prestored by each determined effective user, and finally obtains an information authentication result of the object to be authenticated; in the embodiment, the double consideration of the set time period and the current position is combined, and the identity information authentication can be started only when the object to be authenticated meets the requirements of time and position of authorized merchant equipment at the same time, so that convenience is provided and the safety of the identity information is further ensured; in the embodiment, when the terminal device detects that the current time meets the valid determination time period and the state of the terminal device is motion, the terminal device acquires the current position meeting at least one valid authorized merchant hotspot range and sends the current position information to the server, so that the energy consumption is further reduced, and the energy consumption is kept at the lowest level; in the embodiment, when the number of times of identity authentication of the object to be authenticated based on the temporary user authorization interface reaches the threshold value within the set time interval is detected, the hot spot information of the authorized merchant corresponding to the authorized merchant is downloaded from the server and added to the display interface, so that the intelligent learning function is provided, and the use is more convenient; in addition, in this embodiment, whether the set merchant hotspot of the authorized merchant hotspot is valid, the time period, whether each time period is valid, and the default preset time is recovered are set through a setting interface provided by an application program in the terminal device, further, the authorized merchant hotspot is displayed on a display interface corresponding to the application program through at least one display mode of map display, list display, and classification display, where the classification display indicates that the authorized merchant hotspot is respectively classified into corresponding category sets according to preset classification rules, and different category sets are displayed on the display interface of the application program, so that a simpler, faster, and more intuitive visual management function is provided, and user operation is facilitated.
The following are detailed below.
Fig. 1 is a flowchart of a time-based near field information authentication method according to an embodiment of the present application, where the time-based near field information authentication method according to an embodiment of the present application may be executed by a time-based near field information authentication apparatus, which may be implemented by hardware and/or software and integrated in a computer device.
The following description will be given taking as an example a case where the time-control-based near-field information authentication apparatus performs the time-control-based near-field information authentication method. Referring to fig. 1, the near field information authentication method based on time regulation includes:
step 101: and when detecting that the current time meets the effective determination time period and the current position is within the hot spot range of the effective authorized merchant, the terminal equipment periodically sends position information to the server, and the terminal equipment is associated with the object to be authenticated.
The application system comprises terminal equipment, authorized merchant equipment and a server. Wherein, terminal equipment uses by the user, include like smart mobile phone, notebook computer, panel computer, intelligent bracelet, intelligent wrist-watch, intelligent earphone, intelligent glasses, intelligent necklace, intelligence wearing equipment, mechanical ectoskeleton, brain machine class intelligent equipment, terminal equipment is as hardware equipment, need possess position information acquisition function in this embodiment. More specifically, the product implementing the functions of the present embodiment is actually an application program applied in the terminal device, such as a mobile phone app. The authorized merchant device is also a device for providing the merchant with the user for identity authentication, and may also have functions of transaction, such as an intelligent transaction terminal, an intelligent panel machine, an intelligent robot, an intelligent camera gun, and other intelligent devices. An authorized merchant device is typically referred to as corresponding to an authorized merchant, but an authorized merchant may typically correspond to one or more authorized merchant hotspots, and an authorized merchant hotspot may correspond to one or more authorized merchant devices. The server is used for connecting the terminal equipment and the authorized merchant equipment and playing a bridge for communication between the terminal equipment and the authorized merchant equipment, and the server can be a service cloud.
In this embodiment, the terminal device has a position detection function and a clock, and the terminal device may detect its current position at intervals, and may or may not send the current position to the server. For the authorized merchant hot spot, the application program is virtual information, and one authorized merchant hot spot at the same place of the same authorized merchant can correspond to a plurality of authorized merchant devices, so that the display quantity of the authorized merchant devices can be reduced, the storage quantity of the mobile terminal is reduced, and the management and the checking are more convenient; the preset range of the authorized merchant hotspot can be set through a preset interface, for example, for the authorized merchant hotspot a, the preset range set by the authorized merchant hotspot a is within 50 meters near the authorized merchant hotspot a for identity authentication, and the preset range set by the authorized merchant hotspot B is within 200 meters near the authorized merchant hotspot B for identity authentication. Besides setting a preset authentication range of a geographic position, a time limit is set for an authorized merchant hotspot through a setting interface, namely the default set time period, so that whether a user account is valid or not is intelligently controlled through time and place. The authorized merchant device is a physical device, wherein an authorized merchant hotspot may correspond to one or more authorized merchant devices. And the terminal equipment periodically and frequently sends the position information to the server only when the current time meets the effective set time period and is within the preset range of the hot spot of the effective authorized merchant. Therefore, the terminal equipment avoids sending self position information uninterruptedly for a long time, and avoids invading the personal track privacy security of the user. The hot spot of the authorized merchant is equivalent to a virtual activation point, and when the terminal device meets the conditions of time and position at the same time, namely the switch for information authentication is turned on, the user using the terminal device is also used as an object to be authenticated to perform identity information authentication subsequently.
Illustratively, the user a loads an application program for near field information authentication on a terminal device a held by the user a, in the application program, some authorized merchant hotspots related to authorized merchant devices have been loaded, and an interface for setting the authorized merchant hotspots is provided in the application degree, and whether the authorized merchant hotspots corresponding to the authorized merchant hotspots are valid, whether the time period is determined, whether each time period is valid, and whether default preset time is recovered are set through the interface. The authorized time periods of each authorized merchant hotspot may be the same, completely different, or overlapped, and one or more authorized time periods of each authorized merchant hotspot may be provided. Information and a preset range of the geographic location of the authorized merchant hotspot are already contained in the authorized merchant hotspot. Assuming that the valid authorized time period of the authorized merchant hotspot B is 8:00-9:00, the valid geographic location is point B, the preset range is 300 meters, and the authorized merchant device C is an authentication device of the authorized merchant hotspot B, so that the valid geographic location is also point B, and the preset range is 300 meters. The user A holds the terminal device A and continuously moves the position, the current time is 8:10 in the morning, the set time period is met, and when the user moves to the point A, the point A is detected to be located within 300 meters of the point B, and the condition of periodically sending the position information to the server is met. Assuming that the user a needs to perform information authentication with the authorized merchant device C, it is equivalent that the user a is the object to be authenticated.
As a preferred implementation manner, the terminal device provided in this embodiment of the present application is provided with a position acquisition device, and the position acquisition device may use one or more positioning technologies such as a commonly used chinese beidou satellite navigation system positioning device, an american GPS satellite navigation system positioning device, an european galileo satellite navigation system positioning device, an russian GLONASS satellite navigation system positioning device, a base station positioning system (LBS), an Assisted Global Positioning System (AGPS), a global system for mobile communications (GMS), and an IP address positioning (Internet Protocol).
On the other hand, since the user holding the terminal device may enter some areas with weak satellite signals or no satellite signals, such as basements, the location information may not be updated in time if the user only uses the satellite positioning device to collect the location. In order to overcome the technical problem, in this embodiment, optionally, an acceleration sensor, a direction sensor, and a magnetic field sensor are further disposed in the terminal device. The acceleration sensor can detect acceleration data of the terminal device, the direction sensor can detect direction data of the terminal device, and the magnetic field sensor can detect state data of the terminal device. Therefore, the moving direction and the moving distance of the terminal equipment are calculated by combining real-time data acquired by the acceleration sensor, the direction sensor and the magnetic field sensor, and the moving direction and the moving distance are calculated by combining last position information. The last position information is the last satellite position information collected before the satellite positioning device signal disappears.
Step 102: and the authorized merchant equipment sends an information authentication request to a server, wherein the information authentication request comprises the identification information of the authorized merchant equipment and the acquired at least one type of living body biological characteristic information of the object to be authenticated.
When the information authentication is carried out on the object to be authenticated through the authorized merchant equipment, the object to be authenticated collects at least one type of living body biological characteristic information in real time through the authorized merchant equipment, and when the information authentication is carried out, the authorized merchant equipment uploads the at least one type of living body biological characteristic information collected in real time to the server. When the authorized merchant device sends an information authentication request, the information authentication process is started. And the server selects the valid user of the terminal equipment for information authentication according to the information authentication request. The identification information of the authorized merchant device is used for identifying the authorized merchant device so as to be used for the server to perform corresponding matching query.
Step 103: and the server determines valid users in the preset range of the authorized merchant equipment based on the identification information of the authorized merchant equipment and the position information uploaded by each terminal equipment.
In the server, the identification information of each authorized merchant device is stored in advance, and the position information of each authorized merchant device, such as the current satellite positioning information filled in during registration, is determined through the query of the identification information. In another embodiment, it may also be that the merchant device is authorized to send the real-time location information directly to the server. And determining the position information of the authorized merchant hot spot corresponding to the authorized merchant equipment, and simultaneously storing the preset range corresponding to each authorized merchant equipment and the authorized merchant hot spot. The terminal device sends the location information to the server, and especially when entering a preset range corresponding to the hotspot of the authorized merchant, the location information is periodically sent to the server, for example, the location information is sent to the server every 60 seconds, so that the server can know the movement of the terminal device in time. In this embodiment, the valid user is a terminal device whose current location is within a range set by the authorized merchant device when the authorized merchant device makes an information authentication request. And when the server receives the information authentication request, determining the valid user. For example, an information authentication request is provided by an authorized merchant device, when the server receives the information authentication request, the server determines a terminal device within the range of the authorized merchant device according to the position of the authorized merchant, and if the terminal device currently meeting the conditions includes a terminal device a, a terminal device B, and a terminal device C, the terminal device a, the terminal device B, and the terminal device C are valid users, and a holding user corresponding to the terminal device A, B, C is used as an object to be authenticated.
Step 104: and the server compares the at least one living body biological characteristic information with the corresponding biological characteristic information pre-stored by each determined effective user to obtain an information authentication result of the object to be authenticated.
The server compares at least one type of living body biological characteristic information from the authorized merchant equipment with corresponding biological characteristic information prestored by the valid user, so that an information authentication result is completed. Further, if at least one piece of living body biological characteristic information of the authorized merchant equipment is similar enough to corresponding biological characteristic information prestored by a valid user, and the two pieces of living body biological characteristic information are generally considered to be consistent, the information authentication result can be correspondingly authenticated, when the difference between the two pieces of living body biological characteristic information and the corresponding biological characteristic information is large, the information authentication result generally corresponds to authentication failure, at this time, the server can feed back the information authentication result of the authorized merchant equipment, and the authorized merchant equipment performs the following processes of business transaction, financial transaction and the like according to the information authentication result.
Optionally, in this embodiment of the application, the server compares the at least one living body biometric information with the corresponding biometric information pre-stored by each determined valid user to obtain an information authentication result of the object to be authenticated, and actually, the server calculates a similarity between the at least one living body biometric information and the corresponding biometric information pre-stored by each determined valid user; and the server obtains the information authentication result of the object to be authenticated according to the similarity. The embodiment provides a set threshold for the server, when the similarity is greater than or equal to the set threshold, the living body biometric information of the authorized merchant device is considered to be consistent with the corresponding biometric information pre-stored by the valid user, and the corresponding information authentication result is that the authentication is passed, otherwise, when the similarity is less than the set threshold, the living body biometric information of the authorized merchant device is considered to be inconsistent with the corresponding biometric information pre-stored by the valid user, and the corresponding information authentication result is that the authentication is failed.
Optionally, the server compares the at least one living body biometric information with corresponding biometric information pre-stored by each determined valid user to obtain an information authentication result of the object to be authenticated, including:
a user presets a user-defined expression and a corresponding execution instruction; the server calculates face similarity and expression similarity between the at least one living body biological characteristic information and corresponding biological characteristic information pre-stored by each determined effective user; and the server obtains an information authentication result of the object to be authenticated and a corresponding execution instruction according to the face similarity and the expression similarity. In an embodiment, the corresponding biometric information is living human face expression biometric information, and correspondingly, the corresponding biometric information pre-stored in the valid user is corresponding human face expression biometric information. The user-defined expression and the corresponding execution instruction are set through a setting interface provided by an application program in the terminal equipment, and the application program comprises a plurality of authorized merchant application programs, APP or applets.
The user presets a user-defined finger characteristic, a palm print characteristic, a palm vein characteristic and/or a palm print and palm vein characteristic and a corresponding execution instruction; the server calculates the similarity between the living finger characteristics, the palm print characteristics, the palm vein characteristics and/or the palm print and palm vein characteristic information and the corresponding biological characteristic information pre-stored by each determined effective user; and the server obtains an information authentication result of the object to be authenticated and a corresponding execution instruction according to the finger characteristics, the palm print characteristics, the palm vein characteristics and/or the similarity of the palm print and the palm vein. Wherein, the finger characteristic, the palm print characteristic, the palm vein characteristic, the palm print and the palm vein characteristic all belong to the biological characteristic information of the living body.
The user-defined expression preset by the user and the corresponding execution instruction are set through a setting interface provided by an application program in the terminal equipment, and the user application program comprises a plurality of authorized merchant application programs, APP (application program) or applets.
On the other hand, as shown in fig. 2, an embodiment of the present application further provides another near field information authentication method based on time management, including the following steps:
step 201: when detecting that the hot spots of the authorized merchants meet the set conditions, the terminal equipment downloads at least one piece of hot spot information of the authorized merchants corresponding to the authorized merchants from the server and adds the hot spot information to the display interface, wherein one authorized merchant is associated with one or more hot spots of the authorized merchants, and one hot spot of the authorized merchants is associated with one or more pieces of equipment of the authorized merchants.
Specifically, in this embodiment, the set condition is that the hot spot of the authorized merchant is visible to the user and the location information of the hot spot is located within a preset range of the current location or the virtual location of the terminal device. The location may be a virtual location, for example, a text is input into certain address information, for example, the obtained location information is sent or shared, for example, a location is clicked on a mobile phone map to generate corresponding location information.
The method includes downloading an application program in the terminal device for accommodating an authorized merchant hotspot, providing the application program for the authorized merchant to authenticate information of an object to be authenticated, and managing authorized merchant hotspots corresponding to different authorized merchants, for example, setting a time period for the authorized merchants. When the user uses the application program for the first time, the user firstly adds an authorized merchant hotspot in the application program display interface of the terminal device. The specific adding mode is that when the authorized merchant device is located within the preset range of the current position of the terminal device, the authorized merchant hotspot information corresponding to the authorized merchant device is downloaded from the server and added. The operation of adding the authorized merchant hotspot for the merchant comprises the following steps: selecting a newly added authorized merchant hotspot, setting information such as position information, a preset range, default preset time and the like of the newly added authorized merchant hotspot, determining and uploading the information to a server, and then setting the authorized merchant device corresponding to the newly added hotspot.
In this step, using the current position of the terminal device as a reference point, for example, setting the preset range to be 3 kilometers, and the current position of the terminal device as a point a, obtaining information of authorized merchant hotspots corresponding to all authorized merchant devices currently located within the range of 3 kilometers of the point a and visible to the user, downloading the authorized merchant hotspots from the server, and loading and displaying the authorized merchant hotspots in a display interface of the terminal device. In the step, the terminal device is used as a reference object, the terminal device obtains the current position of the terminal device and obtains authorized merchants within a preset range, the terminal device is held by a user and is movable, when the geographic position of the terminal device is changed or a virtual geographic position is used, the corresponding preset range is correspondingly different, and therefore the authorized merchants are different, in the step, the authorized merchant hot spot visible to the user within the preset range of the current position obtained each time is only added on a display interface of an application program and is not stored, and the adding mode of the authorized merchant hot spot is dynamically updated.
Further, in this embodiment, since the terminal device often generates a location change or uses a virtual geographic location under the hold of the user, the change of the location brings a difference of a preset range thereof, and the corresponding authorized merchants are also different. Therefore, the hot spot of the authorized merchant can be dynamically updated according to the change of the geographic position of the terminal equipment.
Specifically, when detecting that the terminal device is located within the preset geographic boundary based on the current position information, the terminal device obtains authorized merchant hotspots corresponding to all authorized merchants within the preset range of the current position in real time, and downloads and updates the authorized merchant hotspot information from the server to the display interface in real time. The preset geographical boundary may be a geographical boundary set by a person for updating the authorized merchant hotspot for the terminal device.
Step 202: and when detecting that the current time meets the effective determination time period and the current position is within the hot spot range of the effective authorized merchant, the terminal equipment periodically sends position information to the server, and the terminal equipment is associated with the object to be authenticated.
In this step, a binding relationship exists between the authorized merchant and the authorized merchant hotspot, and a binding relationship exists between the authorized merchant hotspot and the authorized merchant device, for example, the authorized merchant is a supermarket, a card swiping machine is installed in the supermarket, the card swiping machine serves as the authorized merchant device and corresponds to the supermarket authorized merchant hotspot, and the supermarket authorized merchant hotspot corresponds to the supermarket. A supermarket can be provided with a plurality of card readers, but a user does not want to see a plurality of card readers on an operation interface and does not care which card reader is used for swiping cards at which card reader is finally arranged, so the supermarket can become an authorized merchant hotspot, all the card readers in the supermarket correspond to the authorized merchant hotspot, namely, one authorized merchant hotspot can correspond to a plurality of authorized merchant devices, but one authorized merchant device can only be bound with one authorized merchant hotspot at a time; the supermarket can have a plurality of branch stores, each branch store is an authorized merchant hotspot, namely, one authorized merchant can correspond to a plurality of authorized merchant hotspots, but one authorized merchant hotspot can only be bound with one authorized merchant at a time.
The terminal equipment is held by the user, the user is used as an object to be authenticated when the information authentication is carried out, at the moment, the object to be authenticated authorizes a merchant, and the merchant becomes an authorized merchant. Taking a subway as an example, when the object to be authenticated authorizes the subway, the subway becomes an authorization merchant, and the object to be authenticated is defaulted to all subway stations included in the subway. That is, an authorized merchant includes at least one merchant item, for example, a subway includes at least one subway station, and when the object to be authenticated authorizes the authorized merchant, all subway stations are authorized by default.
In this embodiment, each authorized merchant includes at least one merchant item, the authorized merchants and the merchant items both have corresponding authentication time periods, an authentication time period corresponding to any one merchant item is the same as or different from an authentication time period corresponding to an authorized merchant, and an authentication time period corresponding to any one merchant item in the same authorized merchant is the same as or different from authentication time periods corresponding to other merchant items. Taking a subway as an example, the subway is an authorized merchant, the subway comprises a plurality of subway stations, and each subway station is a merchant project. In the application program, the method can be provided for the authorized merchant setting interface to carry out unified setting on the authorized merchants, and simultaneously, the method is also independently provided for the interface for carrying out setting on each merchant project. For example, when the interface of the authorized merchant sets the set time period of the subway to be 8:00 a.m. to 11:30 a.m., all subway stations are corresponding to the set time period of 8:00 a.m. to 11:30 a.m., for some special subway stations, the user can additionally set the set time period of the subway station through the interface. Therefore, the set time periods of different subway stations can be different, and the set time periods of all subway stations can be the same.
Step 203: and the authorized merchant equipment sends an information authentication request to a server, wherein the information authentication request comprises the identification information of the authorized merchant equipment and the acquired at least one type of living body biological characteristic information of the object to be authenticated. In addition, the information authentication request may also carry identification information of the authorized merchant device, such as a device unique code, so that the server may quickly match other information corresponding to the authorized merchant device.
Step 204: and the server determines valid users in the preset range of the authorized merchant equipment based on the identification information of the authorized merchant equipment and the position information uploaded by each terminal equipment.
Step 205: and the server compares the at least one living body biological characteristic information with the corresponding biological characteristic information pre-stored by each determined effective user to obtain an information authentication result of the object to be authenticated.
In this embodiment, the at least one type of living body biometric information includes one or more types of biometric information such as face information, palm print information, palm vein information, fingerprint information, voiceprint information, iris information, and DNA information, and in this embodiment, face biometric information is preferred. The terminal equipment is provided with acquisition equipment for acquiring at least one type of biological characteristic information of the living body. The human face recognition technology has smaller error rate of acquiring the biological characteristic information of the object to be authenticated, can provide the accuracy of identity recognition, and is relatively convenient to apply. Furthermore, a face recognition technology and a face gesture recognition technology can be combined, the object to be authenticated can customize the expression required by identity recognition based on own preference, and funds are prevented from being stolen and brushed. In addition, the palm vein recognition technology and the finger gesture recognition technology can be combined, the object to be authenticated can customize the palm vein and the finger gesture required by identity recognition based on own preference, and funds are prevented from being stolen and brushed.
Fig. 3 is a flowchart illustrating another time-based near field information authentication method, and referring to fig. 3, the time-based near field information authentication method provided in this embodiment includes:
step 301: when detecting that the terminal device is associated with an authorized merchant application program, an APP or an applet, the server adds and stores an authorized merchant hotspot and a default valid identification time period corresponding to the authorized merchant to a display interface, wherein the authorized merchant application program, the APP or the applet is associated with the authorized merchant.
Specifically, in this embodiment, an application program of the terminal device serves as a framework of applets corresponding to a plurality of authorized merchants, and accommodates different authorized merchant applications, APPs, or applets. The method comprises the steps that an applet operator presets an authorized merchant hotspot when designing an applet, and registers the authorized merchant hotspot in a server while the applet is on-line, so that when a user searches for an applet keyword through terminal equipment and pays attention to an authorized merchant application program, an APP or the applet, the server adds the authorized merchant hotspot corresponding to the authorized merchant to a display interface.
The difference from the previous embodiment is that in the previous embodiment, the terminal device is used as a geographical reference point, the authorized merchant hot spot corresponding to the authorized merchant within the preset range is selected and added to the display interface, and the geographical position is changed, so that the authorized merchant hot spot is added to the display interface in a dynamic updating manner. In the embodiment, the server detects the terminal device to search the applet keywords, and judges whether to pay attention to the authorized merchant application program, APP or applet, and when the terminal device pays attention to the authorized merchant application program, APP or applet, the authorized merchant application program, APP or applet cannot be objectively changed along with the change of the geographic position except for the situation of artificially deleting the attention. The valid determination time period may be a default preset time of the authorized merchant hotspot, or may be changed.
In the case that an authorized merchant hotspot is added based on the applet mode in this embodiment, the updating manner of the authorized merchant hotspot is that when the server receives and verifies that an authorized merchant application program, an APP or an operator to which the applet belongs proposes a change request for the authorized merchant hotspot of the authorized merchant application program, the APP or the applet, the changed authorized merchant hotspot, a merchant hotspot name, position information, a preset range, default preset time, and/or whether the user is visible or not, and the like are stored, and the authorized merchant hotspot change information is generated and sent to the terminal device; and the terminal equipment downloads and stores the modified hot spot update of the authorized merchant to a display interface from the server based on the hot spot modification information of the authorized merchant.
Step 302: and when detecting that the current time meets the effective determination time period and the current position is within the hot spot range of the effective authorized merchant, the terminal equipment periodically sends position information to the server, and the terminal equipment is associated with the object to be authenticated.
Step 303: and the authorized merchant equipment sends an information authentication request to a server, wherein the information authentication request comprises the identification information of the authorized merchant equipment and the acquired at least one type of living body biological characteristic information of the object to be authenticated.
Step 304: and the server determines valid users in the preset range of the authorized merchant equipment based on the identification information of the authorized merchant equipment and the position information uploaded by each terminal equipment.
Step 305: and the server compares the at least one living body biological characteristic information with the corresponding biological characteristic information pre-stored by each determined effective user to obtain an information authentication result of the object to be authenticated.
As shown in fig. 4, the present application further provides another near field information authentication method based on time management, including:
step 401: and when detecting that the number of times of information authentication of the object to be authenticated based on the temporary user authorization interface within a set time interval reaches a threshold value, downloading the authorized merchant hotspot corresponding to the authorized merchant device from the server and adding the authorized merchant hotspot to a display interface.
In this embodiment, another way of adding an authorized merchant hotspot to a display interface of a terminal device application is provided. In this embodiment, the authorized merchant hotspot includes an authorized merchant hotspot name, information of an affiliated operator, an affiliated application program, an affiliated item in the affiliated application program, location information, a preset range, default preset time, whether the authorized merchant hotspot is visible to the user, whether the authorized merchant hotspot is valid, one or more authorized time periods, and whether each time period is valid.
The embodiment can provide different interfaces for the user to set the set time period, including setting the name of the merchant hotspot of the right merchant hotspot, the information of the affiliated operator, the affiliated application program, the affiliated item in the affiliated application program, the position information, the preset range, the default preset time, and setting whether the user can see the set interface provided by the authorized merchant application program, the APP or the applet; or, the authorized merchant hot spot is set to determine whether the authorized merchant hot spot is valid, determine the time period, determine whether each time period is valid, and restore the default preset time, and the application program is set through a setting interface provided by an application program in the terminal device, wherein the application program comprises a plurality of authorized merchant application programs, APPs or applets.
Preferably, the authorized merchant hotspots are displayed on a display interface corresponding to the application program in any one of a map display mode, a list display mode and a classification display mode, the classification display mode indicates that the authorized merchant hotspots are respectively classified into corresponding category sets according to a preset classification rule, and different category sets are displayed on the display interface of the application program. The classification display can be classified according to the geographical position dimensions of provinces, cities and streets, can also be classified according to the dimension of a map space, or can be classified according to the dimension of a small program to which the small program belongs, or the dimension of character name sorting, can also be classified according to the dimension of a reference position from far to near or from near to far, and can also be subjected to classification management according to the dimension of a time sequence. The list display means that different authorized merchant hotspots are formed into a list according to a preset sequence to be displayed, and the map display means that the authorized merchant hotspots are correspondingly displayed corresponding to the positions of the authorized merchant hotspots on the map.
Furthermore, in this embodiment, the set time period of the authorized merchant hotspot necessarily includes a start time parameter and an end time parameter, where a time length corresponding to the set time period is formed between the start time parameter and the end time parameter. However, if only the start time parameter and the end time parameter exist, the object to be authenticated can only be valid within the entering range within the time period, for example, the method is applied to security protection of entrance guard of a residential area, a user sets ten nights to ten nights, when the user enters the vicinity of the residential area within the time period, the entrance guard is opened, but due to the long time period, the entrance guard is easily counterfeited and insulted by others. And if ten night hours to ten night hours are set, the time period length is shortened, but the limitation on the user is large, and if the user returns to the cell at other time points, the user needs to enter the cell by other modes. In order to improve the problem, in this embodiment, the set time period of the authorized merchant hotspot includes a start time parameter, an end time parameter, a sustainable time parameter, and whether the set time period is valid, where a time length corresponding to the set time period is formed between the start time parameter and the end time parameter, the sustainable time parameter is used to indicate a duration for the terminal device to continuously send the location information to the server when the set time period is satisfied and the current location is within a valid authorized merchant hotspot range, and whether the sustainable time period is valid is used to indicate whether the set time period participates in the actual operation of the terminal device. For example, setting a set time period for a user to enter a cell to be 17:00-22:00, assuming that the user is detected to finish identity authentication in 17:24 minutes and enter the cell, if no sustainable time is set, continuously sending user position information to a server from the time when the user enters the cell to the time of 22:00 minutes; if the sustainable time parameter is set to be 2 minutes, the position signal is continuously uploaded to the server within 2 minutes, namely the opening authentication state is kept for 2 minutes, and after 2 minutes, the terminal device does not upload the position information to the server any more, so that the false entering of others is prevented; when the user returns after leaving the range of the cell, the user starts again, and then the user enters the effective range from 17:00 to 22: 00.
As a further preferred implementation manner, this embodiment provides a time table, and valid approval time periods of different authorized merchant hotspots are all mapped to the time table, and the time table is used to represent a corresponding relationship between an authorized merchant hotspot and a valid approval time period. The time table is respectively provided with matched identification information corresponding to different valid authorized time periods, and the identification information is used for indicating general attributes or individual attributes of the different valid authorized time periods. The uniform time schedule is viewed by a user, different attributes are identified through different identification information, the user can view the uniform time schedule more conveniently, the identification information can be specific characters or different colors, for example, yellow identification represents a universal time slot, and blue identification represents an individual time slot.
Step 402: and when detecting that the current time meets the effective determination time period and the current position is within the hot spot range of the effective authorized merchant, the terminal equipment periodically sends position information to the server, and the terminal equipment is associated with the object to be authenticated.
Step 403: the authorized merchant equipment sends an information authentication request to a server, wherein the information authentication request comprises identification information of the authorized merchant equipment and collected at least one type of living body biological characteristic information of the object to be authenticated;
step 404: the server determines valid users in a preset range of the authorized merchant equipment based on the identification information of the authorized merchant equipment and the position information uploaded by each terminal equipment;
step 405: and the server compares the at least one living body biological characteristic information with the corresponding biological characteristic information pre-stored by each determined effective user to obtain an information authentication result of the object to be authenticated.
As shown in fig. 5, an embodiment of the present application further provides a near field information authentication method based on time management and control, including:
step 501: the terminal equipment detects the self state and whether the current time meets the effective determination time period every set period, and sends the position information to the server according to the self state. When detecting that the current time meets the effective determination time period and the self state is motion, the terminal equipment acquires the current position and sends position information to the server; when the terminal equipment detects that the current time meets the effective determination time period and the self state is static, the time interval from the last time of sending the position information to the server meets the preset interval, the position information is sent to the server, and otherwise, the position information is not sent. That is, it is determined whether the current time of the terminal device is valid, and on the premise that the current time is valid, the current location information is compared with the location information that was sent to the server last time.
In this embodiment, before the terminal device detects whether the current time of the terminal device itself meets the set time period and whether the current position is within the set range, the motion state of the terminal device itself is also detected. Specifically, the terminal device calculates through the attitude sensor, the magnetic field sensor or the gravity sensor that the self state is motion or static, and specifically, when detecting that data of the attitude sensor, the magnetic field sensor or the gravity sensor changes, the corresponding terminal device is judged to be in a non-static state. In another embodiment, the horizontal angle and the magnetic field direction are calculated in real time through the gravity sensor and the magnetic field sensor, and if the horizontal angle and the magnetic field direction are changed, the terminal equipment is correspondingly determined to be in a non-static state. Further, the terminal device acquires current position information and compares the current position information with the last position information; and when the change value between the current position information and the last position information is larger than a preset value, defining the terminal equipment to be in motion, otherwise, defining the terminal equipment to be in static state. For example, the change value is set to be any direction gravity vector greater than 0.05 or the magnetic field angle change greater than 8 degrees, and when the mobile phone is placed on a table and is just in the positive north direction for the first detection, the transverse angle X0 is 0.0, the vertical direction Y0 is 0.0, the longitudinal angle Z0 is-1.0, and the magnetic field direction C0 is 0 degrees; detecting that the user is picking up the mobile phone and faces west, wherein the transverse angle X1 is 0.0, the vertical direction Y1 is-0.8, the longitudinal angle Z1 is-0.6, and the magnetic field direction is C1 is 270 degrees; and the third time of detection, when the user holds the mobile phone but does not move, the transverse angle X2 is 0.0, the vertical direction Y2 is-0.8, the longitudinal angle Z2 is-0.6, and the magnetic field direction is C2 is 270 degrees. Calculating the state change of the first detection and the second detection, | X1-X0| ═ 0.0-0.0| ═ 0.0, | Y1-Y0| ═ 0.8-0.0| ═ 0.8, | Z1-Z0| -0.6- (-1.0) | -0.4, | C1-C0| -270-0 | -270, it can be seen that 2 gravity vector changes are greater than 0.05, and the magnetic field angle change is greater than 8 degrees, the state is judged to be motion; calculating the state change of the second detection and the third detection, | X2-X1| ═ 0.0-0.0| ═ 0.0, | Y2-Y1| ═ 0.8- (-0.8) | ═ 0.0, | Z2-Z1| -0.6- (-0.6) | -0.0, | C2-C1| -270| -0, it can be seen that none of the gravity vector changes are greater than 0.05 or the magnetic field angle changes are greater than 8 degrees, the state is judged to be static, and the position information is sent to the server again after the last update time reaches a preset interval. It should be noted that, assuming that the position information is set to be valid for 10 minutes, the preset interval should be within 10 minutes. Because the cell-phone state is more for quiescent time, for example when sleeping the cell-phone put aside, see the cell-phone when though hold the cell-phone but do not move etc. and clock, attitude sensor, magnetic field sensor and gravity sensor are the most energy-conserving module in the cell-phone, so, can reduce APP to terminal equipment's energy consumption by a wide margin.
Step 502: and when detecting that the current time meets the effective determination time period and the current position is within the hot spot range of the effective authorized merchant, the terminal equipment periodically sends position information to the server, and the terminal equipment is associated with the object to be authenticated.
In this embodiment, the position information detected by the terminal device is acquired in real time by a satellite positioning device in the terminal device, or the moving direction and the moving distance of the terminal device are calculated by real-time data acquired by a acceleration sensor, a direction sensor, and a magnetic field sensor in the terminal device, and the position information is calculated in combination with the last time.
Step 503: the authorized merchant equipment sends an information authentication request to a server, wherein the information authentication request comprises identification information of the authorized merchant equipment and collected at least one type of living body biological characteristic information of the object to be authenticated;
step 504: the server determines valid users in a preset range of the authorized merchant equipment based on the identification information of the authorized merchant equipment and the position information uploaded by each terminal equipment;
step 505: and the server compares the at least one living body biological characteristic information with the corresponding biological characteristic information pre-stored by each determined effective user to obtain an information authentication result of the object to be authenticated.
Specifically, the server calculates the similarity between the at least one living body biological characteristic information and the corresponding biological characteristic information pre-stored by each determined effective user; and the server obtains the information authentication result of the object to be authenticated according to the similarity.
In an embodiment, the method for reporting the location information by the terminal device may further include: the terminal equipment receives a mandatory position information reporting notification instruction, and determines a corresponding position reporting area according to the mandatory position information reporting notification instruction; and when the terminal equipment detects that the terminal equipment is positioned in the position reporting area range, reporting the current position information. Specifically, if a mandatory location information reporting point is set at some location, the corresponding terminal device will establish a corresponding reporting policy after receiving the corresponding instruction. Of course, the mandatory location information reporting notification command may include a specific reporting time period. When the user carries the equipment to enter the range of a position reporting area (such as 50 meters or 100 meters), the current position information is reported. The method can be applied to scenes such as police identity verification and the like.
Fig. 6 shows a schematic structural diagram of a near field information authentication apparatus based on time management and control provided in an embodiment of the present application, referring to fig. 6, the near field information authentication apparatus based on time management and control provided in this embodiment includes a location sending module 601, an authentication request module 602, a user determining module 603, and a feature comparing module 604, where the location sending module 601 is configured to, when detecting that a current time meets a valid authorization time period and a current location is within a valid authorized merchant hotspot range, periodically send location information to a server, where the terminal device is associated with an object to be authenticated; the authentication request module 602 is configured to send an information authentication request to a server by the authorized merchant device, where the information authentication request includes identification information of the authorized merchant device and acquired at least one living body biometric information of the object to be authenticated; the user determining module 603 is configured to determine, by the server, valid users within a preset range of the authorized merchant device based on the identification information of the authorized merchant device and the location information uploaded by each terminal device; the feature comparison module 604 is configured to compare the at least one living body biometric information with the determined corresponding biometric information pre-stored by each valid user by the server, so as to obtain an information authentication result of the object to be authenticated.
In the position sending module 601, the position information detected by the terminal device is acquired in real time by a satellite positioning device in the terminal device, or the moving direction and the moving distance of the terminal device are calculated by real-time data acquired by an acceleration sensor, a direction sensor and a magnetic field sensor in the terminal device, and the position information is calculated in combination with the last time. The server compares the at least one living body biological characteristic information with the corresponding biological characteristic information pre-stored by each determined effective user to obtain the information authentication result of the object to be authenticated, and the method comprises the following steps: the server calculates the similarity between the at least one living body biological characteristic information and the corresponding biological characteristic information pre-stored by each determined effective user; and the server obtains the information authentication result of the object to be authenticated according to the similarity.
As shown in fig. 7, an embodiment of the present application further provides another near field information authentication apparatus based on time management and control, including a hotspot adding module 701, a location sending module 702, an authentication request module 703, a user determining module 704, and a feature comparing module 705. The location sending module 702 is configured to, when detecting that the current time meets an effective authorized time period and the current location is within an effective authorized merchant hotspot range, periodically send location information to a server, where the terminal device is associated with an object to be authenticated; the authentication request module 703 is configured to send an information authentication request to a server by the authorized merchant device, where the information authentication request includes identification information of the authorized merchant device and acquired at least one living body biometric information of the object to be authenticated; the user determining module 704 is configured to determine, by the server, valid users within a preset range of the authorized merchant device based on the identification information of the authorized merchant device and the location information uploaded by each terminal device; the feature comparison module 705 is configured to compare the at least one piece of living body biometric information with the determined corresponding biometric information pre-stored by each valid user by the server, so as to obtain an information authentication result of the object to be authenticated.
The hotspot adding module 701 of this embodiment is configured to add at least one authorized merchant hotspot corresponding to an authorized merchant in the terminal device. Specifically, in one embodiment, when detecting that the authorized merchant hotspot meets the set condition, the terminal device downloads authorized merchant hotspot information corresponding to the authorized merchant from the server and adds the authorized merchant hotspot information to the display interface, where one authorized merchant is associated with one or more authorized merchant hotspots, and one authorized merchant hotspot is associated with one or more authorized merchant devices. And the set condition is that the position information of the hot spot of the authorized merchant is positioned in a preset range of the current position or the virtual position of the terminal equipment.
The specific adding manner in the hot spot adding module 701 is to download all authorized merchant hot spots corresponding to authorized merchants within a preset range from the server and add the authorized merchant hot spots to the display interface of the terminal device by taking the geographic position or the virtual position of the terminal device as a reference point. In this case, since the terminal device is often changed in location under the possession of the user or the user designates a different virtual location, the change in location causes a difference in the preset range thereof, and the corresponding authorized merchant also differs. Therefore, the hot spot of the authorized merchant can be dynamically updated according to the change of the geographic position or the virtual position of the terminal equipment. Specifically, when detecting that the terminal device is located within the preset geographic boundary line based on the current position information, the terminal device obtains authorized merchant hotspots corresponding to all authorized merchants within the preset range of the current position or the virtual position in real time, and downloads and updates the authorized merchant hotspot information from the server to the display interface in real time. The preset geographical boundary may be a geographical boundary set by a person for updating the authorized merchant hotspot for the terminal device.
Another implementation manner of the hotspot adding module 701 may be that when detecting that the terminal device is associated with an authorized merchant application program, APP, or applet, the server adds and stores an authorized merchant hotspot corresponding to an authorized merchant and a default valid determination time period setting to a display interface, where the authorized merchant application program, APP, or applet is associated with the authorized merchant.
In this embodiment, therefore, in this embodiment, after obtaining the authorized merchant hotspot information, the server adds the authorized merchant hotspot to the display interface, and simultaneously stores the authorized merchant hotspot to the display interface, which is not a dynamic update manner. In the case that an authorized merchant hotspot is added based on an application program, an APP or an applet in the embodiment, the method for updating the authorized merchant hotspot is that when the server receives and verifies that a change request is provided for the authorized merchant hotspot of the authorized merchant application program, the APP or the applet by an operator to which the authorized merchant application program, the APP or the applet belongs, the changed authorized merchant hotspot is stored, and the change information of the authorized merchant hotspot is generated and sent to the terminal device; and the terminal equipment downloads and stores the modified hot spot update of the authorized merchant to a display interface from the server based on the hot spot modification information of the authorized merchant.
In other embodiments, a specific adding manner of the hotspot adding module 701 may also be a case where the merchant device currently operating by the terminal device is not loaded on the display interface of the terminal device, specifically, when the terminal device detects that the authorized merchant hotspot corresponding to the currently authorized merchant is not loaded on the current display interface, the terminal device opens the temporary user authorization interface, and when it is detected that the number of times of information authentication performed on the basis of the temporary user authorization interface within a set time interval by the object to be authenticated reaches a threshold, the authorized merchant hotspot corresponding to the authorized merchant is downloaded from the server and added to the display interface.
The authorized merchant hotspot comprises an authorized merchant hotspot name, belonging operator information, belonging application program, belonging item in the belonging application program, position information, a preset range, default preset time, visibility to a user, validity of the authorized merchant hotspot, one or more determination time periods and validity of each time period. Further, the authorized merchant hotspot sets a merchant hotspot name, information of an affiliated operator, an affiliated application program, an affiliated item in the affiliated application program, position information, a preset range, default preset time, and whether a user can see through a setting interface provided by the authorized merchant application program, the APP, or the applet. And the authorized merchant hot spot is set to be valid or not, to determine the time period or not, to recover the default preset time, and to set through a setting interface provided by an application program in the terminal equipment, wherein the application program comprises a plurality of authorized merchant application programs, APPs or applets.
As a preferred embodiment, the authorized merchant hotspots are displayed on a display interface corresponding to the application program in any one of a map display mode, a list display mode and a classification display mode, wherein the classification display mode indicates that the authorized merchant hotspots are respectively classified into corresponding category sets according to a preset classification rule, and different category sets are displayed on the display interface of the application program. The classification display can be classified according to the geographical position dimensions of provinces, cities and streets, can also be classified according to the dimension of a map space, or can be classified according to the dimension of a small program to which the small program belongs, or the dimension of character name sorting, can also be classified according to the dimension of a reference position from far to near or from near to far, and can also be subjected to classification management according to the dimension of a time sequence. The list display means that different authorized merchant hotspots are formed into a list according to a preset sequence to be displayed, and the map display means that the authorized merchant hotspots are correspondingly displayed corresponding to the positions of the authorized merchant hotspots on the map.
Further preferably, valid approval time periods of different authorized merchant hotspots are mapped to a time table, and the time table is used for representing a corresponding relation between the authorized merchant hotspots and the valid approval time periods. By setting a time table and mapping all valid determination time periods, repeated time periods can be combined into one time period so as to reduce the electric energy loss caused by inquiring the global valid time period. Furthermore, the schedule is respectively provided with matched identification information corresponding to different set time periods, and the identification information is used for indicating general attributes or individual attributes of the different set time periods. The uniform time schedule is viewed by a user, different attributes are identified through different identification information, the user can view the uniform time schedule more conveniently, the identification information can be specific characters or different colors, for example, yellow identification represents a universal time slot, and blue identification represents an individual time slot.
Referring to fig. 8, in the present embodiment, another near field information authentication apparatus based on time management and control is further provided, in this embodiment, a state detection module 801 is added on the basis of the above embodiment, and the state detection module 801 is configured to detect, every set period, a state of a terminal device and whether a current time meets a set time period; when detecting that the current time meets the effective determination time period and the self state is motion, the terminal equipment acquires the current position and sends position information to the server; when detecting that the current time meets the effective determination time period and the self state is static, the terminal equipment sends the position information to the server after the time interval from the last time of sending the position information to the server meets the preset interval. In addition, the system further comprises a location sending module 802, an authentication request module 803, a user determining module 804 and a feature comparing module 805. The location sending module 802 is configured to, when detecting that the current time meets an effective authorized time period and the current location is within an effective authorized merchant hotspot range, periodically send location information to a server, where the terminal device is associated with an object to be authenticated; the authentication request module 803 is configured to send, by the authorized merchant device, an information authentication request to a server, where the information authentication request includes identification information of the authorized merchant device and acquired at least one living body biometric information of the object to be authenticated; the user determining module 804 is configured to determine, by the server, valid users within a preset range of the authorized merchant device based on the identification information of the authorized merchant device and the location information uploaded by each terminal device; the feature comparison module 805 is configured to compare the at least one piece of living body biometric information with corresponding biometric information pre-stored by each determined valid user by the server, so as to obtain an information authentication result of the object to be authenticated.
In this embodiment, the terminal device confirms that the current state is moving or stationary through the attitude sensor and/or the magnetic field sensor. Specifically, the terminal device acquires current position information and compares the current position information with the last position information;
and when the change value between the current position information and the last position information is larger than a preset value, defining the terminal equipment to be in motion, otherwise, defining the terminal equipment to be in static state. The position information detected by the terminal equipment is acquired in real time through a satellite positioning device in the terminal equipment, or the position information is acquired by calculating the horizontal angle and the magnetic field direction of the terminal equipment through real-time data acquired by a gravity sensor and a magnetic field sensor in the terminal equipment.
As shown in fig. 9, an embodiment of the present application further provides a computer device, including: a memory 901 and one or more processors 902; the memory 901 is used for storing one or more programs; when executed by the one or more processors 902, cause the one or more processors to implement a method for routing internet of things based data transmission as described herein.
Embodiments of the present application further provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform the time-based near-field information authentication method provided in the foregoing embodiments, where the time-based near-field information authentication method includes: when detecting that the current time meets an effective determination time period and the current position is within an effective authorized merchant hotspot range, the terminal equipment periodically sends position information to a server, and the terminal equipment is associated with an object to be authenticated; the authorized merchant equipment sends an information authentication request to a server, wherein the information authentication request comprises identification information of the authorized merchant equipment and collected at least one type of living body biological characteristic information of the object to be authenticated; the server determines valid users in a preset range of the authorized merchant equipment based on the identification information of the authorized merchant equipment and the position information uploaded by each terminal equipment; and the server compares the at least one living body biological characteristic information with the corresponding biological characteristic information pre-stored by each determined effective user to obtain an information authentication result of the object to be authenticated.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media that may reside in different locations, such as in different computer systems that are connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium provided in the embodiments of the present application contains computer-executable instructions, and the computer-executable instructions are not limited to the near field information authentication method based on time management as described above, and may also perform related operations in the near field information authentication method based on time management as provided in any embodiment of the present application.
The time-control-based near field information authentication device, the time-control-based near field information authentication apparatus, and the storage medium provided in the foregoing embodiments may perform the time-control-based near field information authentication method provided in any embodiment of the present application, and reference may be made to the time-control-based near field information authentication method provided in any embodiment of the present application without detailed technical details described in the foregoing embodiments.
The foregoing is considered as illustrative of the preferred embodiments of the invention and the technical principles employed. The present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the claims.
Claims (26)
1. The near field information authentication method based on time management and control is characterized by comprising the following steps:
when detecting that the current time meets an effective determination time period and the current position is within an effective authorized merchant hotspot range, the terminal equipment periodically sends position information to a server, and the terminal equipment is associated with an object to be authenticated;
the authorized merchant equipment sends an information authentication request to a server, wherein the information authentication request comprises identification information of the authorized merchant equipment and collected at least one type of living body biological characteristic information of the object to be authenticated;
the server determines valid users in a preset range of the authorized merchant equipment based on the identification information of the authorized merchant equipment and the position information uploaded by each terminal equipment;
and the server compares the at least one living body biological characteristic information with the corresponding biological characteristic information pre-stored by each determined effective user to obtain an information authentication result of the object to be authenticated.
2. The near field information authentication method according to claim 1, further comprising:
when detecting that the hot spots of the authorized merchants meet the set conditions, the terminal equipment downloads at least one piece of hot spot information of the authorized merchants corresponding to the authorized merchants from the server and adds the hot spot information to the display interface, wherein one authorized merchant is associated with one or more hot spots of the authorized merchants, and one hot spot of the authorized merchants is associated with one or more pieces of equipment of the authorized merchants.
3. A near field information authentication method according to claim 2, wherein the setting condition is that the location information of the authorized merchant hot spot is within a preset range of the current location or the virtual location of the terminal device.
4. The near field information authentication method according to claim 2, further comprising:
and when the terminal equipment detects that the terminal equipment is positioned in the preset geographic boundary line based on the current position information, all authorized commercial tenant hot spots in the preset range of the current position are obtained in real time, and the authorized commercial tenant hot spot information is downloaded from the server and updated to the display interface in real time.
5. The near field information authentication method according to claim 1, further comprising:
when detecting that the terminal equipment is associated with an authorized merchant application program, an APP or an applet, the server adds and stores an authorized merchant hotspot corresponding to the authorized merchant and a default preset time period setting to a display interface, wherein the authorized merchant application program, the APP or the applet is associated with the authorized merchant.
6. The near field information authentication method according to claim 5, further comprising:
when receiving and verifying a change request of an authorized merchant application program, APP or applet to an authorized merchant hotspot of the authorized merchant application program, APP or applet by an operator to which the authorized merchant application program, APP or applet belongs, the server stores the changed authorized merchant hotspot, generates authorized merchant hotspot change information and sends the authorized merchant hotspot change information to the terminal equipment;
and the terminal equipment downloads and stores the modified authorized merchant hotspot to a display interface from the server based on the authorized merchant hotspot modification information.
7. The near field information authentication method according to claim 1, further comprising:
the method comprises the steps that when a terminal device detects that an authorized merchant hotspot corresponding to a current authorized merchant is not loaded on a current display interface, a temporary user authorization interface is opened, and when the fact that the number of times of identity authentication of an object to be authenticated based on the temporary user authorization interface within a set time interval reaches a threshold value is detected, authorized merchant hotspot information corresponding to the authorized merchant is downloaded from a server and added to the display interface, wherein the adding mode comprises automatic adding and manual adding.
8. A near field information authentication method according to any one of claims 2 to 7, wherein the authorized merchant hotspot includes an authorized merchant hotspot name, affiliated operator information, affiliated application program, affiliated item in affiliated application program, location information, preset range, default preset time, whether it is visible to the user, whether the authorized merchant hotspot is valid, one or more authorized time periods, and whether each time period is valid.
9. The near field information authentication method of claim 8, wherein the authorized merchant hotspot has a name of a set merchant hotspot, information of an affiliated operator, an affiliated application program, an affiliated item in the affiliated application program, location information, a preset range, a default preset time, and whether a user can see through a setting interface provided by the authorized merchant application program, APP, or applet.
10. The near field information authentication method of claim 8, wherein the setting of the authorized merchant hotspot is performed by setting whether the authorized merchant hotspot is valid, determining a time period, whether each time period is valid, and restoring the default preset time through a setting interface provided by an application program in the terminal device, wherein the application program includes a plurality of authorized merchant application programs, APPs, or applets.
11. The near field information authentication method according to claim 10, wherein the authorized merchant hotspots are displayed on a display interface corresponding to the application program in at least one of a map display mode, a list display mode and a classification display mode, the classification display mode indicates that the authorized merchant hotspots are respectively classified into corresponding category sets according to a preset classification rule, and different category sets are displayed on the display interface of the application program.
12. The near field information authentication method according to claim 9 or 10, wherein the set time period of the authorized merchant hotspot includes a start time parameter, an end time parameter, a sustainable time parameter, and whether the set time period is valid, a time length corresponding to the set time period is formed between the start time parameter and the end time parameter, the sustainable time parameter is used to indicate a duration for the terminal device to continue to continuously send the location information to the server after the terminal device meets the set valid time period and the current location is within a valid authorized merchant hotspot range and completes one-time identity authentication, and whether the sustainable time period is valid is used to indicate whether the set time period participates in actual operation of the terminal device.
13. The near field information authentication method of claim 8, wherein valid authentication time periods of different authorized merchant hotspots are mapped to a time table, and the time table is used for representing a corresponding relationship between the authorized merchant hotspots and the set time periods.
14. A near field information authentication method according to claim 13, wherein matching identification information is set in the schedule corresponding to different set time periods, and the identification information is used for indicating a general attribute or a personality attribute of the different set time periods.
15. The near field information authentication method of claim 13, wherein before detecting that the current time satisfies the valid authorization time period and the current location is within the range of the valid authorized merchant device, the terminal device further comprises:
the terminal equipment detects the self state and whether the current time meets the effective determination time period every set period;
when detecting that the current time meets an effective determination time period and the self state is motion, the terminal equipment acquires the current position meeting at least one effective authorized merchant hotspot range and sends the current position information to a server;
when the terminal equipment detects that the current time meets the effective determination time period and the self state is static, the time interval from the last time of sending the position information to the server meets the preset interval, the position information is sent to the server, and otherwise, the position information is not sent.
16. A near field information authentication method according to claim 15, wherein the terminal device confirms that the current state is moving or stationary by means of a posture sensor and/or a magnetic field sensor.
17. The near field information authentication method according to claim 16, wherein the detecting, by the terminal device, that the self state is moving or stationary includes:
the terminal equipment acquires current state information and compares the current state information with the last state information;
and when the change value between the current state information and the last state information is larger than a preset value, defining the terminal to be in motion, otherwise, defining the terminal equipment to be static.
18. A near field information authentication method according to claim 1, wherein the position information detected by the terminal device is acquired in real time by a satellite positioning device in the terminal device, or is obtained by calculating a horizontal angle and a magnetic field direction of the terminal device from real-time data acquired by a gravity sensor and a magnetic field sensor in the terminal device.
19. A near field information authentication method according to claim 1, wherein the server compares the at least one living body biometric information with corresponding biometric information pre-stored by each determined valid user to obtain an information authentication result of the object to be authenticated, and the method comprises:
the server calculates the similarity between the at least one living body biological characteristic information and the corresponding biological characteristic information pre-stored by each determined effective user;
and the server obtains the information authentication result of the object to be authenticated according to the similarity.
20. A near field information authentication method according to claim 1, wherein the server compares the at least one living body biometric information with corresponding biometric information pre-stored by each determined valid user to obtain an information authentication result of the object to be authenticated, and the method comprises:
a user presets a user-defined expression and a corresponding execution instruction;
the server calculates face similarity and expression similarity between the living body biological characteristic information and corresponding biological characteristic information pre-stored by each determined effective user;
and the server obtains an information authentication result of the object to be authenticated and a corresponding execution instruction according to the face similarity and the expression similarity.
21. The user preset custom expression and a corresponding execution instruction according to claim 20, wherein the custom expression and the corresponding execution instruction are set through a setting interface provided by an application program in a terminal device, and the application program includes a plurality of authorized merchant application programs, APPs, or applets.
22. A near field information authentication method according to claim 1, wherein the server compares the at least one living body biometric information with corresponding biometric information pre-stored by each determined valid user to obtain an information authentication result of the object to be authenticated, and the method comprises:
the user presets a user-defined finger characteristic, a palm print characteristic, a palm vein characteristic and/or a palm print and palm vein characteristic and a corresponding execution instruction;
the server calculates the similarity between the living finger characteristics, the palm print characteristics, the palm vein characteristics and/or the palm print and palm vein characteristic information and the corresponding biological characteristic information pre-stored by each determined effective user;
and the server obtains an information authentication result of the object to be authenticated and a corresponding execution instruction according to the finger characteristics, the palm print characteristics, the palm vein characteristics and/or the similarity of the palm print characteristics and the palm vein characteristics.
23. The near field information authentication method according to claim 1, further comprising:
the terminal equipment receives a mandatory position information reporting notification instruction, and determines a corresponding position reporting area according to the mandatory position information reporting notification instruction;
and when the terminal equipment detects that the terminal equipment is positioned in the position reporting area range, reporting the current position information.
24. Near field information authentication device based on time management and control includes:
a position sending module: the terminal equipment is used for periodically sending identification information to the server when detecting that the current time meets an effective determination time period and the current position is within an effective authorized merchant equipment range, and the terminal equipment is associated with an object to be authenticated;
an authentication request module: the authorization merchant device is used for sending an information authentication request to a server, wherein the information authentication request comprises identification information of the authorization merchant device and at least one acquired living body biological characteristic information of the object to be authenticated;
a user determination module: the server is used for determining valid users in a preset range of the authorized merchant equipment based on the identification information of the authorized merchant equipment and the position information uploaded by each terminal equipment;
a feature comparison module: and the server is used for comparing the at least one living body biological characteristic information with the corresponding biological characteristic information prestored by each determined effective user to obtain the information authentication result of the object to be authenticated.
25. A computer device, comprising: a memory and one or more processors;
the memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the time-aware-based near-field information authentication method of any one of claims 1-21.
26. A storage medium containing computer-executable instructions for performing the time-based steering near-field information authentication method according to any one of claims 1 to 21 when executed by a computer processor.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110515813.4A CN113204749A (en) | 2021-05-12 | 2021-05-12 | Near field information authentication method and device based on time control |
PCT/CN2022/092355 WO2022237859A1 (en) | 2021-05-12 | 2022-05-12 | Time management and control-based near field information authentication method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110515813.4A CN113204749A (en) | 2021-05-12 | 2021-05-12 | Near field information authentication method and device based on time control |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113204749A true CN113204749A (en) | 2021-08-03 |
Family
ID=77031947
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110515813.4A Pending CN113204749A (en) | 2021-05-12 | 2021-05-12 | Near field information authentication method and device based on time control |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN113204749A (en) |
WO (1) | WO2022237859A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022237859A1 (en) * | 2021-05-12 | 2022-11-17 | 简伟明 | Time management and control-based near field information authentication method and apparatus |
CN116756719A (en) * | 2023-08-16 | 2023-09-15 | 北京亚大通讯网络有限责任公司 | Fingerprint biological identification and UWB protocol-based identity verification system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170149772A1 (en) * | 2015-11-24 | 2017-05-25 | Alibaba Group Holding Limited | Identity authentication method, system, business server and authentication server |
CN108353099A (en) * | 2016-11-23 | 2018-07-31 | 华为技术有限公司 | A kind of method and apparatus of PPG certifications |
CN109711847A (en) * | 2018-12-26 | 2019-05-03 | 广州市巽腾信息科技有限公司 | Method, apparatus, electronic equipment and the computer storage medium of near-field information certification |
CN109711133A (en) * | 2018-12-26 | 2019-05-03 | 广州市巽腾信息科技有限公司 | Authentication method, device and the server of identity information |
CN111079103A (en) * | 2015-09-14 | 2020-04-28 | 阿里巴巴集团控股有限公司 | Identity authentication method and equipment |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109684811B (en) * | 2018-12-26 | 2021-04-13 | 巽腾(广东)科技有限公司 | Identity recognition method and device for fixed-point authorization and server |
CN113204749A (en) * | 2021-05-12 | 2021-08-03 | 巽腾(广东)科技有限公司 | Near field information authentication method and device based on time control |
-
2021
- 2021-05-12 CN CN202110515813.4A patent/CN113204749A/en active Pending
-
2022
- 2022-05-12 WO PCT/CN2022/092355 patent/WO2022237859A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111079103A (en) * | 2015-09-14 | 2020-04-28 | 阿里巴巴集团控股有限公司 | Identity authentication method and equipment |
US20170149772A1 (en) * | 2015-11-24 | 2017-05-25 | Alibaba Group Holding Limited | Identity authentication method, system, business server and authentication server |
CN108353099A (en) * | 2016-11-23 | 2018-07-31 | 华为技术有限公司 | A kind of method and apparatus of PPG certifications |
CN109711847A (en) * | 2018-12-26 | 2019-05-03 | 广州市巽腾信息科技有限公司 | Method, apparatus, electronic equipment and the computer storage medium of near-field information certification |
CN109711133A (en) * | 2018-12-26 | 2019-05-03 | 广州市巽腾信息科技有限公司 | Authentication method, device and the server of identity information |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022237859A1 (en) * | 2021-05-12 | 2022-11-17 | 简伟明 | Time management and control-based near field information authentication method and apparatus |
CN116756719A (en) * | 2023-08-16 | 2023-09-15 | 北京亚大通讯网络有限责任公司 | Fingerprint biological identification and UWB protocol-based identity verification system |
CN116756719B (en) * | 2023-08-16 | 2023-10-24 | 北京亚大通讯网络有限责任公司 | Fingerprint biological identification and UWB protocol-based identity verification system |
Also Published As
Publication number | Publication date |
---|---|
WO2022237859A1 (en) | 2022-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20160232516A1 (en) | Predictive authorization of mobile payments | |
CN101496427B (en) | Identity verification using location over time information | |
US10332192B2 (en) | Methods and systems for locating a mobile merchant | |
US11900389B2 (en) | Transaction cards and computer-based systems that provide fraud detection at POS devices based on analysis of feature sets and methods of use thereof | |
JP2022513977A (en) | Identity identification method, device and server for designated point approval | |
US9443326B2 (en) | Semantic place labels | |
TW202013281A (en) | Identity authentication method, device and system | |
WO2022237859A1 (en) | Time management and control-based near field information authentication method and apparatus | |
US11055683B1 (en) | Computer-based systems involving fingerprint or biometrically-activated transaction cards and methods of use thereof | |
US11800314B2 (en) | Interlinked geo-fencing | |
RU2725701C1 (en) | Method and equipment for verification of safety based on biometric feature | |
US20230098616A1 (en) | Method for Invoking NFC Application, Electronic Device, and NFC Apparatus | |
US11887089B2 (en) | Dynamic and predictive adjustment of payment attributes based on contextual data and metadata | |
CA3068693A1 (en) | Method and system for authentication via location monitoring | |
US20200226605A1 (en) | Systems and methods for account monitoring and transaction verification | |
Shahzad et al. | Centralized connectivity for multiwireless edge computing and cellular platform: A smart vehicle parking system | |
KR102290481B1 (en) | Method and apparatus for providing real estate transaction service interacting with fintech based on block chain | |
US20150317631A1 (en) | Matching personal photo images with purchase history | |
US11134079B2 (en) | Cognitive behavioral and environmental access | |
JP2019109556A (en) | Identity authentication method using behavior history | |
JPWO2018079167A1 (en) | Information processing apparatus, information processing system, information processing method, and program | |
US20240135351A1 (en) | Dynamic and predictive adjustment of payment attributes based on contextual data and metadata | |
US11880843B2 (en) | System, method, and computer-accessible medium for geo-fenced zones | |
US20150312710A1 (en) | Information processing method and electronic device thereof | |
KR20200043160A (en) | Manless notebook computer rental method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |