WO2017031850A1 - User identity authentication method, device, system and smart home - Google Patents

User identity authentication method, device, system and smart home Download PDF

Info

Publication number
WO2017031850A1
WO2017031850A1 PCT/CN2015/095783 CN2015095783W WO2017031850A1 WO 2017031850 A1 WO2017031850 A1 WO 2017031850A1 CN 2015095783 W CN2015095783 W CN 2015095783W WO 2017031850 A1 WO2017031850 A1 WO 2017031850A1
Authority
WO
Grant status
Application
Patent type
Prior art keywords
authentication
information
user
fingerprint
terminal
Prior art date
Application number
PCT/CN2015/095783
Other languages
French (fr)
Chinese (zh)
Inventor
周福家
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

A user identity authentication method, device, system and smart home. The method comprises: receiving fingerprint information collected by a terminal and pre-stored first authentication information; verifying whether the first authentication information matches second authentication information pre-stored in a local device; if so, merging the first authentication information and the second authentication information to generate fingerprint authentication information; performing authentication by comparing the fingerprint authentication information and the fingerprint information; and if the authentication is successful, determining the user identity authentication is successful. The method can improve security of user identity authentication.

Description

User authentication methods, devices, systems and intelligent home

This application claims the August 27, 2015 submitted to the China Patent Office Application No. 201510534923.X, entitled priority "user authentication methods, devices, systems and smart home" in Chinese patent application, in its entirety by hereby incorporated by reference in the present application.

FIELD

The present invention relates to data processing, and more particularly relates to a user authentication method, apparatus, system and intelligent home.

Background technique

Now with the development of technology, safety, simple fingerprint authentication user identity being called into question. For example, in the field of intelligent control, when a simple fingerprint authentication if a loophole, and will control the use of safety equipment and a huge risk.

Therefore, how to improve the security of user authentication, the skilled personnel required to solve technical problems.

SUMMARY

Object of the present invention is to provide a user authentication method that can improve the security of the user authentication; a further object of the present invention is to provide a user authentication device, and intelligent home system.

To solve the above problems, the present invention provides a user authentication method, comprising:

Receiving terminal and a first fingerprint information acquired authentication information stored in advance;

Second verification information verifying the first authentication information stored in advance and the local device match;

When a match, the first authentication information and the second authentication verification information generating fusion fingerprint information;

The verification fingerprint information and the fingerprint information verification comparison;

If after verification by the user authenticated.

Wherein the first authentication information and the method of obtaining the second authentication information comprising:

Collecting user's fingerprint information, and acquires the feature information of fingerprint information;

The feature information of the fingerprint information is divided into two parts in accordance with a predetermined rule, the first authentication information and second authentication information.

Wherein the user authentication method further comprises:

Once verified, the terminal obtains control authority corresponds with the user identity.

Wherein the user authentication method further comprises:

When the authentication is passed, obtaining a difference from the location of the terminal device with the local location;

When the distance difference is within a first range, the first terminal obtains control authority;

When the distance difference is within the second range, the second terminal acquires the control right.

The present invention provides a user authentication apparatus comprising:

Receiving means for receiving the terminal and a first fingerprint information acquired authentication information stored in advance;

Matching module, a second authentication information for authenticating the first authentication information stored in advance and the local device match;

A generating module, configured to, when matched, the first authentication information and the second authentication verification information generating fusion fingerprint information;

Authentication module, authentication for the fingerprint information and the fingerprint information to verify comparing; if the verification is passed, via user authentication.

Wherein said user authentication means further comprises:

A first authority setting module, configured to, when the authentication is passed, the terminal obtains control authority corresponding to the user identity.

Wherein said user authentication means further comprises:

Distance module, configured to, when the authentication is passed, obtaining a difference from the location of the terminal device with the local location;

The second authority setting module, configured to, when the distance difference is within a first range, the first control terminal obtains permission; when the distance difference is within the second range, the second terminal acquires control permissions.

The present invention provides an intelligent user identity comprises a home device authentication.

The present invention provides a user authentication system, comprising:

Terminal, a fingerprint information acquisition; fingerprint information and transmits the first authentication information stored in advance to the device;

Means for receiving the terminal information collected by the fingerprint and the first authentication information stored in advance; a second authentication information verifying the first authentication information stored in advance and the local device match; when mated, the first verification authentication information and the second authentication information generating fusion fingerprint information; the authentication fingerprint information and the fingerprint information to verify comparing; if the verification is passed, via user authentication.

Wherein the terminal is further configured to collect fingerprint information of the user, and acquires the feature information of fingerprint information; the feature information of the fingerprint information is divided into two parts in accordance with a predetermined rule, the first authentication information and second authentication information, and sending the second authentication information to the device.

User authentication method of the present invention is provided, comprising: a receiving terminal acquired fingerprint information and the first authentication information stored in advance; a second authentication information verifying the first authentication information stored in advance and the local device match; when a match the first authentication information and the second authentication verification information generating fusion fingerprint information; the authentication fingerprint information and the fingerprint information to verify comparing; if the verification is passed, via user authentication.

In this method, the user's fingerprint information previously divided into a first authentication information and second authentication information and the first authentication information and second authentication information are stored in the user terminal and the device. When the user to be authenticated, the terminal needs to collect the fingerprint information stored in the terminal and the first authentication information to the device; the second authentication information received to the first device a first authentication information stored in the device matching, when a match is found, during the fusion to generate fingerprint information verification. Comparing the device authentication in the received information and the fingerprint information of the fingerprint authentication; if the verification is passed, via user authentication.

The method and apparatus does not store the complete fingerprint authentication information, so the user only if fingerprint information without verification information is not the first fingerprint identification can be performed. If the first user authentication information and the user finger print information is wrong, not through identification fingerprint collation. Therefore, only when the user terminal sends fingerprint information it is correct and the first authentication information is correct, only through user authentication, therefore, this method can improve the security of user authentication, ensure the legitimate rights and interests of users.

BRIEF DESCRIPTION

In order to more clearly illustrate the technical solutions in the embodiments or the prior art embodiment of the present invention, the accompanying drawings briefly described embodiments or the prior art needed to be used in describing the embodiments. Apparently, the drawings in the following description only It is an embodiment of the present invention, those of ordinary skill in the art is concerned, without creative efforts, can derive other drawings from the accompanying drawings provided.

FIG 1 is a flowchart of a user authentication method according to an embodiment of the present invention;

FIG 2 provides a block diagram of user identity verification apparatus of the embodiment of the present invention;

FIG 3 a block diagram of a user authentication system according to an embodiment of the present invention.

detailed description

The core of the present invention is to provide a user authentication method that can improve the security of the user authentication; another core of the present invention is to provide a user authentication device, and intelligent home system.

Order that the invention object, technical solutions, and advantages of the embodiments more clearly below in conjunction with the present invention in the accompanying drawings, technical solutions in the embodiments will be apparent to the present invention, completely described, obviously, the described embodiments some embodiments of the present invention rather than all embodiments. Based on the embodiments of the present invention, all other embodiments of ordinary skill in the art without any creative effort shall fall within the scope of the present invention.

Please refer to FIG. 1, FIG. 1 is a flowchart of a user authentication method according to an embodiment; the method may comprise:

Step s100, the collected fingerprint information receiving terminal and the first authentication information stored in advance;

Step s110, the first verification device authentication information stored in advance and a second local verification information matches;

Wherein the first authentication information and second authentication information acquisition methods may be more, preferably, the first authentication information and second authentication information acquisition method may include:

Collecting user's fingerprint information, and acquires the feature information of fingerprint information;

The feature information of the fingerprint information is divided into two parts in accordance with a predetermined rule, the first authentication information and second authentication information.

DETAILED DESCRIPTION e.g. user equipment fingerprint image and the fingerprint image feature extraction, minutiae these divided into two parts, each part is a fingerprint image having the characteristic information, and the two parts together can form a complete fingerprint verification image; terminal storage portion, another portion stored in the device. User terminal may be acquired fingerprint image and the fingerprint image feature extraction, minutiae these divided into two parts, each part having a fingerprint is image feature information, and the two parts together can form a complete fingerprint verification image; terminal storage portion, another portion stored in the device. Of course, the extraction may be performed here means the first additional information and the second authentication verification information, and respectively transmits the first authentication information to the terminal, sends the second authentication information to the device. Two of which may be assigned to the feature information on the average two figures, according to the weights may be divided without a weight.

Wherein, following the specific terminal to acquire the first authentication information and second authentication information is described as an example: wherein, mobile phone terminal as an example, of course, also be a terminal device having a function fingerprint.

1) Firstly, mobile console (mobile phone) and connect the console device, data can be transmitted through the NFC near field (where you can also transmit data through other means, such as Bluetooth).

2) Select the authentication information input device console, the user's fingerprint information collected through the phone's fingerprint verification module.

3) mobile application side core fingerprint input field direction, the reference point, and other characteristic minutiae information judgment based on two parts A and B, and having a matching verification binding relationship between A and B.

Wherein a specific division of A and B is:

Collecting a user's fingerprint image, the fingerprint identification feature information of the picture, in FIG each feature point feature information of a small rectangle;

Utilizing a curve in the case do not intersect as many feature points through the center point of the small rectangle, because the curve passes through the center point of the feature point is, therefore, the article along the curve can be traversed wherein points are divided into two parts; Thus, according to the curve characteristic information A and B is divided into two parts; while the user fingerprint image can be divided into pictures, and B pictures by curve A, where A has the feature image information A and image B having the features B. information

Which is divided into A and B, there are many algorithms, will reach here as long as characteristic information can be divided in two fingerprint images so that they can be integrated into the fingerprint image to have a complete feature information.

4) The part B stores information passed to the device through the console NFC. End mobile phones to retain only half of the information A. Prevent hackers black into the entire verification acquired rights.

Step S120, when mated, the first authentication information and the second authentication verification information generating fusion fingerprint information;

Do not match, the first authentication information and second authentication information can not be integrated into a complete fingerprint verification information.

Step s130, the authentication fingerprint information and the fingerprint information verification comparison;

About to verify the feature information of the fingerprint information and the fingerprint information comparison, when the threshold is met, it is considered verified by comparison.

Step s140, if after verification by the user authenticated.

Which, when verified, the user identity is legitimate and secure. It may be made to the device for subsequent operation.

Based on the above technical solution, the user authentication method provided in the embodiment of the present invention, the method by the user's fingerprint information previously divided into a first authentication information and second authentication information and the first authentication information and second authentication information respectively and stored in the user terminal equipment. When the user to be authenticated, the terminal needs to collect the fingerprint information stored in the terminal and the first authentication information to the device; the second authentication information received to the first device a first authentication information stored in the device matching, when a match is found, during the fusion to generate fingerprint information verification. Comparing the device authentication in the received information and the fingerprint information of the fingerprint authentication; if the verification is passed, via user authentication. The method and apparatus does not store the complete fingerprint authentication information, so the user only if fingerprint information without verification information is not the first fingerprint identification can be performed. If the first user authentication information and the user finger print information is wrong, not through identification fingerprint collation. Therefore, only when the user terminal sends fingerprint information it is correct and the first authentication information is correct, only through user authentication, therefore, this method can improve the security of user authentication, ensure the legitimate rights and interests of users.

Preferably, the user authentication method based on the above embodiment, it may further comprise:

Once verified, the terminal obtains control authority corresponds with the user identity.

Which, after verification by, the device can know the user's identity information, control and find the right information with the corresponding information through the user's identity. For example, according to the information the user M look to control permissions can be viewed only as M. The device user controls the operation of M, M can only view, the device can not be other instructions, other operating instructions i.e. the device will be considered an illegal instruction.

By this arrangement, it is possible to ensure the maximum possible safety devices to ensure that confidential information is not leaked back. Easy to personalize user rights management.

Wherein, preferably, it is also a need in some cases the same user privileges set differently under different conditions.

For example, with the M users, rights under different operating status of the device is different, so that when the device needs to set user privileges, regulations accordingly, the user M impart different in different operating state of the device authority. This method needs to be set based on actual usage of the device.

Can also impart limit plus the time wherein preferably the authority, e.g., the user M passes the authentication, the user acquires the rights of M, but the execution time is a predetermined permission time may be one hour or the like, after more than a predetermined time, permission will be canceled, if a user wanted to operate the equipment M then have to authenticate again.

Preferably, the basis of the embodiment of FIG. 1, the user authentication method may further comprise:

When the authentication is passed, obtaining a difference from the location of the terminal device with the local location;

When the distance difference is within a first range, the first terminal obtains control authority;

When the distance difference is within the second range, the second terminal acquires the control right.

Wherein such information in accordance with different distances, user permissions, the remote control device may be used, e.g., smart home remote control, when the distance is only possible to view all smart home home switch case, and a few smart permission to open home; but the situation at home near distance, you can give all users permission to use all the intelligent home.

Below smart home particular embodiments of the description:

(1) intelligent home console, through a router connected to the network, home phone establishes a connection with the application side of the console over the network.

(2) When the authentication is passed, obtaining a position of the mobile phone and the distance difference of the local device position; when the distance difference is within a first range, the first control terminal obtains permission; that can only be obtained View permissions and permissions and close the electrical permission to open a small part of household appliances. The timely detection of the operating state of the home appliance and close. For permission to require users to manually turn on the console to give permission, to ensure safety.

(3) When the user is at home (i.e., when the distance difference is within the second range, the second control terminal obtains permission) would like to let the phone then need to get all console validation operation privilege NFC near field verify (NFC console to be opened manually once). At this time, the mobile phone 12 hours gives permission to connect the control application side.

(4) when the user is away from home, the phone application side away from home position range is determined, the report will automatically cancel the connection console. Become the default permissions to connect again.

Among them, the console may be designed to perform user authentication devices, can also be part of the use of devices such as the console device can be set in the smart home.

Based on the above technical solution, the user authentication method provided in the embodiment of the present invention, the method and apparatus does not store the complete fingerprint authentication information, so the user only if fingerprint information without verification information is not the first fingerprint identification can be performed. If the first user authentication information and the user finger print information is wrong, not through identification fingerprint collation. Therefore, only when the user terminal sends fingerprint information it is correct and the first authentication information is correct, only through user authentication, therefore, this method can improve the security of user authentication, ensure the legitimate rights and interests of users. And it may also give authenticated users assign different permissions information, ensure the safe use of equipment.

Please refer to FIG 2, a block diagram of FIG. 2 user authentication apparatus according to an embodiment of the present invention; the apparatus may comprise:

A receiving module 100, configured to receive a fingerprint information acquisition terminal and the first authentication information stored in advance;

Wherein the user terminal may be mobile phones and other terminals may be a tablet.

Matching module 200, the second verification information for verifying the first authentication information stored in advance and the local device match;

Generating module 300, used when a match, the first authentication information and the second authentication verification information generating fusion fingerprint information;

Authentication module 400, the authentication for the fingerprint information and the fingerprint information to verify comparing; if the verification is passed, via user authentication.

Preferably, in the user authentication apparatus may further comprise:

A first authority setting module, configured to, when the authentication is passed, the terminal obtains control authority corresponding to the user identity.

Preferably, in the user authentication apparatus may further comprise:

Distance module, configured to, when the authentication is passed, obtaining a difference from the location of the terminal device with the local location;

The second authority setting module, configured to, when the distance difference is within a first range, the first control terminal obtains permission; when the distance difference is within the second range, the second terminal acquires control permissions.

Embodiment of the present invention provides a smart home, including the above-described user authentication means.

Wherein, where the user authentication means may be provided inside the smart home, may be provided to an external control platform, platform means by controlling user authentication and permissions.

When based on the above technical scheme, the intelligent home to an embodiment of the present invention employ split the stored fingerprint information in the user terminal and the user authentication apparatus to enhance a user remote control authentication security home achieve different rights management, user-friendly home and work understanding and control of the home. Enhanced security, operational criminals can be prevented. Improved rights management and use of smart home security.

Please refer to FIG. 3, FIG. 3 is a block diagram showing embodiment user authentication system provided by the invention; The system may comprise:

Terminal 500, a fingerprint information acquisition; fingerprint information to the device and transmits the first authentication information stored in advance;

Device 600 for receiving the terminal and a first fingerprint information acquired authentication information stored in advance; a second authentication information verifying the first authentication information stored in advance and the local device match; when mated, the first authentication information and the second authentication verification information generating fusion fingerprint information; the authentication fingerprint information and the fingerprint information to verify comparing; if the verification is passed, via user authentication.

Wherein, preferably, the terminal is further configured to collect fingerprint information of the user, and acquires the feature information of fingerprint information; the feature information of the fingerprint information is divided into two parts in accordance with a predetermined rule, the first authentication information and second authentication information and the second authentication information to the device.

Progressive specification described embodiment, differences from the embodiment and the other embodiments each of which emphasizes embodiment, similar parts identical to each other between the respective embodiments Referring to the various embodiments. For the disclosed embodiment of the apparatus embodiment, since it corresponds to the method disclosed embodiments, the description is relatively simple, see Methods of the correlation can be described.

Professionals can further appreciate that the various means disclosed herein and algorithm steps described exemplary embodiments, by electronic hardware, computer software, or a combination thereof. In order to clearly illustrate the hardware and the software interchangeability foregoing has generally described in terms of functional components and steps of each example. Whether these functions are performed by hardware or software depends upon the particular application and design constraints of the technical solutions. Professional technical staff may use different methods for each specific application to implement the described functionality, but such implementation should not be considered outside the scope of the present invention.

Steps of a method or algorithm described in connection with the embodiments disclosed herein may be implemented in hardware, or a combination thereof, in a software module executed by a processor implemented directly. A software module may be placed in a random access memory (RAM), a memory, a read only memory (ROM), electrically programmable ROM, an electrically erasable programmable ROM, a register, a hard disk, a removable disk, CD-ROM, or within the technical field known any other form of storage medium.

Above for user authentication method, apparatus, and intelligent home system provided by the present invention in detail. Herein through specific examples and embodiments of the principles of the present invention are set forth in the above described embodiments are only used to help understand the method and core idea of ​​the present invention. It should be noted that those of ordinary skill in the art, in the present invention without departing from the principles of the premise, may also be a number of modifications and improvements of the present invention, and these improvements and modifications also fall within the scope of the claims of the invention.

Claims (10)

  1. A user authentication method comprising:
    Receiving terminal and a first fingerprint information acquired authentication information stored in advance;
    Second verification information verifying the first authentication information stored in advance and the local device match;
    When a match, the first authentication information and the second authentication verification information generating fusion fingerprint information;
    The verification fingerprint information and the fingerprint information verification comparison;
    If after verification by the user authenticated.
  2. User authentication method according to claim 1, wherein the first authentication information and the second authentication information acquiring method comprising:
    Collecting user's fingerprint information, and acquires the feature information of fingerprint information;
    The feature information of the fingerprint information is divided into two parts in accordance with a predetermined rule, the first authentication information and second authentication information.
  3. User authentication method according to claim 1, characterized in that, further comprising:
    Once verified, the terminal obtains control authority corresponds with the user identity.
  4. 1 to user authentication method according to any one as claimed in claim 3, characterized in that, further comprising:
    When the authentication is passed, obtaining a difference from the location of the terminal device with the local location;
    When the distance difference is within a first range, the first terminal obtains control authority;
    When the distance difference is within the second range, the second terminal acquires the control right.
  5. A user authentication apparatus comprising:
    Receiving means for receiving the terminal and a first fingerprint information acquired authentication information stored in advance;
    Matching module, a second authentication information for authenticating the first authentication information stored in advance and the local device match;
    A generating module, configured to, when matched, the first authentication information and the second authentication verification information generating fusion fingerprint information;
    Authentication module, authentication for the fingerprint information and the fingerprint information to verify comparing; if the verification is passed, via user authentication.
  6. User authentication means as claimed in claim 5, characterized in that, further comprising:
    A first authority setting module, configured to, when the authentication is passed, the terminal obtains control authority corresponding to the user identity.
  7. User authentication apparatus of claim 5 or claim 6, characterized in that, further comprising:
    Distance module, configured to, when the authentication is passed, obtaining a difference from the location of the terminal device with the local location;
    The second authority setting module, configured to, when the distance difference is within a first range, the first control terminal obtains permission; when the distance difference is within the second range, the second terminal acquires control permissions.
  8. An intelligent home, which comprising the user identity according to any one of claims 5-7 verification apparatus.
  9. A user authentication system comprising:
    Terminal, a fingerprint information acquisition; fingerprint information and transmits the first authentication information stored in advance to the device;
    Means for receiving the terminal information collected by the fingerprint and the first authentication information stored in advance; a second authentication information verifying the first authentication information stored in advance and the local device match; when mated, the first verification authentication information and the second authentication information generating fusion fingerprint information; the authentication fingerprint information and the fingerprint information to verify comparing; if the verification is passed, via user authentication.
  10. User authentication system according to claim 9, wherein,
    The terminal is also used to collect fingerprint information of the user, and acquires the feature information of fingerprint information; the feature information of the fingerprint information is divided into two parts in accordance with a predetermined rule, the first authentication information and second authentication information, and the transmitting said second authentication information to the device.
PCT/CN2015/095783 2015-08-27 2015-11-27 User identity authentication method, device, system and smart home WO2017031850A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510534923.X 2015-08-27
CN 201510534923 CN105160226B (en) 2015-08-27 2015-08-27 User authentication methods, devices, systems and intelligent home

Publications (1)

Publication Number Publication Date
WO2017031850A1 true true WO2017031850A1 (en) 2017-03-02

Family

ID=54801082

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/095783 WO2017031850A1 (en) 2015-08-27 2015-11-27 User identity authentication method, device, system and smart home

Country Status (2)

Country Link
CN (1) CN105160226B (en)
WO (1) WO2017031850A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516203B (en) * 2016-01-27 2018-07-17 北京博明信德科技有限公司 Species-based security fingerprint authentication method and system of decentralized storage
CN105867141A (en) * 2016-03-30 2016-08-17 宁波三博电子科技有限公司 Intelligent home control method and system based on effective instruction scope
WO2018014263A1 (en) * 2016-07-20 2018-01-25 张志慧 Control method for intelligent humidifier

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040042641A1 (en) * 2002-08-30 2004-03-04 Jakubowski Peter Joel Personnel identity verification system
CN102933479A (en) * 2010-05-10 2013-02-13 通力股份公司 Method and system for limiting access rights
CN104335226A (en) * 2012-06-29 2015-02-04 苹果公司 Fingerprint enrollment using partial fingerprints
CN104714414A (en) * 2015-03-25 2015-06-17 小米科技有限责任公司 Smart home equipment control method and device and electronic equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102222368A (en) * 2011-04-28 2011-10-19 王鑫 Electronic ticket authentication system applying short-distance communication technology and detection method
CN103699996A (en) * 2012-09-27 2014-04-02 中国银联股份有限公司 Payment authentication method based on human biological characteristics
CN203340098U (en) * 2013-01-21 2013-12-11 上海科斗电子科技有限公司 Infrared transfer intelligent household system
CN104601331B (en) * 2014-12-26 2018-05-08 深圳市科陆电子科技股份有限公司 Charging pole monitoring control system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040042641A1 (en) * 2002-08-30 2004-03-04 Jakubowski Peter Joel Personnel identity verification system
CN102933479A (en) * 2010-05-10 2013-02-13 通力股份公司 Method and system for limiting access rights
CN104335226A (en) * 2012-06-29 2015-02-04 苹果公司 Fingerprint enrollment using partial fingerprints
CN104714414A (en) * 2015-03-25 2015-06-17 小米科技有限责任公司 Smart home equipment control method and device and electronic equipment

Also Published As

Publication number Publication date Type
CN105160226A (en) 2015-12-16 application
CN105160226B (en) 2018-09-07 grant

Similar Documents

Publication Publication Date Title
US8171531B2 (en) Universal authentication token
US20140282945A1 (en) Technologies for secure storage and use of biometric authentication information
US20070223685A1 (en) Secure system and method of providing same
US20140280955A1 (en) Controlling Electronically Communicated Resources
US20090158033A1 (en) Method and apparatus for performing secure communication using one time password
US20140068744A1 (en) Surrogate Secure Pairing of Devices
US20130237190A1 (en) Method and apparatus for remote portable wireless device authentication
CN102567686A (en) Security authentication method of application software of mobile terminal based on human body stable characteristics
US20130183936A1 (en) Method and apparatus for remote portable wireless device authentication
US20090158048A1 (en) Method, client and system for reversed access to management server using one-time password
US20140282929A1 (en) Controlling physical access to secure areas via client devices in a networked environment
US20140317708A1 (en) Login via near field communication with automatically generated login information
US8769289B1 (en) Authentication of a user accessing a protected resource using multi-channel protocol
US20120047566A1 (en) Password protected secure device
US20080250485A1 (en) Guest Dongle and Method of Connecting Guest Apparatuses to Wireless Home Networks
CN104063932A (en) Non-networking access system based on mobile terminal and implementation method
US20160086176A1 (en) Method for multi-factor transaction authentication using wearable devices
US8656455B1 (en) Managing data loss prevention policies
US20150358317A1 (en) Behavioral Authentication System using a biometric fingerprint sensor and User Behavior for Authentication
Ceccarelli et al. Continuous and transparent user identity verification for secure internet services
US20150281211A1 (en) Network security
CN105117630A (en) Fingerprint authentication method, fingerprint authentication apparatus, and terminal
CN103067397A (en) Security authentication method, access gateway and authentication server of desktop cloud system
US20140354401A1 (en) Resource Management Based on Biometric Data
WO2007094165A1 (en) Id system and program, and id method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15902119

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase in:

Ref country code: DE