WO2017162112A1 - 一种身份注册方法及装置 - Google Patents
一种身份注册方法及装置 Download PDFInfo
- Publication number
- WO2017162112A1 WO2017162112A1 PCT/CN2017/077247 CN2017077247W WO2017162112A1 WO 2017162112 A1 WO2017162112 A1 WO 2017162112A1 CN 2017077247 W CN2017077247 W CN 2017077247W WO 2017162112 A1 WO2017162112 A1 WO 2017162112A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- biometric information
- verified
- user
- identifier
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Definitions
- the present application relates to the field of computer technologies, and in particular, to an identity registration method and apparatus.
- the user needs to pre-register the identity of the user before using the service. Subsequently, when the user uses the service through the network, the user needs to The user's identity is verified. After the authentication is passed, the user can use the service. For example, the fingerprint information is used to indicate the identity of the user. Therefore, the user fingerprint information needs to be registered in advance.
- the server of the service passes the fingerprint information of the user. The entire process of registering the identity of the user and subsequently verifying the identity of the user through the fingerprint information of the user can be completed using the terminal.
- the terminal can simultaneously store multiple fingerprint information of the user, and for any service, when registering the identity of the user through the fingerprint information uploaded by the user, the terminal needs to pass through the terminal first. To verify whether the fingerprint information is one of a plurality of fingerprint information that has been stored in the terminal. If yes, the terminal may register the identity of the user with the server according to the fingerprint information. If not, the terminal directly prompts the user to register. failure.
- FIG. 1 the registration process of the user's fingerprint information is specifically as shown in FIG. 1:
- S101 The terminal receives a registration operation of the user.
- S102 Collect fingerprint information of the user.
- S104 Query the identifier corresponding to the fingerprint information stored in the terminal locally, and generate a corresponding identifier of the identifier.
- the private key and the public key store the corresponding relationship between the private key and the identifier corresponding to the fingerprint information in the terminal local area, and send the correspondence between the public key and the identifier corresponding to the fingerprint information to the server for storage.
- S201 The terminal receives the fingerprint information of the user.
- S203 Search for a private key corresponding to the identifier according to the identifier corresponding to the standard biometric information
- the embodiment of the present invention provides an identity registration method and device, which are used to solve the problem in which the fingerprint of the fingerprint is forgotten by the user in the prior art, which brings great inconvenience to the user to use the service and the finger used when the user registers. If you are injured in your daily life, you will not be able to pass the verification and you will not be able to use the business.
- An identity registration method provided by an embodiment of the present application, where the method includes:
- the identity of the user is registered with the server according to the biometric information to be verified, so that the server saves the public key corresponding to the biometric information to be verified.
- An identity registration device provided by an embodiment of the present application, the device includes:
- a receiving module configured to receive biometric information of the user to be verified
- a matching module configured to match the biometric information to be verified in each biometric information stored in advance Standard biometric information with consistent information
- a search module configured to search for a private key corresponding to the identifier according to the identifier corresponding to the standard biometric information after the matching is successful;
- a registration module configured to: when the private key corresponding to the identifier is not found, register the identity of the user with the server according to the biometric information to be verified, so that the server saves the biometric information to be verified The corresponding public key.
- An embodiment of the present application provides an identity registration method and device, where the terminal receives the biometric information of the user to be verified, and matches the standard biometric information that is consistent with the biometric information to be verified.
- the identifier corresponding to the standard biometric information is searched for the private key corresponding to the identifier.
- the identity of the user is registered with the server according to the biometric information to be verified, so that the server saves the The public key corresponding to the verified biometric information.
- the terminal can match the standard biometric information that is consistent with the biometric information to be verified, even if the identifier corresponding to the standard biometric information is not locally located in the terminal.
- the private key corresponding to the identifier is found, and the identity of the user is directly registered according to the biometric information to be verified, thereby completing the service processing, which brings great convenience to the user to use the service, and also effectively improves the use.
- the success rate of the business regardless of which biometric information is used by the user when registering, the terminal can match the standard biometric information that is consistent with the biometric information to be verified, even if the identifier corresponding to the standard biometric information is not locally located in the terminal.
- the private key corresponding to the identifier is found, and the identity of the user is directly registered according to the biometric information to be verified, thereby completing the service processing, which brings great convenience to the user to use the service, and also effectively improves the use.
- the success rate of the business is
- FIG. 1 is a schematic diagram of a registration process of fingerprint information of a user in a prior art according to an embodiment of the present disclosure
- FIG. 2 is a schematic diagram of a process of using a service by a user in the prior art according to an embodiment of the present disclosure
- FIG. 3 is a schematic diagram of an identity registration process according to an embodiment of the present application.
- FIG. 4 is a schematic structural diagram of an identity registration apparatus according to an embodiment of the present application.
- S301 The terminal receives the biometric information of the user to be verified.
- the user in order to improve the security of information used by users in the business process, in the process of using the service, the user first needs to verify the identity of the current user, thereby confirming that the identity of the current user is legal.
- the biometric information of the user to be verified is first received, and since the biometric information identification is more and more commonly used in the terminal (eg, a mobile phone) in actual applications, the user is received.
- the verified biometric information may be completed by the terminal, and the terminal responds after receiving the data, wherein the biometric information refers to the user's physical signs, which may be the iris of the eye or the fingerprint of the finger. It is mainly used to uniquely identify the identity of the user.
- the biometric information as the fingerprint information as an example for detailed description.
- step S302 For example, suppose a forum only provides services for users who have registered accounts, and the user can use the fingerprint information to log in when logging in. Therefore, when the user needs to query the information in the forum, the user clicks on the mobile phone ( That is, the application corresponding to the forum on the terminal is pressed and the fingerprint is pressed. Subsequently, the mobile phone (ie, the terminal) receives the fingerprint information of the user to be verified, and step S302 is performed.
- S302 Match, in each biometric information stored in advance, standard biometric information that is consistent with the biometric information to be verified.
- the fingerprint information ie, biometric information
- the fingerprint information of the user is used to unlock the lock screen interface, and therefore, for any service, the service is
- the server can register the identity of the user through the fingerprint information of the user and subsequently verify the identity of the user through the fingerprint information of the user, and can use the fingerprint information stored in the terminal to complete, that is, as long as the terminal stores
- the fingerprint information can be used in the present application to complete the entire business process.
- the fingerprint information already stored in the terminal may be entered when the user uses other functions of the terminal, and is not the fingerprint information used by the user to register the identity before using the service, for example, the user uses the terminal.
- the function of unlocking the lock screen interface through the fingerprint information the terminal can store the fingerprint information to the terminal local.
- the stored fingerprint information may be used as standard fingerprint information (ie, standard biometric information). It is mainly used to verify whether the user can pass the authentication during the process of using the service, and to provide the user with For business processing.
- the terminal after receiving the fingerprint information (ie, biometric information) to be verified by the user, the terminal directly matches the standard fingerprint information that is consistent with the fingerprint information to be verified (ie, standard biometrics) directly at the terminal. information).
- the mobile phone after receiving the fingerprint information of the user to be verified, the mobile phone locally matches the standard fingerprint information consistent with the fingerprint information to be verified, and assumes that the standard fingerprint information consistent with the fingerprint information to be verified is matched.
- the terminal may assign a fingerprint information identifier to each fingerprint information when storing the fingerprint information (ie, the creature Feature information identification).
- the server corresponding to the subsequent service verifies the identity of the user, that is, the server corresponding to the service needs to know which user is using the service. Therefore, in the present application, the identifier corresponding to the fingerprint information used in the registration is required.
- a private key corresponding to the identifier and a public key are generated.
- the private key and the public key respectively represent the identity of the user, and the generated private key is stored locally in the terminal.
- the terminal after matching the standard fingerprint information that is consistent with the fingerprint information to be verified, the terminal needs to find the private key corresponding to the identifier according to the identifier corresponding to the standard fingerprint information.
- the mobile phone after matching the standard fingerprint information that is consistent with the fingerprint information to be verified, the mobile phone searches for the private key corresponding to the identifier according to the identifier corresponding to the standard fingerprint information.
- S304 When the private key corresponding to the identifier is not found, register the identity of the user with the server according to the biometric information to be verified, and enable the server to save the public information corresponding to the biometric information to be verified. key.
- the terminal matches the standard fingerprint information that is consistent with the fingerprint information to be verified in step S302, but the identifier corresponding to the standard fingerprint information is not found, the private key corresponding to the identifier is not found, indicating that the fingerprint is to be verified.
- the fingerprint information is indeed the user's, but not the fingerprint information used in the registration.
- the fingerprint information (ie, biometric information) to be verified may be directly registered with the server. The identity of the user.
- the present application provides a specific process for registering a user's identity, as follows:
- the corresponding relationship between the identifier and the generated private key is stored locally in the terminal, and the correspondence between the identifier and the generated public key is sent to the server for storage.
- the standard biometric information has a unique identifier corresponding to the standard biometric information
- the identifier of the standard biometric information has a unique corresponding private key and public key, that is, standard biometric information and standard biological information.
- the identifier is in one-to-one correspondence with the private key public key.
- a standard biometric information can be uniquely matched, that is, It is said that the correspondence between the identifier and the generated public key is sent to the server for saving. It can also be said that the server saves the public key corresponding to the biometric information to be verified.
- the user may be prompted to input the password for using the service, and receive the password input by the user, verifying whether the password is correct, if the verification If the authentication is correct, the identity of the user may be registered with the server according to the biometric information to be verified. If the verification is not correct, the identity of the user is not registered according to the biometric information to be verified, and the user service failure is prompted.
- the terminal may directly return to the user that the service processing fails. At this time, if the user wants to continue to use the service, only the password for using the service may be input. The service can be continued, and the terminal can receive the password input by the user and verify whether the password is correct. If correct, the user is registered with the server according to the biometric information to be verified.
- the mobile phone prompts the user to use the password of the query data service, and assumes that the user inputs the password: xxxx, and the terminal receives the user input.
- the authentication key is correct, and the private key and the public key corresponding to the identifier are generated according to the identifier corresponding to the standard fingerprint information that matches the fingerprint information to be verified, and the identifier is associated with the generated private key.
- the relationship is stored locally on the mobile phone, and the correspondence between the identifier and the generated public key is sent to the server for storage.
- the terminal can match the standard biometric information that is consistent with the biometric information to be verified, even if the identifier corresponding to the standard biometric information is not locally located in the terminal.
- the private key corresponding to the identifier is found, and the identity of the user is directly registered according to the biometric information to be verified, thereby completing the service processing, which brings great convenience to the user to use the service, and also effectively improves the use.
- the success rate of the business regardless of which biometric information is used by the user when registering, the terminal can match the standard biometric information that is consistent with the biometric information to be verified, even if the identifier corresponding to the standard biometric information is not locally located in the terminal.
- the private key corresponding to the identifier is found, and the identity of the user is directly registered according to the biometric information to be verified, thereby completing the service processing, which brings great convenience to the user to use the service, and also effectively improves the use.
- the success rate of the business is
- biometric information is sent to the server for processing, so that the server performs service processing according to the public key corresponding to the biometric information to be verified.
- the application may specifically: sign the service information according to the generated private key, and send the service information carrying the signed service information and the identifier to the service processing request.
- the server determines, according to the identifier carried in the service processing request, the public key corresponding to the identifier, and performs verification on the service information carried in the service processing request according to the determined public key, thereby verifying the identity of the user.
- the server then performs business processing on the business information.
- the mobile phone signs the login information according to the generated private key of the identifier, and sends the signed login information and the login processing request of the identifier to the server, and the server searches according to the identifier carried in the login processing request.
- the public key corresponding to the identifier is used, and the login information carried in the login processing request is checked by the public key, and the login of the user is completed.
- the mobile phone ie, the terminal.
- Applying and pressing the fingerprint after receiving the fingerprint information of the user to be verified, the mobile phone locally matches the standard fingerprint information consistent with the fingerprint information to be verified, and assumes that the standard fingerprint matching the fingerprint information to be verified is matched.
- the information is searched according to the identifier corresponding to the standard fingerprint information, and the private key corresponding to the identifier is searched. If the mobile phone does not find the private key corresponding to the identifier, the user is directly prompted to input the payment password, and the mobile phone receives the user input.
- the payment password is cccc, and the password is verified to be correct. If the password is correct, the mobile phone generates a private key and a public key corresponding to the standard fingerprint information that matches the fingerprint information to be verified, and the identifier is associated with the public key and the public key. The corresponding relationship of the generated private key is stored locally in the mobile phone, and the identifier is associated with the generated public key. Save sent to the server.
- the mobile phone signs the payment information according to the generated private key corresponding to the identifier, and sends the signed payment information and the payment processing request of the identifier to the server, and the server Paying the identifier carried in the processing request, finding the public key corresponding to the identifier, using the public key to check the payment information, and successfully completing the payment.
- FIG. 4 is a schematic structural diagram of an identity registration apparatus according to an embodiment of the present disclosure, including:
- the receiving module 401 is configured to receive biometric information of the user to be verified
- the matching module 402 is configured to match, in each biometric information stored in advance, standard biometric information that is consistent with the biometric information to be verified;
- the searching module 403 is configured to: after the matching is successful, search for a private key corresponding to the identifier according to the identifier corresponding to the standard biometric information;
- a registration module 404 configured to: when the search module 403 does not find the private key corresponding to the identifier, register the identity of the user with the server according to the biometric information to be verified, so that the server saves the The public key corresponding to the biometric information to be verified.
- the device also includes:
- the password verification module 405 is configured to receive the password input by the user and verify that the password is correct before registering the identity of the user with the server according to the biometric information to be verified.
- the registration module 404 is specifically configured to: generate a private key and a public key corresponding to the identifier according to the identifier corresponding to the standard biometric information that is matched with the biometric information to be verified, and use the identifier and the generated private key The corresponding relationship is stored locally in the terminal, and the correspondence between the identifier and the generated public key is sent to the server for storage.
- the device also includes:
- the processing module 406 after the registration module 404 registers the identity of the user with the server, sends a service processing request to the server according to the biometric information to be verified, so that the server is configured according to the to-be-verified
- the public key corresponding to the biometric information is used for business processing.
- the processing module 406 is specifically configured to: sign the service information according to the generated private key, and send the service information carrying the signed service information and the identifier to the server, so that the server determines the received The public key corresponding to the identifier carried in the service processing request, and performing service processing according to the determined public key and the signed service information.
- the business processing request includes a payment request.
- a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
- processors CPUs
- input/output interfaces network interfaces
- memory volatile and non-volatile memory
- the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
- RAM random access memory
- ROM read only memory
- Memory is an example of a computer readable medium.
- Computer readable media includes both permanent and non-persistent, removable and non-removable media.
- Information storage can be implemented by any method or technology.
- the information can be computer readable instructions, data structures, modules of programs, or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
- computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.
- embodiments of the present application can be provided as a method, system, or computer program product.
- the present application can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment in combination of software and hardware.
- the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Collating Specific Patterns (AREA)
- Mobile Radio Communication Systems (AREA)
Priority Applications (15)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP17769389.2A EP3435590B1 (en) | 2016-03-25 | 2017-03-20 | Identity registration method and device |
| MYPI2018703340A MY194973A (en) | 2016-03-25 | 2017-03-20 | Identity registration method and device |
| JP2018550394A JP6929496B2 (ja) | 2016-03-25 | 2017-03-20 | 身元登録方法及びデバイス |
| KR1020187029758A KR102242766B1 (ko) | 2016-03-25 | 2017-03-20 | 신원 등록 방법 및 장치 |
| PL17769389T PL3435590T3 (pl) | 2016-03-25 | 2017-03-20 | Sposób i urządzenie do rejestracji tożsamości |
| SG11201808007XA SG11201808007XA (en) | 2016-03-25 | 2017-03-20 | Identity registration method and device |
| CA3018409A CA3018409C (en) | 2016-03-25 | 2017-03-20 | Identity registration method and device |
| MX2018011482A MX383373B (es) | 2016-03-25 | 2017-03-20 | Metodo y dispositivo para registro de identidad. |
| RU2018137487A RU2732507C2 (ru) | 2016-03-25 | 2017-03-20 | Способ и устройство для регистрации личности |
| ES17769389T ES2874192T3 (es) | 2016-03-25 | 2017-03-20 | Método y dispositivo de registro de identidad |
| AU2017239211A AU2017239211B2 (en) | 2016-03-25 | 2017-03-20 | Identity registration method and device |
| BR112018069442A BR112018069442B8 (pt) | 2016-03-25 | 2017-03-20 | método e dispositivo para registro de identidade |
| US16/134,750 US10833862B2 (en) | 2016-03-25 | 2018-09-18 | Identity registration method and device |
| PH12018502002A PH12018502002B1 (en) | 2016-03-25 | 2018-09-18 | Identity registration method and device |
| US16/722,284 US11012238B2 (en) | 2016-03-25 | 2019-12-20 | Identity registration method and device |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610180030.4A CN107231234B (zh) | 2016-03-25 | 2016-03-25 | 一种身份注册方法及装置 |
| CN201610180030.4 | 2016-03-25 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/134,750 Continuation US10833862B2 (en) | 2016-03-25 | 2018-09-18 | Identity registration method and device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017162112A1 true WO2017162112A1 (zh) | 2017-09-28 |
Family
ID=59899281
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2017/077247 Ceased WO2017162112A1 (zh) | 2016-03-25 | 2017-03-20 | 一种身份注册方法及装置 |
Country Status (17)
| Country | Link |
|---|---|
| US (2) | US10833862B2 (https=) |
| EP (1) | EP3435590B1 (https=) |
| JP (1) | JP6929496B2 (https=) |
| KR (1) | KR102242766B1 (https=) |
| CN (1) | CN107231234B (https=) |
| AU (1) | AU2017239211B2 (https=) |
| BR (1) | BR112018069442B8 (https=) |
| CA (1) | CA3018409C (https=) |
| ES (1) | ES2874192T3 (https=) |
| MX (1) | MX383373B (https=) |
| MY (1) | MY194973A (https=) |
| PH (1) | PH12018502002B1 (https=) |
| PL (1) | PL3435590T3 (https=) |
| RU (1) | RU2732507C2 (https=) |
| SG (1) | SG11201808007XA (https=) |
| TW (1) | TWI668589B (https=) |
| WO (1) | WO2017162112A1 (https=) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2019096077A (ja) * | 2017-11-22 | 2019-06-20 | キヤノン株式会社 | 情報処理装置、情報処理装置における方法、およびプログラム |
Families Citing this family (30)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8600120B2 (en) | 2008-01-03 | 2013-12-03 | Apple Inc. | Personal computing device control using face detection and recognition |
| US11165963B2 (en) | 2011-06-05 | 2021-11-02 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
| US9898642B2 (en) | 2013-09-09 | 2018-02-20 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
| CN107231234B (zh) | 2016-03-25 | 2020-06-09 | 创新先进技术有限公司 | 一种身份注册方法及装置 |
| DK179978B1 (en) | 2016-09-23 | 2019-11-27 | Apple Inc. | Image data for enhanced user interactions |
| CN107026836B (zh) * | 2016-10-28 | 2020-03-06 | 阿里巴巴集团控股有限公司 | 一种业务实现方法和装置 |
| KR102185854B1 (ko) | 2017-09-09 | 2020-12-02 | 애플 인크. | 생체측정 인증의 구현 |
| KR102483830B1 (ko) * | 2018-02-20 | 2023-01-03 | 삼성전자주식회사 | 전자 장치 및 그의 동작 방법 |
| US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
| US10491404B1 (en) * | 2018-09-12 | 2019-11-26 | Hotpyp, Inc. | Systems and methods for cryptographic key generation and authentication |
| US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
| US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
| CN109583165A (zh) * | 2018-10-12 | 2019-04-05 | 阿里巴巴集团控股有限公司 | 一种生物特征信息处理方法、装置、设备及系统 |
| CN109246156B (zh) * | 2018-10-30 | 2021-03-02 | 佛山中科芯蔚科技有限公司 | 登录认证方法及装置、登录方法及装置以及登录认证系统 |
| CN109992680A (zh) * | 2018-12-13 | 2019-07-09 | 阿里巴巴集团控股有限公司 | 信息处理方法、装置、电子设备及计算机可读存储介质 |
| CN110266480B (zh) * | 2019-06-13 | 2022-05-20 | 腾讯科技(深圳)有限公司 | 数据传输方法、装置及存储介质 |
| CN110601827B (zh) * | 2019-09-12 | 2022-09-02 | 腾讯科技(深圳)有限公司 | 基于区块链的身份识别方法、装置及系统、存储介质 |
| CN111931146B (zh) * | 2020-07-24 | 2024-01-19 | 捷德(中国)科技有限公司 | 身份验证方法、装置、设备及存储介质 |
| FR3114891B3 (fr) * | 2020-10-05 | 2022-09-30 | Amadeus | Système d’identification biométrique |
| US11727127B2 (en) * | 2020-10-16 | 2023-08-15 | Micron Technology, Inc. | Secure storage device verification with multiple computing devices |
| RU2756336C1 (ru) * | 2020-12-25 | 2021-09-29 | Ринат Муратович Мухамадиев | Игрушка "меч в камне" |
| CN112784238B (zh) * | 2021-01-21 | 2024-04-05 | 百度在线网络技术(北京)有限公司 | 一种数据处理方法、装置、电子设备和介质 |
| EP4264460B1 (en) | 2021-01-25 | 2025-12-24 | Apple Inc. | Implementation of biometric authentication |
| US12210603B2 (en) * | 2021-03-04 | 2025-01-28 | Apple Inc. | User interface for enrolling a biometric feature |
| US11831754B2 (en) * | 2021-04-21 | 2023-11-28 | Aetna Inc. | Systems and methods for device binding across multiple domains using an authentication domain |
| US12216754B2 (en) | 2021-05-10 | 2025-02-04 | Apple Inc. | User interfaces for authenticating to perform secure operations |
| US11451402B1 (en) | 2021-07-29 | 2022-09-20 | IPAssets Technology Holdings Inc. | Cold storage cryptographic authentication apparatus and system |
| US12277205B2 (en) | 2021-09-20 | 2025-04-15 | Apple Inc. | User interfaces for digital identification |
| CN114491460A (zh) * | 2022-01-05 | 2022-05-13 | 合肥美的智能科技有限公司 | 用户注册方法和装置、存储介质、无人零售柜和服务器 |
| US12608079B2 (en) | 2023-04-20 | 2026-04-21 | Apple Inc. | Devices, methods, and graphical user interfaces for user enrollment and authentication |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101340285A (zh) * | 2007-07-05 | 2009-01-07 | 杭州中正生物认证技术有限公司 | 利用指纹USBkey进行身份验证的方法及系统 |
| US20110142234A1 (en) * | 2009-12-15 | 2011-06-16 | Michael Leonard Rogers | Multi-Factor Authentication Using a Mobile Phone |
| CN102523213A (zh) * | 2011-12-13 | 2012-06-27 | 华为终端有限公司 | 服务器、终端鉴权方法以及服务器、终端 |
| CN104253818A (zh) * | 2011-12-13 | 2014-12-31 | 华为终端有限公司 | 服务器、终端鉴权方法以及服务器、终端 |
| CN104540129A (zh) * | 2014-12-29 | 2015-04-22 | 广州唯品会信息科技有限公司 | 第三方应用的注册和登录方法及系统 |
Family Cites Families (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| ES2245305T3 (es) * | 1999-04-22 | 2006-01-01 | Veridicom, Inc. | Autenticacion biometrica de alta seguridad usando pares de encriptacion clave publica/clave privada. |
| WO2002073877A2 (en) * | 2001-03-09 | 2002-09-19 | Pascal Brandys | System and method of user and data verification |
| KR20050083594A (ko) * | 2002-07-03 | 2005-08-26 | 오로라 와이어리스 테크놀로지즈 리미티드 | 바이오메트릭 개인키 인프라스트럭처 |
| US8438385B2 (en) * | 2008-03-13 | 2013-05-07 | Fujitsu Limited | Method and apparatus for identity verification |
| US20090320125A1 (en) * | 2008-05-08 | 2009-12-24 | Eastman Chemical Company | Systems, methods, and computer readable media for computer security |
| US9832019B2 (en) * | 2009-11-17 | 2017-11-28 | Unho Choi | Authentication in ubiquitous environment |
| US8726010B2 (en) * | 2010-10-21 | 2014-05-13 | Qumu Corporation | Secure content distribution |
| EP2512061A1 (en) * | 2011-04-15 | 2012-10-17 | Hanscan IP B.V. | System for conducting remote biometric operations |
| US8694771B2 (en) * | 2012-02-10 | 2014-04-08 | Connect In Private Panama Corp. | Method and system for a certificate-less authenticated encryption scheme using identity-based encryption |
| WO2013134306A1 (en) * | 2012-03-05 | 2013-09-12 | Michael Fiske | One-time passcodes with asymmetric keys |
| KR20140138271A (ko) * | 2012-03-15 | 2014-12-03 | 미코 코포레이션 | 생체 측정 인증 시스템 |
| KR20140050322A (ko) * | 2012-10-19 | 2014-04-29 | 삼성전자주식회사 | 사용자 디바이스의 고유 식별자 제공 방법 및 장치 |
| US9165130B2 (en) * | 2012-11-21 | 2015-10-20 | Ca, Inc. | Mapping biometrics to a unique key |
| US9461992B2 (en) * | 2013-01-09 | 2016-10-04 | Chris Outwater | Smartphone based identification, access control, testing, and evaluation |
| WO2014141263A1 (en) * | 2013-03-13 | 2014-09-18 | Biothent Security Ltd. | Asymmetric otp authentication system |
| US9330513B2 (en) * | 2013-05-31 | 2016-05-03 | Microsoft Technology Licensing, Llc | Resource management based on biometric data |
| GB2517775B (en) | 2013-08-30 | 2016-04-06 | Cylon Global Technology Inc | Apparatus and methods for identity verification |
| KR20150044614A (ko) * | 2013-10-17 | 2015-04-27 | 중소기업은행 | 생체정보를 이용한 실명확인 시스템 및 방법 |
| US9473494B2 (en) * | 2014-01-09 | 2016-10-18 | Fujitsu Limited | Access credentials using biometrically generated public/private key pairs |
| EP2966605B1 (de) * | 2014-07-07 | 2017-06-21 | FinPin Technologies GmbH | Verfahren und System zur Authentifizierung eines Benutzers |
| CN104507086A (zh) * | 2014-12-02 | 2015-04-08 | 上海斐讯数据通信技术有限公司 | 一种生物身份识别代替实体sim卡的智能终端及其实现方法 |
| CN105376233A (zh) * | 2015-11-20 | 2016-03-02 | 宇龙计算机通信科技(深圳)有限公司 | 虚拟sim卡参数管理方法及装置、终端和网络端服务器 |
| CN107231234B (zh) | 2016-03-25 | 2020-06-09 | 创新先进技术有限公司 | 一种身份注册方法及装置 |
-
2016
- 2016-03-25 CN CN201610180030.4A patent/CN107231234B/zh active Active
-
2017
- 2017-01-20 TW TW106102208A patent/TWI668589B/zh active
- 2017-03-20 JP JP2018550394A patent/JP6929496B2/ja active Active
- 2017-03-20 MY MYPI2018703340A patent/MY194973A/en unknown
- 2017-03-20 RU RU2018137487A patent/RU2732507C2/ru active
- 2017-03-20 EP EP17769389.2A patent/EP3435590B1/en active Active
- 2017-03-20 ES ES17769389T patent/ES2874192T3/es active Active
- 2017-03-20 CA CA3018409A patent/CA3018409C/en active Active
- 2017-03-20 MX MX2018011482A patent/MX383373B/es unknown
- 2017-03-20 WO PCT/CN2017/077247 patent/WO2017162112A1/zh not_active Ceased
- 2017-03-20 AU AU2017239211A patent/AU2017239211B2/en not_active Ceased
- 2017-03-20 SG SG11201808007XA patent/SG11201808007XA/en unknown
- 2017-03-20 KR KR1020187029758A patent/KR102242766B1/ko active Active
- 2017-03-20 PL PL17769389T patent/PL3435590T3/pl unknown
- 2017-03-20 BR BR112018069442A patent/BR112018069442B8/pt not_active IP Right Cessation
-
2018
- 2018-09-18 PH PH12018502002A patent/PH12018502002B1/en unknown
- 2018-09-18 US US16/134,750 patent/US10833862B2/en active Active
-
2019
- 2019-12-20 US US16/722,284 patent/US11012238B2/en active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101340285A (zh) * | 2007-07-05 | 2009-01-07 | 杭州中正生物认证技术有限公司 | 利用指纹USBkey进行身份验证的方法及系统 |
| US20110142234A1 (en) * | 2009-12-15 | 2011-06-16 | Michael Leonard Rogers | Multi-Factor Authentication Using a Mobile Phone |
| CN102523213A (zh) * | 2011-12-13 | 2012-06-27 | 华为终端有限公司 | 服务器、终端鉴权方法以及服务器、终端 |
| CN104253818A (zh) * | 2011-12-13 | 2014-12-31 | 华为终端有限公司 | 服务器、终端鉴权方法以及服务器、终端 |
| CN104540129A (zh) * | 2014-12-29 | 2015-04-22 | 广州唯品会信息科技有限公司 | 第三方应用的注册和登录方法及系统 |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP3435590A4 * |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2019096077A (ja) * | 2017-11-22 | 2019-06-20 | キヤノン株式会社 | 情報処理装置、情報処理装置における方法、およびプログラム |
| JP7091057B2 (ja) | 2017-11-22 | 2022-06-27 | キヤノン株式会社 | 情報処理装置、情報処理装置における方法、およびプログラム |
Also Published As
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN107231234B (zh) | 一种身份注册方法及装置 | |
| US11068575B2 (en) | Authentication system | |
| US11461781B2 (en) | Pro-active identity verification for authentication of transaction initiated via non-voice channel | |
| AU2017242765C1 (en) | Method and device for registering biometric identity and authenticating biometric identity | |
| CN106651363B (zh) | 一种硬件钱包及其持有者身份验证方法 | |
| US10142331B2 (en) | Authentication for application | |
| JP2022513977A (ja) | 指定ポイント承認における身元識別方法、装置及びサーバ | |
| JP7213596B2 (ja) | 動的ラスタライズ管理に基づく身元識別方法、装置及びサーバ | |
| US11218464B2 (en) | Information registration and authentication method and device | |
| WO2017211199A1 (zh) | 身份认证方法及装置 | |
| WO2017206747A1 (zh) | 移动支付方法、装置及系统 | |
| CN104579682A (zh) | 一种多业务服务器的访问方法及系统 | |
| US20250150454A1 (en) | Digital identity step-up | |
| JP2017102842A (ja) | 本人認証システム、本人認証用情報出力システム、認証サーバー、本人認証方法、本人認証用情報出力方法及びプログラム | |
| CN107548059A (zh) | 一种认证方法及系统 | |
| CN107026816B (zh) | 一种身份认证方法及装置 | |
| CN105827625A (zh) | 基于生物识别信息的认证方法和认证系统、电子设备 | |
| CN116452204A (zh) | 基于did的支付方法、装置、可读存储介质及电子设备 | |
| HK1245523B (zh) | 一种身份注册方法及装置 | |
| HK1245523A1 (zh) | 一种身份注册方法及装置 | |
| CN120567426A (zh) | 安全密钥的管理方法、装置、设备和存储介质 | |
| CN116233840A (zh) | 一种业务平台的认证方法、装置、电子设备和存储介质 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| ENP | Entry into the national phase |
Ref document number: 3018409 Country of ref document: CA |
|
| WWE | Wipo information: entry into national phase |
Ref document number: MX/A/2018/011482 Country of ref document: MX |
|
| ENP | Entry into the national phase |
Ref document number: 2018550394 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 11201808007X Country of ref document: SG |
|
| ENP | Entry into the national phase |
Ref document number: 2017239211 Country of ref document: AU Date of ref document: 20170320 Kind code of ref document: A |
|
| ENP | Entry into the national phase |
Ref document number: 20187029758 Country of ref document: KR Kind code of ref document: A |
|
| REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112018069442 Country of ref document: BR |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2017769389 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 2017769389 Country of ref document: EP Effective date: 20181025 |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17769389 Country of ref document: EP Kind code of ref document: A1 |
|
| ENP | Entry into the national phase |
Ref document number: 112018069442 Country of ref document: BR Kind code of ref document: A2 Effective date: 20180924 |