WO2020135114A1 - 身份信息的认证方法、装置及服务器 - Google Patents
身份信息的认证方法、装置及服务器 Download PDFInfo
- Publication number
- WO2020135114A1 WO2020135114A1 PCT/CN2019/125377 CN2019125377W WO2020135114A1 WO 2020135114 A1 WO2020135114 A1 WO 2020135114A1 CN 2019125377 W CN2019125377 W CN 2019125377W WO 2020135114 A1 WO2020135114 A1 WO 2020135114A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- identity
- identity information
- information
- user terminal
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3221—Access to banking information through M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3224—Transactions dependent on location of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3227—Aspects of commerce using mobile devices [M-devices] using secure elements embedded in M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
Definitions
- This application relates to the field of identity authentication technology, and in particular to an identity information authentication method, device, and server.
- the purpose of this application is to provide an identity information authentication method, device and server, which can effectively protect personal identity information, improve the security, reliability and convenience of identity authentication, and enhance the user experience.
- an embodiment of the present application provides an authentication method for identity information.
- the method is performed by a server, and the server is respectively in communication connection with a target authentication device and a user terminal; the method includes: receiving the user to be authenticated sent by the target authentication device The first identity information and the identification information of the target authentication device; wherein the first identity information of the user to be authenticated includes the current biometrics of the user to be authenticated; the current biometrics includes the current facial features; the identification information of the target authentication device includes the target authentication device Account information and location information of the target authentication device; based on the stored first identity information of the legal user and the identification information of the target authentication device, the first identity information of the authenticated user is authenticated for legitimacy; the authentication result is sent to the target authentication equipment.
- the embodiments of the present application provide a first possible implementation manner of the first aspect, wherein, before receiving the first identity information of the user to be authenticated sent by the target authentication device, the above method further includes: receiving the user terminal to send The location information of the user terminal; perform dynamic rasterization processing on the location information of the user terminal to determine the grid where the location information of the user terminal is located.
- the embodiments of the present application provide a second possible implementation manner of the first aspect, wherein, based on the stored first identity information of the legitimate user and the identification of the target authentication device Information, the step of legally authenticating the first identity information of the user to be authenticated includes: performing dynamic rasterization on the location information of the target authentication device to determine the grid where the location information of the target authentication device is located; The grid where the location information is located and the grid within the preset range from the grid where the location information of the target authentication device is located are used as the target grid; based on the stored first identity information of the legal user, look up the location information of each user terminal The stored biometrics of each user in the target grid; matching the current biometrics of the user to be authenticated with the stored biometrics of each user found to perform legality authentication on the first identity information of the user to be authenticated.
- the embodiments of the present application provide a third possible implementation manner of the first aspect, in which the current biological characteristics of the user to be authenticated and the stored
- the steps of matching biometrics include: judging whether the current biometrics are living biometrics; if so, comparing the current biometrics of the user to be authenticated with the stored biometrics of each user found; if the comparison Obtain that the similarity between a stored biometric and the current biometric is greater than the preset similarity threshold, and determine that the stored biometric with a similarity greater than the preset similarity threshold is the current biometric; if the comparison results in multiple stored biometrics The similarity between the biometrics and the current biometrics is greater than the preset similarity threshold, and it is determined that the account corresponding to the stored biometrics whose similarity is greater than the preset similarity threshold is the current user account; if multiple stored biometrics are obtained by comparison The similarity to the current biometric is higher than the preset similarity threshold,
- the embodiments of the present application provide a fourth possible implementation manner of the first aspect, wherein the user terminal of the user to be authenticated includes a user account, and the identity confirmation is to be authenticated again
- the user account of the user is the current user account.
- the above method further includes: sending a request to the user terminal of the current user account to obtain the second identity information of the user; wherein, the user terminal has the second identity information of the user, and the second identity information of the user Including the user's name, the user's ID number and the user's stored biometrics; when receiving the user's second identity information sent by the user terminal of the current user account, determine whether the user terminal is set to allow response to the request; if Yes, verify the legitimacy of the second identity information; if the verified second identity information is legal, send the second identity information to the target authentication device and generate an identity authentication log; send the identity information authentication log to the user account User terminal.
- the embodiments of the present application provide a fifth possible implementation manner of the first aspect, in which a request for acquiring the second identity information of the user is issued to the user terminal of the current user account Thereafter, the above method further includes: verifying the legitimacy of the second identity information through the user terminal of the current user account; if the second identity information is legal, sending the second identity information to the server through the user terminal of the current user account.
- the embodiments of the present application provide a sixth possible implementation manner of the first aspect, wherein the server is also in communication connection with the identity authentication system, and the above method further includes: if the identity information The authentication is a secondary identity authentication request. After verifying that the second identity information is legal, the second identity information is sent to the identity authentication system; the identity authentication is performed on the second identity information through the identity authentication system to obtain an identity verification result; the identity authentication is passed The system sends the identity verification result to the server; if the identity verification result contains legal information about the second identity information, the second identity letter is sent to the target authentication device and an identity information authentication log is generated; the identity authentication log is sent to the user account’s User terminal.
- the embodiments of the present application provide a seventh possible implementation manner of the first aspect, wherein the server is also in communication connection with the identity authentication system, and the above method further includes: passing identity authentication The system registers the second identity information for the user terminal.
- the embodiments of the present application provide an eighth possible implementation manner of the first aspect, wherein the step of registering the user terminal with the second identity information through the identity authentication system, Including: receiving the second identity information sent by the user terminal; sending the second identity information to the identity authentication system; performing identity verification on the second identity information through the identity authentication system; sending the identity verification result of the second identity information through the identity authentication system To the server; if the identity verification result contains legal information of the second identity information, associate the user’s stored biometrics in the second identity information with the user account; send the legal identity verification result of the second identity information to the user terminal After receiving the legal identity verification result of the second identity information, the user terminal encrypts the second identity information and saves the encrypted second identity information to the user terminal.
- an embodiment of the present application further provides an identity information authentication apparatus.
- the apparatus is executed by a server, and the server is respectively communicatively connected to a target authentication device and a user terminal;
- the device includes: a receiving module configured to receive the target authentication device to send The first identity information of the user to be authenticated and the identification information of the target authentication device; where the first identity information of the user to be authenticated includes the current biometrics of the user to be authenticated; the current biometrics include the current facial features; the identification of the target authentication device
- the information includes the account information of the target authentication device and the location information of the target authentication device; the authentication module is configured to legalize the first identity information of the authenticated user based on the stored first identity information of the legal user and the identification information of the target authentication device Sexual authentication; sending module, configured to send the authentication result to the target authentication device.
- the embodiments of the present application provide a first possible implementation manner of the second aspect, wherein the receiving module is configured to: receive location information of the user terminal sent by the user terminal; and dynamically fence the location information of the user terminal Grid processing to determine the grid where the location information of the user terminal is located.
- an embodiment of the present application provides a server, including a processor and a memory; a program is stored on the memory, and the program executes the ninth possible implementation manner as in the first aspect to the first aspect when the program is executed by the processor Any of the methods.
- an embodiment of the present application provides a chip that stores a program on the chip, and when the program is executed by a processor, the method steps of any one of the foregoing first aspect to the ninth possible implementation manner of the first aspect are performed. .
- Embodiments of the present application provide an identity information authentication method, device, and server, by receiving the first identity information of the user to be authenticated and the identification information of the target authentication device sent by the target authentication device, and based on the stored legal user’s first
- the identity information and the identification information of the target authentication device perform legality authentication on the first identity information of the user to be authenticated, thereby sending the authentication result to the target authentication device.
- the identity information of the user to be authenticated includes the current biometrics of the user to be authenticated, and the current biometrics include the current facial features.
- the identification information of the target authentication device includes the account information of the target authentication device and the location information of the target authentication device.
- the identity information of the user to be authenticated sent by the authentication device When the identity information of the user to be authenticated sent by the authentication device is authenticated, it includes the authentication of the current biometrics in the identity information, and takes into account the impact of the identification information of the target authentication device on the current biometric authentication, which can effectively protect personal identity information, Improve the security, reliability and convenience of identity authentication and enhance user experience.
- FIG. 1 shows a flowchart of an identity information authentication method provided by an embodiment of the present application
- FIG. 2 shows a flowchart of another identity information authentication method provided by an embodiment of the present application
- FIG. 3 shows a structural block diagram of an identity information authentication device provided by an embodiment of the present application
- FIG. 4 shows a schematic structural diagram of a server provided by an embodiment of the present application.
- the existing biometric recognition technology is affected by conditions such as shooting angle, shooting distance, illumination direction, illumination angle, light brightness and color, and light color during the collection of biometrics such as face images, resulting in a large face comparison result.
- Deviation, and there will be two people who look exactly like brothers, sisters, twins or without blood relationship so the reliability of biometric identification technology needs to be improved, and the personal identity information of citizens belongs to personal privacy and is protected by law No individual, group or business unit can save the personal identity information of citizens.
- the illegal storage of personal identity information violates the privacy rights of citizens and even leads to the disclosure of personal information, which in turn leads to various social problems.
- the method is executed by a server such as a computer, and the server is respectively communicatively connected to the target authentication device and the user terminal.
- the method includes the following steps:
- Step S102 Receive the first identity information of the user to be authenticated and the identification information of the target authentication device sent by the target authentication device; wherein the first identity information of the user to be authenticated includes the current biometrics of the user to be authenticated; the current biometrics includes the current person Face characteristics; the identification information of the target authentication device includes the account information of the target authentication device and the location information of the target authentication device.
- the target authentication device can be a self-service terminal (e-government self-service terminal, e-bank self-service terminal, e-tax self-service terminal, hotel check-in self-service terminal, ATM (Automatic Teller Machine) automatic withdrawal machine, queuing machine , Number pick-up machine, self-service single machine, self-service invoice machine, self-service ticket machine and self-checkout machine, etc.), shared equipment, smart robots, smart cars, drones, identity authentication machines, member and VIP identification devices, smart access control, Smart video intercom equipment and smart gate and other identity authentication equipment.
- a self-service terminal e-government self-service terminal, e-bank self-service terminal, e-tax self-service terminal, hotel check-in self-service terminal, ATM (Automatic Teller Machine) automatic withdrawal machine, queuing machine , Number pick-up machine, self-service single machine, self-service invoice machine, self-service ticket machine and self-checkout machine, etc.
- shared equipment smart robots, smart cars, drones, identity authentication machines, member and
- user terminals can also be personal mobile devices such as notebook computers, tablet computers, smart watches, smart bracelets, smart glasses, smart earplugs, and smart button-type devices.
- Biometrics include one of facial biometrics, iris biometrics, scleral biometrics, eye pattern biometrics, palm vein biometrics, palmprint biometrics, finger vein biometrics, ear print biometrics, and voiceprint biometrics. Or more.
- the current biometrics of the user to be authenticated are facial biometrics, including: live facial biometrics or live facial biometrics combined with facial expression information.
- the current biometrics stored by the user are facial biometrics, including: facial biometrics, facial biometrics combined with facial expression information, live facial biometrics, or combined facial expression information Biometrics of living human face.
- Global satellites can be assisted by manual settings, BDS (BeiDou Navigation, Satellite System), GPS (Global Positioning System, Global Positioning System), LBS (Location Based Service, Base Station Positioning), AGPS (Assisted Global Positioning System) Positioning system), GSM (Global System for Mobile), IP (Internet Protocol) address positioning and WIFI (Wireless Wireless Fidelity, mobile hotspot), etc. for positioning To obtain the location information of the target authentication device.
- BDS BeiDou Navigation, Satellite System
- GPS Global Positioning System, Global Positioning System
- LBS Location Based Service, Base Station Positioning
- AGPS Assisted Global Positioning System Positioning system
- GSM Global System for Mobile
- IP Internet Protocol address positioning
- WIFI Wireless Wireless Fidelity, mobile hotspot
- the self-service terminal of the high-speed rail station If the user picks up the ticket at the high-speed rail station, the self-service terminal of the high-speed rail station, if the user needs to use the self-service terminal to handle the ticket collection service, the user is the user to be authenticated at this time, and the user to be authenticated needs to pass the authentication to proceed to the next business process.
- the user to be authenticated can operate according to the prompt information provided by the interactive interface of the target authentication device.
- the target authentication device can collect the current biometrics of the user, such as the current facial features, including the current live facial features And/or combined with the live facial features of facial expression information, the above information collected by the target authentication device is used as the first identity information of the user to be authenticated, and the first identity information of the user to be authenticated is sent to the server through the target authentication device.
- the current biometrics of the user such as the current facial features, including the current live facial features And/or combined with the live facial features of facial expression information
- the above information collected by the target authentication device is used as the first identity information of the user to be authenticated
- the first identity information of the user to be authenticated is sent to the server through the target authentication device.
- Step S104 based on the stored identity information of the legal user and the identification information of the target authentication device, perform legality authentication on the first identity information of the authenticated user.
- the server stores the identity information of legal users, including stored biometrics.
- Legal users include users whose user information entered on the user terminal is authenticated by the Ministry of Public Security. These authenticated users will enter the biometrics of the user terminal and the user’s terminal’s
- the identification information is stored in the user terminal and sent by the user terminal to the server, where it is stored in the server.
- the server can also obtain the location information of the target authentication device sent by the target authentication device, and perform dynamic rasterization processing on the location information of the target authentication device to determine the grid where the location information is located.
- the server determines the user whose location corresponding to the legal user's identity information stored in the server is within the preset grid range, and the server will match the identity information of the user to be authenticated with the preset
- the identity information of users in the grid range is compared one by one to determine the legitimacy of the identity information of the user to be authenticated.
- positioning technologies such as BDS, GPS, LBS, AGPS, GSM, IP, WIFI, and gyroscope positioning
- Step S106 Send the authentication result to the target authentication device.
- the authentication result is sent to the target authentication device. If the authentication result contains legal information of the identity information of the user to be authenticated, the user to be authenticated passes the authentication, and the target authentication device allows the authentication to be authenticated The user performs the next business operation. If the user to be authenticated fails the authentication, the target authentication device does not allow the user to be authenticated to perform subsequent operations.
- the self-service terminal of the high-speed rail receives the authentication result from the server. If the authentication result contains legal information such as the name and ID number of the user to be authenticated, then wait The authenticated user is authenticated, and the self-service terminal allows the user to perform the next ticket collection business operation; at this time, the business management terminal obtains the legal identity information of the user, achieving the effect equivalent to a machine-readable physical ID card, and carrying out " "Real name, real person and real evidence" certification results. If the user to be authenticated does not pass the authentication, the self-service terminal does not allow the user to perform subsequent ticket collection operations.
- the above authentication method for identity information treats by receiving the first identity information of the user to be authenticated sent by the target authentication device, and based on the stored first identity information of the legitimate user and the identification information of the target authentication device
- the first identity information of the authenticated user undergoes legality authentication, thereby sending the authentication result to the target authentication device.
- the first identity information of the user to be authenticated includes the current biometrics of the user to be authenticated, and the current biometrics include the current facial features
- the identification information of the target authentication device includes the account information of the target authentication device and the location information of the target authentication device.
- FIG. 2 a flowchart of an authentication method for identity information shown in FIG. 2, which includes the following steps:
- Step S202 Receive location information of the user terminal sent by the user terminal.
- Step S204 Perform dynamic rasterization processing on the location information of the user terminal to determine the grid where the location information of the user terminal is located.
- the grid where the received location information of the user terminal is located can be determined.
- Step S206 Receive the first identity information of the user to be authenticated and the identification information of the target authentication device sent by the target authentication device; wherein the first identity information of the user to be authenticated includes the current biometrics of the user to be authenticated; the current biometrics includes the current person Face characteristics; the identification information of the target authentication device includes the account information of the target authentication device and the location information of the target authentication device.
- the target authentication device includes a camera, and the current biological characteristics of the user to be authenticated are collected through the camera of the target authentication device.
- the living biometric judgment method is used to judge whether the current biometric of the user to be authenticated is a living body; if it is judged to be non-living, the target authentication device does not send the user's first identity Information and identification information of the target authentication device to the server.
- Step S208 Perform dynamic rasterization processing on the location information of the target authentication device to determine the grid where the location information of the target authentication device is located.
- the server performs dynamic rasterization processing on the location information of the target authentication device to determine the grid where the location information of the target authentication device is located.
- step S210 the grid where the location information of the target authentication device is located and the grid within a preset range from the grid where the location information of the target authentication device is located are used as the target grid.
- the preset range may be pre-stored in the server, and the server determines the target grid according to the pre-stored preset range.
- Step S212 based on the stored first identity information of the legal user, search for the stored biometrics of each user in the target grid for the location information of each user terminal.
- the server searches for the user terminal in the target grid, and searches for the stored biometrics of each user corresponding to each user terminal in the target grid according to the searched user terminal.
- step S214 it is determined whether the current biometric is the biometric of the living body; if so, step S216 is executed; if not, it ends.
- the current biometrics may be judged according to a pre-stored method for judging the biometrics of the living body.
- step S216 the current biometrics of the user to be authenticated and the biometrics stored by each user found are compared one by one.
- biometrics stored by the user in the target grid has a similarity to the current biometrics greater than the preset similarity threshold, it means that there is only one biometric in the biometrics stored by the user in the target grid It can be matched with the current biological feature, and it is determined that the biological feature whose similarity is greater than the preset similarity threshold is the current biological feature.
- Step S220 if it is obtained that the similarity between a plurality of stored biometrics and the current biometric is greater than a preset similarity threshold, it is determined that the users corresponding to the stored biometrics whose respective similarities are greater than the preset similarity threshold are respectively more than Users to be authenticated.
- Step S222 re-identifying multiple users to be authenticated; wherein the identity confirmation includes confirming that the number of preset digits of the ID card and/or biometric match.
- the server sends a reminder of re-identification to the target authentication device, and the target authentication device prompts the user to be authenticated to re-identify according to the reminder sent by the server, such as prompting the user to be authenticated to enter the number and/or the number of preset digits of the ID card Mobile phone number, biometric confirmation such as iris, sclera, finger veins, palm veins, palmprints, eye patterns, ear patterns and voiceprints, etc. Confirm that the account number corresponding to the biometrics whose similarity degree is greater than the preset similarity threshold is the current account user account.
- the server sends a request to the user terminal of the current user account to obtain the user's second identity information; wherein, the user terminal has the user's second identity information, and the user's second identity information includes the user's name, user ID number and stored biometrics of the user; when the server receives the second identity information of the user sent by the user terminal of the current user account, it is determined whether the user terminal is set to allow response to the request, and the second identity information Verify the legitimacy of the server; if the user terminal allows response to the request and the second identity information is legal, the server sends the second identity information to the target authentication device and generates an identity authentication log through the server. The server sends the identity information authentication log to the user account User terminal.
- the server sends a request to obtain the second identity information of the user to the user terminal of the current user account
- the validity of the second identity information is verified by the user terminal of the current user account; if the second identity information is legal, pass
- the user terminal of the current user account sends the second identity information to the server.
- the server is also in communication connection with the identity authentication system.
- the above method further includes: registering the user terminal with the second identity information through the identity authentication system, the server receives the second identity information sent by the user terminal, and converts the The second identity information is sent to the identity authentication system; the identity verification is performed on the second identity information through the identity authentication system, and the identity verification result of the second identity information is sent to the server; if the identity verification result contains legal information of the second identity information, The server associates the user's biometrics in the second identity information with the user account, and sends the legal identity verification result of the second identity information to the user terminal; after receiving the legal identity verification result of the second identity information, the user terminal The second identity information is encrypted and the encrypted second identity information is saved to the user terminal.
- the foregoing encryption processing may be a preset encryption method, and the second identity information is encrypted according to the preset encryption method.
- Step S224 Send the authentication result to the target authentication device.
- the target authentication device allows the user to be authenticated to perform the next business operation operation; if the user to be authenticated fails to pass the authentication, the target authentication device does not allow the user to be authenticated to perform subsequent operations.
- the user before the user uses the target authentication device for identity authentication, the user needs to download the corresponding APP on the user terminal, install and open it; register with the APP and obtain the unique ID number of the user, that is, the identification information of the user terminal; Click the ID card information entry page, enter the name and ID number, etc.
- the information can be static images, on-site shooting images and on-site shooting biological characteristics; according to specific The public security department's identity authentication interface specification sends user name, ID number and personal photo image information to the identity authentication interface for identity authentication; if the authentication is passed, the above personal photo image information and the user's unique ID number are associated and saved to In the server database; send the authenticated message to the user APP, the APP encrypts the user's unique ID number, user's name, ID number, and personal photo image information, etc., and stores the encrypted encrypted information in In the storage unit of the user terminal, the storage unit may be a file, a database, a dedicated chip, etc.; the hardware ID information of the user terminal is added to the encrypted information to prevent tampering.
- the identity authentication interface adopts the identity authentication interface provided for the network ID CTID
- the user's unique CTID code can be downloaded and stored in the user terminal
- the local device uses an electronic ID eID
- the hardware information of eID can be bound and stored in the user terminal
- the user can select "authorize” or "unauthorize” in the authorization option of the APP to determine whether the user's identity information is allowed to be read; in the above process ,
- the server only stores the user's face information and the user's unique ID number, that is, the above-mentioned biological characteristics and user terminal identification information stored in the server, but does not store the user's name, ID number and other personal identification information.
- the server determines that the user account of the user to be authenticated is the identification information of the user terminal mentioned above, and sends the user account to the APP of the user terminal, requesting to obtain the user's identity information; after receiving the request, the APP of the user terminal first determines whether the user has Authorize the authority to read the identity information; then determine whether the user has perfect identity information; then determine whether the identity information stored in the user terminal is legal, including: determining whether the information has been tampered with, determining whether the user's unique ID number is consistent and consistent with Whether the hardware ID information of the user terminal is consistent. If the user has authorized the right to read the identity information and the identity information of the user terminal is legal, the APP sends the identity information of the user terminal to the server. If the above user terminal uses an electronic ID card eID, it is determined whether the hardware information that is bound to the eID is consistent.
- the server After receiving the identity information of the user terminal sent by the APP, the server first determines whether the user's unique ID number is consistent, and then determines whether the personal photo image information is consistent. For general services (for example, identity authentication for entering a residential area and queuing for numbers, etc.), the server can directly send the user's identity information to the target authentication device to complete this identity authentication and identity information acquisition operation and generate an identity authentication record At the same time, the generated identity authentication record is sent to the APP of the user terminal; for services with a higher security level (for example, identity authentication for entry and exit and ATM machine without bank card withdrawal, etc.), the server needs to perform secondary identity authentication.
- a higher security level for example, identity authentication for entry and exit and ATM machine without bank card withdrawal, etc.
- the user's name, ID number, and on-site photo taken by the self-service terminal are the above-mentioned current biometrics (the specific content is based on the identity authentication interface specification) and sent to the identity authentication interface for identity authentication. If the second identity authentication passes, then send The user's identity information is sent to the target authentication device to complete the identity authentication and identity information acquisition operation, and generates an identity authentication record and sends the generated identity authentication record to the user terminal's APP. Among them, if the identity authentication interface provided by the network ID CTID is used, and the user information contains the user’s unique CTID code, then during the second identity authentication, the user’s CTID code and the on-site photo taken by the self-service terminal are sent. The above current biometrics (the specific content is determined according to the identity authentication interface specification) to the corresponding identity authentication interface to determine whether the secondary identity authentication is passed.
- the identity information of the user to be authenticated includes the current biological characteristics of the user to be authenticated, and the current biological characteristics include the current facial characteristics
- the identification information of the target authentication device includes The account information of the target authentication device and the location information of the target authentication device, because the server authenticates the identity information of the user to be authenticated sent by the target authentication device, the identity information of the authenticated user is treated according to the grid where the location information of the target authentication device is located
- the current biometrics in the authentication considering the impact of the identification information of the target authentication device on the current biometrics authentication, effectively reduces the number of biometrics comparisons and accelerates the speed of comparison through rasterization technology, reducing the investment in hardware equipment , Effectively improving the accuracy of biometric matching and the security of identity authentication; taking into account the security and legitimacy of personal information, through the user equipment to save their personal information, and through the legal verification of identity information to prevent tampering, effective Protect personal identity information; achieve the reliability
- an embodiment of the present application provides an identity information authentication device.
- FIG. 3 for a structural block diagram of an identity information authentication device.
- the device is executed by a server, and the server and the target are respectively Authentication equipment and user terminal communication connection, the device includes the following modules:
- the receiving module 302 is configured to receive the first identity information of the user to be authenticated and the identification information of the target authentication device sent by the target authentication device; wherein the identity information of the user to be authenticated includes the current biometrics of the user to be authenticated; the current biometrics includes the current Face features; the identification information of the target authentication device includes the account information of the target authentication device and the location information of the target authentication device;
- the authentication module 304 is configured to perform legality authentication on the first identity information of the authenticated user based on the stored first identity information of the legitimate user and the identification information of the target authentication device;
- the sending module 306 is configured to send the authentication result to the target authentication device.
- the identity information of the user to be authenticated includes the current biological characteristics of the user to be authenticated, and the current biological characteristics include the current facial characteristics
- the identification information of the target authentication device includes the account number of the target authentication device Information and the location information of the target authentication device, because the server authenticates the identity information of the user to be authenticated sent by the target authentication device, it includes the authentication of the current biometrics in the identity information, and takes into account the identification information of the target authentication device.
- biometric authentication can effectively protect personal identity information, improve the security, reliability and convenience of identity authentication, and enhance user experience.
- the above-mentioned receiving module 302 is further configured to: receive the location information of the user terminal sent by the user terminal; perform dynamic rasterization processing on the location information of the user terminal to determine the grid where the location information of the user terminal is located.
- the server includes: a processor 40, a memory 41, a bus 42, and a communication interface 43.
- the processor 40 and the communication interface 43 It is connected to the memory 41 through the bus 42; the processor 40 is configured to execute an executable module stored in the memory 41, such as a computer program.
- the memory 41 may include a high-speed random access memory (RAM, Random Access Memory), or may include a non-volatile memory (non-volatile memory), such as at least one disk memory.
- RAM Random Access Memory
- non-volatile memory such as at least one disk memory.
- the communication connection between the system network element and at least one other network element is achieved through at least one communication interface 43 (which may be wired or wireless), and the Internet, wide area network, local area network, metropolitan area network, etc. may be used.
- the bus 42 may be an ISA bus, a PCI bus, an EISA bus, or the like.
- the bus can be divided into an address bus, a data bus, and a control bus. For ease of representation, only one bidirectional arrow is used in FIG. 4, but it does not mean that there is only one bus or one type of bus.
- the memory 41 is configured to store a program, and the processor 40 executes the program after receiving the execution instruction.
- the method executed by the apparatus defined by the stream process disclosed in any of the embodiments of the present application may be applied to processing
- the processor 40 may be implemented in the processor 40.
- the processor 40 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method may be completed by an integrated logic circuit of hardware in the processor 40 or instructions in the form of software.
- the processor 40 may be a general-purpose processor, including a central processor (Central Processing Unit, CPU for short) and a network processor (Network Processor, short for NP), etc.; or a digital signal processor (Digital Signal Processing, DSP for short) , Application Specific Integrated Circuit (Application Specific Integrated Circuit, referred to as ASIC), ready-made programmable gate array (Field-Programmable Gate Array, referred to as FPGA) or other programmable logic devices, discrete gate or transistor logic devices, and discrete hardware components.
- CPU Central Processing Unit
- NSP Network Processor
- DSP Digital Signal Processing
- ASIC Application Specific Integrated Circuit
- FPGA Field-Programmable Gate Array
- the methods, steps, and logical block diagrams disclosed in the embodiments of the present application may be implemented or executed.
- the general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
- the steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied and completed by a hardware decoding processor or by using a combination of hardware and software modules in the decoding processor.
- the software module may be located in a mature storage medium in the art such as a random access memory, a flash memory and/or a read-only memory, a programmable read-only memory, or an electrically erasable programmable memory and/or a register.
- the storage medium is located in the memory 41.
- the processor 40 reads the information in the memory 41 and completes the steps of the above method in combination with its hardware.
- An embodiment of the present application further provides a chip that stores a program on the chip, and when the program is executed by the processor, the steps of the method in any one of the foregoing embodiments are performed.
- the identity information authentication method, device and server program product provided by the embodiments of the present application include a chip storing a program code, and the instructions included in the program code may be configured to perform the method described in the foregoing method embodiments, specifically For implementation, refer to the method embodiment, and details are not described herein again.
- the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in one chip.
- the technical solution of the present application essentially or part of the contribution to the existing technology or part of the technical solution can be embodied in the form of a software product, which is stored in a chip and includes several instructions It is used to enable a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Power Engineering (AREA)
- Finance (AREA)
- Mathematical Physics (AREA)
- Collating Specific Patterns (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims (13)
- 一种身份信息的认证方法,其特征在于,所述方法由服务器执行,所述服务器分别与目标认证设备以及用户终端通信连接;所述方法包括:接收所述目标认证设备发送的待认证用户的第一身份信息和所述目标认证设备的标识信息;其中,所述待认证用户的第一身份信息包括所述待认证用户的当前生物特征;所述当前生物特征包括当前人脸特征;所述目标认证设备的标识信息包括所述目标认证设备的账号信息和所述目标认证设备的位置信息;基于已存储的合法用户的第一身份信息和所述目标认证设备的标识信息,对所述待认证用户的第一身份信息进行合法性认证;将认证结果发送给所述目标认证设备。
- 根据权利要求1所述的方法,其特征在于,所述接收所述目标认证设备发送的待认证用户的第一身份信息之前,所述方法还包括:接收所述用户终端发送的所述用户终端的位置信息;对所述用户终端的位置信息进行动态栅格化处理,以确定所述用户终端的位置信息所在的栅格。
- 根据权利要求2所述的方法,其特征在于,基于已存储的合法用户的第一身份信息和所述目标认证设备的标识信息,对所述待认证用户的第一身份信息进行合法性认证的步骤,包括:对所述目标认证设备的位置信息进行动态栅格化处理,以确定所述目标认证设备的位置信息所在的栅格;将所述目标认证设备的位置信息所在的栅格和距离所述目标认证设备的位置信息所在的栅格预设范围内的栅格作为目标栅格;基于已存储的合法用户的第一身份信息,查找各所述用户终端的位置信息在所述目标栅格中的各个用户已存储的生物特征;将所述待认证用户的当前生物特征和查找到的各个所述用户已存储的生物特征进行匹配,以对所述待认证用户的第一身份信息进行合法性认证。
- 根据权利要求3所述的方法,其特征在于,所述将所述待认证用户的当前生物特征和查找到的各个所述用户已存储的生物特征进行匹配的步骤包括:判断所述当前生物特征是否为活体的生物特征;如果是,将所述待认证用户的当前生物特征和查找到的各个所述用户已存储的生物特征进行一一比对;若比对得到一个所述已存储的生物特征和所述当前生物特征的相似度大于预设相似度阈值,确定所述相似度大于预设相似度阈值的已存储的生物特征对应的账号为当前用户账号;若比对得到多个所述已存储的生物特征和所述当前生物特征的相似度大于预设相似度阈值,确定各个所述相似度大于预设相似度阈值的已存储的生物特征分别对应的用户作为多个所述待认证用户;对多个所述待认证用户进行再次身份确认;其中,所述身份确认包括确认身份证预设位数的数字和/或生物识别匹配。
- 根据权利要求4所述的方法,其特征在于,所述待认证用户的用户终端包括用户账号,所述进行再次身份确认的所述待认证用户的用户账号为当前用户账号,所述方法还包括:向所述当前用户账号的用户终端发出获取用户的第二身份信息的请求;其中,所述用户终端有所述用户的第二身份信息,所述用户的第二身份信息包括用户的姓名、用户的身份证号和所述用户已存储的生物特征;当接收到所述当前用户账号的用户终端发送的所述用户的第二身份信息时,判断所述用户终端是否设置为允许响应所述请求;如果是,对所述第二身份信息的合法性进行校验;如果校验得到所述第二身份信息合法,将所述第二身份信息发送到所述目标认证设备,并生成身份认证日志;将所述身份信息认证日志发送到所述用户账号的用户终端。
- 根据权利要求5所述的方法,其特征在于,向所述当前用户账号的用户终端发出获取用户的第二身份信息的请求之后,所述方法还包括:通过所述当前用户账号的用户终端对所述第二身份信息的合法性进行校验;如果所述第二身份信息合法,通过所述当前用户账号的用户终端将所述第二身份信息发送到所述服务器。
- 根据权利要求5所述的方法,其特征在于,所述服务器还与身份认证系统通信连接,所述方法还包括:如果所述身份信息的认证为二次身份认证请求,校验所述第二身份信息合法后,将所述第二身份信息发送到所述身份认证系统;通过所述身份认证系统对所述第二身份信息进行身份核验,得到身份核验结果;通过所述身份认证系统将所述身份核验结果发送到所述服务器;如果所述身份核验结果中包含所述第二身份信息合法的信息,将所述第二身份信发送到所述目标认证设备,并生成身份信息认证日志;将所述身份认证日志发送到所述用户账号的用户终端。
- 根据权利要求5所述的方法,其特征在于,所述服务器还与身份认证系统通信连接,所述方法还包括:通过所述身份认证系统对所述用户终端进行所述第二身份信息的注册。
- 根据权利要求8所述的方法,其特征在于,所述通过所述身份认证系统对所述用户终端进行所述第二身份信息的注册的步骤,包括:接收所述用户终端发送的所述第二身份信息;将所述第二身份信息发送到所述身份认证系统;通过所述身份认证系统对所述第二身份信息进行身份核验;通过所述身份认证系统将所述第二身份信息的身份核验结果发送到所述服务器;如果所述身份核验结果中包含所述第二身份信息合法的信息,将所述第二身份信息中的所述用户已存储的生物特征与所述用户账号进行关联;将所述第二身份信息合法的身份核验结果发送到所述用户终端;所述用户终端接收到所述第二身份信息合法的身份核验结果后,将所述第二身份信息进行加密处理并将加密处理后的所述第二身份信息保存到所述用户终端。
- 一种身份信息的认证装置,其特征在于,所述装置由服务器执行,所述服务器分别与目标认证设备以及用户终端通信连接;所述装置包括:接收模块,配置成接收所述目标认证设备发送的待认证用户的第一身份信息和所述目标认证设备的标识信息;其中,所述待认证用户的第一身份信息包括所述待认证用户的当前生物特征;所述当前生物特征包括当前人脸特征;所述目标认证设备的标识信息包括所述目标认证设备的账号信息和所述目标认证设备的位置信息;认证模块,配置成基于已存储的合法用户的第一身份信息和所述目标认证设备的标识信息,对所述待认证用户的第一身份信息进行合法性认证;发送模块,配置成将认证结果发送给所述目标认证设备。
- 根据权利要求10所述的装置,其特征在于,所述接收模块配置成:接收所述用户终端发送的所述用户终端的位置信息;对所述用户终端的位置信息进行动态栅格化处理,以确定所述用户终端的位置信息所在的栅格。
- 一种服务器,其特征在于,包括处理器和存储器;所述存储器上存储有计算机程序,所述计算机程序在被所述处理器运行时执行如权利要求1至9任一项所述的方法。
- 一种芯片,所述芯片上存储有程序,其特征在于,所述程序被处理器运行时执行上述权利要求1至9任一项所述的方法的步骤。
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP19905330.7A EP3905081A4 (en) | 2018-12-26 | 2019-12-13 | METHOD AND DEVICE FOR AUTHENTICATION OF IDENTITY INFORMATION AND SERVER |
KR1020217022290A KR102596783B1 (ko) | 2018-12-26 | 2019-12-13 | 신원 정보의 인증 방법, 장치 및 서버 |
AU2019413312A AU2019413312A1 (en) | 2018-12-26 | 2019-12-13 | Method and device for authenticating identity information, and server |
CN201980086697.XA CN113424182A (zh) | 2018-12-26 | 2019-12-13 | 身份信息的认证方法、装置及服务器 |
CA3124891A CA3124891A1 (en) | 2018-12-26 | 2019-12-13 | An authenticating method for identity information, and device and server therefor |
US17/418,769 US20220078185A1 (en) | 2018-12-26 | 2019-12-13 | Method and device for authenticating identity information, and server |
JP2021531866A JP7240030B2 (ja) | 2018-12-26 | 2019-12-13 | 身元情報認証方法、装置及びサーバ |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811608040.9 | 2018-12-26 | ||
CN201811608040.9A CN109711133B (zh) | 2018-12-26 | 2018-12-26 | 身份信息的认证方法、装置及服务器 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020135114A1 true WO2020135114A1 (zh) | 2020-07-02 |
Family
ID=66258542
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/125377 WO2020135114A1 (zh) | 2018-12-26 | 2019-12-13 | 身份信息的认证方法、装置及服务器 |
Country Status (8)
Country | Link |
---|---|
US (1) | US20220078185A1 (zh) |
EP (1) | EP3905081A4 (zh) |
JP (1) | JP7240030B2 (zh) |
KR (1) | KR102596783B1 (zh) |
CN (2) | CN109711133B (zh) |
AU (1) | AU2019413312A1 (zh) |
CA (1) | CA3124891A1 (zh) |
WO (1) | WO2020135114A1 (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112820041A (zh) * | 2020-12-30 | 2021-05-18 | 深兰盛视科技(苏州)有限公司 | 自动存取款方法、装置、设备及存储介质 |
CN114844687A (zh) * | 2022-04-15 | 2022-08-02 | 深圳汇辰软件有限公司 | 一种认证方法、电子设备及存储介质 |
CN115396183A (zh) * | 2022-08-23 | 2022-11-25 | 北京百度网讯科技有限公司 | 用户身份识别方法及装置 |
CN116108413A (zh) * | 2023-02-17 | 2023-05-12 | 北京融数联智科技有限公司 | 一种基于个人隐私保护的身份认证方法、介质和设备 |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109711133B (zh) * | 2018-12-26 | 2020-05-15 | 巽腾(广东)科技有限公司 | 身份信息的认证方法、装置及服务器 |
CN110135137A (zh) * | 2019-05-08 | 2019-08-16 | 北京科蓝软件系统股份有限公司 | 一种基于移动设备的网络身份验证方法和装置 |
CN110532256A (zh) * | 2019-07-04 | 2019-12-03 | 平安科技(深圳)有限公司 | 一种账号校验方法、装置、计算机设备及存储介质 |
CN110933603B (zh) * | 2019-09-04 | 2021-08-10 | 中国银联股份有限公司 | 基于生物特征的身份认证方法及其身份认证系统 |
JP7419712B2 (ja) * | 2019-09-12 | 2024-01-23 | 富士フイルムビジネスイノベーション株式会社 | 情報処理装置およびプログラム |
CN111046366B (zh) * | 2019-12-17 | 2022-05-20 | 佳讯飞鸿(北京)智能科技研究院有限公司 | 用户身份识别方法、装置和电子设备 |
CN110942556A (zh) * | 2019-12-27 | 2020-03-31 | 合肥美的智能科技有限公司 | 无人零售终端的认证方法、服务端和客户端 |
CN111144895B (zh) | 2019-12-31 | 2023-10-31 | 中国银联股份有限公司 | 一种数据处理方法、装置与系统 |
CN111798240A (zh) * | 2020-05-13 | 2020-10-20 | 广州永惠网络科技股份有限公司 | 用户认证的绑定方法及装置 |
CN111683085B (zh) * | 2020-05-18 | 2022-12-16 | 巽腾(广东)科技有限公司 | 基于内网连接的外网身份认证方法、系统、设备和存储介质 |
CN111627450A (zh) * | 2020-07-28 | 2020-09-04 | 南京新研协同定位导航研究院有限公司 | 一种mr眼镜的延长续航系统及其续航方法 |
CN111831995A (zh) * | 2020-09-08 | 2020-10-27 | 杭州海宴科技有限公司 | 一种基于eID和人体生物信息的可信身份认证方法和系统 |
CN112632497B (zh) * | 2020-12-26 | 2023-05-12 | 深圳市八方通达科技有限公司 | 一种基于区块链的身份信息验证方法及系统 |
CN112968819B (zh) * | 2021-01-18 | 2022-07-22 | 珠海格力电器股份有限公司 | 基于tof的家电设备控制方法及装置 |
CN113177797A (zh) * | 2021-05-06 | 2021-07-27 | 巽腾(广东)科技有限公司 | 用户身份信息认证方法、系统、装置、设备及存储介质 |
CN113299296A (zh) * | 2021-05-08 | 2021-08-24 | 深圳市沃特沃德信息有限公司 | 基于声纹识别的交友方法、装置和计算机设备 |
CN113204749A (zh) * | 2021-05-12 | 2021-08-03 | 巽腾(广东)科技有限公司 | 基于时间管控的近场信息认证方法及装置 |
CN116152967A (zh) * | 2023-04-17 | 2023-05-23 | 成都赛力斯科技有限公司 | 一种车辆远程分享方法、装置、系统和电子设备 |
CN117275138A (zh) * | 2023-11-21 | 2023-12-22 | 建信金融科技有限责任公司 | 基于自动取款机的身份认证方法、装置、设备和存储介质 |
CN117633848B (zh) * | 2024-01-25 | 2024-04-12 | 中信证券股份有限公司 | 用户信息联合处理方法、装置、设备和计算机可读介质 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070136796A1 (en) * | 2005-12-13 | 2007-06-14 | Microsoft Corporation | Wireless authentication |
CN105847253A (zh) * | 2016-03-22 | 2016-08-10 | 燕南国创科技(北京)有限公司 | 用于认证的方法和设备 |
CN107079034A (zh) * | 2016-11-15 | 2017-08-18 | 深圳达闼科技控股有限公司 | 一种身份认证的方法、终端设备、认证服务器及电子设备 |
CN107147608A (zh) * | 2016-03-01 | 2017-09-08 | 阿里巴巴集团控股有限公司 | 验证方法及装置 |
CN107548059A (zh) * | 2016-06-28 | 2018-01-05 | 中兴通讯股份有限公司 | 一种认证方法及系统 |
CN108243495A (zh) * | 2016-12-23 | 2018-07-03 | 亿阳信通股份有限公司 | 一种位置指纹数据库建立方法、装置和终端定位方法 |
CN109711133A (zh) * | 2018-12-26 | 2019-05-03 | 广州市巽腾信息科技有限公司 | 身份信息的认证方法、装置及服务器 |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002140306A (ja) * | 2000-11-01 | 2002-05-17 | Matsushita Electric Ind Co Ltd | 生体情報認証ログ管理サービス提供方法及びそのシステム |
US7404086B2 (en) * | 2003-01-24 | 2008-07-22 | Ac Technology, Inc. | Method and apparatus for biometric authentication |
GB2405558B (en) * | 2003-08-29 | 2005-08-10 | Motorola Inc | Method and apparatus for enabling access in a WLAN environment |
JP2008108035A (ja) | 2006-10-25 | 2008-05-08 | Fujitsu Ltd | 生体認証のためのシステム、クライアント、サーバ、その制御方法及び制御プログラム |
US9928379B1 (en) * | 2008-09-08 | 2018-03-27 | Steven Miles Hoffer | Methods using mediation software for rapid health care support over a secured wireless network; methods of composition; and computer program products therefor |
CN103221958B (zh) * | 2010-09-24 | 2016-01-06 | 维萨国际服务协会 | 使用通用id和生物特征的方法和系统 |
CN102448061B (zh) * | 2011-11-18 | 2015-07-22 | 王黎明 | 一种基于移动终端防钓鱼攻击的方法和系统 |
US8447273B1 (en) * | 2012-01-09 | 2013-05-21 | International Business Machines Corporation | Hand-held user-aware security device |
CN103796227B (zh) * | 2012-10-31 | 2017-11-10 | 中国电信股份有限公司 | 进行无线信号覆盖分析的方法和系统 |
CN104426846A (zh) * | 2013-08-22 | 2015-03-18 | 阿里巴巴集团控股有限公司 | 业务安全性验证方法和装置 |
CN103685311B (zh) * | 2013-12-27 | 2017-06-13 | 网易(杭州)网络有限公司 | 一种登录验证方法及设备 |
JP6415607B2 (ja) * | 2014-06-03 | 2018-10-31 | エレメント,インク. | モバイル・デバイスに関連する出退認証および管理 |
JP6208104B2 (ja) * | 2014-09-16 | 2017-10-04 | 株式会社日立製作所 | 生体認証システム、生体認証処理装置、生体認証方法、生体情報取得端末および情報端末 |
CN105577618A (zh) * | 2014-10-15 | 2016-05-11 | 中兴通讯股份有限公司 | 认证方法及装置 |
KR20160072682A (ko) * | 2014-12-15 | 2016-06-23 | 삼성전자주식회사 | 생체 정보를 이용한 인증 방법 및 이를 위한 전자 장치 |
US11354651B2 (en) * | 2015-01-19 | 2022-06-07 | Royal Bank Of Canada | System and method for location-based token transaction processing |
US20160307186A1 (en) * | 2015-04-20 | 2016-10-20 | Mastercard International Incorporated | Verification of contactless payment card for provisioning of payment credentials to mobile device |
CN108369620A (zh) * | 2015-08-20 | 2018-08-03 | 艾佛伦美国公司 | 用于基于地理位置的电子安全管理的方法和装置 |
JP2017102842A (ja) | 2015-12-04 | 2017-06-08 | 大日本印刷株式会社 | 本人認証システム、本人認証用情報出力システム、認証サーバー、本人認証方法、本人認証用情報出力方法及びプログラム |
US11227277B2 (en) * | 2015-12-22 | 2022-01-18 | Intel Corporation | Facilitating smart geo-fencing-based payment transactions |
US20180060092A1 (en) * | 2016-08-31 | 2018-03-01 | Microsoft Technology Licensing, Llc | Group Data and Priority in an Individual Desktop |
US10587616B2 (en) * | 2016-09-16 | 2020-03-10 | Google Llc | Methods, systems, and media for authentication of user devices to a display device |
US11068567B2 (en) * | 2017-06-04 | 2021-07-20 | Harsha Ramalingam | Self-owned authentication and identity framework |
-
2018
- 2018-12-26 CN CN201811608040.9A patent/CN109711133B/zh active Active
-
2019
- 2019-12-13 WO PCT/CN2019/125377 patent/WO2020135114A1/zh unknown
- 2019-12-13 US US17/418,769 patent/US20220078185A1/en active Pending
- 2019-12-13 KR KR1020217022290A patent/KR102596783B1/ko active IP Right Grant
- 2019-12-13 AU AU2019413312A patent/AU2019413312A1/en not_active Abandoned
- 2019-12-13 CA CA3124891A patent/CA3124891A1/en active Pending
- 2019-12-13 JP JP2021531866A patent/JP7240030B2/ja active Active
- 2019-12-13 EP EP19905330.7A patent/EP3905081A4/en active Pending
- 2019-12-13 CN CN201980086697.XA patent/CN113424182A/zh active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070136796A1 (en) * | 2005-12-13 | 2007-06-14 | Microsoft Corporation | Wireless authentication |
CN107147608A (zh) * | 2016-03-01 | 2017-09-08 | 阿里巴巴集团控股有限公司 | 验证方法及装置 |
CN105847253A (zh) * | 2016-03-22 | 2016-08-10 | 燕南国创科技(北京)有限公司 | 用于认证的方法和设备 |
CN107548059A (zh) * | 2016-06-28 | 2018-01-05 | 中兴通讯股份有限公司 | 一种认证方法及系统 |
CN107079034A (zh) * | 2016-11-15 | 2017-08-18 | 深圳达闼科技控股有限公司 | 一种身份认证的方法、终端设备、认证服务器及电子设备 |
CN108243495A (zh) * | 2016-12-23 | 2018-07-03 | 亿阳信通股份有限公司 | 一种位置指纹数据库建立方法、装置和终端定位方法 |
CN109711133A (zh) * | 2018-12-26 | 2019-05-03 | 广州市巽腾信息科技有限公司 | 身份信息的认证方法、装置及服务器 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3905081A4 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112820041A (zh) * | 2020-12-30 | 2021-05-18 | 深兰盛视科技(苏州)有限公司 | 自动存取款方法、装置、设备及存储介质 |
CN114844687A (zh) * | 2022-04-15 | 2022-08-02 | 深圳汇辰软件有限公司 | 一种认证方法、电子设备及存储介质 |
CN115396183A (zh) * | 2022-08-23 | 2022-11-25 | 北京百度网讯科技有限公司 | 用户身份识别方法及装置 |
CN115396183B (zh) * | 2022-08-23 | 2023-08-11 | 北京百度网讯科技有限公司 | 用户身份识别方法及装置 |
CN116108413A (zh) * | 2023-02-17 | 2023-05-12 | 北京融数联智科技有限公司 | 一种基于个人隐私保护的身份认证方法、介质和设备 |
Also Published As
Publication number | Publication date |
---|---|
EP3905081A1 (en) | 2021-11-03 |
CN109711133B (zh) | 2020-05-15 |
EP3905081A4 (en) | 2022-09-14 |
CA3124891A1 (en) | 2020-07-02 |
JP7240030B2 (ja) | 2023-03-15 |
JP2022512123A (ja) | 2022-02-02 |
US20220078185A1 (en) | 2022-03-10 |
KR102596783B1 (ko) | 2023-11-01 |
CN113424182A (zh) | 2021-09-21 |
CN109711133A (zh) | 2019-05-03 |
KR20210103517A (ko) | 2021-08-23 |
AU2019413312A1 (en) | 2021-07-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020135114A1 (zh) | 身份信息的认证方法、装置及服务器 | |
AU2019415474B2 (en) | Fixed-point authorization identity recognition method and apparatus, and server | |
US11847199B2 (en) | Remote usage of locally stored biometric authentication data | |
CN109389723B (zh) | 利用人脸识别的访客管理方法、装置、计算机设备 | |
KR20160144419A (ko) | 신원들을 검증하기 위한 방법 및 시스템 | |
US11496471B2 (en) | Mobile enrollment using a known biometric | |
EP3905174A1 (en) | Method and device for authenticating near-field information, electronic apparatus, and computer storage medium | |
US20180082220A1 (en) | System and method for biometric verification of ticket users | |
US20230409681A1 (en) | Enabling a password-based mode of authentication through a non-digital authentication channel | |
US20230412587A1 (en) | Disabling a password-based mode of authentication and enabling a password-less mode of authentication | |
CN109584132A (zh) | 一种证件链电子居住证系统 | |
RU2799096C2 (ru) | Способ и устройство для аутентификации личной информации и сервер | |
KR100614080B1 (ko) | 네트워크를 통한 생체 인식 결제 시스템 및 그 방법 | |
US20210365945A1 (en) | Automatic User Identification and Authentication System | |
TWM590332U (zh) | 身分認證系統 | |
RU2021122112A (ru) | Способ и устройство для аутентификации личной информации и сервер | |
KR20130131752A (ko) | 홍채인증 및 증강현실을 이용한 클라우드 컴퓨팅 환경의 모바일 사용자 인증 보안 시스템 및 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19905330 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2021531866 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 3124891 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20217022290 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2019413312 Country of ref document: AU Date of ref document: 20191213 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2019905330 Country of ref document: EP Effective date: 20210726 |