WO2022037405A1 - 信息验证的方法、电子设备及计算机可读存储介质 - Google Patents
信息验证的方法、电子设备及计算机可读存储介质 Download PDFInfo
- Publication number
- WO2022037405A1 WO2022037405A1 PCT/CN2021/110320 CN2021110320W WO2022037405A1 WO 2022037405 A1 WO2022037405 A1 WO 2022037405A1 CN 2021110320 W CN2021110320 W CN 2021110320W WO 2022037405 A1 WO2022037405 A1 WO 2022037405A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- ciphertext
- authentication information
- sub
- identity authentication
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Definitions
- the present invention relates to the field of computer technology, and in particular, to an information verification method, an electronic device and a computer-readable storage medium.
- devices in the same wireless network or devices under the same account are often considered to be credible, and further, the terminal device recommends the device list under the same wireless network or the device list under the same account to the user to Allows the user to select a device in a list to interact with.
- the terminal device recommends the device list under the same wireless network or the device list under the same account to the user to Allows the user to select a device in a list to interact with.
- only determining trusted devices based on network conditions or account information between devices cannot guarantee the security of device data.
- the present technology provides a method for determining a device belonging to the same user as a trusted device through device data, and the method can ensure the security of device communication.
- Embodiments of the present invention provide an information verification method, an electronic device, and a computer-readable storage medium.
- the second device is determined to be a trusted device of the first device.
- the method does not require complicated user operations, has high efficiency, and can ensure the security of device communication.
- an embodiment of the present invention provides a method for information verification, which is applied to a first device, and the method includes:
- the first device encrypts the identity authentication information of the first user through an encryption algorithm to obtain a first ciphertext, and the first user is a user who uses the first device;
- the first device receives a second ciphertext, where the second ciphertext is the ciphertext obtained by encrypting the identity authentication information of the second user by the encryption algorithm;
- the first device determines that the second device is a valid device of the first device. letter equipment.
- the identity authentication information is strong identity authentication information
- the strong identity authentication information is at least one of a fingerprint, a face feature, an account and password of an application program, and an unlocking password.
- the second device is a trusted device of the first device.
- the identity authentication information includes N pieces of authentication information
- the first device encrypts the identity authentication information of the first user through an encryption algorithm to obtain the first ciphertext, including:
- the first device encrypts the N pieces of authentication information respectively through the encryption algorithm to obtain N sub-ciphertexts, the first ciphertext includes the N sub-ciphertexts; the second ciphertext includes M sub-ciphertexts , the M sub-ciphertexts are the ciphertexts obtained by encrypting the M authentication information of the second user through the encryption algorithm respectively;
- the method further includes: the first device identifies the first user and the sub-ciphertext obtained by encrypting the target authentication information of the first user and the sub-ciphertext obtained by encrypting the target authentication information of the second user. Whether the second user is the same user, wherein the target authentication information is the same authentication information among the N pieces of authentication information and the M pieces of authentication information.
- the second ciphertext further includes keywords respectively corresponding to the M sub-ciphertexts, where the keywords are used to indicate authentication information corresponding to the sub-ciphertexts.
- the first device identifies the first device according to the sub-ciphertext obtained by encrypting the target authentication information of the first user and the sub-ciphertext obtained by encrypting the target authentication information of the second user. Whether the user and the second user are the same user, including:
- the target authentication information is strong authentication information
- the first sub-ciphertext and the second sub-ciphertext are compared, and the first sub-ciphertext is encrypted for the target authentication information of the first user among the N sub-ciphertexts
- the obtained sub-ciphertext, the second sub-ciphertext is the sub-ciphertext obtained by encrypting the target authentication information of the second user in the M sub-ciphertexts;
- the first sub-ciphertext is consistent with the second sub-ciphertext, it is determined that the first user and the second user are the same user.
- the first device identifies the first device according to the sub-ciphertext obtained by encrypting the target authentication information of the first user and the sub-ciphertext obtained by encrypting the target authentication information of the second user. Whether the user and the second user are the same user, including:
- the target authentication information is weak authentication information
- compare the sub-ciphertext obtained by encrypting the target authentication information of the first user with the sub-ciphertext obtained by encrypting the target authentication information of the second user, and the target authentication information Include multiple authentication information;
- the first user is determined when the sub-ciphertexts obtained by respectively encrypting the plurality of authentication information of the first user are consistent with the sub-ciphertexts obtained by encrypting the plurality of authentication information of the second user respectively is the same user as the second user.
- the method further includes:
- the first device encrypts the resident location information of the first device through the encryption algorithm to obtain a first environment ciphertext
- the first device receives the second environment ciphertext of the second device, where the second environment ciphertext is the ciphertext obtained by encrypting the resident location information of the second device through the encryption algorithm;
- the first device determines that the second device is a valid device of the first device.
- letter equipment including:
- the first device When the first device recognizes that the first user and the second user are the same user according to the first ciphertext and the second ciphertext, compares the first environment ciphertext and the second environment ciphertext;
- the second device is a trusted device of the first device.
- the method further includes:
- the first device inputs the user data of the first user into a data learning model to obtain the identity authentication information of the first user, and the data learning model is used to identify the identity of the user according to the input user data of the user Certification Information.
- an embodiment of the present invention provides a method for information verification, which is applied to a second device, and the method includes:
- the second device establishes a short-range communication connection with the first device
- the second device encrypts the identity authentication information of the second user through an encryption algorithm according to the verification request to obtain a second ciphertext, where the second user is a user who uses the second device;
- the second device sends the second ciphertext to the first device, so that the first device recognizes the first ciphertext according to the first ciphertext and the second ciphertext after receiving the second ciphertext
- the first device recognizes the first ciphertext according to the first ciphertext and the second ciphertext after receiving the second ciphertext
- the identity authentication information includes at least two different identity authentication information
- the second device encrypts the identity authentication information of the second user through an encryption algorithm to obtain a second ciphertext, include:
- the second device encrypts each of the at least two different identity authentication information by using the encryption algorithm to obtain at least two sub-ciphertexts, and the first ciphertext includes the at least two sub-ciphertexts. ciphertext.
- the second ciphertext further includes keywords respectively corresponding to the M sub-ciphertexts, where the keywords are used to indicate authentication information corresponding to the sub-ciphertexts.
- the method further includes:
- the second device encrypts the resident location information of the second user through an encryption algorithm to obtain a second environment ciphertext
- the user compares the first environment ciphertext with the second environment ciphertext when the first environment ciphertext and the second environment ciphertext are consistent, determine that the second device is the first device of trusted devices.
- an embodiment of the present invention provides a first device, including: a processor, a memory, and a communication interface, the memory, the processor and the communication interface are coupled, and the memory is used for storing computer program codes,
- the computer program code includes computer instructions, and the processor is configured to invoke the computer instructions to execute:
- the first device establishes a short-range communication connection with the second device through the communication interface
- the first device encrypts the identity authentication information of the first user through an encryption algorithm to obtain a first ciphertext, and the first user is a user who uses the first device;
- the first device receives a second ciphertext through the communication interface, where the second ciphertext is the ciphertext obtained by encrypting the identity authentication information of the second user through the encryption algorithm;
- the first device determines that the second device is a valid device of the first device. letter equipment.
- the identity authentication information is strong identity authentication information
- the strong identity authentication information is at least one of a fingerprint, a face feature, an account and password of an application program, and an unlocking password
- the processing When the first device identifies that the first user and the second user are the same user according to the first ciphertext and the second ciphertext, the controller executes the first device to determine that the second device is the first device of trusted devices, including:
- the second device is a trusted device of the first device.
- the identity authentication information includes N pieces of authentication information
- the processor executes the first device to encrypt the identity authentication information of the first user through an encryption algorithm to obtain the first ciphertext, including :
- the first device encrypts the N pieces of authentication information respectively through the encryption algorithm to obtain N sub-ciphertexts, the first ciphertext includes the N sub-ciphertexts; the second ciphertext includes M sub-ciphertexts , the M sub-ciphertexts are the ciphertexts obtained by encrypting the M authentication information of the second user through the encryption algorithm respectively;
- the method further includes: the first device identifies the first user and the sub-ciphertext obtained by encrypting the target authentication information of the first user and the sub-ciphertext obtained by encrypting the target authentication information of the second user. Whether the second user is the same user, wherein the target authentication information is the same authentication information among the N pieces of authentication information and the M pieces of authentication information.
- the second ciphertext further includes keywords respectively corresponding to the M sub-ciphertexts, where the keywords are used to indicate authentication information corresponding to the sub-ciphertexts.
- the processor executes the sub-ciphertext encrypted by the first device according to the target authentication information of the first user and the sub-ciphertext encrypted by the target authentication information of the second user Identifying whether the first user and the second user are the same user, including:
- the target authentication information is strong authentication information
- the first sub-ciphertext and the second sub-ciphertext are compared, and the first sub-ciphertext is encrypted for the target authentication information of the first user among the N sub-ciphertexts
- the obtained sub-ciphertext, the second sub-ciphertext is the sub-ciphertext obtained by encrypting the target authentication information of the second user in the M sub-ciphertexts;
- the first sub-ciphertext is consistent with the second sub-ciphertext, it is determined that the first user and the second user are the same user.
- the processor executes the sub-ciphertext encrypted by the first device according to the target authentication information of the first user and the sub-ciphertext encrypted by the target authentication information of the second user Identifying whether the first user and the second user are the same user, including:
- the target authentication information is weak authentication information
- compare the sub-ciphertext obtained by encrypting the target authentication information of the first user with the sub-ciphertext obtained by encrypting the target authentication information of the second user, and the target authentication information Include multiple authentication information;
- the first user is determined when the sub-ciphertexts obtained by respectively encrypting the plurality of authentication information of the first user are consistent with the sub-ciphertexts obtained by encrypting the plurality of authentication information of the second user respectively is the same user as the second user.
- the method further includes:
- the first device encrypts the resident location information of the first device through the encryption algorithm to obtain a first environment ciphertext
- the first device receives the second environment ciphertext of the second device, where the second environment ciphertext is the ciphertext obtained by encrypting the resident location information of the second device through the encryption algorithm;
- the first device determines that the second device is a valid device of the first device.
- letter equipment including:
- the first device When the first device recognizes that the first user and the second user are the same user according to the first ciphertext and the second ciphertext, compares the first environment ciphertext and the second environment ciphertext;
- the second device is a trusted device of the first device.
- the method further includes:
- the first device inputs the user data of the first user into a data learning model to obtain the identity authentication information of the first user, and the data learning model is used to identify the identity of the user according to the input user data of the user Certification Information.
- an embodiment of the present invention provides a second device, including: a processor, a memory, and a communication interface, the memory, the processor and the communication interface are coupled, and the memory is used for storing computer program codes,
- the computer program code includes computer instructions, and the processor is configured to invoke the computer instructions to execute:
- the second device establishes a short-range communication connection with the first device through the communication interface
- the second device encrypts the identity authentication information of the second user through an encryption algorithm according to the verification request to obtain a second ciphertext, where the second user is a user who uses the second device;
- the second device sends the second ciphertext to the first device through the communication interface, so that the first device receives the second ciphertext according to the first ciphertext and the second ciphertext
- the first device receives the second ciphertext according to the first ciphertext and the second ciphertext
- the ciphertext obtained by encrypting the information through the encryption algorithm.
- the identity authentication information includes at least two different identity authentication information
- the processor executes the second device to encrypt the identity authentication information of the second user through an encryption algorithm, and obtains The second ciphertext, including:
- the second device encrypts each of the at least two different identity authentication information by using the encryption algorithm to obtain at least two sub-ciphertexts, and the first ciphertext includes the at least two sub-ciphertexts. ciphertext.
- the second ciphertext further includes keywords respectively corresponding to the M sub-ciphertexts, where the keywords are used to indicate authentication information corresponding to the sub-ciphertexts.
- the method further includes:
- the second device encrypts the resident location information of the second user through an encryption algorithm to obtain a second environment ciphertext
- the user compares the first environment ciphertext with the second environment ciphertext when the first environment ciphertext and the second environment ciphertext are consistent, determine that the second device is the first device of trusted devices.
- an embodiment of the present application provides a chip, where the chip is applied to a first device, the chip includes one or more processors, and the processors are configured to invoke computer instructions to cause the first device to execute A method as described in the first aspect and any possible implementation manner of the first aspect.
- an embodiment of the present application provides a chip, where the chip is applied to a second device, the chip includes one or more processors, and the processors are configured to invoke computer instructions to cause the second device to execute A method as described in the second aspect and any possible implementation of the second aspect.
- an embodiment of the present application provides a computer program product containing instructions, when the computer program product is run on a first device, the first device is made to execute any of the first aspect and the first aspect. Implement the method described by the method.
- an embodiment of the present application provides a computer program product containing instructions, when the computer program product is run on a second device, the second device is made to execute any of the second aspect and the second aspect. Implement the method described by the method.
- an embodiment of the present application provides a computer-readable storage medium, including instructions, when the above-mentioned instructions are executed on a first device, the above-mentioned first device is made to execute any of the first aspect and the first aspect. Implement the method described by the method.
- an embodiment of the present application provides a computer-readable storage medium, including instructions, when the above-mentioned instructions are executed on a second device, the above-mentioned second device is made to execute any of the second aspect and the second aspect. Implement the method described by the method.
- the first device provided by the third aspect the second device provided by the fourth aspect, the chip provided by the fifth aspect and the sixth aspect, the computer program product provided by the seventh aspect and the eighth aspect, and the ninth aspect
- Both the computer storage medium provided in the tenth aspect and the tenth aspect are used to execute the method provided by the embodiments of the present application.
- the first device establishes a short-range communication connection with the second device, and then the first device encrypts the identity authentication information of the first user through an encryption algorithm to obtain a first ciphertext, wherein the first ciphertext is A user is a user using the first device, the first device sends a verification request to the second device, and the verification request is used to request the second device for the identity authentication information of the second user, after that, the first device receives the second ciphertext, the first device
- the second ciphertext is the ciphertext obtained by encrypting the identity authentication information of the second user through an encryption algorithm.
- the second device is a trusted device of the first device.
- the present invention can determine that the second device is a trusted device of the first device when identifying the user corresponding to the first device and the second device as one user by comparing the identity authentication information of the users corresponding to the first device and the second device , which can ensure the security of device communication.
- FIG. 1 is a schematic diagram of the architecture of an information verification system disclosed in an embodiment of the present invention.
- FIG. 2 is a schematic diagram of the architecture of another information verification system disclosed in an embodiment of the present invention.
- FIG. 3 is a schematic diagram of a hardware structure of a terminal disclosed in an embodiment of the present invention.
- FIG. 4 is a schematic flowchart of a method for information verification disclosed in an embodiment of the present invention.
- FIG. 5 is a schematic diagram of an application interface provided by an embodiment of the present application.
- FIG. 6 is a schematic flowchart of determining a trusted device disclosed in an embodiment of the present invention.
- FIG. 7 is a schematic diagram of obtaining verification data disclosed in an embodiment of the present invention.
- FIG. 8 is an interface diagram of a trusted device list disclosed in an embodiment of the present application.
- FIG. 10 is a schematic diagram of a hardware structure of a second device disclosed in an embodiment of the present invention.
- the embodiments of the present invention disclose an information verification method, an electronic device and a computer-readable storage medium.
- the first device establishes a short-range communication connection with the second device, and further, the first device encrypts the identity authentication information of the first user through an encryption algorithm to obtain a first ciphertext, wherein the first user uses the first ciphertext.
- a user of a device the first device sends a verification request to the second device, and the verification request is used to request the second device for the identity authentication information of the second user, and then the first device receives the second ciphertext, and the second ciphertext is the first ciphertext.
- the cipher text obtained by encrypting the identity authentication information of the two users through an encryption algorithm.
- the first device identifies that the first user and the second user are the same user according to the first cipher text and the second cipher text, it determines that the second device is the same user. Trusted devices of the first device.
- the second device by comparing the identity authentication information of the user corresponding to the first device and the second device, when identifying the user corresponding to the first device and the second device as one user, determine that the second device is the first device.
- a trusted device for a device by comparing the identity authentication information of the user corresponding to the first device and the second device, when identifying the user corresponding to the first device and the second device as one user, determine that the second device is the first device.
- FIG. 1 is a schematic structural diagram of an information verification system disclosed in an embodiment of the present invention.
- the system architecture includes a first device 100 and a second device 200, wherein the first device 100 is a terminal with the function of receiving user instructions.
- the first device 100 may be a smartphone
- the second device 200 is a terminal that can interact with the first device.
- the second device 200 may be a TV, a tablet computer, a computer, or a speaker.
- the first device 100 can receive an instruction input by the user, and establish a short-range communication connection with the second device 200. After that, the first device 100 sends an authentication request to the second device 200, so that the second device 200 can send an authentication request to the second device 200.
- the first device 100 sends the verification data of the second user, where the second user is the user of the second device 200 .
- the first device 100 acquires verification data of the first user, where the first user is a user of the first device 100, and the verification data includes identity authentication information.
- the second device 200 is determined to be a trusted device of the first device 100 .
- FIG. 3 is a schematic structural diagram of another information verification system disclosed in an embodiment of the present invention.
- the system architecture includes a first device 100 and a plurality of second devices 200, wherein the first device 100 is a terminal with the function of receiving user instructions, for example, the first device 100 may be a smartphone, and the first device 100 may be a
- the second device 200 is a terminal that can interact with the first device.
- the second device 200 may be a TV, a tablet computer, a computer, or a speaker.
- the first device 100 can receive an instruction input by the user, and establish a short-range communication connection with a plurality of second devices 200 at the same time.
- the first device 100 is respectively established with a TV, a tablet computer, a computer and a speaker.
- the short-range communication connection and further, send verification requests to the TV, tablet, computer and speaker respectively, so that the TV, tablet, computer and speaker send verification data, such as identity authentication information, to the first device 100 respectively.
- the first device 100 can determine the first device among the TV, tablet, computer, and speaker by comparing the verification data of the user corresponding to the first device and the user corresponding to the TV, tablet, computer, and speaker. of trusted devices.
- the trusted device may be displayed to the user. For example, after the first device 100 determines that the tablet computer and the TV are the trusted devices of the first device 100, the first device 100 may provide the user with A list of trusted devices on which the tablet computer and the TV are displayed, and further, settings for connecting with trusted devices may be provided, so that the user may select trusted devices in the list of trusted devices for secure communication connection.
- first device and the second device shown in FIG. 1 and FIG. 3 are not limited to include only the terminals shown in the figures, but may also include other devices not shown in the figures. List them one by one. It should be noted that the system architecture shown in FIG. 1 and FIG. 3 does not constitute a limitation on the system architecture of information verification.
- FIG. 3 is a schematic diagram of a hardware structure of a terminal disclosed in an embodiment of the present invention.
- the terminal may be the first device or the second device in the above-mentioned FIG. 1 or FIG. 2 .
- the terminal may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile Communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone jack 170D, sensor module 180, buttons 190, motor 191, indicator 192, camera 193, display screen 194, and user identification Module (subscriber identification module, SIM) card interface 195 and so on.
- SIM subscriber identification module
- the sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and ambient light. Sensor 180L, bone conduction sensor 180M, etc.
- the terminal may include more or less components than shown, or some components may be combined, or some components may be separated, or different components may be arranged.
- the illustrated components may be implemented in hardware, software, or a combination of software and hardware.
- the processor 110 may include one or more processing units, for example, the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), controller, memory, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural-network processing unit (NPU) Wait. Wherein, different processing units may be independent devices, or may be integrated in one or more processors.
- the first device may process the verification data through the processor 110. For example, the first device compares the identity authentication information of the first user and the second user through the processor 110, thereby identifying the first user and the second user.
- the second device is a trusted device of the first device, wherein the first user is a user who uses the first device, and the second user is a trusted device of the first device. For users using a second device.
- the controller can be the nerve center and command center of the terminal.
- the controller can generate an operation control signal according to the instruction operation code and timing signal, and complete the control of fetching and executing instructions.
- a memory may also be provided in the processor 110 for storing instructions and data.
- the memory in processor 110 is cache memory. This memory may hold instructions or data that have just been used or recycled by the processor 110 . If the processor 110 needs to use the instruction or data again, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby increasing the efficiency of the system.
- the processor 110 may include one or more interfaces.
- the interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous transceiver (universal asynchronous transmitter) receiver/transmitter, UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, subscriber identity module (SIM) interface, and / or universal serial bus (universal serial bus, USB) interface, etc.
- I2C integrated circuit
- I2S integrated circuit built-in audio
- PCM pulse code modulation
- PCM pulse code modulation
- UART universal asynchronous transceiver
- MIPI mobile industry processor interface
- GPIO general-purpose input/output
- SIM subscriber identity module
- USB universal serial bus
- the I2C interface is a bidirectional synchronous serial bus that includes a serial data line (SDA) and a serial clock line (SCL).
- the processor 110 may contain multiple sets of I2C buses.
- the processor 110 can be respectively coupled to the touch sensor 180K, the charger, the flash, the camera 193 and the like through different I2C bus interfaces.
- the processor 110 can couple the touch sensor 180K through the I2C interface, so that the processor 110 and the touch sensor 180K communicate with each other through the I2C bus interface, so as to realize the touch function of the terminal.
- the I2S interface can be used for audio communication.
- the processor 110 may contain multiple sets of I2S buses.
- the processor 110 may be coupled with the audio module 170 through an I2S bus to implement communication between the processor 110 and the audio module 170 .
- the audio module 170 can transmit audio signals to the wireless communication module 160 through the I2S interface, so as to realize the function of answering calls through a Bluetooth headset.
- the PCM interface can also be used for audio communications, sampling, quantizing and encoding analog signals.
- the audio module 170 and the wireless communication module 160 may be coupled through a PCM bus interface.
- the audio module 170 can also transmit audio signals to the wireless communication module 160 through the PCM interface, so as to realize the function of answering calls through the Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.
- the UART interface is a universal serial data bus used for asynchronous communication.
- the bus may be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication.
- a UART interface is typically used to connect the processor 110 with the wireless communication module 160 .
- the processor 110 communicates with the Bluetooth module in the wireless communication module 160 through the UART interface to implement the Bluetooth function.
- the audio module 170 can transmit audio signals to the wireless communication module 160 through the UART interface, so as to realize the function of playing music through the Bluetooth headset.
- the MIPI interface can be used to connect the processor 110 with peripheral devices such as the display screen 194 and the camera 193 .
- MIPI interfaces include camera serial interface (CSI), display serial interface (DSI), etc.
- the processor 110 communicates with the camera 193 through a CSI interface to implement the shooting function of the terminal.
- the processor 110 communicates with the display screen 194 through the DSI interface to realize the display function of the terminal.
- the GPIO interface can be configured by software.
- the GPIO interface can be configured as a control signal or as a data signal.
- the GPIO interface may be used to connect the processor 110 with the camera 193, the display screen 194, the wireless communication module 160, the audio module 170, the sensor module 180, and the like.
- the GPIO interface can also be configured as I2C interface, I2S interface, UART interface, MIPI interface, etc.
- the USB interface 130 is an interface that conforms to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, and the like.
- the USB interface 130 can be used to connect a charger to charge the terminal, and can also be used to transmit data between the terminal and peripheral devices. It can also be used to connect headphones to play audio through the headphones. This interface can also be used to connect other terminals, such as AR devices, etc.
- the interface connection relationship between the modules illustrated in the embodiments of the present invention is only a schematic illustration, and does not constitute a limitation on the structure of the terminal.
- the terminal may also adopt different interface connection manners in the foregoing embodiments, or a combination of multiple interface connection manners.
- the charging management module 140 is used to receive charging input from the charger.
- the charger may be a wireless charger or a wired charger.
- the charging management module 140 may receive charging input from the wired charger through the USB interface 130 .
- the charging management module 140 may receive wireless charging input through a wireless charging coil of the terminal. While the charging management module 140 charges the battery 142 , it can also supply power to the terminal through the power management module 141 .
- the power management module 141 is used for connecting the battery 142 , the charging management module 140 and the processor 110 .
- the power management module 141 receives input from the battery 142 and/or the charging management module 140 and supplies power to the processor 110 , the internal memory 121 , the external memory, the display screen 194 , the camera 193 , and the wireless communication module 160 .
- the power management module 141 can also be used to monitor parameters such as battery capacity, battery cycle times, battery health status (leakage, impedance).
- the power management module 141 may also be provided in the processor 110 .
- the power management module 141 and the charging management module 140 may also be provided in the same device.
- the wireless communication function of the terminal may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modulation and demodulation processor, the baseband processor, and the like.
- Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
- Each antenna in the terminal can be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
- the antenna 1 can be multiplexed as a diversity antenna of the wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
- the mobile communication module 150 may provide a wireless communication solution including 2G/3G/4G/5G etc. applied on the terminal.
- the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (LNA) and the like.
- the mobile communication module 150 can receive electromagnetic waves from the antenna 1, filter and amplify the received electromagnetic waves, and transmit them to the modulation and demodulation processor for demodulation.
- the mobile communication module 150 can also amplify the signal modulated by the modulation and demodulation processor, and then turn it into an electromagnetic wave for radiation through the antenna 1 .
- at least part of the functional modules of the mobile communication module 150 may be provided in the processor 110 .
- at least part of the functional modules of the mobile communication module 150 may be provided in the same device as at least part of the modules of the processor 110 .
- the modem processor may include a modulator and a demodulator.
- the modulator is used to modulate the low frequency baseband signal to be sent into a medium and high frequency signal.
- the demodulator is used to demodulate the received electromagnetic wave signal into a low frequency baseband signal. Then the demodulator transmits the demodulated low-frequency baseband signal to the baseband processor for processing.
- the low frequency baseband signal is processed by the baseband processor and passed to the application processor.
- the application processor outputs sound signals through audio devices (not limited to the speaker 170A, the receiver 170B, etc.), or displays images or videos through the display screen 194 .
- the modem processor may be a stand-alone device.
- the modem processor may be independent of the processor 110, and may be provided in the same device as the mobile communication module 150 or other functional modules.
- the wireless communication module 160 can provide applications on the terminal including wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) networks), bluetooth (BT), global navigation satellite system ( global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field communication technology (near field communication, NFC), infrared technology (infrared, IR) and other wireless communication solutions.
- WLAN wireless local area networks
- BT wireless fidelity
- GNSS global navigation satellite system
- frequency modulation frequency modulation, FM
- NFC near field communication technology
- infrared technology infrared, IR
- the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
- the wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 .
- the wireless communication module 160 can also receive the signal to be sent from the processor 110 , perform frequency modulation on it, amplify it, and convert it into electromagnetic waves for radiation through the antenna 2 .
- the wireless communication module 160 is used to realize the interaction between the first device and the second device.
- the first device has a wireless communication module, and the first device sends a verification request to the second device through the module, and receives the second device. Authentication data sent by the device.
- the antenna 1 of the terminal is coupled with the mobile communication module 150, and the antenna 2 is coupled with the wireless communication module 160, so that the terminal can communicate with the network and other devices through wireless communication technology.
- the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code Division Multiple Access (WCDMA), Time Division Code Division Multiple Access (TD-SCDMA), Long Term Evolution (LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc.
- the GNSS may include global positioning system (global positioning system, GPS), global navigation satellite system (global navigation satellite system, GLONASS), Beidou navigation satellite system (beidou navigation satellite system, BDS), quasi-zenith satellite system (quasi -zenith satellite system, QZSS) and/or satellite based augmentation systems (SBAS).
- global positioning system global positioning system, GPS
- global navigation satellite system global navigation satellite system, GLONASS
- Beidou navigation satellite system beidou navigation satellite system, BDS
- quasi-zenith satellite system quadsi -zenith satellite system, QZSS
- SBAS satellite based augmentation systems
- the terminal implements the display function through the GPU, the display screen 194, and the application processor.
- the GPU is a microprocessor for image processing, and is connected to the display screen 194 and the application processor.
- the GPU is used to perform mathematical and geometric calculations for graphics rendering.
- Processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
- Display screen 194 is used to display images, videos, and the like.
- Display screen 194 includes a display panel.
- the display panel can be a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode or an active-matrix organic light-emitting diode (active-matrix organic light).
- LED diode AMOLED
- flexible light-emitting diode flexible light-emitting diode (flex light-emitting diode, FLED), Miniled, MicroLed, Micro-oLed, quantum dot light-emitting diode (quantum dot light emitting diodes, QLED) and so on.
- the terminal may include 1 or N display screens 194, where N is a positive integer greater than 1.
- the terminal can realize the acquisition function through ISP, camera 193, video codec, GPU, display screen 194 and application processor.
- the ISP is used to process the data fed back by the camera 193 .
- the shutter is opened, the light is transmitted to the camera photosensitive element through the lens, the light signal is converted into an electrical signal, and the camera photosensitive element transmits the electrical signal to the ISP for processing, and converts it into an image or video visible to the naked eye.
- ISP can also perform algorithm optimization on image noise, brightness, and skin tone.
- ISP can also optimize the exposure, color temperature and other parameters of the shooting scene.
- the ISP may be provided in the camera 193 .
- Camera 193 is used to capture still images or video.
- the object is projected through the lens to generate an optical image onto the photosensitive element.
- the photosensitive element may be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
- CMOS complementary metal-oxide-semiconductor
- the photosensitive element converts the optical signal into an electrical signal, and then transmits the electrical signal to the ISP to convert it into a digital image or video signal.
- ISP outputs digital image or video signal to DSP for processing.
- DSP converts digital image or video signal into standard RGB, YUV and other formats of image or video signal.
- the terminal may include 1 or N cameras 193 , where N is a positive integer greater than 1.
- the terminal may use the N cameras 193 to acquire images with multiple exposure coefficients, and further, in video post-processing, the terminal may synthesize HDR images through HDR technology according to the images with multiple exposure coefficients.
- a digital signal processor is used to process digital signals, in addition to digital image or video signals, it can also process other digital signals. For example, when the terminal selects a frequency point, the digital signal processor is used to perform Fourier transform on the energy of the frequency point, and so on.
- Video codecs are used to compress or decompress digital video.
- a terminal may support one or more video codecs.
- the terminal can play or record videos in multiple encoding formats, such as: moving picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4 and so on.
- MPEG moving picture experts group
- MPEG2 moving picture experts group
- MPEG3 MPEG4
- MPEG4 moving picture experts group
- the NPU is a neural-network (NN) computing processor.
- NN neural-network
- applications such as intelligent cognition of the terminal can be realized, such as image recognition, face recognition, speech recognition, text understanding, etc.
- the external memory interface 120 can be used to connect an external memory card, such as a Micro SD card, to expand the storage capacity of the terminal.
- the external memory card communicates with the processor 110 through the external memory interface 120 to realize the data storage function. For example to save files like music, video etc in external memory card.
- Internal memory 121 may be used to store computer executable program code, which includes instructions.
- the processor 110 executes various functional applications and data processing of the terminal by executing the instructions stored in the internal memory 121 .
- the internal memory 121 may include a storage program area and a storage data area.
- the storage program area can store an operating system, an application program required for at least one function (such as a sound playback function, an image and video playback function, etc.), and the like.
- the storage data area can store data (such as audio data, phone book, etc.) created during the use of the terminal.
- the internal memory 121 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, universal flash storage (UFS), and the like.
- the terminal may implement audio functions through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, and an application processor. Such as music playback, recording, etc.
- the audio module 170 is used for converting digital audio information into analog audio signal output, and also for converting analog audio input into digital audio signal. Audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be provided in the processor 110 , or some functional modules of the audio module 170 may be provided in the processor 110 .
- Speaker 170A also referred to as a "speaker" is used to convert audio electrical signals into sound signals.
- the terminal can listen to music through the speaker 170A, or listen to a hands-free call.
- the receiver 170B also referred to as "earpiece" is used to convert audio electrical signals into sound signals.
- the voice can be received by placing the receiver 170B close to the human ear.
- the microphone 170C also called “microphone” or “microphone” is used to convert sound signals into electrical signals.
- the user can make a sound by approaching the microphone 170C through a human mouth, and input the sound signal into the microphone 170C.
- the terminal may be provided with at least one microphone 170C.
- the terminal may be provided with two microphones 170C, which can implement noise reduction function in addition to acquiring sound signals.
- the terminal may also be provided with three, four or more microphones 170C, to achieve sound signal acquisition, noise reduction, and also to identify sound sources, to achieve directional recording functions, and the like.
- the earphone jack 170D is used to connect wired earphones.
- the earphone interface 170D may be the USB interface 130, or may be a 3.5mm open mobile terminal platform (open mobile terminal platform, OMTP) standard interface, a cellular telecommunications industry association of the USA (CTIA) standard interface.
- OMTP open mobile terminal platform
- CTIA cellular telecommunications industry association of the USA
- the pressure sensor 180A is used to sense pressure signals, and can convert the pressure signals into electrical signals.
- the pressure sensor 180A may be provided on the display screen 194 .
- the capacitive pressure sensor may be comprised of at least two parallel plates of conductive material. When a force is applied to the pressure sensor 180A, the capacitance between the electrodes changes. The terminal determines the intensity of the pressure based on the change in capacitance. When a touch operation acts on the display screen 194, the terminal detects the intensity of the touch operation according to the pressure sensor 180A. The terminal can also calculate the touched position according to the detection signal of the pressure sensor 180A.
- touch operations acting on the same touch position but with different touch operation intensities may correspond to different operation instructions. For example, when a touch operation whose intensity is less than the first pressure threshold acts on the short message application icon, the instruction for viewing the short message is executed. When a touch operation with a touch operation intensity greater than or equal to the first pressure threshold acts on the short message application icon, the instruction to create a new short message is executed.
- the gyroscope sensor 180B can be used to determine the motion attitude of the terminal.
- the angular velocity of the terminal around three axes ie, the x, y and z axes
- the gyro sensor 180B can be used for image stabilization. Exemplarily, when the shutter is pressed, the gyro sensor 180B detects the angle at which the terminal shakes, calculates the distance to be compensated by the lens module according to the angle, and allows the lens to counteract the shake of the terminal through reverse motion to achieve anti-shake.
- the gyro sensor 180B can also be used for navigation and somatosensory game scenarios.
- the air pressure sensor 180C is used to measure air pressure. In some embodiments, the terminal calculates the altitude through the air pressure value measured by the air pressure sensor 180C to assist in positioning and navigation.
- the magnetic sensor 180D includes a Hall sensor.
- the terminal can use the magnetic sensor 180D to detect the opening and closing of the flip holster.
- the terminal when the terminal is a flip machine, the terminal can detect the opening and closing of the flip according to the magnetic sensor 180D. Further, according to the detected opening and closing state of the leather case or the opening and closing state of the flip cover, characteristics such as automatic unlocking of the flip cover are set.
- the acceleration sensor 180E can detect the magnitude of the acceleration of the terminal in various directions (generally three axes).
- the magnitude and direction of gravity can be detected when the terminal is stationary. It can also be used to identify the terminal posture, and can be used in horizontal and vertical screen switching, pedometer and other applications.
- the terminal can measure distance by infrared or laser. In some embodiments, when shooting a scene, the terminal can use the distance sensor 180F to measure the distance to achieve fast focusing.
- Proximity light sensor 180G may include, for example, light emitting diodes (LEDs) and light detectors, such as photodiodes.
- the light emitting diodes may be infrared light emitting diodes.
- the terminal emits infrared light outward through light-emitting diodes.
- the terminal uses photodiodes to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it can be determined that there is an object near the terminal. When insufficient reflected light is detected, the terminal can determine that there is no object near the terminal.
- the terminal can use the proximity light sensor 180G to detect the user holding the terminal close to the ear to talk, so as to automatically turn off the screen to save power.
- Proximity light sensor 180G can also be used in holster mode, pocket mode automatically unlocks and locks the screen.
- the ambient light sensor 180L is used to sense ambient light brightness.
- the terminal can adaptively adjust the brightness of the display screen 194 according to the perceived ambient light brightness.
- the ambient light sensor 180L can also be used to automatically adjust the white balance when taking pictures.
- the ambient light sensor 180L can also cooperate with the proximity light sensor 180G to detect whether the terminal is in the pocket to prevent accidental touch.
- the fingerprint sensor 180H is used to acquire fingerprints.
- the terminal can use the acquired fingerprint characteristics to unlock the fingerprint, access the application lock, take a picture with the fingerprint, answer the incoming call with the fingerprint, etc.
- the temperature sensor 180J is used to detect the temperature.
- the terminal uses the temperature detected by the temperature sensor 180J to execute the temperature processing strategy. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold value, the terminal executes to reduce the performance of the processor located near the temperature sensor 180J, so as to reduce power consumption and implement thermal protection.
- the terminal when the temperature is lower than another threshold, the terminal heats the battery 142 to avoid abnormal shutdown of the terminal due to low temperature.
- the terminal when the temperature is lower than another threshold, the terminal performs boosting on the output voltage of the battery 142 to avoid abnormal shutdown caused by low temperature.
- Touch sensor 180K also called “touch panel”.
- the touch sensor 180K may be disposed on the display screen 194 , and the touch sensor 180K and the display screen 194 form a touch screen, also called a “touch screen”.
- the touch sensor 180K is used to detect a touch operation on or near it.
- the touch sensor can pass the detected touch operation to the application processor to determine the type of touch event.
- Visual output related to touch operations may be provided through display screen 194 .
- the touch sensor 180K may also be disposed on the surface of the terminal, which is different from the location where the display screen 194 is located.
- the bone conduction sensor 180M can acquire vibration signals.
- the bone conduction sensor 180M can acquire the vibration signal of the vibrating bone mass of the human voice.
- the bone conduction sensor 180M can also contact the pulse of the human body and receive the blood pressure beating signal.
- the bone conduction sensor 180M can also be disposed in the earphone, combined with the bone conduction earphone.
- the audio module 170 can analyze the voice signal based on the vibration signal of the vocal vibration bone block obtained by the bone conduction sensor 180M, so as to realize the voice function.
- the application processor can analyze the heart rate information based on the blood pressure beat signal obtained by the bone conduction sensor 180M, and realize the function of heart rate detection.
- the keys 190 include a power-on key, a volume key, and the like. Keys 190 may be mechanical keys. It can also be a touch key.
- the terminal can receive key input and generate key signal input related to user settings and function control of the terminal.
- Motor 191 can generate vibrating cues.
- the motor 191 can be used for vibrating alerts for incoming calls, and can also be used for touch vibration feedback.
- touch operations acting on different applications can correspond to different vibration feedback effects.
- the motor 191 can also correspond to different vibration feedback effects for touch operations on different areas of the display screen 194 .
- Different application scenarios for example: time reminder, receiving information, alarm clock, games, etc.
- the touch vibration feedback effect can also support customization.
- the indicator 192 can be an indicator light, which can be used to indicate the charging state, the change of the power, and can also be used to indicate a message, a missed call, a notification, and the like.
- the SIM card interface 195 is used to connect a SIM card.
- the SIM card can be inserted into the SIM card interface 195 or pulled out from the SIM card interface 195 to achieve contact and separation with the terminal.
- the terminal can support 1 or N SIM card interfaces, where N is a positive integer greater than 1.
- the SIM card interface 195 can support Nano SIM card, Micro SIM card, SIM card and so on. Multiple cards can be inserted into the same SIM card interface 195 at the same time. The types of the plurality of cards may be the same or different.
- the SIM card interface 195 can also be compatible with different types of SIM cards.
- the SIM card interface 195 is also compatible with external memory cards.
- the terminal interacts with the network through the SIM card to realize functions such as call and data communication.
- the terminal employs an eSIM, ie an embedded SIM card.
- the eSIM card can be embedded in the terminal and cannot be separated from the terminal.
- FIG. 4 is a schematic flowchart of an information verification method disclosed in an embodiment of the present invention. The method can be implemented by the system shown in FIG. 1 above. As shown in FIG. 4 , the information verification method includes some or all of the following steps:
- a first device establishes a short-range communication connection with a second device
- the first device may receive a communication connection instruction from the user, where the instruction is used to instruct the first device to communicate with the second device, and further, the first device and the second device establish a short-range communication connection.
- the user may instruct the first device to establish a proximity communication connection with a device under the same network, where the device under the same network is the second device.
- the first device is a smart phone, and the smart phone can provide a management interface, so that the user can open the network by touching related icons on the management interface.
- the device establishes a communication connection to determine the trusted devices under the same network.
- FIG. 5 is a schematic diagram of an application interface provided by an embodiment of the present application. As shown in (A) of FIG. 5 , it is a device management interface 300 .
- the device management interface 300 includes a network settings entry 301 . As shown in (A) and (B) of FIG.
- the first device in response to a user operation, such as a touch operation, acting on the network setting portal 301 , the first device displays the device setting interface 400 , and the devices included in the device setting interface 400 display Area 401 may display trusted devices, for example, device display area 401 displays smartphones, televisions, and speakers. Not limited to these devices, the first device may display more devices in response to the user's touch and slide operation on the device display area 401 . Further, the user can perform an operation on any device in the device display area 401, such as a touch operation, to perform a trusted connection with the device.
- the device display area may also include other devices, such as untrusted devices, which are not limited here.
- the first device can provide a multi-device management interface.
- the user can open the network by touching a related icon on the multi-device management interface.
- the smartphone responds to this operation and is connected to the device under the same network. Establish a communication connection and display the devices under the same network on the multi-device management interface.
- the user can determine the second device on the interface, for example, click to connect the refrigerator, that is, the refrigerator is the second device, so that the first device The transmission of authentication data can be performed with the refrigerator through the communication connection.
- the multi-device management interface may be a function provided by a smart phone, or may be implemented by installing an application program related to this embodiment. It can be understood that when the first device is not sure that the second device is a trusted device, the short-range communication connection restricts the data transmitted between the first device and the second device to be only verification data, which can protect the first device in this Security during communication.
- the first device may also establish a communication connection with the second device by means of Bluetooth or the like, which is not limited here.
- the first device encrypts the identity authentication information of the first user through an encryption algorithm to obtain a first ciphertext, where the first user is a user who uses the first device.
- the first device can obtain the identity authentication information of the first user, and then encrypt the identity authentication information of the first user through an encryption algorithm to obtain the first ciphertext, where the first user is a user using the first device. It can be understood that the first user is a user who uses the first device. Correspondingly, the first device contains the identity authentication information of the first user, that is, the identity authentication information in the first device includes the identity authentication information of the first user.
- the first device may obtain the identity authentication information from the device data, for example, obtain the user's fingerprint from the user record.
- the identity authentication information may include various types, for example, strong identity authentication information and weak identity authentication information.
- the user's strong identity authentication information is the unique identification of the user, which can include memory authentication information, such as application account and password, unlock password, and pattern, etc., and biometric authentication information, such as facial features, fingerprints, and voiceprints, etc. , which is not limited here.
- the user's weak identity authentication information is the characteristic information of the user, which may include the user's gender, age, hobby field, device name, and usage time period and usage time.
- the way that the device obtains the weak identity authentication information can be through deep learning.
- a pre-trained data learning model is installed on the first device, and the first device inputs the user record into the data learning model, and the first device can be obtained.
- User's weak authentication information For example, the first device can determine the age of the user according to the type of movies the user watches. Specifically, the first device is a tablet computer. The tablet computer inputs the user's movie viewing records into the trained data learning model. If a large proportion of the videos are teenagers' tutoring videos, the age stage in the weak identity authentication information of the user of the tablet computer obtained is the teenager stage.
- the training process of the data learning model includes: the first device obtains training data, where the training data may include multiple user records and annotation authentication information corresponding to the user records, and the annotation authentication information is a label that the user marks for the user record, and the annotation The authentication information is used to indicate the authentication information corresponding to the user record.
- the first device obtains the training data, it inputs the training data into the initial data learning model to obtain the target authentication information.
- the total loss is determined according to the marked authentication information and the target authentication information. , and optimize the initial data learning model according to the total loss to obtain the data learning model.
- the first user includes multiple users.
- the first device is a computer, and user No. 1, user No. 2, and user No. 3 have all entered face information on the computer as login verification data
- the first user includes user No. 1, user No. 2, and user No. 3.
- the identity authentication information in the first device includes identity authentication information of the first user, the second user, and the third user.
- the identity authentication information of the first user includes at least two pieces of identity authentication information.
- the first device may encrypt each piece of identity authentication information in the identity authentication information of the first user by using an encryption algorithm to obtain The multiple sub-ciphertexts, that is, the first ciphertext includes multiple sub-ciphertexts.
- the first device encrypts the N pieces of authentication information through an encryption algorithm to obtain N sub-ciphertexts.
- the first ciphertext includes N sub-ciphertexts
- the second ciphertext includes M sub-ciphertexts.
- the M sub-ciphertexts are the ciphertexts obtained by encrypting the M pieces of authentication information of the second user respectively through an encryption algorithm.
- the first device can Compare the M sub-ciphertexts and the ciphertexts with the same authentication information type in the N sub-ciphertexts.
- the ciphertext obtained after encrypting the same data by the encryption algorithm is unique. Therefore, it can be determined whether the data in the ciphertext are consistent by comparing the ciphertext.
- the encryption algorithm may also be a non-decryptable encryption algorithm.
- the ciphertext does not need to be decrypted during the execution of this embodiment, and after the data is encrypted in a non-decryptable manner, even if a third party obtains the encrypted The text also cannot obtain the data, which ensures the security of the data.
- the encryption algorithm may be the PDKDF2 encryption algorithm, and may also be other encryption algorithms, which is not limited here.
- the identity authentication information includes the above multiple types, even if the user does not log in to the account on the device, this embodiment can also determine whether the device belongs to the same user through other identity authentication information, that is, other trusted devices of the device can be determined. . It can be understood that logging in to a user's account on all devices is extremely cumbersome, has high repetition, and affects user experience. With this embodiment, user operations can be reduced, user experience can be improved, and it is convenient for users to determine trusted devices.
- the first device sends a verification request to the second device, where the verification request is used to request the second device for identity authentication information of a second user, where the second user is a user using the second device.
- the first device sends a verification request to the second device through the established short-range communication connection, where the verification request is used to request the second device for identity authentication information of a second user, and the second user is a user using the second device.
- the verification request is used to request the second device for identity authentication information of a second user
- the second user is a user using the second device.
- the second device After receiving the verification request sent by the first device, the second device acquires the identity authentication information of the second user.
- the verification request carries indication information
- the indication information is used to indicate the type of identity authentication information of the verification request
- the second device can obtain the indication information indicated by the indication information according to the indication information in the verification request.
- identity authentication information The indication information is used to indicate the type of information requested by the verification request, and the information type includes strong identity authentication information, weak identity authentication information, and resident location information.
- the indication information is used to instruct the second device to obtain the strong identity authentication information of the second user, and after recognizing the indication information, the second device acquires all the strong identity authentication information of the second user, and for example, the indication information is used for If the second device is instructed to acquire the fingerprint information of the second user, the second device acquires all the fingerprint information of the second user after recognizing the instruction information.
- the verification request does not carry indication information, and when receiving the verification request, the second device obtains all the identity authentication information of the second user.
- the second device encrypts the identity authentication information of the second user through an encryption algorithm to obtain a second ciphertext.
- the encryption algorithms of the first device and the second device are the same encryption algorithm, and the same identity authentication information is unique after passing through the ciphertext, so that the identity authentication information can be compared by comparing the ciphertext.
- the first device can encrypt the identity authentication information of the first user through an encryption algorithm according to a random code, and the first device includes the random code in sending the verification request, so that the second device can pass the random code according to the random code.
- the encryption algorithm encrypts the identity authentication information of the first user. It should be noted that the same random code can ensure that the encrypted text of the same data is unique.
- the second device sends the second ciphertext to the first device
- the second device may first encapsulate the second ciphertext. Specifically, the second device may first establish a corresponding relationship between the keyword and the ciphertext, and then send the keyword and the ciphertext to the first device. text, so that the first device can find the corresponding cipher text according to the keyword when receiving the second cipher text.
- the correspondence between keywords and ciphertext and the naming of keywords can be the communication protocol established between trusted devices, and the keywords can be plaintext information, such as "strong identity authentication information", "fingerprint” and "password”, etc. , can also be a code name, for example, the keyword “apple” stands for "strong authentication information”.
- the second ciphertext includes at least two sub-ciphertexts
- the second device may establish a correspondence between keywords and ciphertexts for each sub-ciphertext, and then associate the sub-ciphertext with the sub-ciphertext and the sub-ciphertext The corresponding keyword is sent to the first device.
- the first device receives the second ciphertext.
- step 102 may also be executed after step 107 .
- the first device may execute step 102 after sending the verification information. Specifically, according to the indication The information acquires the identity authentication information of the first user, and then encrypts the acquired identity authentication information of the first user.
- the first device may execute step 102 after step 107. identity authentication information, and then encrypt the acquired identity authentication information of the first user.
- the first device determines that the second device is a trusted device of the first device when identifying that the first user and the second user are the same user according to the first ciphertext and the second ciphertext.
- the first device can directly compare the first ciphertext with the second ciphertext. If a plurality of sub-ciphertexts are included, the first device can compare the sub-ciphertext of the first user and the sub-ciphertext of the second user of the same authentication information type, and when recognizing that the first user and the second user are the same user , and determine that the second device is a trusted device of the first device.
- the first device encrypts the N pieces of authentication information through an encryption algorithm to obtain N sub-ciphertexts, the first ciphertext includes N sub-ciphertexts, and the second ciphertext includes M sub-ciphertexts
- the ciphertext is the ciphertext that the M sub-ciphertexts are the ciphertexts obtained by encrypting the M pieces of authentication information of the second user through an encryption algorithm, and the sub-ciphertexts obtained by the first device encrypted according to the target authentication information of the first user and the target authentication information of the second user.
- the sub-ciphertext obtained by encrypting the authentication information identifies whether the first user and the second user are the same user, wherein the target authentication information is the same authentication information in the N authentication information and the M authentication information, for example, the target authentication information is a fingerprint , the target authentication information of the first user is the fingerprint of the first user, and the target authentication information of the second user is the fingerprint of the second user. It can be understood that the target authentication information is used to indicate the authentication information to be compared in the user authentication information type.
- FIG. 6 is a schematic flowchart of determining a trusted device disclosed in an embodiment of the present invention.
- the first device performs step 108, which may include performing some or all of the following parts:
- step 1085 If there is only one account information in the second device, go to step 1085;
- the first device analyzes the sub-ciphertext to obtain the account information record of the second device. It can be understood that if there is no account information or there are multiple account information in the second ciphertext, it can be considered that the second device is a public device, and the identification of the next step is carried out. If there is only one account information in the second device, it is considered that The second device is a private device, and the second device is determined to be an untrusted device of the first device.
- the first device may compare the first sub-ciphertext with the second sub-ciphertext, and the first sub-ciphertext is a sub-cipher obtained by encrypting the target authentication information of the first user among the N sub-ciphertexts
- the second sub-ciphertext is the sub-ciphertext obtained by encrypting the target authentication information of the second user in the M sub-ciphertexts.
- the first device obtains the strong identity authentication information of the first user and the second user, and compares the strong identity authentication information of the first user and the second user, wherein the first user and the second user have the same type of strong identity authentication information.
- the identity authentication information is a set of strong identity authentication information.
- the fingerprint information of the first user and the fingerprint information of the second user are a set of strong identity authentication information.
- the first device can identify a set of strong identity authentication information when they are consistent.
- the first device can also set a threshold X, when it is identified that the X group strong identity authentication information is consistent, determine that the second device is a trusted device of the first device, otherwise, determine The second device is an untrusted device of the first device.
- the first ciphertext includes the first sub-ciphertext
- the first sub-ciphertext is the ciphertext obtained by encrypting any strong identity authentication information of the first user
- the second ciphertext includes the second sub-ciphertext
- the The second sub-ciphertext is the sub-ciphertext in the second ciphertext with the same keyword as the first sub-ciphertext
- the first sub-ciphertext and the second sub-ciphertext are a set of strong identity authentication information, wherein the keyword is used to indicate
- the type of strong identity authentication information for example, the keywords can be face, password and fingerprint information, etc. It can be understood that the keywords of the first sub-ciphertext and the second sub-ciphertext are the same, that is, the first sub-ciphertext and the second The type of identity authentication information corresponding to the sub-ciphertext is the same.
- the first device compares the first sub-ciphertext with the second sub-ciphertext
- step 1086 is executed; If the strong identity information of the user and the second user are inconsistent, step 1085 is executed.
- the first device may also set a threshold X, and when the X groups of strong identity authentication information are consistent, step 1086 is performed, wherein M is a natural number greater than 1, and otherwise, step 1085 is performed.
- the first device may not perform step 1081, but use the account information as strong identity authentication information, and perform comparison when performing step 1082.
- the first device may compare the sub-ciphertext obtained by encrypting the target authentication information of the first user with the sub-ciphertext obtained by encrypting the target authentication information of the second user, and the target authentication information includes multiple authentication information, when the sub-ciphertext obtained by encrypting the multiple authentication information of the first user respectively is consistent with the sub-ciphertext obtained by encrypting the multiple authentication information of the second user respectively, it is determined that the first user and the second user are the same user .
- the first device obtains the weak identity authentication information of the first user and the second user, and compares the weak identity authentication information of the first user and the second user, wherein the first user and the second user have the same type of weak identity authentication information.
- the identity authentication information is a set of weak identity authentication information.
- the gender of the first user and the gender of the second user are a set of weak identity authentication information.
- the first device can perform fault-tolerant matching, that is, it can identify a set of weak identity authentication information.
- the identity authentication information is consistent, it is determined that the second device is a trusted device of the first device, and the first device may also set a threshold N, and when it is identified that the N groups of weak identity authentication information are consistent, the second device is determined to be a trusted device of the first device.
- the first device can also perform non-error-tolerant matching, that is, when the weak identity information of all groups is consistent, the second device is determined to be a trusted device of the first device; otherwise, it is determined that the second device is an inoperable device of the first device. letter equipment.
- the first ciphertext includes the third sub-ciphertext
- the third sub-ciphertext is the ciphertext obtained by encrypting a weak identity authentication information of the first user
- the second ciphertext includes the fourth sub-ciphertext
- the fourth sub-ciphertext is the sub-ciphertext with the same keyword as the third sub-ciphertext in the second ciphertext
- the third sub-ciphertext and the fourth sub-ciphertext are a group of weak identity authentication information, wherein the keyword is used to indicate weak
- the type of identity authentication information for example, the keywords can be gender, age, and hobbies.
- the first device can compare the N groups of third sub-ciphertexts with the fourth sub-ciphertexts, where Y is a natural number greater than 1; If the Y groups of weak identity information of the first user and the second user are consistent, step 1086 is executed; if the third sub-ciphertext of the N groups is inconsistent with the fourth sub-ciphertext, that is, the Y group of weak identity information of the first user and the second user If not, step 1085 is executed. Wherein, the first device may also perform step 1086 when a group of weak identity authentication information is the same, otherwise, perform step 1085.
- the first device may acquire the resident location information of the first device and the second device, and compare the resident location information of the first device and the second device.
- the resident location information of the first device and the second device is When the premise information is consistent, it is determined that the second device is a trusted device of the first device. For example, if the first device is a home TV, and the second device is a smart phone of a guest at home, the resident location of the smart phone is different from the resident location of the TV, then the smart phone is identified as an inoperable device of the smart terminal. letter equipment.
- the first environment ciphertext is obtained by encrypting the resident location information of the first device
- the second environment ciphertext is obtained by encrypting the resident location information of the second device
- the first environment ciphertext and the second environment ciphertext are encrypted and obtained. environment ciphertext for comparison;
- step 1086 is performed; otherwise, step 1085 is performed.
- the first device may not perform this step. For example, if the first device only requests the second device for the fingerprint information of the second device when verifying the request, then Only step 1082 is executed. For another example, if the verification request sent by the first device to the second device is to request the identity authentication information of the second user, and the verification request does not specify the type of the identity authentication information, the first device can receive the first device after receiving the first device. When the identity authentication information of the second user is used, the steps are adjusted according to the type of the identity authentication information of the second user. For example, step 1084 can also be after step 1083, which is not limited here.
- the first device may acquire the current environment state of the second device, and when the second device is currently in an area corresponding to the resident location information of the second device, it is determined that the second device is located in a safe environment, then The second device may be determined to be a trusted device of the first device under the condition that the first user and the second user are identified as the same user. Specifically, the second device may send the information of the current environmental state of the second device to the first device, and the first device judges the environmental stability of the second device according to the information.
- the first device may acquire the current environmental states of the first device and the second device, and the first device and the second device are currently in areas corresponding to the resident information of the first device and the second device, respectively
- the second device can be determined to be a trusted device of the first device under the condition that the first user and the second user are identified as the same user. It should be noted that there may be other implementation methods for judging whether the environments of the first device and the second device are stable, which are not limited here.
- the first device may provide a display interface for displaying information such as the name of the trusted device, and may also provide a prompt, which is not limited here.
- the first device may provide a display interface for displaying information such as the name of the trusted device.
- the first device provides a distributed device management interface. Specifically, the user opens the network by touching a relevant icon on the multi-device management interface. Correspondingly, the first device performs steps 101 to 108 in response to the operation.
- the first device may display the second device on the interface, and the first device may also display the second device on the interface when establishing a proximity communication connection with the second device. device and display the status of the second device, when it is determined that the second device is a trusted device of the first device, the status can be changed to "trusted".
- the information verification system shown in FIG. 3 includes a plurality of second devices, then the first device can perform the information verification method of steps 101 to 108 for each second device, respectively, and identify each second device, from multiple A trusted device is determined in the second device.
- each of the first device and the second device may include a data learning model, and the data learning model may implement functions such as collecting strong identity authentication information, permanent residence information, and obtaining weak identity authentication information through user records.
- the No. 1 device is the first device
- the No. 2 and No. 3 devices are the second devices.
- FIG. 7 is a schematic diagram of obtaining verification data according to an embodiment of the present invention.
- the second device sends a verification request.
- the second device and the third device collect the verification data through their respective data learning models, and then send the collected verification data to the first device.
- the verification data may include user-level data, device-level data, and application-level data.
- User-level data includes user fingerprints, voiceprints, gender, hobbies (music or video category preferences), duration of using the device, device name, and frequent residents, etc.
- device-level data includes device type, device attributes (private or public), and device hardware conditions, etc.
- application-level data includes system software version, software feature support, and application usage preferences. It can be understood that the verification request may further include indication information for requesting verification data other than the identity authentication information in the second device, such as device-level data. It should be noted that, the method for the first device and the second device to obtain the identity authentication information may also directly obtain the user's identity authentication information from the user record, or other methods, which are not limited here.
- the first device may provide a display interface for displaying information such as the name of the trusted device.
- FIG. 8 is an interface diagram of a trusted device list disclosed in an embodiment of the present application.
- the first device will place the trusted device in the available The list of trusted devices is displayed in real time until the trusted devices in the second device are displayed, or after all trusted devices are acquired, all trusted devices can be displayed on the trusted device interface of the first device at the same time. superior.
- the first device may also display an untrusted device, so that the user can choose whether to perform a communication connection. For example, the user can open the network by touching related icons on the multi-device management interface.
- the first device performs steps 101 to 108, and displays the device currently being identified on the interface.
- the device is identified as a trusted device, provide the identification of the device as a trusted device.
- the status of the device is displayed below the device name. The status can include "recognizing", "trusted device” and " There is a certain risk” etc.
- the first device when the first device includes the identity authentication information of multiple users, that is, when the first user includes multiple users, the first device may obtain and display a list of trusted devices including multiple users.
- the first device is a tablet computer, and the tablet computer has the identity authentication information of users No. 1, No. 2 and No. 3;
- the second device is a learning machine, a learning watch, a TV, a smart phone, and a smart speaker.
- the device compares the identity authentication information of each second device with the identity authentication information of user No. 1, user No. 2, and user No. 3, for example, the fingerprints of user No. 2 and user No. User fingerprint comparison, refer to steps 101 to 108 for the specific information comparison process, obtain the trusted devices of user No.
- the trusted devices of user No. 2 are smartphones and TVs, and the trusted devices of user No. 3 are obtained. If the devices are a TV, a smart phone, and a smart speaker, the first device can display a trusted device list as shown in FIG. 9 , which is an interface of another trusted device list disclosed in an embodiment of the present invention.
- FIG. 10 is a schematic diagram of a hardware structure of a second device disclosed in an embodiment of the present invention.
- the second device shown in FIG. 10 includes a memory 201 , a processor 202 , a communication interface 203 and a bus 204 .
- the memory 201 , the processor 202 , and the communication interface 203 are connected to each other through the bus 204 for communication.
- the memory 201 may be a read-only memory (Read Only Memory, ROM), a static storage device, a dynamic storage device, or a random access memory (Random Access Memory, RAM).
- the memory 201 may store a program. When the program stored in the memory 201 is executed by the processor 202, the processor 202 and the communication interface 203 are used to perform various steps of information verification in the embodiments of the present application.
- the processor 202 may adopt a general-purpose central processing unit (Central Processing Unit, CPU), a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a graphics processor (graphics processing unit, GPU) or one or more
- the integrated circuit is used to execute the relevant program to implement the method for performing the information verification of the method embodiment of the present application.
- the processor 202 can also be an integrated circuit chip with signal processing capability. In the implementation process, each step of the information verification method of the present application can be completed by an integrated logic circuit of hardware in the processor 202 or instructions in the form of software.
- the above-mentioned processor 202 can also be a general-purpose processor, a digital signal processor (Digital Signal Processing, DSP), an application-specific integrated circuit (ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic devices. , discrete gate or transistor logic devices, discrete hardware components.
- a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
- the steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware decoding processor, or executed by a combination of hardware and software modules in the decoding processor.
- the software modules may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art.
- the storage medium is located in the memory 201, and the processor 202 reads the information in the memory 201, and completes the information verification method of the embodiment of the present application in combination with its hardware.
- the communication interface 203 uses a transceiver such as but not limited to a transceiver to implement communication between the second device and other devices or a communication network. For example, data (such as the global pose sequence in the embodiment of the present application) can be acquired through the communication interface 203 .
- a transceiver such as but not limited to a transceiver to implement communication between the second device and other devices or a communication network.
- data (such as the global pose sequence in the embodiment of the present application) can be acquired through the communication interface 203 .
- the bus 204 may include a pathway for communicating information between the various components of the second device (eg, the memory 201, the processor 202, the communication interface 203).
- all or part of the functions may be implemented by software, hardware, or a combination of software and hardware.
- the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present application are generated.
- the computer may be a general purpose computer, special purpose computer, computer network, or other programmable device.
- the computer instructions may be stored in a computer-readable storage medium.
- the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that includes an integration of one or more available media.
- the available media may be magnetic media (e.g., floppy disks, hard disks, magnetic tapes), optical media (e.g., DVDs), or semiconductor media (e.g., solid state disks (SSDs)), and the like.
- the process can be completed by instructing the relevant hardware by a computer program, and the program can be stored in a computer-readable storage medium.
- the program When the program is executed , which may include the processes of the foregoing method embodiments.
- the aforementioned storage medium includes: ROM or random storage memory RAM, magnetic disk or optical disk and other mediums that can store program codes.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Telephone Function (AREA)
- Collating Specific Patterns (AREA)
- Storage Device Security (AREA)
Abstract
本发明实施例公开了一种信息验证的方法、电子设备及计算机可读存储介质,包括: 第一设备与第二设备建立近距离通信连接,通过加密算法对第一用户的身份认证信息进行加密,得到第一密文,第一设备向第二设备发送验证请求,验证请求用于向第二设备请求第二用户的身份认证信息,第一设备接收第二密文,第二密文是第二用户的身份认证信息通过加密算法加密得到的密文,在根据第一密文与第二密文识别第一用户和第二用户是同一个用户时,确定第二设备为第一设备的可信设备。本发明通过对比第一设备与第二设备对应的用户的身份认证信息,在识别第一设备与第二设备对应的用户为用一个用户时,确定第二设备为第一设备的可信设备,保证第一设备的通信安全。
Description
本申请要求于2020年08月17日提交中国国家知识产权局、申请号为202010826014.4、申请名称为“信息验证的方法、电子设备及计算机可读存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本发明涉及计算机技术领域,尤其涉及一种信息验证的方法、电子设备及计算机可读存储介质。
智慧全场景的浪潮之下,单个家庭拥有的智能设备越来越多,设备间的互动成为分布式多设备的日常。然而,设备之间的交互需要建立在可信的环境下,如果不在一个用户有权限的设备间交互,极易对用户的个人隐私和安全造成极大的困扰。
现有技术中往往认为同一无线网络中的设备或同一个账号下的设备之间是可信的,进而,终端设备将同一无线网络下的设备列表或同一账号下的设备列表推荐给用户,以使用户可以在列表中选择设备进行交互。然而,仅根据设备之间的网络条件或账号信息确定可信设备,依据单薄,无法保证设备数据的安全。
本技术提供了一种通过设备数据将属于同一用户的设备确定为可信设备的方法,该方法能够确保设备通信的安全。
发明内容
本发明实施例提供了一种信息验证的方法、电子设备及计算机可读存储介质,通过对比第一设备与第二设备对应的用户的身份认证信息,在识别第一设备与第二设备对应的用户为用一个用户时,确定第二设备为第一设备的可信设备。该方法不需要繁琐的用户操作,效率高,能够确保设备通信的安全。
第一方面,本发明实施例提供了一种信息验证的方法,应用于第一设备,所述方法包括:
第一设备与第二设备建立近距离通信连接;
所述第一设备通过加密算法对第一用户的身份认证信息进行加密,得到第一密文,所述第一用户为使用所述第一设备的用户;
所述第一设备向所述第二设备发送验证请求,所述验证请求用于向所述第二设备请求第二用户的身份认证信息;
所述第一设备接收第二密文,所述第二密文是所述第二用户的身份认证信息通过所述加密算法加密得到的密文;
所述第一设备在根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时,确定所述第二设备为所述第一设备的可信设备。
作为一种可能的实施方式,所述身份认证信息为强身份认证信息,所述强身份认证信息为指纹、人脸特征、应用程序的账户和密码、解锁密码中的至少一种,所述第一设备在根据 所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时,确定所述第二设备为所述第一设备的可信设备,包括:
在所述第一密文与所述第二密文一致时,确定所述第二设备为所述第一设备的可信设备。
作为一种可能的实施方式,所述身份认证信息包括N个认证信息,所述第一设备通过加密算法对第一用户的身份认证信息进行加密,得到第一密文,包括:
所述第一设备通过所述加密算法分别对所述N个认证信息进行加密,得到N个子密文,所述第一密文包括所述N个子密文;第二密文包括M个子密文,所述是M个子密文是所述第二用户的M个认证信息分别通过所述加密算法加密得到的密文;
所述方法还包括:所述第一设备根据所述第一用户的目标认证信息加密得到的子密文与所述第二用户的目标认证信息加密得到的子密文识别所述第一用户和所述第二用户是否为同一个用户,其中,所述目标认证信息为所述N个认证信息和M个认证信息中相同的认证信息。
作为一种可能的实施方式,所述第二密文还包括所述M个子密文分别对应的关键词,所述关键词用于指示子密文对应的认证信息。
作为一种可能的实施方式,所述第一设备根据所述第一用户的目标认证信息加密得到的子密文与所述第二用户的目标认证信息加密得到的子密文识别所述第一用户和所述第二用户是否为同一个用户,包括:
在所述目标认证信息为强认证信息时,比较第一子密文和第二子密文,所述第一子密文为所述N个子密文中的所述第一用户的目标认证信息加密得到的子密文,所述第二子密文为M个子密文中的所述第二用户的目标认证信息加密得到的子密文;
在所述第一子密文与所述第二子密文一致时,确定所述第一用户和所述第二用户为同一个用户。
作为一种可能的实施方式,所述第一设备根据所述第一用户的目标认证信息加密得到的子密文与所述第二用户的目标认证信息加密得到的子密文识别所述第一用户和所述第二用户是否为同一个用户,包括:
在所述目标认证信息为弱认证信息时,比较所述第一用户的目标认证信息加密得到的子密文与所述第二用户的目标认证信息加密得到的子密文,所述目标认证信息包括多个认证信息;
在所述第一用户的所述多个认证信息分别加密得到的子密文与所述第二用户的所述多个认证信息分别加密得到的子密文均一致时,确定所述第一用户和所述第二用户为同一个用户。
作为一种可能的实施方式,所述方法还包括:
所述第一设备通过所述加密算法对所述第一设备的常驻地信息进行加密,得到第一环境密文;
所述第一设备接收所述第二设备的第二环境密文,所述第二环境密文是所述第二设备的常驻地信息通过所述加密算法加密得到的密文;
所述第一设备在根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时,确定所述第二设备为所述第一设备的可信设备,包括:
所述第一设备在根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时,比较所述第一环境密文和所述第二环境密文;
在所述第一环境密文和所述第二环境密文一致时,确定所述第二设备为所述第一设备的可信设备。
作为一种可能的实施方式,在所述第一设备与第二设备建立近距离通信连接前,所述方法还包括:
所述第一设备获取所述第一用户的用户数据;
所述第一设备将所述第一用户的用户数据输入数据学习模型,得到所述第一用户的身份认证信息,所述数据学习模型用于根据输入的用户的用户数据识别所述用户的身份认证信息。
第二方面,本发明实施例提供了一种信息验证的方法,应用于第二设备,所述方法包括:
第二设备与第一设备建立近距离通信连接;
所述第二设备接收所述第一设备发送的验证请求;
所述第二设备根据所述验证请求,通过加密算法对第二用户的身份认证信息进行加密,得到第二密文,所述第二用户为使用所述第二设备的用户;
所述第二设备向所述第一设备发送所述第二密文,以使所述第一设备在接收第二密文后根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时,确定所述第二设备为所述第一设备的可信设备,所述第一密文是所述第一用户的身份认证信息通过所述加密算法加密得到的密文。
作为一种可能的实施方式,所述身份认证信息包括至少两个不同的身份认证信息,所述第二设备通过加密算法对所述第二用户的身份认证信息进行加密,得到第二密文,包括:
所述第二设备对所述至少两个不同的身份认证信息中的每一个身份认证信息通过所述加密算法进行加密,得到至少两个子密文,所述第一密文包括所述至少两个子密文。
作为一种可能的实施方式,所述第二密文还包括所述M个子密文分别对应的关键词,所述关键词用于指示子密文对应的认证信息。
作为一种可能的实施方式,所述方法还包括:
所述第二设备通过加密算法对所述第二用户的常驻地信息进行加密,得到第二环境密文;
向所述第二设备发送所述第二环境密文,以使所述第一设备在根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时比较所述第一环境密文和所述第二环境密文,在所述第一环境密文和所述第二环境密文一致时,确定所述第二设备为所述第一设备的可信设备。
第三方面,本发明实施例提供了一种第一设备,包括:处理器、存储器和通信接口,所述存储器、所述处理器与所通信接口耦合,所述存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令,所述处理器用于调用所述计算机指令,执行:
第一设备通过所述通信接口与第二设备建立近距离通信连接;
所述第一设备通过加密算法对第一用户的身份认证信息进行加密,得到第一密文,所述第一用户为使用所述第一设备的用户;
所述第一设备通过所述通信接口向所述第二设备发送验证请求,所述验证请求用于向所述第二设备请求第二用户的身份认证信息;
所述第一设备通过所述通信接口接收第二密文,所述第二密文是所述第二用户的身份认证信息通过所述加密算法加密得到的密文;
所述第一设备在根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时,确定所述第二设备为所述第一设备的可信设备。
作为一种可能的实施方式,所述身份认证信息为强身份认证信息,所述强身份认证信息为指纹、人脸特征、应用程序的账户和密码、解锁密码中的至少一种,所述处理器执行所述第一设备在根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时,确定所述第二设备为所述第一设备的可信设备,包括:
在所述第一密文与所述第二密文一致时,确定所述第二设备为所述第一设备的可信设备。
作为一种可能的实施方式,所述身份认证信息包括N个认证信息,所述处理器执行所述第一设备通过加密算法对第一用户的身份认证信息进行加密,得到第一密文,包括:
所述第一设备通过所述加密算法分别对所述N个认证信息进行加密,得到N个子密文,所述第一密文包括所述N个子密文;第二密文包括M个子密文,所述是M个子密文是所述第二用户的M个认证信息分别通过所述加密算法加密得到的密文;
所述方法还包括:所述第一设备根据所述第一用户的目标认证信息加密得到的子密文与所述第二用户的目标认证信息加密得到的子密文识别所述第一用户和所述第二用户是否为同一个用户,其中,所述目标认证信息为所述N个认证信息和M个认证信息中相同的认证信息。
作为一种可能的实施方式,所述第二密文还包括所述M个子密文分别对应的关键词,所述关键词用于指示子密文对应的认证信息。
作为一种可能的实施方式,所述处理器执行所述第一设备根据所述第一用户的目标认证信息加密得到的子密文与所述第二用户的目标认证信息加密得到的子密文识别所述第一用户和所述第二用户是否为同一个用户,包括:
在所述目标认证信息为强认证信息时,比较第一子密文和第二子密文,所述第一子密文为所述N个子密文中的所述第一用户的目标认证信息加密得到的子密文,所述第二子密文为M个子密文中的所述第二用户的目标认证信息加密得到的子密文;
在所述第一子密文与所述第二子密文一致时,确定所述第一用户和所述第二用户为同一个用户。
作为一种可能的实施方式,所述处理器执行所述第一设备根据所述第一用户的目标认证信息加密得到的子密文与所述第二用户的目标认证信息加密得到的子密文识别所述第一用户和所述第二用户是否为同一个用户,包括:
在所述目标认证信息为弱认证信息时,比较所述第一用户的目标认证信息加密得到的子密文与所述第二用户的目标认证信息加密得到的子密文,所述目标认证信息包括多个认证信息;
在所述第一用户的所述多个认证信息分别加密得到的子密文与所述第二用户的所述多个认证信息分别加密得到的子密文均一致时,确定所述第一用户和所述第二用户为同一个用户。
作为一种可能的实施方式,所述方法还包括:
所述第一设备通过所述加密算法对所述第一设备的常驻地信息进行加密,得到第一环境密文;
所述第一设备接收所述第二设备的第二环境密文,所述第二环境密文是所述第二设备的常驻地信息通过所述加密算法加密得到的密文;
所述第一设备在根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时,确定所述第二设备为所述第一设备的可信设备,包括:
所述第一设备在根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时,比较所述第一环境密文和所述第二环境密文;
在所述第一环境密文和所述第二环境密文一致时,确定所述第二设备为所述第一设备的可信设备。
作为一种可能的实施方式,在所述处理器执行所述第一设备与第二设备建立近距离通信连接前,所述方法还包括:
所述第一设备获取所述第一用户的用户数据;
所述第一设备将所述第一用户的用户数据输入数据学习模型,得到所述第一用户的身份认证信息,所述数据学习模型用于根据输入的用户的用户数据识别所述用户的身份认证信息。
第四方面,本发明实施例提供了一种第二设备,包括:处理器、存储器和通信接口,所述存储器、所述处理器与所通信接口耦合,所述存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令,所述处理器用于调用所述计算机指令,执行:
第二设备通过所述通信接口与第一设备建立近距离通信连接;
所述第二设备通过所述通信接口接收所述第一设备发送的验证请求;
所述第二设备根据所述验证请求,通过加密算法对第二用户的身份认证信息进行加密,得到第二密文,所述第二用户为使用所述第二设备的用户;
所述第二设备通过所述通信接口向所述第一设备发送所述第二密文,以使所述第一设备在接收第二密文后根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时,确定所述第二设备为所述第一设备的可信设备,所述第一密文是所述第一用户的身份认证信息通过所述加密算法加密得到的密文。
作为一种可能的实施方式,所述身份认证信息包括至少两个不同的身份认证信息,所述处理器执行所述第二设备通过加密算法对所述第二用户的身份认证信息进行加密,得到第二密文,包括:
所述第二设备对所述至少两个不同的身份认证信息中的每一个身份认证信息通过所述加密算法进行加密,得到至少两个子密文,所述第一密文包括所述至少两个子密文。
作为一种可能的实施方式,所述第二密文还包括所述M个子密文分别对应的关键词,所述关键词用于指示子密文对应的认证信息。
作为一种可能的实施方式,所述方法还包括:
所述第二设备通过加密算法对所述第二用户的常驻地信息进行加密,得到第二环境密文;
向所述第二设备发送所述第二环境密文,以使所述第一设备在根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时比较所述第一环境密文和所述第二环境密文,在所述第一环境密文和所述第二环境密文一致时,确定所述第二设备为所述第一设备的可信设备。
第五方面,本申请实施例提供了一种芯片,所述芯片应用于第一设备,所述芯片包括一个或多个处理器,所述处理器用于调用计算机指令以使得所述第一设备执行如第一方面以及第一方面中任一可能的实现方式描述的方法。
第六方面,本申请实施例提供了一种芯片,所述芯片应用于第二设备,所述芯片包括一个或多个处理器,所述处理器用于调用计算机指令以使得所述第二设备执行如第二方面以及第二方面中任一可能的实现方式描述的方法。
第七方面,本申请实施例提供一种包含指令的计算机程序产品,当上述计算机程序产品在第一设备上运行时,使得上述第一设备执行如第一方面以及第一方面中任一可能的实现方式描述的方法。
第八方面,本申请实施例提供一种包含指令的计算机程序产品,当上述计算机程序产品在第二设备上运行时,使得上述第二设备执行如第二方面以及第二方面中任一可能的实现方式描述的方法。
第九方面,本申请实施例提供一种计算机可读存储介质,包括指令,当上述指令在第一设备上运行时,使得上述第一设备执行如第一方面以及第一方面中任一可能的实现方式描述的方法。
第十方面,本申请实施例提供一种计算机可读存储介质,包括指令,当上述指令在第二设备上运行时,使得上述第二设备执行如第二方面以及第二方面中任一可能的实现方式描述的方法。
可以理解地,上述第三方面提供的第一设备、第四方面提供的第二设备,第五方面和第六方面提供的芯片、第七方面和第八方面提供的计算机程序产品以及第九方面和第十方面提供的计算机存储介质均用于执行本申请实施例所提供的方法。
在本发明实施例中,首先,第一设备与第二设备建立近距离通信连接,进而,第一设备通过加密算法对第一用户的身份认证信息进行加密,得到第一密文,其中,第一用户为使用第一设备的用户,第一设备向第二设备发送验证请求,验证请求用于向第二设备请求第二用户的身份认证信息,之后,第一设备接收第二密文,第二密文是第二用户的身份认证信息通过加密算法加密得到的密文,最后,第一设备在根据第一密文与第二密文识别第一用户和第二用户是同一个用户时,确定第二设备为第一设备的可信设备。本发明能够通过对比第一设备与第二设备对应的用户的身份认证信息,在识别第一设备与第二设备对应的用户为用一个用户时,确定第二设备为第一设备的可信设备,能够确保设备通信的安全。
下面对本申请实施例用到的附图进行介绍。
图1是本发明实施例公开的一种信息验证系统架构示意图;
图2是本发明实施例公开的另一种信息验证系统架构示意图;
图3是本发明实施例公开的一种终端的硬件结构示意图;
图4是本发明实施例公开的一种信息验证的方法的流程示意图;
图5是本申请实施例提供的一种应用界面的示意图;
图6是本发明实施例公开的一种确定可信设备的流程示意图;
图7是本发明实施例公开的一种获取验证数据的示意图;
图8是本申请实施例公开的一种可信设备列表的界面图;
图9是本发明实施例公开的另一种可信设备列表的界面;
图10是本发明实施例公开的一种第二设备的硬件结构示意图。
本申请以下实施例中所使用的术语只是为了描述特定实施例的目的,而并非旨在作为对本申请实施例的限制。如在本申请实施例的说明书和所附权利要求书中所使用的那样,单数表达形式“一个”、“一种”、“所述”、“上述”、“该”和“这一”旨在也包括复数表达形式,除非其上下文中明确地有相反指示。还应当理解,本申请实施例中使用的术语“和/或”是指并包含一个或多个所列出项目的任何或所有可能组合。
本发明实施例公开了一种信息验证的方法、电子设备及计算机可读存储介质。该方法中,第一设备与第二设备建立近距离通信连接,进而,第一设备通过加密算法对第一用户的身份认证信息进行加密,得到第一密文,其中,第一用户为使用第一设备的用户,第一设备向第二设备发送验证请求,验证请求用于向第二设备请求第二用户的身份认证信息,之后,第一设备接收第二密文,第二密文是第二用户的身份认证信息通过加密算法加密得到的密文,最后,第一设备在根据第一密文与第二密文识别第一用户和第二用户是同一个用户时,确定第二设备为第一设备的可信设备。
上述的信息验证的方法中,可以通过对比第一设备与第二设备对应的用户的身份认证信息,在识别第一设备与第二设备对应的用户为用一个用户时,确定第二设备为第一设备的可信设备。
为了更好地理解本发明实施例公开的一种信息验证的方法、电子设备及计算机可读存储介质,下面先对本发明实施例使用的系统架构进行描述。
请参见图1,图1是本发明实施例公开的一种信息验证系统架构示意图。如图1所示,该系统架构包括第一设备100和第二设备200,其中,第一设备100为具备接收用户指令的功能的终端,例如,第一设备100可以为智能手机,第二设备200为一个可以与第一设备进行交互的终端,例如,第二设备200可以为电视机、平板电脑、电脑或音箱等。
如图1所示,第一设备100可以接收用户输入的指令,与第二设备200建立近距离通信连接,之后,第一设备100向第二设备200发送验证请求,以使第二设备200向第一设备100发送第二用户的验证数据,其中,第二用户为第二设备200的使用者。第一设备100获取第一用户的验证数据,其中,第一用户为第一设备100的使用者,验证数据包括身份认证信息。最后,在第一设备100对比第一用户与第二用户的验证数据确定第一用户和第二用户为同一个用户时,确定第二设备200为第一设备100的可信设备。
请参见图3,图3是本发明实施例公开的另一种信息验证系统架构示意图。如图3所示,该系统架构包括第一设备100和多个第二设备200,其中,第一设备100为具备接收用户指令的功能的终端,例如,第一设备100可以为智能手机,第二设备200为一个可以与第一设备进行交互的终端,例如,第二设备200可以为电视机、平板电脑、电脑或音箱等。
如图3所示,第一设备100可以接收用户输入的指令,同时与多个第二设备200建立近距离通信连接,具体的,第一设备100分别与电视机、平板电脑、电脑和音箱建立近距离通信连接,进而,分别向电视机、平板电脑、电脑和音箱发送验证请求,以使电视机、平板电脑、电脑和音箱分别向第一设备100发送验证数据,例如,身份认证信息。最后,第一设备100可以通过分别对比第一设备对应的用户与电视机、平板电脑、电脑和音箱对应的用户的验证数据,从而在电视机、平板电脑、电脑和音箱之间确定第一设备的可信设备。在第一设备100确定了可信设备后,可以将可信设备显示给用户,例如,第一设备100在确定了平板电脑和电视机是第一设备100的可信设备之后,可以向用户提供一个可信设备的列表,该列表上显示平板电脑和电视机,进一步,可以提供与可信设备连接的设置,以使用户可以在可信设备的列表中选择可信设备进行安全的通信连接。
需要说明的是,图1和图3所示的第一设备和第二设备不限于仅包括图中所示的终端,还可以包括其它未在图中表示的设备,具体本发明在此处不再一一列举。需要说明的是,图1和图3所示的系统架构,并不构成对信息验证的系统架构的限定。
下面介绍本申请实施例涉及的终端。
图3是本发明实施例公开的一种终端的硬件结构示意图。该终端可以是上述图1或图2中的第一设备或第二设备。
终端可以包括处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,按键190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。其中传感器模块180可以包括压力传感器180A,陀螺仪传感器180B,气压传感器180C,磁传感器180D,加速度传感器180E,距离传感器180F,接近光传感器180G,指纹传感器180H,温度传感器180J,触摸传感器180K,环境光传感器180L,骨传导传感器180M等。
可以理解的是,本发明实施例示意的结构并不构成对终端的具体限定。在本申请另一些实施例中,终端可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,存储器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。在本实施例中,第一设备可以通过处理器110对验证数据进行处理,例如,第一设备通过处理器110对比第一用户与第二用户的身份认证信息,从而识别第一用户与第二用户是否为同一个用户,在第一用户与第二用户为同一个用户时,确定第二设备为第一设备的可信设备,其中,第一用户为使用第一设备的用户,第二用户为使用第二设备的用户。
其中,控制器可以是终端的神经中枢和指挥中心。控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。
处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从所述存储器中直接调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。
在一些实施例中,处理器110可以包括一个或多个接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口,集成电路内置音频(inter-integrated circuit sound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purpose input/output,GPIO)接口,用户标识模块(subscriber identity module,SIM)接口,和/或通用串行总线(universal serial bus,USB)接口等。
I2C接口是一种双向同步串行总线,包括一根串行数据线(serial data line,SDA)和一根串行时钟线(derail clock line,SCL)。在一些实施例中,处理器110可以包含多组I2C总线。处理器110可以通过不同的I2C总线接口分别耦合触摸传感器180K,充电器,闪光灯,摄像头193等。例如:处理器110可以通过I2C接口耦合触摸传感器180K,使处理器110与触摸 传感器180K通过I2C总线接口通信,实现终端的触摸功能。
I2S接口可以用于音频通信。在一些实施例中,处理器110可以包含多组I2S总线。处理器110可以通过I2S总线与音频模块170耦合,实现处理器110与音频模块170之间的通信。在一些实施例中,音频模块170可以通过I2S接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。
PCM接口也可以用于音频通信,将模拟信号抽样,量化和编码。在一些实施例中,音频模块170与无线通信模块160可以通过PCM总线接口耦合。在一些实施例中,音频模块170也可以通过PCM接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。所述I2S接口和所述PCM接口都可以用于音频通信。
UART接口是一种通用串行数据总线,用于异步通信。该总线可以为双向通信总线。它将要传输的数据在串行通信与并行通信之间转换。在一些实施例中,UART接口通常被用于连接处理器110与无线通信模块160。例如:处理器110通过UART接口与无线通信模块160中的蓝牙模块通信,实现蓝牙功能。在一些实施例中,音频模块170可以通过UART接口向无线通信模块160传递音频信号,实现通过蓝牙耳机播放音乐的功能。
MIPI接口可以被用于连接处理器110与显示屏194,摄像头193等外围器件。MIPI接口包括摄像头串行接口(camera serial interface,CSI),显示屏串行接口(display serial interface,DSI)等。在一些实施例中,处理器110和摄像头193通过CSI接口通信,实现终端的拍摄功能。处理器110和显示屏194通过DSI接口通信,实现终端的显示功能。
GPIO接口可以通过软件配置。GPIO接口可以被配置为控制信号,也可被配置为数据信号。在一些实施例中,GPIO接口可以用于连接处理器110与摄像头193,显示屏194,无线通信模块160,音频模块170,传感器模块180等。GPIO接口还可以被配置为I2C接口,I2S接口,UART接口,MIPI接口等。
USB接口130是符合USB标准规范的接口,具体可以是Mini USB接口,Micro USB接口,USB Type C接口等。USB接口130可以用于连接充电器为终端充电,也可以用于终端与外围设备之间传输数据。也可以用于连接耳机,通过耳机播放音频。该接口还可以用于连接其他终端,例如AR设备等。
可以理解的是,本发明实施例示意的各模块间的接口连接关系,只是示意性说明,并不构成对终端的结构限定。在本申请另一些实施例中,终端也可以采用上述实施例中不同的接口连接方式,或多种接口连接方式的组合。
充电管理模块140用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。在一些有线充电的实施例中,充电管理模块140可以通过USB接口130接收有线充电器的充电输入。在一些无线充电的实施例中,充电管理模块140可以通过终端的无线充电线圈接收无线充电输入。充电管理模块140为电池142充电的同时,还可以通过电源管理模块141为终端供电。
电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,内部存储器121,外部存储器,显示屏194,摄像头193,和无线通信模块160等供电。电源管理模块141还可以用于监测电池容量,电池循环次数,电池健康状态(漏电,阻抗)等参数。在其他一些实施例中,电源管理模块141也可以设置于处理器110中。在另一些实施例中,电源管理模块141和充电管理模块140也可以设置于同一个器件中。
终端的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160, 调制解调处理器以及基带处理器等实现。
天线1和天线2用于发射和接收电磁波信号。终端中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。
移动通信模块150可以提供应用在终端上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。
调制解调处理器可以包括调制器和解调器。其中,调制器用于将待发送的低频基带信号调制成中高频信号。解调器用于将接收的电磁波信号解调为低频基带信号。随后解调器将解调得到的低频基带信号传送至基带处理器处理。低频基带信号经基带处理器处理后,被传递给应用处理器。应用处理器通过音频设备(不限于扬声器170A,受话器170B等)输出声音信号,或通过显示屏194显示图像或视频。在一些实施例中,调制解调处理器可以是独立的器件。在另一些实施例中,调制解调处理器可以独立于处理器110,与移动通信模块150或其他功能模块设置在同一个器件中。
无线通信模块160可以提供应用在终端上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。本实施例中,无线通信模块160用于实现第一设备与第二设备的交互,例如,第一设备具备无线通信模块,第一设备通过该模块向第二设备发送验证请求,并接收第二设备发送的验证数据。
在一些实施例中,终端的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得终端可以通过无线通信技术与网络以及其他设备通信。所述无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。所述GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。
终端通过GPU,显示屏194,以及应用处理器等实现显示功能。GPU为图像处理的微处理器,连接显示屏194和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器110可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。
显示屏194用于显示图像,视频等。显示屏194包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode的,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。在一些实施例中,终端可以包括1个或N个显示屏194,N为大于1的正整数。
终端可以通过ISP,摄像头193,视频编解码器,GPU,显示屏194以及应用处理器等实现获取功能。
ISP用于处理摄像头193反馈的数据。例如,拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将所述电信号传递给ISP处理,转化为肉眼可见的图像或视频。ISP还可以对图像的噪点,亮度,肤色进行算法优化。ISP还可以对拍摄场景的曝光,色温等参数优化。在一些实施例中,ISP可以设置在摄像头193中。
摄像头193用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体(complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像或视频信号。ISP将数字图像或视频信号输出到DSP加工处理。DSP将数字图像或视频信号转换成标准的RGB,YUV等格式的图像或视频信号。在一些实施例中,终端可以包括1个或N个摄像头193,N为大于1的正整数。例如,在一些实施例中,终端可以利用N个摄像头193获取多个曝光系数的图像,进而,在视频后处理中,终端可以根据多个曝光系数的图像,通过HDR技术合成HDR图像。
数字信号处理器用于处理数字信号,除了可以处理数字图像或视频信号,还可以处理其他数字信号。例如,当终端在频点选择时,数字信号处理器用于对频点能量进行傅里叶变换等。
视频编解码器用于对数字视频压缩或解压缩。终端可以支持一种或多种视频编解码器。这样,终端可以播放或录制多种编码格式的视频,例如:动态图像专家组(moving picture experts group,MPEG)1,MPEG2,MPEG3,MPEG4等。
NPU为神经网络(neural-network,NN)计算处理器,通过借鉴生物神经网络结构,例如借鉴人脑神经元之间传递模式,对输入信息快速处理,还可以不断的自学习。通过NPU可以实现终端的智能认知等应用,例如:图像识别,人脸识别,语音识别,文本理解等。
外部存储器接口120可以用于连接外部存储卡,例如Micro SD卡,实现扩展终端的存储能力。外部存储卡通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将音乐,视频等文件保存在外部存储卡中。
内部存储器121可以用于存储计算机可执行程序代码,所述可执行程序代码包括指令。处理器110通过运行存储在内部存储器121的指令,从而执行终端的各种功能应用以及数据处理。内部存储器121可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统,至少一个功能所需的应用程序(比如声音播放功能,图像视频播放功能等)等。存储数据区可存储终端使用过程中所创建的数据(比如音频数据,电话本等)等。此外,内部存储器121可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件,闪存器件,通用闪存存储器(universal flash storage,UFS)等。
终端可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。例如音乐播放,录音等。
音频模块170用于将数字音频信息转换成模拟音频信号输出,也用于将模拟音频输入转换为数字音频信号。音频模块170还可以用于对音频信号编码和解码。在一些实施例中,音频模块170可以设置于处理器110中,或将音频模块170的部分功能模块设置于处理器110中。
扬声器170A,也称“喇叭”,用于将音频电信号转换为声音信号。终端可以通过扬声器170A收听音乐,或收听免提通话。
受话器170B,也称“听筒”,用于将音频电信号转换成声音信号。当终端接听电话或语音信息时,可以通过将受话器170B靠近人耳接听语音。
麦克风170C,也称“话筒”,“传声器”,用于将声音信号转换为电信号。当拨打电话或发送语音信息时,用户可以通过人嘴靠近麦克风170C发声,将声音信号输入到麦克风170C。终端可以设置至少一个麦克风170C。在另一些实施例中,终端可以设置两个麦克风170C,除了获取声音信号,还可以实现降噪功能。在另一些实施例中,终端还可以设置三个,四个或更多麦克风170C,实现获取声音信号,降噪,还可以识别声音来源,实现定向录音功能等。
耳机接口170D用于连接有线耳机。耳机接口170D可以是USB接口130,也可以是3。5mm的开放移动终端平台(open mobile terminal platform,OMTP)标准接口,美国蜂窝电信工业协会(cellular telecommunications industry association of the USA,CTIA)标准接口。
压力传感器180A用于感受压力信号,可以将压力信号转换成电信号。在一些实施例中,压力传感器180A可以设置于显示屏194。压力传感器180A的种类很多,如电阻式压力传感器,电感式压力传感器,电容式压力传感器等。电容式压力传感器可以是包括至少两个具有导电材料的平行板。当有力作用于压力传感器180A,电极之间的电容改变。终端根据电容的变化确定压力的强度。当有触摸操作作用于显示屏194,终端根据压力传感器180A检测所述触摸操作强度。终端也可以根据压力传感器180A的检测信号计算触摸的位置。在一些实施例中,作用于相同触摸位置,但不同触摸操作强度的触摸操作,可以对应不同的操作指令。例如:当有触摸操作强度小于第一压力阈值的触摸操作作用于短消息应用图标时,执行查看短消息的指令。当有触摸操作强度大于或等于第一压力阈值的触摸操作作用于短消息应用图标时,执行新建短消息的指令。
陀螺仪传感器180B可以用于确定终端的运动姿态。在一些实施例中,可以通过陀螺仪传感器180B确定终端围绕三个轴(即,x,y和z轴)的角速度。陀螺仪传感器180B可以用于拍摄防抖。示例性的,当按下快门,陀螺仪传感器180B检测终端抖动的角度,根据角度计算出镜头模组需要补偿的距离,让镜头通过反向运动抵消终端的抖动,实现防抖。陀螺仪传感器180B还可以用于导航,体感游戏场景。
气压传感器180C用于测量气压。在一些实施例中,终端通过气压传感器180C测得的气压值计算海拔高度,辅助定位和导航。
磁传感器180D包括霍尔传感器。终端可以利用磁传感器180D检测翻盖皮套的开合。在一些实施例中,当终端是翻盖机时,终端可以根据磁传感器180D检测翻盖的开合。进而根据检测到的皮套的开合状态或翻盖的开合状态,设置翻盖自动解锁等特性。
加速度传感器180E可检测终端在各个方向上(一般为三轴)加速度的大小。当终端静止时可检测出重力的大小及方向。还可以用于识别终端姿态,应用于横竖屏切换,计步器等应用。
距离传感器180F,用于测量距离。终端可以通过红外或激光测量距离。在一些实施例中,拍摄场景,终端可以利用距离传感器180F测距以实现快速对焦。
接近光传感器180G可以包括例如发光二极管(LED)和光检测器,例如光电二极管。发光二极管可以是红外发光二极管。终端通过发光二极管向外发射红外光。终端使用光电二极管检测来自附近物体的红外反射光。当检测到充分的反射光时,可以确定终端附近有物体。当检测到不充分的反射光时,终端可以确定终端附近没有物体。终端可以利用接近光传感器180G检测用户手持终端贴近耳朵通话,以便自动熄灭屏幕达到省电的目的。接近光传感器180G也可用于皮套模式,口袋模式自动解锁与锁屏。
环境光传感器180L用于感知环境光亮度。终端可以根据感知的环境光亮度自适应调节显示屏194亮度。环境光传感器180L也可用于拍照时自动调节白平衡。环境光传感器180L还可以与接近光传感器180G配合,检测终端是否在口袋里,以防误触。
指纹传感器180H用于获取指纹。终端可以利用获取的指纹特性实现指纹解锁,访问应用锁,指纹拍照,指纹接听来电等。
温度传感器180J用于检测温度。在一些实施例中,终端利用温度传感器180J检测的温度,执行温度处理策略。例如,当温度传感器180J上报的温度超过阈值,终端执行降低位于温度传感器180J附近的处理器的性能,以便降低功耗实施热保护。在另一些实施例中,当温度低于另一阈值时,终端对电池142加热,以避免低温导致终端异常关机。在其他一些实施例中,当温度低于又一阈值时,终端对电池142的输出电压执行升压,以避免低温导致的异常关机。
触摸传感器180K,也称“触控面板”。触摸传感器180K可以设置于显示屏194,由触摸传感器180K与显示屏194组成触摸屏,也称“触控屏”。触摸传感器180K用于检测作用于其上或附近的触摸操作。触摸传感器可以将检测到的触摸操作传递给应用处理器,以确定触摸事件类型。可以通过显示屏194提供与触摸操作相关的视觉输出。在另一些实施例中,触摸传感器180K也可以设置于终端的表面,与显示屏194所处的位置不同。
骨传导传感器180M可以获取振动信号。在一些实施例中,骨传导传感器180M可以获取人体声部振动骨块的振动信号。骨传导传感器180M也可以接触人体脉搏,接收血压跳动信号。在一些实施例中,骨传导传感器180M也可以设置于耳机中,结合成骨传导耳机。音频模块170可以基于所述骨传导传感器180M获取的声部振动骨块的振动信号,解析出语音信号,实现语音功能。应用处理器可以基于所述骨传导传感器180M获取的血压跳动信号解析心率信息,实现心率检测功能。
按键190包括开机键,音量键等。按键190可以是机械按键。也可以是触摸式按键。终端可以接收按键输入,产生与终端的用户设置以及功能控制有关的键信号输入。
马达191可以产生振动提示。马达191可以用于来电振动提示,也可以用于触摸振动反馈。例如,作用于不同应用(例如拍照,音频播放等)的触摸操作,可以对应不同的振动反馈效果。作用于显示屏194不同区域的触摸操作,马达191也可对应不同的振动反馈效果。不同的应用场景(例如:时间提醒,接收信息,闹钟,游戏等)也可以对应不同的振动反馈效果。触摸振动反馈效果还可以支持自定义。
指示器192可以是指示灯,可以用于指示充电状态,电量变化,也可以用于指示消息,未接来电,通知等。
SIM卡接口195用于连接SIM卡。SIM卡可以通过插入SIM卡接口195,或从SIM卡接口195拔出,实现和终端的接触和分离。终端可以支持1个或N个SIM卡接口,N为大于1的正整数。SIM卡接口195可以支持Nano SIM卡,Micro SIM卡,SIM卡等。同一个SIM卡接口195可以同时插入多张卡。所述多张卡的类型可以相同,也可以不同。SIM卡接口195 也可以兼容不同类型的SIM卡。SIM卡接口195也可以兼容外部存储卡。终端通过SIM卡和网络交互,实现通话以及数据通信等功能。在一些实施例中,终端采用eSIM,即:嵌入式SIM卡。eSIM卡可以嵌在终端中,不能和终端分离。
基于上述系统架构,请参见图4,图4是本发明实施例公开的一种信息验证的方法的流程示意图。该方法可以由上述图1所示的系统来实现,如图4所示,该信息验证的方法包括如下部分或全部步骤:
101、第一设备与第二设备建立近距离通信连接;
具体的,第一设备可以接收来自用户的通信连接指令,该指令用于指示第一设备与第二设备进行通信连接,进而,第一设备与第二设备建立近距离通信连接。
在一种实现中,用户可以指示第一设备与同一网络下的设备建立近距离通信连接,其中,同一网络下的设备即为第二设备。例如,第一设备为智能手机,该智能手机可以提供管理界面,以使用户可以在该管理界面上通过触碰相关图标等操作开启网络,进一步的,智能手机响应于该操作,与同一网络下的设备建立通信连接,确定同一网络下的可信设备。具体的,请参阅图5,图5是本申请实施例提供的一种应用界面的示意图。如图5中的(A)所示,为设备管理界面300。设备管理界面300包含网络设置入口301。如图5中的(A)和(B)所示,响应于作用于网络设置入口301的用户操作,例如触摸操作,第一设备显示设备设置界面400,且该设备设置界面400包含的设备显示区401可以显示可信设备,例如,设备显示区401显示智能手机、电视机和音箱。不限于这些设备,响应于用户对设备显示区401的触摸滑动操作,第一设备可显示更多的设备。进一步的,用户可对设备显示区401中任一个设备进行操作,例如触摸操作,来对该设备进行可信连接。其中,设备显示区还可以包括其他设备,例如不可信设备,此处不做限定。
又例如,第一设备可以提供多设备管理界面,具体的,用户可以在多设备管理界面上通过触碰相关图标等操作开启网络,相应的,智能手机响应于该操作,与同一网络下的设备建立通信连接并在多设备管理界面上显示同一网络下的设备,进一步的,用户可以通过在该界面确定第二设备,例如,点击连接冰箱,即冰箱即为第二设备,以使第一设备可以通过该通信连接与同冰箱进行验证数据的传输。其中,该多设备管理界面可以为智能手机自带的功能,也可以是通过安装与本实施例相关的应用程序来实现的。可以理解的,在第一设备在不确定第二设备为可信设备时,该近距离通信连接限制第一设备与第二设备之间传输的数据仅为验证数据,可以保护第一设备在该通信过程中的安全。
在其他实现中,第一设备也可以通过蓝牙等方式与第二设备建立通信连接,此处不作限定。
102、第一设备通过加密算法对第一用户的身份认证信息进行加密,得到第一密文,第一用户为使用第一设备的用户。
首先,第一设备可以获取第一用户的身份认证信息,再通过加密算法对第一用户的身份认证信息进行加密,得到第一密文,其中,第一用户为使用第一设备的用户。可以理解的,第一用户为使用第一设备的用户,相应的,第一设备中有第一用户的身份认证信息,即第一设备中的身份认证信息包括第一用户的身份认证信息。
具体的,第一设备可以从设备数据中获取身份认证信息,例如,从用户记录中获取用户的指纹等。其中,身份认证信息可以包括多种类型,例如,强身份认证信息以及弱身份认证信息等。用户的强身份认证信息为该用户特有的标识,可以包括记忆认证信息,如应用程序 的账户和密码、解锁密码以及图案等,也可以包括生物认证信息,如人脸特征、指纹以及声纹等,此处不作限定。用户的弱身份认证信息为该用户的特征信息,可以包括用户的性别、年龄、爱好领域、设备命名以及使用时间段与使用时间长短等。
其中,设备获取弱身份认证信息的方式可以通过深度学习的方法,例如,将预先训练好的数据学习模型安装在第一设备上,第一设备将用户记录输入该数据学习模型,可以得到第一用户的弱身份认证信息。例如,第一设备可以通过用户观看的影片类型确定用户的年龄阶段,具体的,第一设备为平板电脑,平板电脑将用户观影记录输训练好的数据学习模型中,平板电脑的用户观看记录中存在大比例的视频为青少年辅导视频,则得到的该平板电脑的用户的弱身份认证信息中的年龄阶段为青少年阶段。其中,数据学习模型的训练过程包括,第一设备获取训练数据,其中,该训练数据可以包括多条用户记录以及用户记录对应的标注认证信息,标注认证信息是用户为用户记录打的标签,标注认证信息用于指示该条用户记录对应的认证信息,第一设备获取到训练数据之后,将训练数据输入初始数据学习模型,获得目标认证信息,最后,根据标注认证信息和目标认证信息确定总损失,根据总损失优化初始数据学习模型得到数据学习模型。
在一些实施例中,若多个用户使用过第一设备,则第一用户包括多个用户。例如,第一设备为电脑,一号用户、二号用户以及三号用户均在该电脑录入了人脸信息作为登录验证数据,则第一用户包括一号用户、二号用户以及三号用户,第一设备中的身份认证信息包括一号用户、二号用户以及三号用户的身份认证信息。
在一些实施例中,第一用户的身份认证信息包括至少两个身份认证信息,具体的,第一设备可以通过加密算法对第一用户的身份认证信息中的每一个身份认证信息进行加密,得到多个子密文,即第一密文包括多个子密文。当存在多个认证信息的情况,第一设备通过加密算法分别对N个认证信息进行加密,得到N个子密文,第一密文包括N个子密文,第二密文包括M个子密文,M个子密文是第二用户的M个认证信息分别通过加密算法加密得到的密文,可以理解的,N个认证信息和的M个认证信息在存在相同类型的认证信息时,第一设备可以对M个子密文和N个子密文中认证信息类型一致的密文进行比较。其中,该加密算法对同一数据进行加密后得到的密文是唯一的,因此,通过比较密文即可确定密文内的数据是否一致。进一步的,该加密算法还可以是不可解密的加密算法,需要说明的,本实施例的执行过程中不需要对密文进行解密,并且对数据进行不可解密的加密后,即使第三方获取了密文也无法获得数据,保证了数据的安全。其中,该加密算法可以为PDKDF2加密算法,还可以为其他加密算法,此处不作限定。
可以理解的,由于身份认证信息包括以上多种,因此,即使用户没有在设备上登陆账号,本实施例也可以通过其他身份认证信息确定设备是否属于同一个用户,即确定设备的其它可信设备。可以理解的,在所有设备上登陆一个用户的账号是极度繁琐的,重复性高,影响用户体验,通过本实施例,可以减少用户操作,提高用户体验,给用户确定可信设备带来便利。
103、第一设备向第二设备发送验证请求,该验证请求用于向第二设备请求第二用户的身份认证信息,第二用户为使用第二设备的用户。
第一设备通过建立后的近距离通信连接向第二设备发送验证请求,该验证请求用于向第二设备请求第二用户的身份认证信息,第二用户为使用第二设备的用户。其中,第二设备与第二用户的关系可以参见第一设备与第一用户的关系,此处不再赘述。
104、第二设备在接收第一设备发送的验证请求后,获取第二用户的身份认证信息。
在一种实现中,该验证请求带有指示信息,该指示信息用于指示该验证请求的身份认证 信息的类型,则第二设备可以根据该验证请求中的指示信息,获取该指示信息所指示的身份认证信息。其中,指示信息用于指示验证请求所请求的信息类型,信息类型包括强身份认证信息、弱身份认证信息以及常驻地信息。例如,指示信息用于指示第二设备获取第二用户的强身份认证信息,则第二设备在识别到该指示信息后,获取第二用户所有的强身份认证信息,又例如,该指示信息用于指示第二设备获取第二用户的指纹信息,则第二设备在识别到该指示信息后,获取第二用户所有的指纹信息。
在另一种实现中,该验证请求不带有指示信息,则第二设备在接收到该验证请求时,获取第二用户的所有身份认证信息。
105、第二设备通过加密算法对第二用户的身份认证信息进行加密,得到第二密文。
第二设备通过加密算法对第二用户的身份认证信息进行加密的过程可以参见步骤102中的相关内容。需要说明的,第一设备与第二设备的加密算法为同一加密算法,同一身份认证信息在经过该密文后是唯一的,以使通过密文的对比来实现对身份认证信息的对比。
在一种实现中,第一设备可以根据一个随机码通过加密算法对第一用户的身份认证信息进行加密,第一设备在发送验证请求中包括随机码,以使第二设备根据该随机码通过该加密算法对第一用户的身份认证信息加密,需要说明的是,相同的随机码可以保证同一数据加密之后的密文是唯一的。
106、第二设备向第一设备发送第二密文;
第二设备在发送第二密文之前,可以先将第二密文进行封装,具体的,第二设备可以先建立关键词与密文的对应的关系,再向第一设备发送关键词与密文,以使第一设备在接收到第二密文时可以根据关键词找到对应的密文。其中,关键词与密文的对应关系以及关键词的命名可以为可信设备之间建立的通信协议,关键词可以为明文信息,如“强身份认证信息”、“指纹”以及“密码”等,也可以为代号,例如,关键词“苹果”代表“强身份认证信息”。
在一些实施例中,第二密文包括至少两个子密文,则第二设备可以针对每一个子密文建立关键词与密文的对应关系,再将子密文与子密文和子密文对应的关键词发送至第一设备。
107、第一设备接收第二密文。
需要说明的是,步骤102也可以在步骤107之后执行。例如,第一设备向第二设备发送的验证请求中有指示请求,该指示信息用于指示身份认证信息的类型,则第一设备可以在发送验证信息之后执行步骤102,具体的,根据该指示信息获取第一用户的身份认证信息,再对获取的第一用户的身份认证信息进行加密。又例如,第一设备向第二设备发送的验证请求中不带有指示信息,则第一设备可以在步骤107之后执行步骤102,具体的,根据第二密文中的关键词获取第一用户的身份认证信息,再对获取的第一用户的身份认证信息进行加密。
108、第一设备在根据第一密文与第二密文识别第一用户和第二用户是同一个用户时,确定第二设备为第一设备的可信设备。
若第一密文和第二密文为同一种认证信息类型的密文,则第一设备可以直接将第一密文与第二密文进行对比,若第一密文和第二密文分别包括多个子密文,则第一设备可以将同一种认证信息类型的第一用户的子密文和第二用户的子密文进行对比,在识别第一用户和第二用户是同一个用户时,确定第二设备为第一设备的可信设备。
当存在多个认证信息的情况,具体的,第一设备通过加密算法分别对N个认证信息进行加密,得到N个子密文,第一密文包括N个子密文,第二密文包括M个子密文,是M个子密文是第二用户的M个认证信息分别通过加密算法加密得到的密文,第一设备根据第一用户的目标认证信息加密得到的子密文与第二用户的目标认证信息加密得到的子密文识别第一用 户和第二用户是否为同一个用户,其中,目标认证信息为N个认证信息和M个认证信息中相同的认证信息,例如,目标认证信息为指纹,第一用户的目标认证信息即为第一用户的指纹,第二用户的目标认证信息即为第二用户的指纹,可以理解的,目标认证信息用于指示用户认证信息中进行比较的认证信息的类型。
需要说明的是,根据认证信息类型的不同,判定的条件不同。如图6所示,图6是本发明实施例公开的一种确定可信设备的流程示意图,第一设备执行步骤108,可以包括执行以下部分或全部部分:
1081、识别第二设备的账号信息;
若第二设备中仅存在一个账号信息,则执行步骤1085;
若第二设备中不存在账号信息或存在多个账户信息,则执行1086。
具体的,当第一设备接收到的第二密文包括包含账号信息的子密文时,第一设备对该子密文进行分析,获取第二设备的账号信息记录。可以理解的,若第二密文中不存在账号信息或存在多个账号信息,则可以认为第二设备为公有设备,进行下一步骤的识别,若第二设备中仅存在一个账号信息,则认为第二设备为私人设备,将第二设备确定为第一设备的不可信设备。
1082、比较第一用户与第二用户的强身份认证信息;
在目标认证信息为强认证信息时,第一设备可以比较第一子密文和第二子密文,第一子密文为N个子密文中的第一用户的目标认证信息加密得到的子密文,第二子密文为M个子密文中的第二用户的目标认证信息加密得到的子密文,在第一子密文与第二子密文一致时,确定第一用户和第二用户为同一个用户。具体的,第一设备获取第一用户与第二用户的强身份认证信息,将第一用户与第二用户的强身份认证信息进行对比,其中,第一用户与第二用户的相同类型的强身份认证信息为一组强身份认证信息,例如,第一用户的指纹信息与第二用户的指纹信息为一组强身份认证信息,进而,第一设备可以在识别一组强身份认证信息一致时,确定第二设备为第一设备的可信设备,第一设备也可以设置阈值X,在识别X组强身份认证信息一致时,确定第二设备为第一设备的可信设备,反之,确定第二设备为第一设备的不可信设备。
本实施例中,第一密文包括第一子密文,第一子密文为第一用户的任意一个强身份认证信息加密得到的密文,第二密文包括第二子密文,第二子密文为第二密文中与第一子密文的关键词相同的子密文,第一子密文与第二子密文为一组强身份认证信息,其中,关键词用于指示强身份认证信息的类型,例如,关键词可以为人脸、密码以及指纹信息等,可以理解的,第一子密文与第二子密文的关键词相同,即第一子密文和第二子密文对应的身份认证信息的类型是相同的。
具体的,第一设备将第一子密文与第二子密文进行比较;
若第一子密文与第二子密文一致,即第一用户与第二用户的强身份信息一致,则执行步骤1086;若第一子密文与第二子密文不一致,即第一用户与第二用户的强身份信息不一致,则执行步骤1085。其中,第一设备也可以设置阈值X,在X组强身份认证信息一致时,执行步骤1086,其中,M为大于1的自然数,反之执行步骤1085。
在一些实施例中,第一设备可以不执行步骤1081,而是将账号信息作为强身份认证信息,在执行步骤1082时进行比较。
1083、比较第一用户与第二用户的弱身份认证信息;
在目标认证信息为弱认证信息时,第一设备可以比较第一用户的目标认证信息加密得到 的子密文与第二用户的目标认证信息加密得到的子密文,目标认证信息包括多个认证信息,在第一用户的多个认证信息分别加密得到的子密文与第二用户的多个认证信息分别加密得到的子密文均一致时,确定第一用户和第二用户为同一个用户。具体的,第一设备获取第一用户与第二用户的弱身份认证信息,将第一用户与第二用户的弱身份认证信息进行对比,其中,第一用户与第二用户的相同类型的弱身份认证信息为一组弱身份认证信息,例如,第一用户的性别与第二用户的性别为一组弱身份认证信息,进而,第一设备可以进行可容错匹配,即可以在识别一组弱身份认证信息一致时,确定第二设备为第一设备的可信设备,第一设备也可以设置阈值N,在识别N组弱身份认证信息一致时,确定第二设备为第一设备的可信设备,其中,第一设备还可以进行无容错匹配,即所有组的弱身份信息均一致时,确定第二设备为第一设备的可信设备,反之,确定第二设备为第一设备的不可信设备。
本实施例中,第一密文包括第三子密文,第三子密文为第一用户的一个弱身份认证信息加密得到的密文,第二密文包括第四子密文,第四子密文为第二密文中与第三子密文的关键词相同的子密文,第三子密文与第四子密文为一组弱身份认证信息,其中,关键词用于指示弱身份认证信息的类型,例如,关键词可以为性别、年龄以及爱好等。
具体的,第一设备可以将N组第三子密文与第四子密文进行比较,其中,Y为大于1的自然数;若Y组第三子密文与第四子密文一致,即第一用户与第二用户的Y组弱身份信息一致,则执行步骤1086;若N组第三子密文与第四子密文不一致,即第一用户与第二用户的Y组弱身份信息不一致,则执行步骤1085。其中,第一设备也可以在有一组弱身份认证信息相同时,执行步骤1086,反之,执行步骤1085。
1084、判断第一设备与第二设备的环境是否稳定;
在一种实现中,第一设备可以获取第一设备和第二设备的常驻地信息,将第一设备和第二设备的常驻地信息进行对比,当第一设备和第二设备的常驻地信息一致时,确定第二设备为第一设备的可信设备。例如,第一设备为一个家用的电视机,第二设备为家中客人的一个智能手机,该智能手机的常驻地与电视机的常驻地不同,则该智能手机被识别为智能终端的不可信设备。
本实施例中,第一环境密文是第一设备的常驻地信息加密得到的,第二环境密文是第二设备的常驻地信息加密得到的,将第一环境密文与第二环境密文进行比较;
若第一环境密文与第二环境密文一致,则执行步骤1086,反之,执行步骤1085。
可以理解的,在上述步骤1081~步骤1083对应的数据缺失时,第一设备可以不执行该步骤,例如,第一设备在验证请求时只向第二设备请求了第二设备的指纹信息,则仅执行步骤1082,又例如,第一设备向第二设备发送的验证请求为请求第二用户的身份认证信息,该验证请求并没有指定身份认证信息的类型,则第一设备可以在接收到第二用户的身份认证信息时,根据第二用户的身份认证信息的类型进行步骤的调整,例如,步骤1084也可以在步骤1083后,此处不做限定。
在一些实施例中,第一设备可以获取第二设备的当前环境状态,在第二设备当前处于第二设备的常驻地信息对应的区域时,确定第二设备位于一个安全的环境中,则可以在识别第一用户与第二用户为同一个用户的情况下,确定第二设备为第一设备的可信设备。具体的,第二设备可以将第二设备的当前环境状态的信息发送至第一设备,第一设备根据该信息对第二设备的环境稳定性进行判断。
在另一些实施例中,第一设备可以获取第一设备和第二设备的当前环境状态,在第一设备和第二设备当前分别处于第一设备和第二设备的常驻地信息对应的区域时,确定第一设备 和第二设备位于一个安全的环境中,则可以在识别第一用户与第二用户为同一个用户的情况下,确定第二设备为第一设备的可信设备。需要说明的是,判断第一设备与第二设备的环境是否稳定还可以有其他实现方法,此处不作限定。
1085、确定第二设备为第一设备的不可信设备。
在确定第二设备为第一设备的不可信设备时,第一设备可以提供一个显示界面用于显示该可信设备的名称等信息,也可以提供提示,此处不作限定。
1086、确定第二设备为第一设备的可信设备。
在确定第二设备为第一设备的可信设备时,第一设备可以提供一个显示界面用于显示该可信设备的名称等信息。例如,第一设备提供分布式设备管理界面,具体的,用户在多设备管理界面上通过触碰相关图标等操作开启网络,相应的,第一设备响应于该操作,执行步骤101~步骤108,在第一设备确定第二设备为可信设备时,第一设备可以将第二设备显示在界面上,第一设备也可以在与第二设备建立近距离通信连接时,在界面上显示第二设备并显示第二设备的状态,在确定第二设备为第一设备的可信设备时,该状态可以更改为“可信任”。
如图3所示的信息验证系统包括多个第二设备,则第一设备可以针对每一个第二设备分别执行步骤101~步骤108的信息验证方法,针对每一个第二设备进行识别,从多个第二设备中确定可信设备。
其中,第一设备和第二设备中的每一个设备可以包括一个数据学习模型,该数据学习模型可以实现收集强身份认证信息、常驻地信息和通过用户记录获取弱身份认证信息等功能。例如,一号设备为第一设备,二号设备和三号设备为第二设备,如图7所示,图7是本发明实施例公开的一种获取验证数据的示意图,第一设备向第二设备发送验证请求,二号设备和三号设备在接收到该验证请求后,分别通过各自的数据学习模型收集验证数据,再将收集到验证数据发送至一号设备。其中,验证数据可以包括用户级数据、设备级数据以及应用级数据,用户级数据包括用户指纹、声纹、性别、爱好领域(音乐或视频类别偏好)、使用该设备的时长、设备命名以及常驻地等等,设备级数据包括设备类型、设备属性(私有或公有)以及设备硬件条件等,应用级数据包括系统软件版本、软件特性支持情况以及应用使用偏好等。可以理解的,验证请求还可以包括指示信息,用于请求第二设备中除身份认证信息以外的验证数据,例如设备级数据。需要说明的是,第一设备与第二设备获取身份认证信息的方法还可以直接从用户记录中获取用户的身份认证信息,还可以为其他方式,此处不作限定。
在得到第一设备的可信设备包括多个第二设备时,第一设备可以提供一个显示界面用于显示该可信设备的名称等信息。具体的,可以如图8所示,图8是本申请实施例公开的一种可信设备列表的界面图。其中,在第一设备与多个设备的交互的过程中,若得到多个可信设备的确定结果不是同时的,则在确定每一个可信设备时,第一设备将该可信设备在可信设备列表中实时显示,直至将第二设备中的可信设备显示完毕,也可以在获取到所有的可信设备之后,同时将所有的可信设备显示在第一设备的可信设备的界面上。在另一些实施例中,第一设备还可以显示不可信设备,以使用户选择是否进行通信连接。例如,用户可以在多设备管理界面上通过触碰相关图标等操作开启网络,相应的,第一设备响应于该操作,执行步骤101~步骤108,并且在界面上显示当前正在进行识别的设备,在识别到该设备为可信设备时,再提供该设备为可信设备的标识,例如,在设备名称的下方显示设备的状态,状态可以包括“正在识别中”、“可信任设备”以及“存在一定风险”等。
在一些实施例中,当第一设备包括多个用户的身份认证信息,即第一用户包括多个用户时,第一设备可以得到并显示一个包括多个用户的可信设备的列表。例如,第一设备为一个 平板电脑,该平板电脑有一号用户、二号用户以及三号用户的身份认证信息,第二设备为学习机、学习手表、电视机、智能手机以及智能音箱,第一设备将每一个第二设备的身份认证信息分别与一号用户、二号用户以及三号用户的身份认证信息进行对比,例如,二号用户以及三号用户的指纹分别跟每一个第二设备的用户指纹对比,具体的信息对比过程参见步骤101~108,得到一号用户的可信设备为学习机和学习手表,二号用户的可信设备为智能手机和电视机,三号用户的可信设备为电视机、智能手机以及智能音箱,则第一设备可以显示如图9所示的可信设备列表,图9是本发明实施例公开的另一种可信设备列表的界面。
图10是本发明实施例公开的一种第二设备的硬件结构示意图。图10所示的第二设备包括存储器201、处理器202、通信接口203以及总线204。其中,存储器201、处理器202、通信接口203通过总线204实现彼此之间的通信连接。
存储器201可以是只读存储器(Read Only Memory,ROM),静态存储设备,动态存储设备或者随机存取存储器(Random Access Memory,RAM)。存储器201可以存储程序,当存储器201中存储的程序被处理器202执行时,处理器202和通信接口203用于执行本申请实施例中的信息验证的各个步骤。
处理器202可以采用通用的中央处理器(Central Processing Unit,CPU),微处理器,应用专用集成电路(Application Specific Integrated Circuit,ASIC),图形处理器(graphics processing unit,GPU)或者一个或多个集成电路,用于执行相关程序,以实现执行本申请方法实施例的信息验证的方法。
处理器202还可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,本申请的信息验证的方法的各个步骤可以通过处理器202中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器202还可以是通用处理器、数字信号处理器(Digital Signal Processing,DSP)、专用集成电路(ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器201,处理器202读取存储器201中的信息,结合其硬件完成本申请实施例的信息验证的方法。
通信接口203使用例如但不限于收发器一类的收发装置,来实现第二设备与其他设备或通信网络之间的通信。例如,可以通过通信接口203获取数据(如本申请实施例中的全局位姿序列)。
总线204可包括在第二设备各个部件(例如,存储器201、处理器202、通信接口203)之间传送信息的通路。在上述实施例中,全部或部分功能可以通过软件、硬件、或者软件加硬件的组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介 质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,该流程可以由计算机程序来指令相关的硬件完成,该程序可存储于计算机可读取存储介质中,该程序在执行时,可包括如上述各方法实施例的流程。而前述的存储介质包括:ROM或随机存储记忆体RAM、磁碟或者光盘等各种可存储程序代码的介质。
Claims (16)
- 一种信息验证的方法,其特征在于,包括:第一设备与第二设备建立近距离通信连接;所述第一设备通过加密算法对第一用户的身份认证信息进行加密,得到第一密文,所述第一用户为使用所述第一设备的用户;所述第一设备向所述第二设备发送验证请求,所述验证请求用于向所述第二设备请求第二用户的身份认证信息;所述第一设备接收第二密文,所述第二密文是所述第二用户的身份认证信息通过所述加密算法加密得到的密文;所述第一设备在根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时,确定所述第二设备为所述第一设备的可信设备。
- 根据权利要求1所述的方法,其特征在于,所述身份认证信息为强身份认证信息,所述强身份认证信息为指纹、人脸特征、应用程序的账户和密码、解锁密码中的至少一种,所述第一设备在根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时,确定所述第二设备为所述第一设备的可信设备,包括:在所述第一密文与所述第二密文一致时,确定所述第二设备为所述第一设备的可信设备。
- 根据权利要求1所述的方法,其特征在于,所述身份认证信息包括N个认证信息,所述第一设备通过加密算法对第一用户的身份认证信息进行加密,得到第一密文,包括:所述第一设备通过所述加密算法分别对所述N个认证信息进行加密,得到N个子密文,所述第一密文包括所述N个子密文;第二密文包括M个子密文,所述是M个子密文是所述第二用户的M个认证信息分别通过所述加密算法加密得到的密文;所述方法还包括:所述第一设备根据所述第一用户的目标认证信息加密得到的子密文与所述第二用户的目标认证信息加密得到的子密文识别所述第一用户和所述第二用户是否为同一个用户,其中,所述目标认证信息为所述N个认证信息和M个认证信息中相同的认证信息。
- 根据权利要求3所述的方法,其特征在于,所述第二密文还包括所述M个子密文分别对应的关键词,所述关键词用于指示子密文对应的认证信息。
- 根据权利要求3或4所述的方法,其特征在于,所述第一设备根据所述第一用户的目标认证信息加密得到的子密文与所述第二用户的目标认证信息加密得到的子密文识别所述第一用户和所述第二用户是否为同一个用户,包括:在所述目标认证信息为强认证信息时,比较第一子密文和第二子密文,所述第一子密文为所述N个子密文中的所述第一用户的目标认证信息加密得到的子密文,所述第二子密文为M个子密文中的所述第二用户的目标认证信息加密得到的子密文;在所述第一子密文与所述第二子密文一致时,确定所述第一用户和所述第二用户为同一个用户。
- 根据权利要求3或4所述的方法,其特征在于,所述第一设备根据所述第一用户的目标认证信息加密得到的子密文与所述第二用户的目标认证信息加密得到的子密文识别所述第一用户和所述第二用户是否为同一个用户,包括:在所述目标认证信息为弱认证信息时,比较所述第一用户的目标认证信息加密得到的子密文与所述第二用户的目标认证信息加密得到的子密文,所述目标认证信息包括多个认证信息;在所述第一用户的所述多个认证信息分别加密得到的子密文与所述第二用户的所述多个认证信息分别加密得到的子密文均一致时,确定所述第一用户和所述第二用户为同一个用户。
- 根据权利要求1-6任一项所述的方法,其特征在于,所述方法还包括:所述第一设备通过所述加密算法对所述第一设备的常驻地信息进行加密,得到第一环境密文;所述第一设备接收所述第二设备的第二环境密文,所述第二环境密文是所述第二设备的常驻地信息通过所述加密算法加密得到的密文;所述第一设备在根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时,确定所述第二设备为所述第一设备的可信设备,包括:所述第一设备在根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时,比较所述第一环境密文和所述第二环境密文;在所述第一环境密文和所述第二环境密文一致时,确定所述第二设备为所述第一设备的可信设备。
- 根据权利要求1所述的方法,其特征在于,在所述第一设备与第二设备建立近距离通信连接前,所述方法还包括:所述第一设备获取所述第一用户的用户数据;所述第一设备将所述第一用户的用户数据输入数据学习模型,得到所述第一用户的身份认证信息,所述数据学习模型用于根据输入的用户的用户数据识别所述用户的身份认证信息。
- 一种信息验证的方法,其特征在于,包括:第二设备与第一设备建立近距离通信连接;所述第二设备接收所述第一设备发送的验证请求;所述第二设备根据所述验证请求,通过加密算法对第二用户的身份认证信息进行加密,得到第二密文,所述第二用户为使用所述第二设备的用户;所述第二设备向所述第一设备发送所述第二密文,以使所述第一设备在接收第二密文后根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时,确定所述第二设备为所述第一设备的可信设备,所述第一密文是所述第一用户的身份认证信息通过所述加密算法加密得到的密文。
- 根据权利要求9所述的方法,其特征在于,所述身份认证信息包括至少两个不同的身份认证信息,所述第二设备通过加密算法对所述第二用户的身份认证信息进行加密,得到第二密文,包括:所述第二设备对所述至少两个不同的身份认证信息中的每一个身份认证信息通过所述加密算法进行加密,得到至少两个子密文,所述第一密文包括所述至少两个子密文。
- 根据权利要求9所述的方法,其特征在于,所述第二密文还包括所述M个子密文分别对应的关键词,所述关键词用于指示子密文对应的认证信息。
- 根据权利要求9-11任一项所述的方法,其特征在于,所述方法还包括:所述第二设备通过加密算法对所述第二用户的常驻地信息进行加密,得到第二环境密文;向所述第二设备发送所述第二环境密文,以使所述第一设备在根据所述第一密文与第二密文识别所述第一用户和所述第二用户是同一个用户时比较所述第一环境密文和所述第二环境密文,在所述第一环境密文和所述第二环境密文一致时,确定所述第二设备为所述第一设备的可信设备。
- 一种电子设备,其特征在于,包括处理器、存储器和通信接口,所述存储器、所述处理器与所通信接口耦合,所述存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令,所述处理器用于调用所述计算机指令,实现如权利要求1-8任一项所述的方法中所述第一设备实现的方法。
- 一种电子设备,其特征在于,包括处理器、存储器和通信接口,所述存储器、所述处理器与所通信接口耦合,所述存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令,所述处理器用于调用所述计算机指令,实现如权利要求9-12任一项所述的方法中所述第二设备实现的方法。
- 一种计算机可读存储介质,包括指令,其特征在于,当所述指令在第一设备上运行时,使得所述第一设备执行如权利要求1-8中任一项所述的方法。
- 一种计算机可读存储介质,包括指令,其特征在于,当所述指令在第二设备上运行时,使得所述第二设备执行如权利要求9-12中任一项所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010826014.4A CN114157412B (zh) | 2020-08-17 | 2020-08-17 | 信息验证的方法、电子设备及计算机可读存储介质 |
CN202010826014.4 | 2020-08-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022037405A1 true WO2022037405A1 (zh) | 2022-02-24 |
Family
ID=80323357
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/110320 WO2022037405A1 (zh) | 2020-08-17 | 2021-08-03 | 信息验证的方法、电子设备及计算机可读存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN114157412B (zh) |
WO (1) | WO2022037405A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117955751A (zh) * | 2024-03-27 | 2024-04-30 | 常州满旺半导体科技有限公司 | 基于物联网的电子设备异常数据检测方法及系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104571502A (zh) * | 2014-12-17 | 2015-04-29 | 联想(北京)有限公司 | 一种信息处理方法及穿戴式电子设备 |
CN105450610A (zh) * | 2014-08-29 | 2016-03-30 | 阿里巴巴集团控股有限公司 | 终端之间快速建立可信任的连接的方法及其系统 |
US20190156345A1 (en) * | 2014-04-25 | 2019-05-23 | Avago Technologies International Sales Pte. Limited | Adaptive biometric and environmental authentication system |
CN110944326A (zh) * | 2019-12-10 | 2020-03-31 | 上海闻泰信息技术有限公司 | 蓝牙耳机的配对方法、装置、计算机设备及存储介质 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101465735B (zh) * | 2008-12-19 | 2011-06-01 | 北京大学 | 网络用户身份验证方法、服务器及客户端 |
US9684778B2 (en) * | 2013-12-28 | 2017-06-20 | Intel Corporation | Extending user authentication across a trust group of smart devices |
US9935965B2 (en) * | 2015-05-14 | 2018-04-03 | International Business Machines Corporation | Establishing and using a trust level in mobile phones |
CN105184561A (zh) * | 2015-08-24 | 2015-12-23 | 小米科技有限责任公司 | 安全支付的方法及装置 |
CN113207122B (zh) * | 2018-08-30 | 2022-10-18 | 华为技术有限公司 | 一种消息传输方法及设备 |
CN110336807A (zh) * | 2019-06-28 | 2019-10-15 | 苏州浪潮智能科技有限公司 | 一种基于Web服务的身份认证方法、设备以及存储介质 |
-
2020
- 2020-08-17 CN CN202010826014.4A patent/CN114157412B/zh active Active
-
2021
- 2021-08-03 WO PCT/CN2021/110320 patent/WO2022037405A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190156345A1 (en) * | 2014-04-25 | 2019-05-23 | Avago Technologies International Sales Pte. Limited | Adaptive biometric and environmental authentication system |
CN105450610A (zh) * | 2014-08-29 | 2016-03-30 | 阿里巴巴集团控股有限公司 | 终端之间快速建立可信任的连接的方法及其系统 |
CN104571502A (zh) * | 2014-12-17 | 2015-04-29 | 联想(北京)有限公司 | 一种信息处理方法及穿戴式电子设备 |
CN110944326A (zh) * | 2019-12-10 | 2020-03-31 | 上海闻泰信息技术有限公司 | 蓝牙耳机的配对方法、装置、计算机设备及存储介质 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117955751A (zh) * | 2024-03-27 | 2024-04-30 | 常州满旺半导体科技有限公司 | 基于物联网的电子设备异常数据检测方法及系统 |
CN117955751B (zh) * | 2024-03-27 | 2024-06-11 | 常州满旺半导体科技有限公司 | 基于物联网的电子设备异常数据检测方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN114157412B (zh) | 2023-09-29 |
CN114157412A (zh) | 2022-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020224486A1 (zh) | 一种通话方法、设备及系统 | |
WO2021052178A1 (zh) | 一种Wi-Fi连接方法及设备 | |
WO2021023032A1 (zh) | 设备解锁方法、系统和相关设备 | |
WO2020062344A1 (zh) | 一种数据传输方法及电子设备 | |
WO2020207328A1 (zh) | 图像识别方法和电子设备 | |
WO2020042119A1 (zh) | 一种消息传输方法及设备 | |
CN112654989B (zh) | 数据保存方法、数据访问方法及相关装置、设备 | |
WO2020216098A1 (zh) | 一种跨电子设备转接服务的方法、设备以及系统 | |
WO2021175266A1 (zh) | 身份验证方法、装置和电子设备 | |
WO2021068926A1 (zh) | 模型更新方法、工作节点及模型更新系统 | |
WO2022143156A1 (zh) | 一种加密通话方法、装置、终端及存储介质 | |
CN113676879A (zh) | 一种分享信息的方法、电子设备和系统 | |
WO2020062304A1 (zh) | 一种文件传输方法及电子设备 | |
WO2020051852A1 (zh) | 一种通信过程中信息的记录及显示方法及终端 | |
WO2022135144A1 (zh) | 自适应显示方法、电子设备及存储介质 | |
WO2022095820A1 (zh) | 一种文本输入的方法、电子设备和系统 | |
WO2022037405A1 (zh) | 信息验证的方法、电子设备及计算机可读存储介质 | |
US20230214532A1 (en) | Permission negotiation method and apparatus during communication, and electronic device | |
CN113676440B (zh) | 通信过程中的权限协商方法、装置和电子设备 | |
WO2021147483A1 (zh) | 数据分享的方法和装置 | |
US11977946B2 (en) | Method for automatically activating NFC application and terminal | |
CN115525366A (zh) | 一种投屏方法及相关装置 | |
CN114117461A (zh) | 一种数据保护方法、电子设备及存储介质 | |
WO2022042273A1 (zh) | 密钥使用方法及相关产品 | |
CN115599596B (zh) | 数据处理方法、电子设备、系统及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21857500 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21857500 Country of ref document: EP Kind code of ref document: A1 |