WO2022143160A1 - 针对多个设备进行用户身份识别的方法及终端设备 - Google Patents

针对多个设备进行用户身份识别的方法及终端设备 Download PDF

Info

Publication number
WO2022143160A1
WO2022143160A1 PCT/CN2021/137958 CN2021137958W WO2022143160A1 WO 2022143160 A1 WO2022143160 A1 WO 2022143160A1 CN 2021137958 W CN2021137958 W CN 2021137958W WO 2022143160 A1 WO2022143160 A1 WO 2022143160A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
information
user
application
user identity
Prior art date
Application number
PCT/CN2021/137958
Other languages
English (en)
French (fr)
Inventor
张舒博
林于超
林嵩晧
郑理文
张宜成
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022143160A1 publication Critical patent/WO2022143160A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Definitions

  • the present application relates to the field of Internet technologies, and in particular, to a method and terminal device for performing user identity identification for multiple devices.
  • terminal manufacturers or Internet manufacturers users usually need to register an account and use the account to log in on the terminal device before they can be used.
  • multiple terminal devices can log in to the same account at the same time, enabling multiple terminal devices to share application resources.
  • the multiple terminal devices may be used by the user alone, or may be used by the user and other users (relatives or friends, etc.) respectively.
  • the present application provides a method and a terminal device for user identity identification for multiple devices, so as to solve the problem of how to determine whether the user identities of multiple terminal devices logging into the same account are the same.
  • the present application provides a method for user identification for multiple devices, the method comprising:
  • the first terminal device sends first biometric information to the second terminal device, where the first biometric information is the biometric information input by the user when the first terminal device successfully unlocks the screen, and the second terminal device is logged in with the first terminal device Devices of the same account;
  • the first terminal device receives a first message sent by the second terminal device, where the first message is used to indicate whether the first biometric information is successfully matched with the second biometric information pre-stored in the second terminal device;
  • the first terminal device determines whether the user identity of the first terminal device and the user identity of the second terminal device are the same according to the first message.
  • the first terminal device when the first terminal device successfully unlocks the screen, it can send the biometric information for unlocking the screen to the second terminal device, and the second terminal device uses the biometric information.
  • the feature information attempts to unlock the screen and returns the unlock attempt result to the first terminal device, and the first terminal device can determine whether the users of the two terminal devices are the same user according to the unlock attempt result.
  • the present application performs user identity identification for multiple terminal devices logged in to the same account, and can distinguish whether multiple terminal devices logged in to the same account are used by the same user or by different users, thereby more accurately providing users with targeted information. Serve.
  • the above-mentioned biological feature information includes fingerprint feature information, face feature information, iris feature information, palmprint feature information, etc., of course, it may also include other feature information that meets actual usage requirements.
  • determining whether the user identity of the first terminal device and the user identity of the second terminal device are the same according to the first message includes:
  • the first terminal device determines that the user identity of the first terminal device is the same as the user identity of the second terminal device;
  • the first terminal device determines that the user identity of the first terminal device is different from the user identity of the second terminal device.
  • the terminal devices when any one of the terminal devices successfully unlocks the screen, it can send the biometric information input by the user when the screen is unlocked to the other terminal device. If the other terminal device uses the The biometric information attempt to unlock the screen is successful, then it can be determined that the users of the two terminal devices are the same user. If the other terminal device fails to unlock the screen by using the biometric information, it can thus be determined that the users of the two terminal devices are different users.
  • sending the first biometric information to the second terminal device by the first terminal device includes: the first terminal device sending the first biometric information to the second terminal device through a point-to-point direct link characteristic information.
  • the above-mentioned first terminal device receiving the first message sent by the second terminal device includes: the first terminal device receiving the first message sent by the second terminal device through the point-to-point direct link.
  • the above method further includes: the first terminal device displays a first prompt message, the The first prompt message is used to prompt both the first terminal device and the second terminal device to log in to the first account and whether to prohibit sending the first application information related to the first application to the first terminal device or the second terminal device.
  • the above-mentioned first application is an application corresponding to the first account.
  • the above method further includes: in response to the first operation input by the user, the first terminal device sends the first prompt message to the server corresponding to the first application. Two messages, where the second message is used to instruct the server to send the application information to the first terminal device but not to the second terminal device. The first operation is used to confirm that the sending of the first application information to the second terminal device is prohibited.
  • the above method further includes: the first terminal device receives the first application information, The interface corresponding to the first application information is displayed on the screen of the .
  • the above-mentioned first application information may include at least one of the following: a video call incoming alert based on the first application, a voice call incoming alert based on the first application, and a text call message based on the first application The reminder is based on the recommendation information of the first application.
  • the above method further includes:
  • the first terminal device displays a second prompt message, where the second prompt message is used to prompt the first terminal device and the second terminal device to log in to the same account and whether to approve the first terminal device and the second terminal device to log in to different accounts.
  • the present application provides another method for user identification for multiple devices, the method comprising:
  • first information and second information where the first information is information obtained from the third biometric information through a first encryption process, the second information is information obtained from the fourth biometric information through a second encryption process, and the third biometric information is obtained through a second encryption process.
  • the biometric information is the biometric information used when the first terminal device successfully unlocks the screen, the fourth biometric information is the biometric information used when the second terminal device successfully unlocks the screen, the first terminal device and the second terminal device is a device that logs in to the same account;
  • the third information and the fourth information it is determined whether the user identity of the first terminal device is the same as the user identity of the second terminal device.
  • the biometric data sent by the two terminal devices after being transformed may be subjected to compensation transformation, and then the user of the two terminal devices may be determined according to whether the compensated and transformed data are the same. is the same.
  • user identification is performed for multiple terminal devices logging in to the same account, and it is possible to distinguish whether multiple terminal devices logging in to the same account are used by the same user or by different users, thereby more accurately providing users with targeted information.
  • the determining whether the user identity of the first terminal device and the user identity of the second terminal device are the same according to the third information and the fourth information includes:
  • the server determines that the user identity of the first terminal device is the same as the user identity of the second terminal device;
  • the server determines that the user identity of the first terminal device is different from the user identity of the second terminal device.
  • the acquiring the first information and the second information includes: acquiring the first information and an algorithm used in the first encryption process, and acquiring the second information and the algorithm used in the second encryption process algorithm.
  • the algorithm used in the first encryption process may be any one of a hash algorithm, a re-encoding algorithm, and a self-defined transformation algorithm.
  • the algorithm used in the second encryption process may be any one of a hash algorithm, a re-encoding algorithm, and a self-defined transformation algorithm.
  • the algorithm used in the first encryption process and the algorithm used in the second encryption process may be the same or different.
  • the method further includes:
  • the server sends first prompt information to the first terminal device and/or the second terminal device, where the first prompt information is used to prompt the first terminal device and the second terminal device to both log in to the first account, whether to prohibit the connection with the first application
  • the relevant first application information is sent to the first terminal device or the second terminal device.
  • the first application is an application corresponding to the first account.
  • the method further includes:
  • the server receives a second message sent by the first terminal device, where the second message is used to indicate that sending the first application information to the second terminal device is prohibited;
  • the server when acquiring the first application information, the server sends the first application information to the first terminal device but not to the second terminal device.
  • the above-mentioned first application information may include at least one of the following: a video call call reminder based on the first application, a voice call call reminder based on the first application, and a text call message based on the first application The reminder is based on the recommendation information of the first application.
  • the above method further includes:
  • the server sends second prompt information to the first terminal device and the second terminal device, the second prompt information is used to prompt the first terminal device and the second terminal device to log in to the same account, whether to agree to the first terminal device and the second terminal device. Log in to a different account.
  • the present application provides an apparatus for performing user identification for multiple devices, the apparatus including a unit for performing the method in the first aspect above.
  • the apparatus may correspond to executing the method described in the first aspect.
  • the description of the units in the apparatus please refer to the description of the first aspect. For brevity, details are not repeated here.
  • the method described in the first aspect above may be implemented by hardware, or may be implemented by executing corresponding software by hardware.
  • the hardware or software includes one or more modules or units corresponding to the above functions. For example, a processing module or unit, a display module or unit, and the like.
  • the present application provides another apparatus for performing user identification for multiple devices, the apparatus comprising a unit for executing the method in the second aspect above.
  • the apparatus may correspond to executing the method described in the second aspect.
  • the description of the units in the apparatus please refer to the description of the first aspect, which is not repeated here for brevity.
  • the method described in the second aspect above may be implemented by hardware, or may be implemented by executing corresponding software by hardware.
  • the hardware or software includes one or more modules or units corresponding to the above functions. For example, a processing module or unit, a display module or unit, and the like.
  • the present application provides a system for user identity identification for multiple devices, the system includes a first terminal device and a second terminal device, and the first terminal device and the second terminal device log into the same account.
  • the first terminal device configured to send the first biometric information to the second terminal device, where the first biometric information is the biometric information input by the user when the first terminal device successfully unlocks the screen;
  • the second terminal device is configured to match the first biometric information sent by the first terminal device with the second biometric information pre-stored in the second terminal device, and send the matching result to the first terminal device through a first message , the first message is used to indicate whether the first biometric information is successfully matched with the second biometric information;
  • the first terminal device is further configured to receive the first message sent by the second terminal device, and determine whether the user identity of the first terminal device is the same as the user identity of the second terminal device according to the first message.
  • determining whether the user identity of the first terminal device and the user identity of the second terminal device are the same according to the first message includes:
  • the first message indicates that the first biometric information and the second biometric information are successfully matched, it is determined that the user identity of the first terminal device is the same as the user identity of the second terminal device;
  • the first message indicates that the matching of the first biometric information and the second biometric information fails, it is determined that the user identity of the first terminal device is different from the user identity of the second terminal device.
  • the present application provides another system for user identification for multiple devices, the system includes a first terminal device, a second terminal device, and a server, and the first terminal device and the second terminal device log into the same account.
  • a first terminal device configured to send the first information obtained by the third biometric information through the first encryption process to the server when the screen is successfully unlocked by the third biometric information input by the user;
  • the second terminal device is configured to send the first information obtained by the fourth biometric information through the first encryption process to the server when the screen is successfully unlocked by the fourth biometric information input by the user;
  • the server is configured to perform second encryption processing on the first information to obtain third information, and perform first encryption processing on the second information to obtain fourth information;
  • the server is further configured to determine whether the user identity of the first terminal device is the same as the user identity of the second terminal device according to the third information and the fourth information.
  • determining whether the user identity of the first terminal device and the user identity of the second terminal device are the same according to the third information and the fourth information including:
  • the third information is the same as the fourth information, it is determined that the user identity of the first terminal device is the same as the user identity of the second terminal device;
  • the third information is different from the fourth information, it is determined that the user identity of the first terminal device is different from the user identity of the second terminal device.
  • obtaining the first information and the second information above includes: obtaining the first information and an algorithm used in the first encryption process, and obtaining the second information and an algorithm used in the second encryption process .
  • the algorithm used in the first encryption process may be any one of a hash algorithm, a re-encoding algorithm, and a self-defined transformation algorithm.
  • the algorithm used in the second encryption process may be any one of a hash algorithm, a re-encoding algorithm, and a self-defined transformation algorithm.
  • the algorithm used in the first encryption process and the algorithm used in the second encryption process may be the same or different.
  • the present application provides a terminal device, the terminal device includes a processor, the processor is coupled with a memory, the memory is used for storing computer programs or instructions, and the processor is used for executing the computer programs or instructions stored in the memory, so that the first aspect The method in is performed or the method in the second aspect is performed.
  • the processor is configured to execute the computer program or instructions stored in the memory, so that the terminal device executes the method in the first aspect or the method in the second aspect.
  • the present application provides a computer-readable storage medium on which a computer program (also referred to as instructions or codes) for implementing the method in the first aspect or the method in the second aspect is stored.
  • a computer program also referred to as instructions or codes
  • the computer program when executed by a computer, causes the computer to perform the method of the first aspect or the method of the second aspect.
  • the present application provides a chip including a processor.
  • the processor is configured to read and execute the computer program stored in the memory to perform the method of the first aspect and any possible implementation thereof or the method of the second aspect and any possible implementation thereof.
  • the chip further includes a memory, and the memory is connected to the processor through a circuit or a wire.
  • the present application provides a chip system including a processor.
  • the processor is configured to read and execute the computer program stored in the memory to perform the method of the first aspect and any possible implementation thereof or the method of the second aspect and any possible implementation thereof.
  • the chip system further includes a memory, and the memory is connected to the processor through a circuit or a wire.
  • the present application provides a computer program product, the computer program product comprising a computer program (also referred to as instructions or codes), which, when executed by a computer, causes the computer to implement the first aspect.
  • a computer program also referred to as instructions or codes
  • FIG. 1 is a schematic diagram of a system architecture involved in various exemplary embodiments of the present application
  • FIG. 2 is one of the schematic flowcharts of the method for performing user identity identification on multiple devices provided by an embodiment of the present application
  • FIG. 3 is the second schematic flowchart of a method for performing user identity identification on multiple devices provided by an embodiment of the present application
  • FIG. 4 is a third schematic flowchart of a method for performing user identity identification on multiple devices provided by an embodiment of the present application
  • FIG. 5 is a schematic diagram of an application interface of the method for performing user identity identification on multiple devices provided by an embodiment of the present application
  • FIG. 6 is a fourth schematic flowchart of a method for performing user identity identification on multiple devices provided by an embodiment of the present application.
  • FIG. 7 is a fifth schematic flowchart of a method for performing user identity identification for multiple devices provided by an embodiment of the present application.
  • FIG. 8 is a sixth schematic flowchart of a method for performing user identity identification for multiple devices provided by an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of an apparatus for performing user identification for multiple devices according to an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of another apparatus for performing user identity identification for multiple devices provided by an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • first and second and the like in the specification and claims herein are used to distinguish between different objects, rather than to describe a particular order of the objects.
  • first message and the second message, etc. are used to distinguish different messages, rather than to describe a specific order of the messages.
  • words such as “exemplary” or “for example” are used to represent examples, illustrations or illustrations. Any embodiments or designs described in the embodiments of the present application as “exemplary” or “such as” should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as “exemplary” or “such as” is intended to present the related concepts in a specific manner.
  • plural refers to two or more, for example, a plurality of processing units refers to two or more processing units, etc.; a plurality of An element refers to two or more elements or the like.
  • FIG. 1 shows a schematic diagram of a system architecture involved in various exemplary embodiments of the present application.
  • the system architecture includes terminal device 1 and terminal device 2, and terminal device 1 and terminal device 2 log in to the same account (or account), so the two terminal devices can share services bound by the account.
  • the account can be used to access various application services provided by the terminal manufacturer or the Internet manufacturer.
  • the user can perform the following operations:
  • cloud services cloud space services
  • online themes music, videos, smart assistants and other services
  • Accounts can support functions such as registration, login, password retrieval, password modification, user information modification, secure mobile phone number and email address settings, self-service appeals, and account freezing/unfreezing.
  • the cloud space can securely store important data such as photos, videos, contacts, and memos, and keep it updated in real time on each device.
  • Cloud space can realize automatic data backup, multi-terminal synchronization of common data, and remote search of mobile phones, thereby helping users manage data more safely and conveniently.
  • the smart assistant is integrated on the negative screen of the mobile phone, providing users with an interactive portal for convenient services such as situational intelligence, voice assistant, application recommendation and secure payment, and provides assistant services.
  • the user needs to register an account and then log in to the account on the device before using the application resources.
  • the user needs to bind the ID number (commonly known as the real-name system), or bind the mobile phone number (belonging to the real-name system), and/or fill in other user information (such as gender, date of birth, etc.).
  • multiple terminal devices can log in to the same account at the same time and use the resources of a certain application or platform.
  • the services bound to this account can be shared by multiple terminal devices at the same time.
  • the multiple terminal devices may be used by the same user, or may be used by multiple users separately.
  • server 3 when terminal device 1 and terminal device 2 log in to the same account, if server 3 sends a service message 01 bound to the account, it usually sends a message to both terminal device 1 and terminal device 2 message 01, so that both terminal device 1 and terminal device 2 will receive message 01, and if these multiple terminal devices are used by different users, unnecessary message interference may be caused, and even personal privacy may be leaked.
  • the embodiment of the present application proposes to perform user identity identification for multiple terminal devices that log in to the same account, so as to distinguish whether the multiple terminal devices logged in to the same account are used by the same user or different users, and further provide users with targeted services provided.
  • Each terminal device provides different services, for example, it can provide all services to users with high priority, and provide some services (such as audio/video recommendation service) to users with low priority, but not provide services with higher sensitivity (such as Wallet information and/or travel information, etc.), the specific services provided to different users can be set by the system, or can be set by users with high priority according to personal needs, which are not limited in this embodiment of the present application.
  • Fig. 2 is a flow chart of a method for user identification for multiple devices according to an exemplary embodiment, wherein the first terminal device and the second terminal device log into the same account.
  • the method 100 includes the following steps S110-S150.
  • the first terminal device successfully unlocks the screen according to the first biometric information input by the user.
  • the above-mentioned first biometric information is one or more items of biometric information input when the user triggers to unlock the screen of the first terminal device, such as fingerprint characteristic information, face characteristic information, iris characteristic information and/or palm print.
  • the feature information may also include other feature information that meets actual usage requirements. Specifically, it can be determined according to actual use requirements, which is not limited in the embodiment of the present application.
  • the following is an example of the first biometric feature information being the fingerprint feature information input when the user triggers to unlock the screen of the first terminal device.
  • biometric information may be pre-stored in the first terminal device, such as fingerprint characteristic information and face characteristic information pre-recorded by the user, and of course other biometric information may be included, which is not limited in this application.
  • the first terminal device can use the pre-stored biometric information to compare (ie, match) the biometric information input by the user, and perform user identity authentication, such as fingerprint recognition, according to the matching result. Authentication or face recognition authentication. If the match is successful, the user identity is credible, and the first terminal device can unlock the screen accordingly; if the match fails, the user identity is not credible, and the first terminal device can not respond accordingly.
  • the first terminal device when the first terminal device is in the screen lock state, if the user performs an unlocking operation on the first terminal device (for example, the finger touches the fingerprint sensing area), the first terminal device can User identity verification is performed with biometric information (eg, consecutive multiple frames of fingerprint images), that is, the first biometric information is matched with the biometric information pre-stored by the first terminal device. If the matching is successful, the first terminal device successfully unlocks the screen; if the matching fails, the first terminal device may not respond.
  • biometric information eg, consecutive multiple frames of fingerprint images
  • the similarity between the first biometric information and the pre-stored biometric information is greater than or equal to the preset similarity, it may be considered that the matching is successful. If the similarity after comparison is less than the preset similarity, it can be considered that the matching fails.
  • the preset similarity is specifically determined according to actual usage requirements, which is not limited in the embodiment of the present application.
  • the first terminal device when the first terminal device is in the screen lock state, if the user's finger touches the fingerprint sensing area of the first terminal device, the first terminal device can respond to User operation, collect multiple consecutive fingerprint images, and compare them with the local pre-stored fingerprint feature information in turn. If the fingerprint feature information matches successfully, the first terminal device unlocks the screen successfully; if the fingerprint feature information fails to match, the first terminal device Device is not responding.
  • the first terminal device sends the first biometric information to the second terminal device.
  • the first terminal device unlocks the screen, and sends the first biometric information to the second terminal device.
  • the first terminal device may pre-store an identifier of a device (for example, a second terminal device) that logs in to the same account as the first terminal device.
  • the identifier of the device (for example, the first terminal device) that logs in to the same account.
  • the first terminal device may establish a connection with the second terminal device after discovering the second terminal device based on the pre-stored identifier of the second terminal device.
  • the first terminal device can broadcast a message to other surrounding terminal devices, and the message carries the identifier of the second terminal device. After receiving the broadcast message, the second terminal device returns a response message to the first terminal device.
  • a terminal device establishes a connection with a second terminal device. Further, the first terminal device may send the first biometric information to the second terminal device.
  • the identification of the above-mentioned first terminal equipment may be the international mobile subscriber identity code stored in the subscriber identity module (subscriber identity module, SIM) card of the first terminal equipment, or may be the international mobile subscriber identity code stored in the first terminal equipment.
  • SIM subscriber identity module
  • the mobile device identification code, or other identification information that can uniquely identify the terminal device, is not limited in this application.
  • the first terminal device may send the first biometric information to the second terminal device through a point-to-point direct link.
  • the point-to-point direct link can be a Wi-Fi link, a Bluetooth link, or any other direct link that meets the actual use requirements, which can be determined according to the actual use requirements.
  • the application examples are not limited.
  • the terminal device 1 sends the fingerprint feature information to the terminal device 2 through the Wi-Fi link, and the terminal device 2 receives the fingerprint feature information sent by the terminal device 1 through the Wi-Fi link.
  • the second terminal device determines whether the first biometric information and the second biometric information can be successfully matched.
  • the above-mentioned second biometric information is one or more items of biometric information pre-stored in the second terminal device.
  • the second terminal device can use the second biometric information. Compare (ie, match) with the biometric information input by the user, and perform user identity authentication according to the matching result: if the matching is successful, the user's identity is credible; if the matching fails, the user's identity is not credible.
  • the above-mentioned second biometric information may include fingerprint feature information and face feature information pre-entered by the user, and of course may also include other biometric information pre-entered by the user, for example, may also include iris feature information and/or palm print.
  • the feature information and the like can be specifically determined according to actual usage requirements, which are not limited in the embodiments of the present application.
  • the second terminal device sends a first message to the first terminal device, and the first terminal device receives the first message sent by the second terminal device, where the first message is used to indicate whether the first biometric information can be associated with the second biometric Information matched successfully.
  • the second terminal device compares (ie matches) the first biometric feature information used by the first terminal device to unlock the screen with the second biometric feature information pre-stored locally by the second terminal device, and compares the two The matching result is returned to the first terminal device in the first message.
  • the first terminal device may receive the first message sent by the second terminal device through the above point-to-point direct link.
  • the terminal device 2 sends the first message for indicating the matching result to the terminal device 1 through the Wi-Fi link, and the terminal device 1 receives the first message sent by the terminal device 2 through the Wi-Fi link.
  • the first terminal device determines whether the user identity of the first terminal device is the same as the user identity of the second terminal device according to the first message.
  • the first terminal device can determine whether the user's first biometric information can be successfully unlocked on both the first terminal device and the second terminal device according to the first message, and then can determine the user identity of the first terminal device and the first terminal device. Whether the user identities of the two terminal devices are the same.
  • the first terminal device for two terminal devices that log in to the same account, when the first terminal device successfully unlocks the screen, it can send the biometric information used to unlock the screen to The second terminal device, the second terminal device uses the biometric information to try to unlock the screen and returns the unlock attempt result to the first terminal device, and the first terminal device can determine whether the users of the two terminal devices are the same according to the unlock attempt result. user.
  • user identification is performed for multiple terminal devices logging in to the same account, and it is possible to distinguish whether multiple terminal devices logging in to the same account are used by the same user or by different users, thereby more accurately providing users with targeted information. Serve.
  • the above-mentioned S150 can be specifically implemented by the following S151 or S152 , and one of S151 and S152 is executed.
  • the first terminal device determines that the user identity of the first terminal device is the same as the user identity of the second terminal device.
  • terminal device 1 and terminal device 2 are two devices that log into the same account.
  • terminal device 1 displays the first biometric feature input by the user.
  • the information (such as fingerprint information) is matched with the biometric information pre-stored by the terminal device 1. If the matching is successful (that is, the screen is unlocked successfully), the first biometric information is further matched with the second biometric information pre-stored by the terminal device 2.
  • the terminal device 1 and the terminal Device 2 has the same user identity. It should be noted that, as shown in FIG. 4 , there is no interaction, comparison or matching between the biometric information pre-stored by the terminal device 1 and the second biometric information pre-stored by the terminal device 2 .
  • the user's first biometric information can successfully unlock the screen on the first terminal device, and try to unlock the screen successfully on the second terminal device, that is, the user's first biometric information is on the first terminal device and the second terminal device. Both terminal devices can be successfully unlocked, so it can be determined that the user of the first terminal device and the user of the second terminal device are the same user. In this way, when the users of multiple terminal devices logging in to the same account are the same user, it is not necessary to block relevant service information.
  • the first terminal device determines that the user identity of the first terminal device is different from the user identity of the second terminal device.
  • the terminal device 1 compares the first biometric information (such as fingerprint information) input by the user with the biometric information pre-stored by the terminal device 1. The information is matched. If the matching is successful (that is, the screen is unlocked successfully), the first biometric information is further matched with the second biometric information pre-stored by the terminal device 2. If the first biometric information matches the second biometric information If it fails, it can be concluded that the user identities of terminal device 1 and terminal device 2 are different.
  • the first biometric information such as fingerprint information
  • the method of identifying the user identity through interaction between terminal devices adopted in the first embodiment may be called the end-to-end cross-check mode. Since the user's first biometric information can successfully unlock the screen on the first terminal device, The attempt to unlock the screen on the second terminal device fails, so it can be determined that the user of the first terminal device and the user of the second terminal device are different users. In this way, in the case where users of multiple terminal devices logging into the same account are different users, different services can be provided for different users to improve user experience.
  • both mobile phone A and mobile phone B complete biometric (such as fingerprint/face, etc.) entry, and log in to the same account.
  • biometric such as fingerprint/face, etc.
  • the A mobile phone records the unlocking result.
  • unlocking the screen fails, mobile phone A does nothing; on the other hand, if unlocking the screen is successful, mobile phone A synchronizes the current biometric data to mobile phone B.
  • mobile phone B uses the fingerprint/face data sent by mobile phone A to perform an unlock attempt, but does not perform post-unlock actions (ie, unlock the screen).
  • mobile phone B records the unlocking result (regardless of whether the unlocking of the screen is successful or the unlocking of the screen fails), and returns the unlocking result to A.
  • a mobile phone makes a judgment based on the unlocking result: if the unlocking fails, it can be determined that the users of mobile phone A and mobile phone B are not the same user; if the unlocking is successful, it can be determined that the users of mobile phone A and mobile phone B are the same user.
  • the user's biometric information can successfully unlock the screen on terminal device 1, and try to unlock the screen on terminal device 2 and terminal device 3 successfully, so it can be determined that the user of terminal device 1, the user of terminal device 2 and the terminal device 3 users are the same user.
  • the user's biometric information can successfully unlock the screen on terminal device 1, but the attempt to unlock the screen on terminal device 2 and terminal device 3 fails. Therefore, it can be determined that the user of terminal device 1, the user of terminal device 2 and the terminal device 3 users are different users.
  • the user's biometric information can successfully unlock the screen on terminal device 1, and successfully try to unlock the screen on terminal device 2, but fail to unlock the screen on terminal device 3, so it can be determined that the user of terminal device 1 and terminal device 2
  • the users of terminal device 1 are the same user, but the user of terminal device 1 and the user of terminal device 3 are different users. It can be understood that the user of the terminal device 2 and the user of the terminal device 3 are different users.
  • the identification result may be recorded.
  • the identification result may be recorded to improve identification accuracy.
  • the method for user identification for multiple devices for two terminal devices that log in to the same account, when any one of the terminal devices successfully unlocks the screen, it can send the biometric information input by the user when the screen is unlocked. For another terminal device, if the other terminal device successfully attempts to unlock the screen by using the biometric information, then it can be determined that the users of the two terminal devices are the same user. If the other terminal device fails to unlock the screen by using the biometric information, it can thus be determined that the users of the two terminal devices are different users.
  • user identification is performed for multiple terminal devices logging in to the same account, and it is possible to distinguish whether multiple terminal devices logging in to the same account are used by the same user or by different users, thereby more accurately providing users with targeted information. Serve.
  • an account registered based on an application (or platform) can associate the user's terminal device with the application (or platform).
  • the server corresponding to the application (or platform) can send application information related to the application (or platform) to the terminal device to provide services for the user.
  • the present application proposes to perform user identity identification for the two terminal devices. If the user identities of the terminal devices are different, the user may be prompted to choose whether to send the first application information related to the first application to the two terminal devices or to one of the terminal devices (for example, the terminal device with higher priority) Yes, so that users can be provided with targeted services in a differentiated manner.
  • the first terminal device may display a first prompt message to prompt the first terminal device and Whether the second terminal device is logged into the first account, whether to prohibit sending the first application information related to the first application to the first terminal device or the second terminal device. Further, in response to the first operation input by the user (for confirming that the sending of the first application information to the second terminal device is prohibited), the first terminal device may send a second message to the server corresponding to the first application to indicate the server The first application information is sent to the first terminal device but not to the second terminal device. In this case, the first terminal device can receive the first application information, and can display an interface corresponding to the first application information on the screen of the first terminal device, while the second terminal device no longer receives the first application information, avoiding Information interference or information leakage.
  • both the first terminal device and the second terminal device log into the first account. Assuming that the first terminal device is the primary device and the second terminal device is the secondary device, it can be considered that the priority of the first terminal device is higher than that of the first terminal device. 2. The priority of the terminal device. In this case, the first prompt message may prompt whether to prohibit sending the first application information to the second terminal device.
  • the above-mentioned first application information may be set by the system, or may be set by the user according to requirements, and may be specifically determined according to actual use requirements, which is not limited in this embodiment of the present application.
  • the first application information may be some specific types of data or information that are highly related to user behavior, such as information that is highly related to user privacy (such as wallet information), or that is more closely related to major users. Information that is high but less relevant to other users (such as flight reminders).
  • the first application information as a non-shared resource of multiple terminal devices logging in to the same account, needs to be shielded for secondary devices to avoid information interference or information leakage;
  • multiple types of application information such as video recommendation information and audio recommendation information, can be used as a shared resource for multiple terminal devices that log in to the same account, and there is no need to block information for secondary devices.
  • one type of multiple types of application information as a shared resource can also be selected by the user according to requirements, or set by the system.
  • the above-mentioned first application information may include any one of the following: a video call incoming alert based on the first application, a voice call incoming alert based on the first application, a text call message alert based on the first application, Recommended information for an application (eg, flight reminder information).
  • the first application information may also be any other information (for example, wallet information) that meets actual usage requirements, which may be specifically determined according to actual usage requirements, which is not limited in this embodiment of the present application.
  • terminal device 1 may display the following prompt message: "Both terminal device 1 and terminal device 2 have logged into the first account, whether it is forbidden to send the following types of application information to terminal device 2: Wallet information, video call call reminder, voice call call reminder, flight reminder information, video recommendation information and audio recommendation information”, after the user selects one or more types of application information and clicks the confirm button, the user selects one or more types of application information. Multiple types of application information will be sent to terminal device 1, but not to terminal device 2, and one or more types of application information not selected by the user will be sent to terminal device 1 and terminal device 2, thereby avoiding Information interference or information leakage.
  • the user of the terminal device 1 can set or select application information such as wallet information, video call incoming alert, voice call incoming alert, flight alert information, etc., according to requirements, and send it to the terminal device 1 but not to the terminal device 2.
  • application information such as wallet information, video call incoming alert, voice call incoming alert, flight alert information, etc.
  • the selected video recommendation information and audio recommendation information are both sent to the terminal device 1 and the terminal device 2 .
  • both terminal devices 1 and 2 logging into the same account will receive the application information 1 . Since the users of the two terminal devices are different users, the application information 1 may be required by the user of the terminal device 1 but not the user of the terminal device 2, which may cause information interference or information leakage.
  • the server 3 if the user identities of the two terminal devices that log into the same account are different, they will receive different application information differently. From the perspective of the server, the server 3 will target different user identities. Distribute application information differently to two terminal devices.
  • the server will deliver the application information 01 required by the user of the terminal device 1 to the terminal device 1. Accordingly, the terminal device 1 can receive the application information 01 and display it to the user for viewing. The user does not need the information, so the server 3 will not deliver it to the second terminal device, so the second terminal device will not receive or display it.
  • the application information 02 is used as a shared resource, and the server 3 can deliver the application information 02 to the terminal device 1 and the terminal device 2, and accordingly both the terminal device 1 and the terminal device 2 will receive and display the application information 02.
  • the above provides a specific implementation method for the user to select and deliver the first application message related to the first application to the first terminal device and/or the second terminal device. It can be understood that in actual implementation, This embodiment of the present application may further include other implementation manners. For example, when the server determines that the priority of the first terminal device is higher than the priority of the second terminal device (the first terminal device is the main device), the server may accordingly assign the first terminal device to the first terminal device. An application message is delivered to the first terminal device, and is no longer delivered to the second terminal device, so as to avoid information interference or information leakage, and the user does not need to make a selection, thereby improving the user experience.
  • the first terminal device may display a second prompt message, where the second prompt message is used to prompt the first terminal device Whether a terminal device and a second terminal device log into the same account, whether to allow the first terminal device and the second terminal device to log in to different accounts. In this way, if the user chooses to allow the first terminal device and the second terminal device to log in to different accounts, information interference or information leakage can be avoided.
  • the screen can be successfully unlocked on the terminal device 1, and whether the screen is successfully unlocked on the terminal device 2, it is determined whether the terminal device 1 and the terminal device 2 who log in to the same account are the same user. identity.
  • other unlocking information such as the password entered by the user when unlocking the screen
  • User identification can also be used to identify the two terminal devices logged into the same account.
  • the specific implementation method of using a password to perform user identity recognition on two terminal devices logging in to the same account can refer to the above detailed description of using user biometric information to perform user identity recognition on two terminal devices logging in to the same account, which is not repeated here. Repeat.
  • the above describes a method for user identity identification for multiple devices provided by the first embodiment of the present application, in which two terminal devices logging into the same account perform user identity identification through information exchange between each other.
  • a method for user identity identification for multiple devices provided by the second embodiment of the present application is exemplarily described below with reference to the accompanying drawings, wherein two terminal devices logging into the same account interact with the server side, and the server side verifies the two terminals.
  • the device performs user identification, and this method of server-side identification can be called the device-cloud arbitration method.
  • the user identity of the two terminal devices may also be performed by the terminal device side (for example, it may be any one of the two terminal devices, or may be a third-party device) according to the combined encrypted biometric information.
  • FIG. 6 is a flowchart of a method for user identity identification for multiple devices provided by an embodiment of the present application, where the first terminal device and the second terminal device log in to the same account.
  • the method 200 includes the following steps S211-S240.
  • the first terminal device successfully unlocks the screen according to the third biometric information input by the user.
  • the third biometric information is the biometric information used when the first terminal device successfully unlocks the screen.
  • the first terminal device performs a first encryption process on the third biometric information to obtain the first information.
  • the first terminal device sends the first information to the server.
  • the first terminal device will also send the algorithm used in the first encryption process to the server.
  • the first terminal device when the screen is successfully unlocked, the first terminal device encrypts the biometric information used when the screen is successfully unlocked, and then sends it to the server.
  • the second terminal device successfully unlocks the screen according to the fourth biometric feature information input by the user.
  • the fourth biometric information is the biometric information used when the second terminal device successfully unlocks the screen.
  • the second terminal device performs second encryption processing on the third biometric information to obtain second information.
  • the second terminal device sends the second information to the server.
  • the second terminal device will also send the algorithm used in the second encryption process to the server.
  • the second terminal device when the screen is successfully unlocked, the second terminal device encrypts the biometric information used when the screen is successfully unlocked, and then sends it to the server.
  • the embodiments of the present application do not limit the execution order of the foregoing S211-S213 and the foregoing S221-S223.
  • S211-S213 is executed first, and S221-S223 is executed later; or S221-S223 is executed first, and S211-S213 is executed later; or S211-S213 and the above-mentioned S211-S213 may be executed simultaneously.
  • it can be determined according to the actual situation, which is not limited in the embodiment of the present application.
  • the algorithm used in the above-mentioned first encryption process may be a hash algorithm, a re-encoding algorithm, or a self-defined transformation algorithm, or any other encryption algorithm that meets actual usage requirements.
  • the algorithm used in the second encryption process may be a hash algorithm, a re-encoding algorithm, or a self-defined transformation algorithm, or any other encryption algorithm that meets actual usage requirements.
  • the algorithm used in the first encryption process and the algorithm used in the second encryption process are both randomly selected from the encryption algorithm library, so the algorithm used in the first encryption process and the algorithm used in the second encryption process are both randomly selected.
  • the algorithms may be the same or different, which are not limited in this embodiment of the present application.
  • the third biometric information and the fourth biometric information should be the same type of biometric information.
  • both are fingerprint feature information, or both are face feature information, or both can be any other possible biometric information.
  • an exemplary description is given below by taking both of them as fingerprint feature information as an example.
  • S230 The server performs second encryption processing on the first information to obtain third information, and performs first encryption processing on the second information to obtain fourth information.
  • the server may pre-store or record the identifiers of multiple terminal devices under the same account. For example, if both terminal device 1 and terminal device 2 use account 1, the server may record the correspondence between account 1 and terminal device 1 and terminal device 2. Therefore, the terminal device 1 and the terminal device 2 have an associated relationship. In this way, the server can identify the terminal device 1 and the terminal device 2 with the associated relationship accordingly.
  • the third biometric information of the user is subjected to the second encryption process after the first encryption process to obtain the third information
  • the fourth biometric information of the user is subjected to the first encryption process after the second encryption process to obtain the Fourth information.
  • S240 The server determines whether the user identity of the first terminal device is the same as the user identity of the second terminal device according to the third information and the fourth information.
  • the first terminal device performs a first encryption process on the third biometric information (the encrypted information is referred to as the first information) when the screen is successfully unlocked according to the third biometric information input by the user.
  • Send to the server, and the second terminal device also sends the fourth biometric information after the second encryption process (the encrypted information is called second information) to
  • the server performs a second encryption process on the first information to obtain third information, and performs a first encryption process on the second information to obtain fourth information, and determines whether the third information and the fourth information are the same. Whether the user is the same user.
  • user identification is performed for multiple terminal devices logging in to the same account, and it is possible to distinguish whether multiple terminal devices logging in to the same account are used by the same user or by different users, thereby more accurately providing users with targeted information.
  • the above S240 may be specifically implemented by the following S241 or S242 , and S241 or S242 is alternatively executed.
  • the server determines that the user identity of the first terminal device is the same as the user identity of the second terminal device.
  • terminal device 1 and terminal device 2 are two devices that log into the same account.
  • terminal device 1 displays the third biometric feature input by the user.
  • the information (such as fingerprint information) is matched with the biometric information pre-stored in the terminal device 1. If the matching is successful (that is, the screen is unlocked successfully), the third biometric information is subjected to the first encryption process, and the encrypted first information is obtained. Send it to the server 3, and inform the server 3 of the algorithm used in the first encryption process.
  • the terminal device 2 matches the fourth biometric information (such as fingerprint information) input by the user with the biometric information pre-stored by the terminal device 2. If the matching is successful (ie, the screen is unlocked successfully), the fourth biometric information is subjected to a second encryption process, the second information obtained after encryption is sent to the server 3, and the server 3 is informed of the algorithm used in the second encryption process. After receiving the first information and the second information, the server 3 performs the second encryption processing on the first information to obtain the third information, performs the first encryption processing on the second information to obtain the fourth information, and encrypts the third information and the fourth information. The information is compared or matched, and if the matching is successful, it can be concluded that the user identities of the terminal device 1 and the terminal device 2 are the same.
  • the fourth biometric information such as fingerprint information
  • the third biometric information is subjected to the first encryption process and then the second encryption process, that is, the third biometric information undergoes combined encryption to obtain the third information
  • the fourth biometric information is first subjected to the first encryption process.
  • the first encryption process is performed, that is, the fourth biometric information is subjected to combined encryption to obtain the fourth information. If the third information and the fourth information are the same, it indicates that the user biometric information used by the terminal device 1 to unlock the screen is the same as the user biometric information used by the terminal device 2 to unlock the screen. Thus, it can be determined that the user of the terminal device 1 and the user of the terminal device 2 are the same user. In this way, when the users of multiple terminal devices logging in to the same account are the same user, it is not necessary to shield the service information.
  • the server determines that the user identity of the first terminal device is different from the user identity of the second terminal device.
  • the server 3 compares or matches the third information and the fourth information. If the matching fails, it can be concluded that the user identities of the terminal device 1 and the terminal device 2 are different.
  • the third information and the fourth information are different, it indicates that the third biometric information input by the user of the first terminal device and the fourth biometric information input by the user of the second terminal device are different. Thereby, it can be determined that the user of the first terminal device and the user of the second terminal device are different users. In this way, in the case where users of multiple terminal devices logging into the same account are different users, different services can be provided for different users to improve user experience.
  • the cloud side ie, the cloud server
  • the cloud side may record the identifiers of multiple terminal devices corresponding to each account, and the multiple terminal devices have an associated relationship because they all use the same account. It is assumed below that the terminal devices using a certain account are recorded on the cloud side, including mobile phone A and mobile phone B.
  • mobile phone A when mobile phone A unlocks the screen through biometric features, it selects a method a from the candidate transformation method library (for example, including a variety of hash algorithms, recoding algorithms, custom transformation algorithms, etc.); The information is transformed by the a method (referred to as a transform), and the transformed data is uploaded to the cloud side, and the cloud side is told that the transformation method used is the a method.
  • a method a for example, including a variety of hash algorithms, recoding algorithms, custom transformation algorithms, etc.
  • a b method from the candidate transformation method library (for example, including multiple hash algorithms, recoding algorithms, custom transformation algorithms, etc.);
  • the feature information is transformed by the b method (referred to as b transform), and the transformed data is uploaded to the cloud side, and at the same time, the cloud side is told that the transformation method adopted is the b method.
  • the cloud side performs compensation and transformation on the transformed data uploaded by mobile phone A and mobile phone B respectively, for example, the transformed data uploaded by mobile phone A is transformed by b, and the transformed data uploaded by mobile phone B is transformed Then perform a transformation.
  • the two pieces of data after compensation and transformation are subjected to cloud-side data collision. It should be noted that due to the limited number of devices under one account, the probability of illegal collision is extremely small. Then explain the judgment result after cloud-side data collision: if the two data after compensation and transformation match successfully, the cloud-side collision result is successful, indicating that the users who log in to the same account on mobile phone A and mobile phone B are the same user. If the two pieces of data after compensation and transformation fail to match, the cloud-side collision result fails, indicating that the users who log in to mobile phone A and mobile phone B are not the same user.
  • the cloud side does not store such transformed data for a long time. For example, the cloud side will clean up such transformed data after completing data collisions. data.
  • the biometric data used to unlock the screen of mobile phone A undergoes a transformation
  • the biometric data used to unlock the screen of mobile phone B undergoes a transformation
  • the biometric data used to unlock the screen of mobile phone B undergoes a transformation
  • the biometric data used by C mobile phone to unlock the screen undergoes c-transformation on the cloud side
  • the transformed data is uploaded to the cloud side
  • the cloud side compensates and transforms the transformed data uploaded by A mobile phone, B mobile phone and C mobile phone respectively.
  • the transformed data uploaded by mobile phone A is subjected to b-transformation and c-transformation
  • the transformed data uploaded by mobile phone B is subjected to a-transformation and c-transformation
  • the transformed data uploaded by mobile phone C is subjected to a-transformation and b-transformation .
  • the three items of data after compensation and transformation are subjected to cloud-side data collision. If the three items of data after compensation and transformation are successfully matched, the cloud-side collision result is successful, indicating that the users who log in to the same account on mobile phone A, mobile phone B, and mobile phone C are the same user. If the three items of data after compensation and transformation fail to match, the cloud-side collision result fails, indicating that the users who log in to A, B, and C are not the same user.
  • the following method can also be used: on the cloud side, the data after compensation and transformation are divided into two pairs. collision, so that it can be more accurately judged whether the user of any two terminal devices among the three or more terminal devices is the same user.
  • the server may send first prompt information to the first terminal device and/or the second terminal device, the first The prompt information is used to prompt both the first terminal device and the second terminal device to log in to the first account and whether to prohibit sending the first application information related to the first application to the first terminal device or the second terminal device.
  • the first application is an application corresponding to the first account
  • the server may be a server corresponding to the first application.
  • the first terminal device receives the first prompt information sent by the server, and displays the first prompt information. Further, in response to the first operation input by the user (for confirming that the sending of the first application information to the second terminal device is prohibited), the first terminal device may send a second message to the server to instruct the server to send the first application information. to the first terminal device and not to the second terminal device.
  • the server receives the second message sent by the first terminal device, and according to the second message, when acquiring the first application information, sends the first application information to the first terminal device but not to the second terminal equipment. In this way, the first terminal device can receive the first application information, and can display an interface corresponding to the first application information on the screen of the first terminal device, while the second terminal device no longer receives the first application information, avoiding information interference or Information disclosure.
  • the above-mentioned first application information may be set by the system, or may be set by the user according to requirements, and may be specifically determined according to actual use requirements, which is not limited in this embodiment of the present application.
  • the first application information may be some specific types of data or information that are highly related to user behavior, such as information that is highly related to user privacy (such as wallet information), or that is more closely related to major users. Information that is high but less relevant to other users (such as flight reminders).
  • the first application information as a non-shared resource of multiple terminal devices logging in to the same account, needs to be shielded for secondary devices to avoid information interference or information leakage;
  • multiple types of application information such as video recommendation information and audio recommendation information, can be used as a shared resource for multiple terminal devices that log in to the same account, and there is no need to block information for secondary devices.
  • one type of multiple types of application information as a shared resource can also be selected by the user according to requirements, or set by the system.
  • the above-mentioned first application information may include any one of the following: a video call incoming alert based on the first application, a voice call incoming alert based on the first application, a text call message alert based on the first application, Recommended information for an application (eg, flight reminder information).
  • the first application information may also be any other information (for example, wallet information) that meets actual usage requirements, which may be specifically determined according to actual usage requirements, which is not limited in this embodiment of the present application.
  • terminal device 1 may display the following prompt message: "Both terminal device 1 and terminal device 2 have logged into the first account, whether it is forbidden to send the following types of application information to terminal device 2: Wallet information, video call call reminder, voice call call reminder, flight reminder information, video recommendation information and audio recommendation information”, after the user selects one or more types of application information and clicks the confirm button, the user selects one or more types of application information. Multiple types of application information will be sent to terminal device 1, but not to terminal device 2, and one or more types of application information not selected by the user will be sent to terminal device 1 and terminal device 2, thereby avoiding Information interference or information leakage.
  • the user of the terminal device 1 can set or select application information such as wallet information, video call incoming alert, voice call incoming alert, flight alert information, etc., according to requirements, and send it to the terminal device 1 but not to the terminal device 2.
  • application information such as wallet information, video call incoming alert, voice call incoming alert, flight alert information, etc.
  • the selected video recommendation information and audio recommendation information are both sent to the terminal device 1 and the terminal device 2 .
  • the above provides a specific implementation method for the user to select and deliver the first application message related to the first application to the first terminal device and/or the second terminal device. It can be understood that in actual implementation, This embodiment of the present application may further include other implementation manners. For example, when the server determines that the priority of the first terminal device is higher than the priority of the second terminal device (the first terminal device is the main device), the server may accordingly assign the first terminal device to the first terminal device. An application message is delivered to the first terminal device, and is no longer delivered to the second terminal device, so as to avoid information interference or information leakage, without requiring the user to make selections, and improve user experience.
  • the server may send second prompt information to the first terminal device and the second terminal device , to prompt the first terminal device and the second terminal device to log in to the same account and whether to approve the first terminal device and the second terminal device to log in to different accounts. Further, assuming that the first terminal device receives the second prompt message, and the first terminal device displays the second prompt message, if the user chooses to allow the first terminal device and the second terminal device to log in to different accounts, information interference or information can be avoided. Give way.
  • this article compares the biometric information used to unlock the screen (that is, compensation transformation) to determine whether the user of terminal device 1 and the user of terminal device 2 are not. for the same user.
  • biometric information used to unlock the screen that is, compensation transformation
  • other unlocking information such as the password entered by the user
  • Identification it can also be determined whether the user of the terminal device 1 and the user of the terminal device 2 are the same user by combining and encrypting the user input password used to unlock the screen and then comparing.
  • the specific implementation method of using a password to perform user identity recognition on two terminal devices logging in to the same account can refer to the above detailed description of using user biometric information to perform user identity recognition on two terminal devices logging in to the same account, which is not repeated here. Repeat.
  • the scenario in which the terminal device unlocks the screen through biometric features is used as an example to illustrate the method provided by the implementation of the present application.
  • the embodiment of the present application It is not limited to the scenario where the terminal device unlocks the screen through biometric features.
  • it can also be a scenario where the terminal device logs in to an account through biometric features, or a scenario where the terminal device makes payment through biometric features, or any other scenario that requires biometric features.
  • the scenario in which the feature authenticates the user's identity can be specifically determined according to the actual use requirement, which is not limited in the embodiment of the present application.
  • the first embodiment of the present application does not specifically limit the specific structure of the execution body of the method provided by the first embodiment, as long as the program that records the code of the method provided by the The methods provided in the embodiments can be implemented.
  • the execution body of the method provided by the embodiment of the present application may be a server, or a functional module in the server that can call a program and execute the program.
  • the execution body of the method provided in the embodiment of the present application may be a third terminal device, or a functional module in the third terminal device that can call a program and execute the program.
  • the server may include a hardware structure and/or software modules, and implement the above functions in the form of a hardware structure, a software module, or a hardware structure plus a software module. Whether one of the above functions is performed in the form of a hardware structure, a software module, or a hardware structure plus a software module depends on the specific application and design constraints of the technical solution.
  • the method for user identity recognition for multiple devices provided by the first embodiment and the method for user identity recognition for multiple devices provided by the second embodiment are respectively introduced above. the beneficial effects of the method.
  • This method takes the universal subscriber identity module (USIM) card as the analysis object, and uses the cellular data information of multiple terminal devices or The global positioning system (GPS) information is compared to determine whether the two devices are being used by the same user.
  • USIM universal subscriber identity module
  • GPS global positioning system
  • Multi-users must have different location trajectories, such as the father going to the park, the mother going to the supermarket, and the son going to the company.
  • mobile phones are usually used by a single user. In terms of location trajectories, mobile phones and people's location trajectories correspond one-to-one, and personal mobile phones will not be shared with others.
  • the base station registration of multiple mobile phones or GPS dosing is recorded respectively, and then the locus distribution of dosing is analyzed.
  • the trajectories of the two mobile phones are not quite consistent, it can be determined that the two mobile phones of the same account are actually used by different users.
  • the trajectory heights of the two mobile phones are the same, it can be determined that a user is using two mobile phones at the same time.
  • a and B whose position track points are A1...An, B1...Bn, and they are all logged into the same account.
  • the distance between A1 and B1 is calculated respectively, and the distance between A2 and B2 The distances, ...
  • M the average value of L1, L2, ... and Ln. If M is greater than or equal to the threshold (for example, 600 meters), it is determined that the two mobile phones are used by different users; if M is less than the threshold, it is determined that the two mobile phones are the same person use.
  • the threshold for example, 600 meters
  • the registration data of the base station is not accurate enough. If it is a classmate, colleague and roommate in the university, it is likely to be within the range of the same base station and cannot be accurately identified. Second, the user's precise location information is sensitive data. If it is directly uploaded to the cloud server for comparison, the risk of privacy leakage is high, and relevant regulations do not allow this operation.
  • the method for user identity identification for multiple devices provided by the first embodiment of the present application can more accurately identify the user's identity based on information such as the user's fingerprint or facial features by means of interaction between terminal devices. Identifying whether multiple terminal devices are used by the same person or by different people has high accuracy and low privacy risk.
  • This method uses biometric features to compare to judge whether the two devices are used by the same user. Among them, it is assumed that each user will register or enter their own biometrics (such as fingerprints) on their own devices, and a single mobile phone will not register the biometrics of two different natural persons. In this solution, on the one hand, if the biometric features of the two mobile phones are inconsistent, it can be determined that the two mobile phones of the same account are used by different users. On the other hand, if the biometric features of the two mobile phones are the same, it can be determined that the two mobile phones of the same account are actually used by the same user.
  • biometric features such as fingerprints
  • mobile phone A and mobile phone B are both logged in to the same account X, and the entered biometrics are Xa and Xb respectively.
  • mobile phone A sends Xa to mobile phone B, and mobile phone B compares Xa with Xb; or mobile phone B sends Xb to mobile phone A, and mobile phone A compares Xa with Xb; or both Xa and Xb are transmitted
  • the method for user identity identification for multiple devices provided by the second embodiment of the present application can combine and encrypt user biometric information, and then compare it, so that multiple terminal devices can be identified. Whether it is used by the same person or by different people, whether the comparison is performed on the server side or the terminal device side, since the user's biometric information is encrypted, the risk of privacy leakage can be reduced, so there is no need to worry about user privacy leakage.
  • the following describes a test scenario using the method provided by the first embodiment of the present application, assuming that mobile phone A and mobile phone B have logged into account X. Close the data channel between the two mobile phones and the cloud server, such as turning off the router switch and/or turning off the cellular data function of the mobile phone. On the one hand, the same biometric features are entered on the A and B phones respectively, and the biometrics are used to unlock the A or B phone repeatedly.
  • the predetermined services or resources are the same, because through the method provided by the first embodiment, if it is determined that multiple mobile phones logged into the same account are used by the same user, the same services or resources are provided to the multiple mobile phones.
  • biometric features are entered on mobile phone A and mobile phone B respectively, and the biometric feature is used to unlock mobile phone A or mobile phone B many times.
  • the services or resources bound by X are different, because through the method provided by the first embodiment, if it is determined that multiple mobile phones logged into the same account are used by different users, services or resources are provided to different users differently.
  • a test scenario using the method provided by the second embodiment of the present application will be described below, assuming that the mobile phone A and the mobile phone B have logged into the account X. Turn off Wi-Fi and Bluetooth on both phones and turn on cellular data only. On the one hand, enter the same biometrics on mobile phone A and mobile phone B, and use the biometrics to unlock mobile phone A or mobile phone B multiple times. In this case, if the server delivers services or resources bound to account X, you can It is observed that the services or resources provided to the mobile phone A and the mobile phone B are the same, because through the method provided by the second embodiment, if it is determined that multiple mobile phones logging into the same account are used by the same user, the same service is provided to the multiple mobile phones. services or resources.
  • biometric features are entered on mobile phone A and mobile phone B, and the biometric feature is used to unlock mobile phone A or mobile phone B multiple times.
  • the server delivers services or resources bound to account X
  • the services or resources provided to A mobile phone and B mobile phone are different, this is because through the method provided by the second embodiment, if it is determined that multiple mobile phones logging in to the same account are used by different users, then different users have different services. Provide services or resources differently.
  • the multi-terminal user identity identification is completed without acquiring the biometric value in the TEE environment by using the multi-terminal end-to-end cross-check method.
  • the multi-terminal user identity identification is completed without acquiring the biometric value in the TEE environment by using the multi-terminal cloud-side data collision method.
  • multiple terminal devices need to have the communication capability of the terminal background and the biometric management capability.
  • multiple terminal devices need to have terminal-end background communication capabilities and terminal-cloud communication capabilities. Since the relevant descriptions of such services must be presented in the privacy agreement according to the general data protection regulations and other requirements, it can be determined whether the terminal device has the above corresponding capabilities through the relevant descriptions of the privacy agreement.
  • this application provides two identification methods: end-to-end cross-check and end-to-cloud arbitration.
  • end-to-end cross-check In addition to being applied to the scenario of identifying multiple users under a single account, it can also be used in other situations where it is inconvenient to perform direct comparison and requires indirect comparison. in the case of. For example, if an analysis system needs to obtain the characteristics of a target object, it can first make basic settings based on the overview information of the target object, and then continuously try to construct use cases. The cloud arbitration identification method gradually approaches the minimum envelope of the target object to obtain the characteristics of the target object.
  • manufacturers support multiple terminal devices to log in to the same account and share the services or resources bound to the account.
  • the first situation the elderly in the family will not register an account, and the children will directly log in to their own account.
  • the second situation the user's mobile phone is not logged out of the account, but is directly transferred to family members or friends.
  • the third situation family members and/or friends choose to use the same account to log in directly in order to share the services bound to the same account.
  • the current traditional solution may have various problems in the multi-user usage scenario under a single account.
  • the following describes the beneficial effects of the method for user identity identification for multiple devices provided by the embodiments of the present application by comparing it with the solution in the traditional solution in a multi-user usage scenario under a single account with reference to specific application scenarios.
  • user A has registered an account for himself, logged into the account on his mobile phone, and shared the account with user B, and user B's mobile phone has also logged into the account. That is, user A is the primary user, and user B is the secondary user.
  • This application solution when two mobile phones are logged into the same account, services can be provided to the two mobile phones differently.
  • the pictures or videos in user B's mobile phone can be prohibited from being synchronized to the cloud gallery, while user A's The pictures or videos in the mobile phone are synchronized to the cloud gallery, so that user A can maintain his own cloud gallery.
  • This application solution when two mobile phones are logged into the same account, services can be provided to the two mobile phones differently. For example, the service provided for user A's mobile phone remains unchanged, and it is possible to prohibit sending presets to user B's mobile phone. Type of service message, which can avoid information interference or information leakage.
  • This application solution when two mobile phones are logged into the same account, services can be provided to the two mobile phones differently. For example, the service provided for user A's mobile phone remains unchanged, and video/video transmission to user B's mobile phone can be prohibited. Audio calls call messages, so as to avoid information interference or information leakage.
  • This application solution when two mobile phones are logged into the same account, after providing services to the two mobile phones differently, a user portrait of user A can be formed based on the behavior data of user A, so that user A can be provided with accurate information. service.
  • the method provided by the embodiment of the present application can solve five typical problem scenarios caused by the above three situations.
  • the embodiments of the present application can identify multiple devices under the same account, how many users are using them, and what is the corresponding relationship between users and terminal devices.
  • targeted services can be provided to different users in a differentiated manner, making the business smarter.
  • the methods and operations implemented by the server in the above method embodiments may also be implemented by components (for example, chips or circuits) that can be used in the server.
  • the methods and operations implemented by the terminal device in the foregoing method embodiments may also be implemented by components (for example, a chip or a circuit) that can be used in the terminal device.
  • each device such as a terminal device or a server, includes hardware structures and/or software modules corresponding to executing the various functions in order to implement the above-mentioned functions.
  • a terminal device such as a terminal device or a server
  • the present application can be implemented in hardware or a combination of hardware and computer software with the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein. Whether a function is performed by hardware or computer software driving hardware depends on the specific application and design constraints of the technical solution. Skilled artisans may use different methods to implement the described functions for each particular application, but such implementations should not be considered outside the scope of protection of this application.
  • the terminal device or the server can be divided into functional modules according to the above method examples.
  • each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware, and can also be implemented in the form of software function modules. It should be noted that the division of modules in the embodiments of the present application is illustrative, and is only a logical function division, and other feasible division manners may be used in actual implementation. The following description will be given by taking as an example that each function module is divided corresponding to each function.
  • FIG. 9 is a schematic block diagram of an apparatus 700 for performing user identification for multiple devices according to an embodiment of the present application.
  • the apparatus 700 may be used to perform the actions performed by the terminal device in the above method embodiments.
  • the apparatus 700 includes a transceiver unit 710 and a processing unit 720 .
  • the transceiving unit 710 is configured to perform the transceiving-related operations on the terminal device side in the above method embodiments.
  • Transceiver unit 710 may also be referred to as a communication interface or a communication unit.
  • the processing unit 720 is configured to perform processing related operations on the terminal device side in the above method embodiments.
  • the device 700 is hereinafter referred to as the first device, and the device interacting with the device 700 is referred to as the second device.
  • the transceiver unit 710 is configured to send the first biometric information to the second device, where the first biometric information is the biometric information input by the user when the device 700 unlocks the screen successfully, and the second device is a user who logs into the same account as the first device. equipment;
  • the transceiver unit 710 is further configured to receive a first message sent by the second device, where the first message is used to indicate whether the first biometric information is successfully matched with the second biometric information pre-stored in the second device;
  • the processing unit 720 is configured to determine, according to the first message, whether the user identity of the first device is the same as the user identity of the second device.
  • the biometric information input by the user when the screen is unlocked can be sent to the second device, and the second device uses the biometric information to try to unlock the screen and returns the result of the attempted unlocking to the first device.
  • the unlock result determines whether the users of the two devices are the same user.
  • the present application performs user identification for multiple devices logged into the same account, and can distinguish whether multiple devices logged into the same account are used by the same user or by different users, thereby more accurately providing targeted services to users.
  • the above-mentioned biological feature information includes fingerprint feature information, face feature information, iris feature information, palmprint feature information, etc., of course, it may also include other feature information that meets actual usage requirements.
  • the above processing unit 720 is specifically configured to: if the first message indicates that the first biometric information and the second biometric information are successfully matched, determine the user identity of the first device and the user identity of the second device or, if the first message indicates that the matching of the first biometric information and the second biometric information fails, it is determined that the user identity of the first device is different from the user identity of the second device.
  • the transceiver unit 710 is specifically configured for the first device to send the first biometric information to the second device through the point-to-point direct link, and to receive the information sent by the second device through the point-to-point direct link first news.
  • the first device 700 further includes a display unit, where the display unit is configured to display a first prompt message, where the first prompt message is used to prompt that both the first device and the second device have logged into the first account, whether It is prohibited to send the first application information related to the first application to the first device or the second device.
  • the above-mentioned first application is an application corresponding to the first account.
  • the transceiver unit 710 is further configured to, in response to the first operation input by the user, send a second message to the server corresponding to the first application, where the second message is used to instruct the server to send the application information to the first application
  • the device transmits without transmitting to the second device.
  • the first operation is used to confirm that the sending of the first application information to the second device is prohibited.
  • the transceiver unit 710 is further configured to receive the first application information; the display unit is further configured to display an interface corresponding to the first application information.
  • the above-mentioned first application information may include at least one of the following: video call incoming alert based on the first application, voice call incoming alert based on the first application, text call message alert based on the first application, Recommended information for the first application.
  • the display unit is also used for a second prompt message, where the second prompt message is used to prompt the first device and the second device to log in to the same account and whether to agree to the first device and the second device to log in to different accounts .
  • the apparatus 700 may correspond to executing the method described in the first embodiment of the present application, and the above-mentioned and other operations and/or functions of the units in the apparatus 700 are respectively used to implement the corresponding processes of the method. For brevity, It is not repeated here.
  • FIG. 10 is a schematic block diagram of an apparatus 800 for performing user identity identification for multiple devices according to an embodiment of the present application.
  • the apparatus 800 may be used to perform the actions performed by the server or the terminal device in the above method embodiments.
  • the apparatus 800 includes a transceiver unit 810 and a processing unit 820 .
  • the transceiving unit 810 is configured to perform the operations related to transceiving on the server side or the terminal device side in the above method embodiments.
  • Transceiver unit 810 may also be referred to as a communication interface or a communication unit.
  • the processing unit 820 is configured to perform data processing, and the processing unit 820 is configured to perform processing-related operations on the server side or the terminal device side in the above method embodiments.
  • the transceiver unit 810 is configured to obtain first information and second information, where the first information is information obtained from the third biometric information through a first encryption process, and the second information is obtained from the fourth biometric information through a second encryption process information, the third biometric information is the biometric information used when the first terminal device successfully unlocks the screen, the fourth biometric information is the biometric information used when the second terminal device successfully unlocks the screen, the first The terminal device and the second terminal device are devices that log into the same account;
  • a processing unit 820 configured to perform second encryption processing on the first information to obtain third information, and perform first encryption processing on the second information to obtain fourth information;
  • the processing unit 820 is further configured to determine, according to the third information and the fourth information, whether the user identity of the first terminal device is the same as the user identity of the second terminal device.
  • the data after the transformation of the biometric data sent by the two terminal devices may be compensated and transformed, and then it is determined whether the users of the two terminal devices are the same according to whether the compensated and transformed data are the same.
  • the processing unit 820 is specifically configured to: if the third information is the same as the fourth information, determine that the user identity of the first terminal device is the same as the user identity of the second terminal device; or, if the third information is the same as the user identity of the second terminal device If the fourth information is different, it is determined that the user identity of the first terminal device is different from the user identity of the second terminal device.
  • the transceiver unit 810 is specifically configured to acquire the first information and the algorithm used in the first encryption process, and acquire the second information and the algorithm used in the second encryption process.
  • the algorithm used in the first encryption process may be any one of a hash algorithm, a re-encoding algorithm, and a self-defined transformation algorithm.
  • the algorithm used in the second encryption process may be any one of a hash algorithm, a re-encoding algorithm, and a self-defined transformation algorithm. It should be noted that the algorithm used in the first encryption process and the algorithm used in the second encryption process are both randomly selected from the encryption algorithm library, so the algorithm used in the first encryption process and the algorithm used in the second encryption process are both randomly selected.
  • the algorithms can be the same or different.
  • the transceiver unit 810 is further configured to send first prompt information to the first terminal device and/or the second terminal device, where the first prompt information is used to prompt both the first terminal device and the second terminal device to log in If the first account is confirmed, whether to prohibit sending the first application information related to the first application to the first terminal device or the second terminal device.
  • the first application is an application corresponding to the first account.
  • the transceiver unit 810 is further configured to receive a second message sent by the first terminal device, where the second message is used to indicate that sending the first application information to the second terminal device is prohibited; and according to the second message, When the first application information is acquired, the first application information is sent to the first terminal device but not to the second terminal device.
  • the above-mentioned first application information may include at least one of the following: video call incoming alert based on the first application, voice call incoming alert based on the first application, text call message alert based on the first application, Recommended information for the first application.
  • the transceiver unit 810 is further configured to send second prompt information to the first terminal device and the second terminal device, where the second prompt information is used to prompt the first terminal device and the second terminal device to log into the same account , whether to allow the first terminal device and the second terminal device to log in to different accounts.
  • the apparatus 800 may correspond to executing the method described in the second embodiment of the present application, and the above-mentioned and other operations and/or functions of the units in the apparatus 800 are respectively used to implement the corresponding processes of the method. For brevity, It is not repeated here.
  • the terminal device in this embodiment of the present application may be a mobile terminal or a non-mobile terminal.
  • the mobile terminal may be a mobile phone, a tablet computer, a notebook computer, a handheld computer, a vehicle-mounted terminal, a wearable device, an ultra-mobile personal computer (UMPC), a netbook, or a personal digital assistant (personal digital assistant, PDA), etc.
  • the non-mobile terminal may be a personal computer (personal computer, PC), a television (television, TV), a teller machine or a self-service machine, etc., which are not specifically limited in the embodiments of the present application.
  • FIG. 11 is a schematic structural diagram of a terminal device 900 provided by an embodiment of the present application.
  • the terminal device 900 includes: a processor 910 , a memory 920 , a communication interface 930 , and a bus 940 .
  • the processor 910 in the terminal device 900 shown in FIG. 11 may correspond to the processing unit 720 in the apparatus 700 in FIG. 9 .
  • the communication interface 930 in the terminal device 900 shown in FIG. 11 may correspond to the transceiver unit 710 in the apparatus 700 in FIG. 9 .
  • the processor 910 in the terminal device 900 shown in FIG. 11 may correspond to the processing unit 820 in the apparatus 800 in FIG. 10 .
  • the communication interface 930 in the terminal device 900 shown in FIG. 11 may correspond to the transceiver unit 810 in the apparatus 800 in FIG. 10 .
  • the processor 910 can be connected with the memory 920 .
  • the memory 920 may be used to store the program codes and data. Therefore, the memory 920 may be a storage unit within the processor 910 , or may be an external storage unit independent of the processor 910 , or may include a storage unit within the processor 910 and an external storage unit independent of the processor 910 . part.
  • the terminal device 900 may further include a bus 940 .
  • the memory 920 and the communication interface 930 may be connected to the processor 910 through the bus 940 .
  • the bus 940 may be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA) bus or the like.
  • PCI peripheral component interconnect
  • EISA extended industry standard architecture
  • the bus 940 can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one line is shown in FIG. 11, but it does not mean that there is only one bus or one type of bus.
  • the processor 910 may adopt a central processing unit (central processing unit, CPU).
  • the processor may also be other general-purpose processors, digital signal processors (DSPs), application specific integrated circuits (ASICs), off-the-shelf programmable gate arrays (FPGAs) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • DSPs digital signal processors
  • ASICs application specific integrated circuits
  • FPGAs off-the-shelf programmable gate arrays
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the processor 810 uses one or more integrated circuits to execute related programs, so as to implement the technical solutions provided by the embodiments of the present application.
  • the memory 920 which may include read-only memory and random access memory, provides instructions and data to the processor 910 .
  • a portion of processor 910 may also include non-volatile random access memory.
  • the processor 910 may also store device type information.
  • the processor 910 executes the computer-executed instructions in the memory 920 to perform the operation steps of the above method.
  • terminal device 900 may correspond to the apparatus 700 and the apparatus 800 in the embodiment of the present application, and the above-mentioned and other operations and/or functions of the respective units in the apparatus 700 and the apparatus 800 are respectively for the purpose of implementing the method The corresponding process, for the sake of brevity, will not be repeated here.
  • the embodiments of the present application further provide a computer-readable medium, where program codes are stored in the computer-readable medium, and when the computer program codes are run on a computer, the computer is made to execute the above-mentioned methods in various aspects.
  • the embodiments of the present application further provide a computer program product, the computer program product comprising: computer program code, when the computer program code is run on a computer, the computer program code enables the computer to execute the above method in aspect.
  • the terminal device or the network device includes a hardware layer, an operating system layer running on the hardware layer, and an application layer running on the operating system layer.
  • the hardware layer may include hardware such as a central processing unit (CPU), a memory management unit (MMU), and memory (also called main memory).
  • the operating system of the operating system layer may be any one or more computer operating systems that implement business processing through processes, such as a Linux operating system, a Unix operating system, an Android operating system, an iOS operating system, or a Windows operating system.
  • the application layer may include applications such as browsers, address books, word processing software, and instant messaging software.
  • the embodiments of the present application do not specifically limit the specific structure of the execution body of the methods provided by the embodiments of the present application, as long as the program in which the codes of the methods provided by the embodiments of the present application are recorded can be executed to execute the methods according to the embodiments of the present application.
  • the execution body of the method provided by the embodiment of the present application may be a terminal device or a network device, or a functional module in the terminal device or network device that can call a program and execute the program.
  • Computer readable media may include, but are not limited to, magnetic storage devices (eg, hard disks, floppy disks, or magnetic tapes, etc.), optical disks (eg, compact discs (CDs), digital versatile discs (DVDs), etc. ), smart cards and flash memory devices (eg, erasable programmable read-only memory (EPROM), cards, stick or key drives, etc.).
  • magnetic storage devices eg, hard disks, floppy disks, or magnetic tapes, etc.
  • optical disks eg, compact discs (CDs), digital versatile discs (DVDs), etc.
  • smart cards and flash memory devices eg, erasable programmable read-only memory (EPROM), cards, stick or key drives, etc.
  • Various storage media described herein may represent one or more devices and/or other machine-readable media for storing information.
  • the term "machine-readable medium” may include, but is not limited to, wireless channels and various other media capable of storing, containing, and/or carrying instructions and/or data.
  • processors mentioned in the embodiments of the present application may be a central processing unit (central processing unit, CPU), and may also be other general-purpose processors, digital signal processors (digital signal processors, DSP), application-specific integrated circuits ( application specific integrated circuit, ASIC), off-the-shelf programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the memory mentioned in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically programmable Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory may be random access memory (RAM).
  • RAM can be used as an external cache.
  • RAM may include the following forms: static random access memory (SRAM), dynamic random access memory (DRAM), synchronous dynamic random access memory (SDRAM) , double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (synchlink DRAM, SLDRAM) and Direct memory bus random access memory (direct rambus RAM, DR RAM).
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • ESDRAM enhanced synchronous dynamic random access memory
  • SLDRAM synchronous link dynamic random access memory
  • Direct memory bus random access memory direct rambus RAM, DR RAM
  • the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic devices, discrete gate or transistor logic devices, or discrete hardware components
  • the memory storage module
  • memory described herein is intended to include, but not be limited to, these and any other suitable types of memory.
  • the disclosed system, apparatus and method may be implemented in other manners.
  • the apparatus embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, which may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
  • the technical solution of the present application, or the part that contributes to the prior art, or the part of the technical solution can be embodied in the form of a computer software product, and the computer software product is stored in a storage
  • the computer software product includes several instructions, the instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium may include, but is not limited to, various media that can store program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Environmental & Geological Engineering (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)

Abstract

本申请提供了一种针对多个设备进行用户身份识别的方法及终端设备,涉及通信技术领域。对于登录同一帐号的两个终端设备,其中第一终端设备在解锁屏幕成功时,可以将解锁屏幕时用户输入的生物特征信息发送给第二终端设备,第二终端设备利用该生物特征信息尝试解锁屏幕并将尝试解锁结果返回给第一终端设备,第一终端设备可以根据尝试解锁结果确定这两个终端设备的用户是否为同一用户。本申请针对登录同一帐号的多个终端设备进行用户身份识别,能够区分登录同一帐号的多个终端设备是同一用户使用,还是不同用户使用,进而可以更准确地为用户提供有针对性的服务。

Description

针对多个设备进行用户身份识别的方法及终端设备
本申请要求于2020年12月28日提交国家知识产权局、申请号为202011589093.8、申请名称为“针对多个设备进行用户身份识别的方法及终端设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及互联网技术领域,尤其涉及一种针对多个设备进行用户身份识别的方法及终端设备。
背景技术
对于终端厂商或者互联网厂商提供的应用资源,用户通常需要注册帐号并采用该帐号在终端设备上登录后才能使用。目前,多个终端设备可以同时登录同一个帐号,实现多个终端设备共享应用资源。其中,这多个终端设备可能是该用户独自使用的,也可能是用户和其他用户(亲人或朋友等)分别使用的。在实际实现时,在多个终端设备登录同一帐号的情况下,若与该帐号关联的应用或平台有业务时(例如视频通话来电提醒,聊天消息或应用推送消息等),这多个设备通常会同步处理该业务,例如多个设备同时接收到应用消息,但是如果多个终端设备的用户不同,有的用户需要应用消息,有的用户不需要应用消息,那么这样会造成不必要的服务推送,用户体验较差。
发明内容
本申请提供一种针对多个设备进行用户身份识别的方法及终端设备,以解决如何判断登录同一帐号的多个终端设备的用户身份是否相同的问题。
为达到上述目的,本申请采用如下技术方案:
第一方面,本申请提供一种针对多个设备进行用户身份识别的方法,该方法包括:
第一终端设备向第二终端设备发送第一生物特征信息,该第一生物特征信息为第一终端设备解锁屏幕成功时用户输入的生物特征信息,该第二终端设备为与第一终端设备登录同一帐号的设备;
第一终端设备接收第二终端设备发送的第一消息,该第一消息用于指示第一生物特征信息是否与第二终端设备中预先存储的第二生物特征信息匹配成功;
第一终端设备根据该第一消息确定第一终端设备的用户身份与第二终端设备的用户身份是否相同。
通过上述方案,对于登录同一帐号的两个终端设备,其中第一终端设备在解锁屏幕成功时,可以将用于解锁屏幕的生物特征信息发送给第二终端设备,该第二终端设备利用该生物特征信息尝试解锁屏幕并将尝试解锁结果返回给第一终端设备,第一终端设备可以根据尝试解锁结果确定这两个终端设备的用户是否为同一用户。这样,本 申请针对登录同一帐号的多个终端设备进行用户身份识别,能够区分登录同一帐号的多个终端设备是同一用户使用,还是不同用户使用,进而可以更准确地为用户提供有针对性的服务。
可选的,上述生物特征信息包括指纹特征信息、人脸特征信息、虹膜特征信息、掌纹特征信息等,当然还可以包括其他满足实际使用需求的特征信息。
在第一方面的可能实现方式中,上述根据第一消息确定第一终端设备的用户身份与第二终端设备的用户身份是否相同,包括:
若第一消息指示第一生物特征信息与第二生物特征信息匹配成功,则第一终端设备确定第一终端设备的用户身份与第二终端设备的用户身份相同;
若第一消息指示第一生物特征信息与第二生物特征信息匹配失败,则第一终端设备确定第一终端设备的用户身份与第二终端设备的用户身份不同。
通过上述方案,对于登录同一帐号的两个终端设备,其中任一个终端设备在解锁屏幕成功时,可以将解锁屏幕时用户输入的生物特征信息发送给另一终端设备,若该另一终端设备利用该生物特征信息尝试解锁屏幕成功,则由此可以确定这两个终端设备的用户是同一用户。若该另一终端设备利用该生物特征信息尝试解锁屏幕失败,则由此可以确定这两个终端设备的用户是不同用户。
在第一方面的可能实现方式中,上述第一终端设备向第二终端设备发送第一生物特征信息,包括:第一终端设备通过点到点直连链路向第二终端设备发送第一生物特征信息。上述第一终端设备接收第二终端设备发送的第一消息,包括:第一终端设备通过该点到点直连链路接收第二终端设备发送的第一消息。
在第一方面的可能实现方式中,在第一终端设备确定第一终端设备的用户身份与第二终端设备的用户身份不同之后,上述方法还包括:第一终端设备显示第一提示消息,该第一提示消息用于提示第一终端设备和第二终端设备均登录了第一帐号,是否禁止将与第一应用相关的第一应用信息发送给第一终端设备或者第二终端设备。其中,上述第一应用为与第一帐号对应的应用。
在第一方面的可能实现方式中,在第一终端设备显示第一提示信息之后,上述方法还包括:响应于用户输入的第一操作,第一终端设备向与第一应用对应的服务器发送第二消息,该第二消息用于指示服务器将应用信息发送给第一终端设备发送而不发送给第二终端设备。其中,第一操作用于确认禁止将第一应用信息发送给第二终端设备。
通过本方案,在多设备通过登录同一账号而共享服务资源的情况下,可以在确定多个设备是不同用户使用时向不同设备推送针对性的服务资源,避免不必要的服务推送,提升用户体验。
在第一方面的可能实现方式中,在第一终端设备向与第一应用对应的服务器发送第二消息之后,上述方法还包括:第一终端设备接收第一应用信息,并在第一终端设备的屏幕上显示第一应用信息对应的界面。
在第一方面的可能实现方式中,上述第一应用信息可以包括以下至少一项:基于第一应用的视频通话来电提醒、基于第一应用的语音通话来电提醒、基于第一应用的文字通话消息提醒,基于第一应用的推荐信息。
在第一方面的可能实现方式中,在第一终端设备确定第一终端设备的用户身份与第二终端设备的用户身份不同之后,上述方法还包括:
第一终端设备显示第二提示消息,该第二提示消息用于提示第一终端设备和第二终端设备登录了同一帐号,是否同意第一终端设备和第二终端设备登录不同的帐号。
第二方面,本申请提供另一种针对多个设备进行用户身份识别的方法,该方法包括:
获取第一信息和第二信息,该第一信息为第三生物特征信息经过第一加密处理得到的信息,该第二信息为第四生物特征信息经过第二加密处理得到的信息,该第三生物特征信息为所述第一终端设备解锁屏幕成功时所采用的生物特征信息,该第四生物特征信息为所述第二终端设备解锁屏幕成功时所采用的生物特征信息,该第一终端设备和第二终端设备为登录同一帐号的设备;
对所述第一信息进行所述第二加密处理,得到第三信息,并且对所述第二信息进行所述第一加密处理,得到第四信息;
根据所述第三信息与所述第四信息,确定所述第一终端设备的用户身份与所述第二终端设备的用户身份是否相同。
在本申请实施例中,可以将两个终端设备各自发送的生物特征数据变换(即加密处理)后的数据进行补偿变换,进而根据补偿变换后的数据是否相同,确定这两个终端设备的用户是否相同。通过本方案,针对登录同一帐号的多个终端设备进行用户身份识别,能够区分登录同一帐号的多个终端设备是同一用户使用,还是不同用户使用,进而可以更准确地为用户提供有针对性的服务。
在第二方面的可能实现方式中,所述根据所述第三信息与所述第四信息,确定所述第一终端设备的用户身份与所述第二终端设备的用户身份是否相同,包括:
若第三信息与第四信息相同,则服务器确定第一终端设备的用户身份与第二终端设备的用户身份相同;
若第三信息与第四信息不同,则服务器确定第一终端设备的用户身份与第二终端设备的用户身份不同。
在第二方面的可能实现方式中,所述获取第一信息和第二信息,包括:获取第一信息和第一加密处理所采用的算法,并且获取第二信息和第二加密处理所采用的算法。
可选的,第一加密处理所采用的算法可以为哈希算法、重编码算法和自定义变换算法中的任一项。第二加密处理所采用的算法可以为哈希算法、重编码算法和自定义变换算法中的任一项。其中,所述第一加密处理所采用的算法与所述第二加密处理所采用的算法可以相同,也可以不同。
在第二方面的可能实现方式中,在所述服务器确定所述第一终端设备的用户身份与所述第二终端设备的用户身份不同之后,所述方法还包括:
服务器向第一终端设备和/或第二终端设备发送第一提示信息,该第一提示信息用于提示第一终端设备和第二终端设备均登录了第一帐号,是否禁止将与第一应用相关的第一应用信息发送给第一终端设备或者第二终端设备。其中,第一应用为与第一帐号对应的应用。
在第二方面的可能实现方式中,在所述服务器向所述第一终端设备和所述第二终 端设备发送第一提示信息之后,所述方法还包括:
服务器接收第一终端设备发送的第二消息,该第二消息用于指示禁止将第一应用信息发送给第二终端设备;
服务器根据第二消息,在获取到第一应用信息时,将第一应用信息发送给第一终端设备而不发送给第二终端设备。
通过本方案,在多设备通过登录同一账号而共享服务资源的情况下,可以在确定多个设备是不同用户使用时向不同设备推送针对性的服务资源,避免不必要的服务推送,提升用户体验。
在第二方面的可能实现方式中,上述第一应用信息可以包括以下至少一项:基于第一应用的视频通话来电提醒、基于第一应用的语音通话来电提醒、基于第一应用的文字通话消息提醒,基于第一应用的推荐信息。
在第二方面的可能实现方式中,在服务器确定第一终端设备的用户身份与第二终端设备的用户身份不同之后,上述方法还包括:
服务器向第一终端设备和第二终端设备发送第二提示信息,该第二提示信息用于提示第一终端设备和第二终端设备登录了同一帐号,是否同意第一终端设备和第二终端设备登录不同的帐号。
第三方面,本申请提供一种针对多个设备进行用户身份识别的装置,该装置包括用于执行上述第一方面中的方法的单元。该装置可对应于执行上述第一方面中描述的方法,该装置中的单元的相关描述请参照上述第一方面的描述,为了简洁,在此不再赘述。
其中,上述第一方面描述的方法可以通过硬件实现,也可以通过硬件执行相应的软件实现。硬件或软件包括一个或多个与上述功能相对应的模块或单元。例如,处理模块或单元、显示模块或单元等。
第四方面,本申请提供另一种针对多个设备进行用户身份识别的装置,该装置包括用于执行上述第二方面中的方法的单元。该装置可对应于执行上述第二方面中描述的方法,该装置中的单元的相关描述请参照上述第一方面的描述,为了简洁,在此不再赘述。
其中,上述第二方面描述的方法可以通过硬件实现,也可以通过硬件执行相应的软件实现。硬件或软件包括一个或多个与上述功能相对应的模块或单元。例如,处理模块或单元、显示模块或单元等。
第五方面,本申请提供一种针对多个设备进行用户身份识别的系统,该系统包括第一终端设备和第二终端设备,第一终端设备和第二终端设备登录了同一帐号。
第一终端设备,用于向第二终端设备发送第一生物特征信息,该第一生物特征信息为第一终端设备解锁屏幕成功时用户输入的生物特征信息;
第二终端设备,用于将第一终端设备发送的第一生物特征信息与第二终端设备中预先存储的第二生物特征信息进行匹配,并将匹配结果通过第一消息发送给第一终端设备,该第一消息用于指示第一生物特征信息是否与第二生物特征信息匹配成功;
第一终端设备,还用于接收第二终端设备发送的第一消息,并根据该第一消息确定第一终端设备的用户身份与第二终端设备的用户身份是否相同。
在第五方面的可能实现方式中,上述根据第一消息确定第一终端设备的用户身份与第二终端设备的用户身份是否相同,包括:
若第一消息指示第一生物特征信息与第二生物特征信息匹配成功,则确定第一终端设备的用户身份与第二终端设备的用户身份相同;
若第一消息指示第一生物特征信息与第二生物特征信息匹配失败,则确定第一终端设备的用户身份与第二终端设备的用户身份不同。
第六方面,本申请提供另一种针对多个设备进行用户身份识别的系统,该系统包括第一终端设备、第二终端设备和服务器,第一终端设备和第二终端设备登录了同一帐号。
第一终端设备,用于在通过用户输入的第三生物特征信息解锁屏幕成功的情况下,将第三生物特征信息经过第一加密处理得到的第一信息发送给服务器;
第二终端设备,用于在通过用户输入的第四生物特征信息解锁屏幕成功的情况下,将第四生物特征信息经过第一加密处理得到的第一信息发送给服务器;
服务器,用于对第一信息进行第二加密处理得到第三信息,并且对第二信息进行第一加密处理得到第四信息;
服务器,还用于根据第三信息与第四信息,确定第一终端设备的用户身份与第二终端设备的用户身份是否相同。
在第五方面的可能实现方式中,上述根据第三信息与第四信息,确定第一终端设备的用户身份与第二终端设备的用户身份是否相同,包括:
若第三信息与第四信息相同,则确定第一终端设备的用户身份与第二终端设备的用户身份相同;
若第三信息与第四信息不同,则确定第一终端设备的用户身份与第二终端设备的用户身份不同。
在第五方面的可能实现方式中,上述获取第一信息和第二信息,包括:获取第一信息和第一加密处理所采用的算法,并且获取第二信息和第二加密处理所采用的算法。
可选的,第一加密处理所采用的算法可以为哈希算法、重编码算法和自定义变换算法中的任一项。第二加密处理所采用的算法可以为哈希算法、重编码算法和自定义变换算法中的任一项。其中,所述第一加密处理所采用的算法与所述第二加密处理所采用的算法可以相同,也可以不同。
第七方面,本申请提供一种终端设备,该终端设备包括处理器,处理器与存储器耦合,存储器用于存储计算机程序或指令,处理器用于执行存储器存储的计算机程序或指令,使得第一方面中的方法被执行或者第二方面中的方法被执行。
例如,处理器用于执行存储器存储的计算机程序或指令,使得该终端设备执行第一方面中的方法或者第二方面中的方法。
第八方面,本申请提供一种计算机可读存储介质,其上存储有用于实现第一方面中的方法或者第二方面中的方法的计算机程序(也可称为指令或代码)。
例如,该计算机程序被计算机执行时,使得该计算机可以执行第一方面中的方法或者第二方面中的方法。
第九方面,本申请提供一种芯片,包括处理器。处理器用于读取并执行存储器中 存储的计算机程序,以执行第一方面及其任意可能的实现方式中的方法或者第二方面及其任意可能的实现方式中的方法。
可选地,所述芯片还包括存储器,存储器与处理器通过电路或电线连接。
第十方面,本申请提供一种芯片系统,包括处理器。处理器用于读取并执行存储器中存储的计算机程序,以执行第一方面及其任意可能的实现方式中的方法或者第二方面及其任意可能的实现方式中的方法。
可选地,所述芯片系统还包括存储器,存储器与处理器通过电路或电线连接。
第十一方面,本申请提供一种计算机程序产品,所述计算机程序产品包括计算机程序(也可称为指令或代码),所述计算机程序被计算机执行时使得所述计算机实现第一方面中的方法或者第二方面及其任意可能的实现方式中的方法。
可以理解的是,上述第三方面至第十一方面的有益效果可以参见上述第一方面和第二方面中的相关描述,在此不再赘述。
附图说明
图1为本申请的各个示例性实施例所涉及的系统架构示意图;
图2为本申请实施例提供的针对多个设备进行用户身份识别的方法流程示意图之一;
图3为本申请实施例提供的针对多个设备进行用户身份识别的方法流程示意图之二;
图4为本申请实施例提供的针对多个设备进行用户身份识别的方法流程示意图之三;
图5为本申请实施例提供的针对多个设备进行用户身份识别的方法应用界面示意图;
图6为本申请实施例提供的针对多个设备进行用户身份识别的方法流程示意图之四;
图7为本申请实施例提供的针对多个设备进行用户身份识别的方法流程示意图之五;
图8为本申请实施例提供的针对多个设备进行用户身份识别的方法流程示意图之六;
图9为本申请实施例提供的一种针对多个设备进行用户身份识别的装置的结构示意图;
图10为本申请实施例提供的另一种针对多个设备进行用户身份识别的装置的结构示意图;
图11为本申请实施例提供的终端设备的结构示意图。
具体实施方式
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本文中术语“和/或”,是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。本文中符号“/”表示关联对象是或者的关系,例如A/B表示A或者B。
本文中的说明书和权利要求书中的术语“第一”和“第二”等是用于区别不同的对象,而不是用于描述对象的特定顺序。例如,第一消息和第二消息等是用于区别不同的消息,而不是用于描述消息的特定顺序。
在本申请实施例中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请实施例中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。
在本申请实施例的描述中,除非另有说明,“多个”的含义是指两个或者两个以上,例如,多个处理单元是指两个或者两个以上的处理单元等;多个元件是指两个或者两个以上的元件等。
图1示出了本申请的各个示例性实施例所涉及的系统架构示意图。如图1所示,该系统架构包括终端设备1和终端设备2,且终端设备1和终端设备2登录了同一帐号(或者账号),因此这两个终端设备可以共享该帐号绑定的服务。
示例性的,帐号可以是用于访问终端厂商或者互联网厂商提供的各种应用服务,通过注册和登录帐号,用户可以进行以下操作:
(1)使用云服务(云空间服务),在线主题,音乐,视频,智能助手等多种服务;
(2)登录会员和手机服务,享受多种会员权益,享受快速维保;
(3)登录钱包,绑卡后,就是随身的钱包,方便在线支付和购物;
(4)登录商城和俱乐部。
帐号可以支持注册、登录、找回密码、修改密码、修改用户信息、设置安全手机号和邮件地址、自助申诉、冻结/解冻帐号等功能。
示例性的,以与帐号关联的云服务为例,云空间可以安全存储照片、视频、联系人、备忘录等重要数据,并且在各个设备上保持实时更新。云空间可实现数据自动备份、常用数据多终端同步、远程查找手机,从而帮助用户更安全、便捷地管理数据。
示例性的,以与帐号关联的智能助手为例,智能助手是集成在手机负一屏,为用户提供情景智能、语音助手、应用推荐和安全支付等便捷服务的交互入口,提供助手服务。
也就是说,如果用户需要使用终端厂商或者互联网厂商提供的应用资源,那么用户需要注册一个帐号,然后在设备上登录该帐号之后,才能使用该应用资源。通常,在注册帐号时,用户需要绑定身份证号(俗称实名制),或者绑定手机号(属于实名制),和/或填写用户的其他信息(如性别、出生日期等)。
目前,多个终端设备可以同时登录同一个帐号,使用某一应用或平台的资源。该帐号所绑定的服务可以同时被多个终端设备共享。这多个终端设备可能是同一用户使用的,也可能是多个用户分别使用的。
如图1所示,在终端设备1和终端设备2登录同一帐号的情况下,若服务器3下发与该帐号绑定的服务类消息01,通常会向终端设备1和终端设备2均下发消息01, 这样终端设备1和终端设备2均会接收到消息01,而如果这多个终端设备由不同用户使用,那么会造成不必要的消息干扰,甚至还可能造成个人隐私泄露。
也就是说,在登录同一帐号的多个终端设备由同一用户独自使用的情况下,不存在个人隐私泄露或信息干扰的问题,而在登录同一帐号的多个终端设备由不同用户使用的情况下,会存在个人隐私泄露或信息干扰的问题。
鉴于此,本申请实施例提出了针对登录同一帐号的多个终端设备进行用户身份识别,以便于区分登录同一帐号的多个终端设备是同一用户使用,还是不同用户使用,进而为用户有针对性地提供的服务。
例如,在确定登录同一帐号的多个终端设备是同一用户使用的情况下,向多个终端设备提供相同的服务;在确定登录同一帐号的多个终端设备是不同用户使用的情况下,向多个终端设备提供不同的服务,比如可以向优先级高的用户提供所有服务,而向优先级低的用户提供部分服务(比如音频/视频推荐服务),但不提供敏感度较高的服务(比如钱包信息和/或出行信息等),具体向不同用户提供哪些服务可以由系统设置,也可以由优先级高的用户根据个人需求进行设置,本申请实施例对此不作限定。
第一实施例
下面结合附图对本申请第一实施例提供的一种针对多个设备进行用户身份识别的方法进行示例性说明。图2是根据示例性实施例示出的一种针对多个设备进行用户身份识别的方法的流程图,其中第一终端设备和第二终端设备登录了同一帐号。参照图2所示,该方法100包括下述的步骤S110-S150。
S110,第一终端设备根据用户输入的第一生物特征信息,解锁屏幕成功。
可选的,上述第一生物特征信息为用户触发解锁第一终端设备的屏幕时输入的一项或多项生物特征信息,例如指纹特征信息、人脸特征信息、虹膜特征信息和/或掌纹特征信息,当然还可以包括其他满足实际使用需求的特征信息。具体可以根据实际使用需求确定,本申请实施例不作限定。为了便于说明,以下以第一生物特征信息为用户触发解锁第一终端设备的屏幕时输入的指纹特征信息为例进行示例性说明。
此外,第一终端设备中可以预先存储一项或多项生物特征信息,例如用户预先录入的指纹特征信息和人脸特征信息,当然还可以包括其他生物特征信息,本申请不作限定。在用户触发解锁第一终端设备的屏幕时,第一终端设备可以利用预先存储的生物特征信息与用户输入的生物特征信息进行比对(即匹配),根据匹配结果进行用户身份认证,例如指纹识别认证或者人脸识别认证。若匹配成功,则用户身份可信,据此第一终端设备可以解锁屏幕;若匹配失败,则用户身份不可信,据此第一终端设备可以不作响应。
在本申请实施例中,当第一终端设备处于屏幕锁闭状态时,如果用户在第一终端设备上进行解锁操作(例如手指触摸指纹感应区域),那么第一终端设备可以根据用户输入的第一生物特征信息(例如连续多帧指纹图像)进行用户身份验证,即将该第一生物特征信息与第一终端设备预先存储的生物特征信息进行匹配。若匹配成功,则第一终端设备解锁屏幕成功;若匹配失败,则第一终端设备可以不响应。
可选的,若第一生物特征信息与预先存储的生物特征信息进行比对后的相似度大于或等于预设相似度,则可以认为匹配成功。若比对后的相似度小于预设相似度,则 可以认为匹配失败。其中,预设相似度具体根据实际使用需求确定,本申请实施例不作限定。
举例来讲,以第一生物特征信息为指纹特征信息为例,当第一终端设备处于屏幕锁闭状态时,若用户手指触摸第一终端设备的指纹感应区域,则第一终端设备可以响应于用户操作,采集连续多帧指纹图像,依次与本地预先存储的指纹特征信息进行比对,若指纹特征信息匹配成功,则第一终端设备解锁屏幕成功;若指纹特征信息匹配失败,则第一终端设备不响应。
S120,第一终端设备向第二终端设备发送第一生物特征信息。
在本申请实施例中,若生物特征信息匹配成功,则第一终端设备解锁屏幕,并将该第一生物特征信息发送给第二终端设备。
在本申请实施例中,第一终端设备可以预先存储有与第一终端设备登录同一帐号的设备(例如第二终端设备)的标识,当然第二终端设备也可以预先存储有与第二终端设备登录同一帐号的设备(例如第一终端设备)的标识。第一终端设备可以基于预先存储的第二终端设备的标识,发现第二终端设备后与第二终端设备建立连接。具体的,第一终端设备可以向周围的其他终端设备广播消息,该消息中携带第二终端设备的标识,第二终端设备在接收到该广播消息后向第一终端设备返回响应消息,如此第一终端设备和第二终端设备建立连接。进而,第一终端设备可以将第一生物特征信息发送给第二终端设备。
示例性的,上述第一终端设备的标识可以为第一终端设备的用户身份识别模块(subscriber identity module,SIM)卡中存储的国际移动用户识别码,也可以是第一终端设备中存储的国际移动设备识别码,或者可以是能够唯一标识终端设备的其他识别信息,本申请对此不作限定。
在一些实施例中,第一终端设备可以通过点到点直连链路向第二终端设备发送第一生物特征信息。示例性的,点到点直连链路可以为Wi-Fi链路,也可以为蓝牙链路,还可以是其他任意满足实际使用需求的直连链路,具体可以根据实际使用需求确定,本申请实施例不作限定。例如,终端设备1通过Wi-Fi链路向终端设备2发送指纹特征信息,以及终端设备2通过Wi-Fi链路接收终端设备1发送的指纹特征信息。
S130,第二终端设备判断第一生物特征信息与第二生物特征信息能否匹配成功。
其中,上述第二生物特征信息是第二终端设备中预先存储的一项或多项生物特征信息,在用户触发解锁第二终端设备的屏幕时,第二终端设备可以利用该第二生物特征信息与用户输入的生物特征信息进行比对(即匹配),根据匹配结果进行用户身份认证:若匹配成功,则用户身份可信;若匹配失败,则用户身份不可信。
示例性的,上述第二生物特征信息可以包括用户预先录入的指纹特征信息和人脸特征信息,当然还可以包括用户预先录入的其他生物特征信息,例如还可以包括虹膜特征信息和/或掌纹特征信息等,具体可以根据实际使用需求确定,本申请实施例不作限定。
S140,第二终端设备向第一终端设备发送第一消息,第一终端设备接收第二终端设备发送的第一消息,该第一消息用于指示第一生物特征信息能否与第二生物特征信息匹配成功。
在本申请实施例中,第二终端设备将第一终端设备解锁屏幕所采用的第一生物特征信息与第二终端设备本地预先存储的第二生物特征信息进行对比(即匹配),并将二者匹配结果以第一消息返回给第一终端设备。
对于将第一生物特征信息与第二生物特征信息进行比对的具体描述可以参见上述对于将第一生物特征信息与第一终端设备预先存储的生物特征信息进行比对的详细描述,此处不再赘述。
在一些实施例中,第一终端设备可以通过上述点到点直连链路接收第二终端设备发送的第一消息。例如,终端设备2通过Wi-Fi链路向终端设备1发送用于指示匹配结果的第一消息,以及终端设备1通过Wi-Fi链路接收终端设备2发送的第一消息。
S150,第一终端设备根据该第一消息确定第一终端设备的用户身份与第二终端设备的用户身份是否相同。
其中,若第一消息指示第一生物特征信息与第二生物特征信息匹配成功,则表明用户的第一生物特征信息在第二终端设备上尝试解锁成功;若第一消息指示第一生物特征信息与第二生物特征信息匹配失败,则表明用户的第一生物特征信息在第二终端设备上尝试解锁失败。因此,第一终端设备可以根据该第一消息,确定用户的第一生物特征信息在第一终端设备和第二终端设备上是否均能够解锁成功,进而可以确定第一终端设备的用户身份与第二终端设备的用户身份是否相同。
本申请实施例提供的针对多个设备进行用户身份识别的方法,对于登录同一帐号的两个终端设备,其中第一终端设备在解锁屏幕成功时,可以将用于解锁屏幕的生物特征信息发送给第二终端设备,该第二终端设备利用该生物特征信息尝试解锁屏幕并将尝试解锁结果返回给第一终端设备,第一终端设备可以根据尝试解锁结果确定这两个终端设备的用户是否为同一用户。通过本方案,针对登录同一帐号的多个终端设备进行用户身份识别,能够区分登录同一帐号的多个终端设备是同一用户使用,还是不同用户使用,进而可以更准确地为用户提供有针对性的服务。
结合图2,如图3所示,上述S150具体可以通过下述的S151或S152实现,S151和S152择一执行。
S151,若第一消息指示第一生物特征信息与第二生物特征信息匹配成功,则第一终端设备确定第一终端设备的用户身份与第二终端设备的用户身份相同。
如图4所示,终端设备1和终端设备2为登录同一帐号的两个设备,当用户触发终端设备1解锁屏幕时(例如通过指纹解锁屏幕),终端设备1将用户输入的第一生物特征信息(例如指纹信息)与终端设备1预先存储的生物特征信息进行匹配,若匹配成功(即解锁屏幕成功),则将第一生物特征信息进一步与终端设备2预先存储的第二生物特征信息进行匹配,若第一生物特征信息与第二生物特征信息匹配成功,即第一生物特征信息在第一终端设备和第二终端设备上均能够解锁成功,则可以得出结论,终端设备1和终端设备2的用户身份相同。需要说明的是,如图4所示,终端设备1预先存储的生物特征信息与终端设备2预先存储的第二生物特征信息之间不作交互,也不作对比或匹配。
通过该方案,由于用户的第一生物特征信息在第一终端设备上能够解锁屏幕成功,并且在第二终端设备上尝试解锁屏幕成功,即用户的第一生物特征信息在第一终端设 备和第二终端设备上均能够解锁成功,因此可以判定第一终端设备的用户和第二终端设备的用户为同一用户。这样,在登录同一帐号的多个终端设备的用户为同一用户的情况下,可以无需屏蔽相关业务信息。
S152,若第一消息指示第一生物特征信息与第二生物特征信息匹配失败,则第一终端设备确定第一终端设备的用户身份与第二终端设备的用户身份不同。
再参考图4所示,当用户触发终端设备1解锁屏幕时(例如通过指纹解锁屏幕),终端设备1将用户输入的第一生物特征信息(例如指纹信息)与终端设备1预先存储的生物特征信息进行匹配,若匹配成功(即解锁屏幕成功),则将第一生物特征信息进一步与终端设备2预先存储的第二生物特征信息进行匹配,若第一生物特征信息与第二生物特征信息匹配失败,则可以得出结论,终端设备1和终端设备2的用户身份不同。
第一实施例采用的这种终端设备之间交互来识别用户身份的方式可称为端端交叉互检方式,由于用户的第一生物特征信息在第一终端设备上能够解锁屏幕成功,但是在第二终端设备上尝试解锁屏幕失败,因此可以判定第一终端设备的用户和第二终端设备的用户为不同用户。这样,在登录同一帐号的多个终端设备的用户为不同用户的情况下,可以针对不同用户提供不同的服务,提升用户体验。
下面通过示例说明上述图4所示步骤的具体实现过程。首先,A手机和B手机都完成生物特征(例如指纹/人脸等)录入,且登录同一个帐号。其次,A手机的用户使用指纹/人脸特征解锁时,A手机记录解锁结果。一方面,如果解锁屏幕失败,A手机无动作;另一方面,如果解锁屏幕成功,则A手机将当前的生物特征数据同步给B手机。然后,B手机使用A手机发送的指纹/人脸数据进行解锁尝试,但不执行解锁后动作(即解锁屏幕)。并且B手机记录解锁结果(不论解锁屏幕成功还是解锁屏幕失败),并将解锁结果返回给A。A手机根据解锁结果进行判决:如果解锁失败,可判定A手机和B手机的用户不是同一用户;如果解锁成功,可判定A手机和B手机的用户是同一用户。
需要说明的是,对于同帐号下的不同终端设备的用户身份的识别,考虑最简单的概念模型,其基础就是终端设备两两之间的比较,尤其是同帐号下的两个手机,到底是同一个人用,还是两个人用。上面以针对登录同一帐号的两个终端设备进行用户身份识别为例进行示例性说明,可以理解,在实际实现时,本申请实施例还可以针对登录同一帐号的三个或更多个终端设备进行用户身份识别。
示例性的,以三个终端设备登录同一帐号的场景为例,下面给出了本申请针对登录同一帐号的三个终端设备进行用户身份识别的三种可能的情况。
情况一,用户的生物特征信息在终端设备1上能够解锁屏幕成功,并且在终端设备2和终端设备3上尝试解锁屏幕成功,因此可以判定终端设备1的用户、终端设备2的用户和终端设备3的用户为同一用户。
情况二,用户的生物特征信息在终端设备1上能够解锁屏幕成功,但是在终端设备2和终端设备3上尝试解锁屏幕失败,因此可以判定终端设备1的用户、终端设备2的用户和终端设备3的用户为不同用户。
情况三,用户的生物特征信息在终端设备1上能够解锁屏幕成功,在终端设备2 尝试解锁屏幕成功,但是在终端设备3上尝试解锁屏幕失败,因此可以判定终端设备1的用户和终端设备2的用户为同一用户,但是终端设备1的用户和终端设备3的用户为不同用户。可以理解,终端设备2的用户和终端设备3的用户为不同用户。
需要说明的是,可以在识别出多终端设备的用户身份是否为同一用户之后,记录识别结果。或者,可以在连续多次识别出多终端设备的用户身份是否为同一用户之后,记录识别结果,以提升识别准确度。
本申请实施例提供的针对多个设备进行用户身份识别的方法,对于登录同一帐号的两个终端设备,其中任一个终端设备在解锁屏幕成功时,可以将解锁屏幕时用户输入的生物特征信息发送给另一终端设备,若该另一终端设备利用该生物特征信息尝试解锁屏幕成功,则由此可以确定这两个终端设备的用户是同一用户。若该另一终端设备利用该生物特征信息尝试解锁屏幕失败,则由此可以确定这两个终端设备的用户是不同用户。通过本方案,针对登录同一帐号的多个终端设备进行用户身份识别,能够区分登录同一帐号的多个终端设备是同一用户使用,还是不同用户使用,进而可以更准确地为用户提供有针对性的服务。
在本申请实施例中,基于应用(或平台)注册的帐号可以将用户的终端设备与应用(或平台)进行关联,当用户在终端设备基于某应用(或平台)登录帐号之后,该应用(或平台)对应的服务器可以向终端设备发送与该应用(或平台)相关的应用信息,为用户提供服务。示例性的,假设两个终端设备均基于第一应用登录了第一帐号,为了避免信息干扰或信息泄露,本申请提出可以先针对两个终端设备进行用户身份识别,若识别后发现这两个终端设备的用户身份不同,则可以提示用户作选择,将与第一应用相关的第一应用信息发送给两个终端设备,还是发送给其中某一终端设备(例如优先级高的终端设备)即可,从而可以有区别地为用户提供针对性服务。
示例性的,在第一终端设备确定第一终端设备的用户身份与第二终端设备的用户身份不同(上述S152)之后,第一终端设备可以显示第一提示消息,以提示第一终端设备和第二终端设备均登录了第一帐号,是否禁止将与第一应用相关的第一应用信息发送给第一终端设备或者第二终端设备。进一步的,响应于用户输入的第一操作(用于确认禁止将第一应用信息发送给第二终端设备),第一终端设备可以向与第一应用对应的服务器发送第二消息,以指示服务器将第一应用信息发送给第一终端设备而不发送给第二终端设备。在此情况下,第一终端设备可以接收第一应用信息,并且可以在第一终端设备的屏幕上显示第一应用信息对应的界面,而第二终端设备不再接收第一应用信息,避免了信息干扰或信息泄露。
示例性的,第一终端设备和第二终端设备均登录第一帐号,假设第一终端设备为主要设备,第二终端设备为次要设备,那么可以认为第一终端设备的优先级高于第二终端设备的优先级。在此情况下,该第一提示消息可以提示是否禁止将第一应用信息发送给第二终端设备。
可选的,上述第一应用信息可以由系统设定,也可以由用户根据需求设定,具体可以根据实际使用需求确定,本申请实施例不作限定。示例性的,第一应用信息可以是与用户行为关联度较高的某些特定类型的数据或信息,例如与用户隐私关联度较高的信息(例如钱包信息),或者与主要用户关联度较高但与其他用户关联度较低的信 息(例如航班提醒信息)。
需要说明的是,第一应用信息作为登录同一帐号的多个终端设备的非共享资源,需要针对次要设备进行屏蔽,避免信息干扰或信息泄露;而对于与用户行为关联度较低的一类或多类应用信息,例如视频推荐信息和音频推荐信息,可以作为登录同一帐号的多个终端设备的共享资源,无需针对次要设备进行信息屏蔽。当然,作为共享资源的一类多类应用信息也可以由用户根据需求选择,或者由系统设定。
在一些实施例中,上述第一应用信息可以包括以下任一项:基于第一应用的视频通话来电提醒、基于第一应用的语音通话来电提醒、基于第一应用的文字通话消息提醒,基于第一应用的推荐信息(例如航班提醒信息)。当然,第一应用信息还可以为其他任意满足实际使用需求的信息(例如钱包信息),具体可以根据实际使用需求确定,本申请实施例不作限定。
示例性的,假设终端设备1为主要设备,终端设备1可以显示如下提示消息:“终端设备1和终端设备2均登录了第一帐号,是否禁止将如下各类应用信息发送给终端设备2:钱包信息、视频通话来电提醒、语音通话来电提醒、航班提醒信息、视频推荐信息和音频推荐信息”,在用户选择其中某一类或多类应用信息并点击确认按钮之后,用户选择的一类或多类应用信息会下发给终端设备1,而不会再下发给终端设备2,以及用户未选择的一类或多类应用信息均会发送给终端设备1和终端设备2,从而可以避免信息干扰或信息泄露。
示例性的,终端设备1的用户可以根据需求,设定或选择钱包信息、视频通话来电提醒、语音通话来电提醒、航班提醒信息等应用信息,发送给终端设备1而不发送给终端设备2,并且选择视频推荐信息和音频推荐信息均发送给终端设备1和终端设备2。
通过本方案,在多设备通过登录同一账号而共享服务资源的情况下,可以在确定多个设备是不同用户使用时,向不同设备推送针对性的服务资源,避免不必要的服务推送,提升用户体验。
下面结合图1和图5进行对比说明本申请实施例提供的方法的应用效果,在图1示出的传统方案中,登录同一帐号的两个终端设备1和2均会接收到应用信息1,由于这两个终端设备的用户为不同用户,因此应用信息1可能是终端设备1的用户需要的,而不是终端设备2的用户需要的,会造成信息干扰或信息泄露。在图5所示的本申请方案中,登录同一帐号的两个终端设备若用户身份不同,则会有区别地接收到不同的应用信息,从服务器角度来讲,服务器3会针对不同用户身份,向两个终端设备有区别地下发应用信息。例如,服务器会向终端设备1下发终端设备1的用户需要的应用信息01,相应地终端设备1可以接收到该应用信息01并显示给用户查看,而由于应用信息01对于第二终端设备的用户是不需要的信息,因此服务器3不会下发给第二终端设备,因此第二终端设备不会接收到,也不会显示。再例如,应用信息02作为共享资源,服务器3可以将该应用信息02下发给终端设备1和终端设备2,相应地终端设备1和终端设备2均会接收并显示应用信息02。
需要说明的是,上面给出了由用户选择将与第一应用相关的第一应用消息下发给第一终端设备和/或第二终端设备的具体实现方式,可以理解,在实际实现时,本申请 实施例还可以包括其他实现方式,例如在服务器确定第一终端设备的优先级高于第二终端设备的优先级的情况下(第一终端设备为主要设备),服务器可以据此将第一应用消息下发给第一终端设备,不再下发给第二终端设备,以避免信息干扰或信息泄露,而无需用户进行选择,提升了用户体验。
在一些实施例中,在第一终端设备确定第一终端设备的用户身份与第二终端设备的用户身份不同之后,第一终端设备可以显示第二提示消息,该第二提示消息用于提示第一终端设备和第二终端设备登录了同一帐号,是否同意第一终端设备和第二终端设备登录不同的帐号。这样,若用户选择同意第一终端设备和第二终端设备登录不同的帐号,则可以避免信息干扰或信息泄露。
需要说明的是,本文根据用户的生物特征信息在终端设备1上能够解锁屏幕成功,以及在终端设备2上尝试解锁屏幕是否成功,判定登录同一帐号的终端设备1和终端设备2是否为同一用户身份。除了采用用户输入的生物特征信息对登录同一帐号的两个终端设备进行用户身份识别之外,还可以采用其他解锁信息(例如解锁屏幕时用户输入的密码)对登录同一帐号的两个终端设备进行用户身份识别。例如,在实际实现时,还可以通过屏幕解锁所采用的用户输入密码在终端设备1上能够解锁屏幕成功,以及在终端设备2上尝试解锁屏幕是否成功,判定终端设备1的用户和终端设备2的用户是否为同一用户。其中,采用密码对登录同一帐号的两个终端设备进行用户身份识别的具体实现方式可以参见上述采用用户生物特征信息对登录同一帐号的两个终端设备进行用户身份识别的详细描述,此处不再赘述。
第二实施例
以上描述了本申请第一实施例提供的一种针对多个设备进行用户身份识别的方法,其中登录同一帐号的两个终端设备彼此之间通过信息交互进行用户身份识别。下面结合附图对本申请第二实施例提供的一种针对多个设备进行用户身份识别的方法进行示例性说明,其中登录同一帐号的两个终端设备与服务器侧交互,由服务器侧对两个终端设备进行用户身份识别,这种由服务器侧识别的方式可称为端云仲裁方式。当然,也可以由终端设备侧(例如可以是两个终端设备中的任意一个设备,或者可以是第三方设备)根据组合加密的生物特征信息,对这两个终端设备进行用户身份识别。
图6是本申请实施例提供的一种针对多个设备进行用户身份识别的方法的流程图,其中第一终端设备和第二终端设备登录了同一帐号。参照图6所示,该方法200包括下述的步骤S211-S240。
S211,第一终端设备根据用户输入的第三生物特征信息,解锁屏幕成功。
即,该第三生物特征信息为第一终端设备解锁屏幕成功时所采用的生物特征信息。
S212,第一终端设备对第三生物特征信息进行第一加密处理,得到第一信息。
S213,第一终端设备向服务器发送第一信息。
此外,第一终端设备还会向服务器发送第一加密处理所采用的算法。
上述S211-S213中,第一终端设备在解锁屏幕成功的情况下,将解锁屏幕成功时所采用的生物特征信息进行加密处理,然后发送给服务器。
S221,第二终端设备根据用户输入的第四生物特征信息,解锁屏幕成功。
即,该第四生物特征信息为第二终端设备解锁屏幕成功时所采用的生物特征信息。
S222,第二终端设备对第三生物特征信息进行第二加密处理,得到第二信息。
S223,第二终端设备向服务器发送第二信息。
此外,第二终端设备还会向服务器发送第二加密处理所采用的算法。
上述S221-S223中,第二终端设备在解锁屏幕成功的情况下,将解锁屏幕成功时所采用的生物特征信息进行加密处理,然后发送给服务器。
需要说明的是,本申请实施例不限定上述S211-S213和上述S221-S223的执行顺序。例如,S211-S213先执行,S221-S223后执行;或者S221-S223先执行,S211-S213后执行;或者S211-S213和上述S211-S213可以同时执行。具体可以根据实际情况确定,本申请实施例不作限定。并且,对于S211和S221的描述具体可以参见上述对S110的详细描述,此处不再赘述。
本申请实施例对于第一加密处理所采用的算法和第二加密处理所采用的算法不作限定。例如,上述第一加密处理所采用的算法可以为哈希算法、重编码算法或自定义变换算法,或者是其他任意满足实际使用需求的加密算法。第二加密处理所采用的算法可以为哈希算法、重编码算法或自定义变换算法,或者是其他任意满足实际使用需求的加密算法。
需要说明的是,第一加密处理所采用的算法和第二加密处理所采用的算法均是从加密算法库中随机选择的,因此第一加密处理所采用的算法与第二加密处理所采用的算法可以相同,也可以不同,本申请实施例对此不作限定。
还需要说明的是,第三生物特征信息和第四生物特征信息应该为相同类型的生物特征信息。例如,二者均为指纹特征信息,或者二者均为人脸特征信息,或者可以均为其他任意可能的生物特征信息。为了便于描述,下面以二者均为指纹特征信息为例进行示例性的说明。
S230,服务器对第一信息进行第二加密处理得到第三信息,并对第二信息进行第一加密处理得到第四信息。
在本申请实施例中,服务器可以预先存储或记录同一帐号下的多个终端设备的标识。例如,若终端设备1和终端设备2均使用帐号1,服务器可以记录帐号1与终端设备1和终端设备2的对应关系。因此,终端设备1和终端设备2具有关联关系。这样服务器可以据此识别具有关联关系的终端设备1和终端设备2。
其中,用户的第三生物特征信息在经过第一加密处理后再经过第二加密处理,得到第三信息,用户的第四生物特征信息在经过第二加密处理后再经过第一加密处理,得到第四信息。
S240,服务器根据第三信息与第四信息,确定第一终端设备的用户身份与第二终端设备的用户身份是否相同。
在本申请实施例中,第一终端设备在根据用户输入的第三生物特征信息解锁屏幕成功的情况下将第三生物特征信息进行第一加密处理后(加密后的信息称为第一信息)发送给服务器,同样第二终端设备在根据用户输入的第四生物特征信息解锁屏幕成功的情况下将第四生物特征信息进行第二加密处理后(加密后的信息称为第二信息)发送给服务器,服务器将第一信息进行第二加密处理得到第三信息并且将第二信息进行第一加密处理得到第四信息,并根据第三信息和第四信息是否相同,确定这两个终端 设备的用户是否为同一用户。通过本方案,针对登录同一帐号的多个终端设备进行用户身份识别,能够区分登录同一帐号的多个终端设备是同一用户使用,还是不同用户使用,进而可以更准确地为用户提供有针对性的服务。
结合图6,如图7所示,上述S240具体可以通过下述的S241或S242实现,S241或S242择一执行。
S241,若第三信息与第四信息相同,则服务器确定第一终端设备的用户身份与第二终端设备的用户身份相同。
如图8所示,终端设备1和终端设备2为登录同一帐号的两个设备,当用户触发终端设备1解锁屏幕时(例如通过指纹解锁屏幕),终端设备1将用户输入的第三生物特征信息(例如指纹信息)与终端设备1预先存储的生物特征信息进行匹配,若匹配成功(即解锁屏幕成功),则将第三生物特征信息进行第一加密处理,将加密后得到的第一信息发送给服务器3,并告知服务器3第一加密处理所采用的算法。当用户触发终端设备2解锁屏幕时(例如通过指纹解锁屏幕),终端设备2将用户输入的第四生物特征信息(例如指纹信息)与终端设备2预先存储的生物特征信息进行匹配,若匹配成功(即解锁屏幕成功),则将第四生物特征信息进行第二加密处理,将加密后得到的第二信息发送给服务器3,并告知服务器3第二加密处理所采用的算法。服务器3在接收到第一信息和第二信息之后,对第一信息进行第二加密处理得到第三信息,对第二信息进行第一加密处理得到第四信息,并且将第三信息和第四信息进行比对或匹配,若匹配成功,则可以得出结论,终端设备1和终端设备2的用户身份相同。
在本申请实施例中,第三生物特征信息先经过第一加密处理后再经过第二加密处理,即第三生物特征信息经历了组合加密,得到第三信息,第四生物特征信息先经过第二加密处理后再经过第一加密处理,即第四生物特征信息经历了组合加密,得到第四信息。若第三信息和第四信息相同,则表明终端设备1用于解锁屏幕的用户生物特征信息和终端设备2用于解锁屏幕的用户生物特征信息相同。由此可以判定终端设备1的用户和终端设备2的用户为同一用户。这样,在登录同一帐号的多个终端设备的用户为同一用户的情况下,可以无需屏蔽业务信息。
S242,若第三信息与第四信息不同,则服务器确定第一终端设备的用户身份与第二终端设备的用户身份不同。
再参考图8所示,服务器3将第三信息和第四信息进行比对或匹配,若匹配失败,则可以得出结论,终端设备1和终端设备2的用户身份不同。
在本申请实施例中,若第三信息和第四信息不同,则表明第一终端设备的用户输入的第三生物特征信息和第二终端设备的用户输入的第四生物特征信息不同。由此可以判定第一终端设备的用户和第二终端设备的用户为不同用户。这样,在登录同一帐号的多个终端设备的用户为不同用户的情况下,可以针对不同用户提供不同的服务,提升用户体验。
下面通过示例说明上述图8所示步骤的具体实现过程。示例性的,云侧(即云服务器)可以记录有每个帐号对应的多个终端设备的标识,这多个终端设备由于均使用了同一帐号而具有关联关系。下面假设云侧记录了使用某一帐号的终端设备包括A手机和B手机。一方面,A手机在通过生物特征解锁屏幕时,从候选变换方法库(例 如包括多种哈希算法、重编码算法、自定义变换算法等)选择一种a方法;将解锁时输入的生物特征信息经过a方法变换(简称a变换),并将变换后数据上传到云侧,同时告诉云侧所采用的变换方法为a方法。另一方面,B手机在通过生物特征解锁屏幕时,从候选变换方法库(例如包括多种哈希算法、重编码算法、自定义变换算法等)选择一种b方法;将解锁时输入的生物特征信息经过b方法变换(简称b变换),并将变换后数据上传到云侧,同时告诉云侧所采用的变换方法为b方法。
下面说明云侧数据碰撞的过程:云侧将A手机和B手机上传的变换后数据,分别进行补偿变换,例如将A手机上传的变换后数据再进行b变换,将B手机上传的变换后数据再进行a变换。将经过补偿变换后的两项数据进行云侧数据碰撞。需要说明的是,由于一个帐号下设备有限,非法碰撞的概率极小。再说明云侧数据碰撞后的判决结果:如果补偿变换后的两项数据匹配成功,则云侧碰撞结果成功,说明登录同一帐号的A手机和B手机的用户为同一用户。如果补偿变换后的两项数据匹配失败,则云侧碰撞结果失败,说明登录A手机和B手机的用户不是同一个用户。
需要说明的是,由于终端设备上传的数据均为变换后数据,且这些变换是不可逆的,因此云侧不长期存储这类变换后数据,例如云侧在完成数据碰撞之后会清理这类变换后数据。
需要说明的是,上面以针对登录同一帐号的两个终端设备进行用户身份识别为例进行示例性说明,可以理解,在实际实现时,本申请实施例还可以采用第二实施例提供的方法针对登录同一帐号的三个或更多个终端设备进行用户身份识别。
示例性的,以三个手机(A手机、B手机和C手机)登录同一帐号的场景为例,A手机解锁屏幕所采用的生物特征数据经历a变换、B手机解锁屏幕所采用的生物特征数据经历b变换,C手机解锁屏幕所采用的生物特征数据经历c变换云侧,变换后数据均上传到云侧,云侧将A手机、B手机和C手机上传的变换后数据,分别进行补偿变换,例如,将A手机上传的变换后数据再进行b变换和c变换,将B手机上传的变换后数据再进行a变换和c变换,将C手机上传的变换后数据再进行a变换和b变换。将经过补偿变换后的三项数据进行云侧数据碰撞。如果补偿变换后的三项数据匹配成功,则云侧碰撞结果成功,说明登录同一帐号的A手机、B手机和C手机的用户为同一用户。如果补偿变换后的三项数据匹配失败,则云侧碰撞结果失败,说明登录A手机、B手机和C手机的用户不是同一个用户。
还需要说明的是,在采用第二实施例提供的方法针对三个或三个以上终端设备进行用户身份识别时,还可以通过如下方式实现:在云侧将经过补偿变换后的数据分别两两碰撞,从而可以更精确地判断出三个或三个以上终端设备中任意两个终端设备的用户是否为同一个用户。
在一些实施例中,在服务器确定第一终端设备的用户身份与第二终端设备的用户身份不同之后,服务器可以向第一终端设备和/或第二终端设备发送第一提示信息,该第一提示信息用于提示第一终端设备和第二终端设备均登录了第一帐号,是否禁止将与第一应用相关的第一应用信息发送给第一终端设备或者第二终端设备。
其中,第一应用为与第一帐号对应的应用,服务器可以为与第一应用对应的服务器。
假设第一终端设备接收到服务器发送的第一提示信息,并显示该第一提示信息。进一步的,响应于用户输入的第一操作(用于确认禁止将第一应用信息发送给第二终端设备),第一终端设备可以向服务器发送第二消息,以指示服务器将第一应用信息发送给第一终端设备而不发送给第二终端设备。在此情况下,服务器接收第一终端设备发送的第二消息,并根据第二消息,在获取到第一应用信息时,将第一应用信息发送给第一终端设备而不发送给第二终端设备。如此,第一终端设备可以接收第一应用信息,并且可以在第一终端设备的屏幕上显示第一应用信息对应的界面,而第二终端设备不再接收第一应用信息,避免了信息干扰或信息泄露。
可选的,上述第一应用信息可以由系统设定,也可以由用户根据需求设定,具体可以根据实际使用需求确定,本申请实施例不作限定。示例性的,第一应用信息可以是与用户行为关联度较高的某些特定类型的数据或信息,例如与用户隐私关联度较高的信息(例如钱包信息),或者与主要用户关联度较高但与其他用户关联度较低的信息(例如航班提醒信息)。
需要说明的是,第一应用信息作为登录同一帐号的多个终端设备的非共享资源,需要针对次要设备进行屏蔽,避免信息干扰或信息泄露;而对于与用户行为关联度较低的一类或多类应用信息,例如视频推荐信息和音频推荐信息,可以作为登录同一帐号的多个终端设备的共享资源,无需针对次要设备进行信息屏蔽。当然,作为共享资源的一类多类应用信息也可以由用户根据需求选择,或者由系统设定。
在一些实施例中,上述第一应用信息可以包括以下任一项:基于第一应用的视频通话来电提醒、基于第一应用的语音通话来电提醒、基于第一应用的文字通话消息提醒,基于第一应用的推荐信息(例如航班提醒信息)。当然,第一应用信息还可以为其他任意满足实际使用需求的信息(例如钱包信息),具体可以根据实际使用需求确定,本申请实施例不作限定。
示例性的,假设终端设备1为主要设备,终端设备1可以显示如下提示消息:“终端设备1和终端设备2均登录了第一帐号,是否禁止将如下各类应用信息发送给终端设备2:钱包信息、视频通话来电提醒、语音通话来电提醒、航班提醒信息、视频推荐信息和音频推荐信息”,在用户选择其中某一类或多类应用信息并点击确认按钮之后,用户选择的一类或多类应用信息会下发给终端设备1,而不会再下发给终端设备2,以及用户未选择的一类或多类应用信息均会发送给终端设备1和终端设备2,从而可以避免信息干扰或信息泄露。
示例性的,终端设备1的用户可以根据需求,设定或选择钱包信息、视频通话来电提醒、语音通话来电提醒、航班提醒信息等应用信息,发送给终端设备1而不发送给终端设备2,并且选择视频推荐信息和音频推荐信息均发送给终端设备1和终端设备2。
需要说明的是,上面给出了由用户选择将与第一应用相关的第一应用消息下发给第一终端设备和/或第二终端设备的具体实现方式,可以理解,在实际实现时,本申请实施例还可以包括其他实现方式,例如在服务器确定第一终端设备的优先级高于第二终端设备的优先级的情况下(第一终端设备为主要设备),服务器可以据此将第一应用消息下发给第一终端设备,不再下发给第二终端设备,以避免信息干扰或信息泄露, 而无需用户进行选择,提升用户体验。
在一些实施例中,在一些实施例中,在服务器确定第一终端设备的用户身份与第二终端设备的用户身份不同之后,服务器可以向第一终端设备和第二终端设备发送第二提示信息,以提示第一终端设备和第二终端设备登录了同一帐号,是否同意第一终端设备和第二终端设备登录不同的帐号。进一步的,假设第一终端设备接收第二提示消息,第一终端设备显示该第二提示消息,若用户选择同意第一终端设备和第二终端设备登录不同的帐号,则可以避免信息干扰或信息泄露。
需要说明的是,本文针对登录同一帐号的不同终端设备,通过对其屏幕解锁所采用的生物特征信息组合加密(即补偿变换)后进行比较,判定终端设备1的用户和终端设备2的用户是否为同一用户。除了通过屏幕解锁所采用的生物特征信息对登录同一帐号的两个终端设备进行用户身份识别之外,还可以通过其他解锁信息(例如用户输入的密码)对登录同一帐号的两个终端设备进行用户身份识别。例如,在实际实现时,还可以通过对屏幕解锁所采用的用户输入密码进行组合加密后进行比较,判定终端设备1的用户和终端设备2的用户是否为同一用户。其中,采用密码对登录同一帐号的两个终端设备进行用户身份识别的具体实现方式可以参见上述采用用户生物特征信息对登录同一帐号的两个终端设备进行用户身份识别的详细描述,此处不再赘述。
还需要说明的是,以上第一实施例和第二实施例中均以终端设备通过生物特征解锁屏幕的场景为例对本申请实施提供的方法进行示例性说明,在实际实现时,本申请实施例不限于终端设备通过生物特征解锁屏幕的场景,例如还可以是终端设备通过生物特征登录某一账号的场景,也可以是终端设备通过生物特征进行付款的场景,或者还可以是其他任意需要通过生物特征对用户身份认证的场景,具体可以根据实际使用需求确定,本申请实施例不作限定。
本申请第一实施例并未对第一实施例提供的方法的执行主体的具体结构进行特别限定,只要能够通过运行记录有本申请实施例提供的方法的代码的程序,以根据本申请第一实施例提供的方法实现即可。例如,本申请实施例提供的方法的执行主体可以是服务器,或者是服务器中能够调用程序并执行程序的功能模块。再例如,本申请实施例提供的方法的执行主体可以是第三终端设备,或者是第三终端设备中能够调用程序并执行程序的功能模块。为了实现上述本申请实施例提供的方法中的各功能,服务器可以包括硬件结构和/或软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能以硬件结构、软件模块、还是硬件结构加软件模块的方式来执行,取决于技术方案的特定应用和设计约束条件。
上面分别介绍了第一实施例提供的针对多个设备进行用户身份识别的方法和第二实施例提供的针对多个设备进行用户身份识别的方法,下面结合传统技术方案进一步说明本申请实施例提供的方法的有益效果。
首先介绍传统技术方案中判断两个设备是否是同一用户在使用的方法,该方法以全球用户识别模块(universal subscriber identity module,USIM)卡为分析对象,通过将多个终端设备的蜂窝数据信息或全球定位系统(global positioning system,GPS)信息进行比对来判断两个设备是否是同一用户在使用。假设:多用户必然位置轨迹不同,例如父亲去公园,母亲去超市,儿子去公司。而且,手机通常是单用户使用的,从位 置轨迹来说,手机和人的位置轨迹一一对应,且个人手机不会给其他人分享使用。
在该传统技术方案中,分别记录多个手机的基站注册Cell或GPS打点,然后分析打点的轨迹分布。一方面,如果两部手机的轨迹不甚一致,则可以判定同一帐号的两个手机被不同用户实际使用。另一方面,如果两部手机的轨迹高度一致,可以判定这是一个用户同时使用两部手机。假设有A、B两部手机,其位置轨迹点分别是A1…An、B1…Bn,都登录同一个帐号,在传统方案中,分别计算A1与B1之间的距离,A2与B2之间的距离,…以及An与Bn之间的距离,分别得到距离L1,L2,…以及Ln。然后,计算L1,L2,…以及Ln的平均值M,如果M大于或等于门限值(例如600米),则判定两个手机是不同用户使用;如果M小于门限判定两个手机是同一人使用。
该传统技术方案的缺点为:第一,基站注册数据不够精准,如果是大学内同学、同事兼室友,很可能一直在同一基站范围内,无法精准识别。第二,用户的精准位置信息是敏感数据,如果直接上传到云服务器进行比较,泄露隐私的风险较高,并且相关管制法规也不允许这样操作。
与上述传统技术方案相比,本申请第一实施例提供的针对多个设备进行用户身份识别的方法可以通过终端设备之间交互的方式,根据用户的指纹或人脸特征等信息,更准确地识别出多个终端设备是同一人使用还是不同人使用,准确性较高,并且隐私风险较低。
其次再介绍传统技术方案中另一种判断两个设备是否是同一用户在使用的方法,该方法使用生物特征进行比对来判断两个设备是否是同一用户在使用。其中,假设每个用户会在自己的设备上注册或录入自己的生物特征(例如指纹),且单一手机不会注册两个不同自然人的生物特征。在该方案中,一方面,如果两部手机的生物特征不一致,则可以判定同一帐号的两个手机被不同用户使用。另一方面,如果两部手机的生物特征一致,则可以判定同一帐号的两个手机被同一用户实际使用。
假设A手机和B手机都登录同一个帐号X,且录入的生物特征分别为Xa和Xb。首先,A手机将Xa发送给B手机,由B手机将Xa与Xb进行比对;或者B手机将Xb发送给A手机,由A手机将Xa与Xb进行比对;或者将Xa和Xb都传递给第三个设备或上传云服务器,由第三个设备或上传云服务器进行比对。若Xa=Xb或Xa等价于Xb,则判定两个手机是同一用户使用;否则判定两个手机是不同用户使用。然而,该技术方案中,由于指纹/人脸的特征数据一般在可信执行环境(trusted execution environment,TEE)中保存,不能脱离TEE环境,例如不能将录入手机的生物特征发送给其他设备,也不能直接上传给云服务器,泄露隐私的风险较高。也就是说,通过该技术方案,通过将两个设备的指纹/人脸的具体特征数据进行比对来判断这两个设备是否同一个人使用,存在一定风险。
与上述传统技术方案相比,本申请第二实施例提供的针对多个设备进行用户身份识别的方法可以通过将用户生物特征信息进行组合加密,再进行比对,从而可以识别出多个终端设备是同一人使用还是不同人使用,不管是在服务器侧进行比对,还是在终端设备侧进行比对,由于用户生物特征信息被加密,可以降低泄露隐私的风险,因此无需担心用户隐私泄露。
下面描述采用本申请第一实施例提供的方法的测试场景,假设A手机和B手机登 录了账号X。关闭两个手机与云服务器之间的数据信道,例如关闭路由器开关和/或关闭手机的蜂窝数据功能。一方面,在A手机和B手机上分别录入相同的生物特征,反复多次通过生物特征解锁A手机或B手机,在此情况下可以观察到:提供给A手机和B手机的与账号X绑定的服务或资源相同,这是因为通过第一实施例提供的方法,如果确定出登录同一账号的多个手机是同一用户使用,则向多个手机提供相同的服务或资源。另一方面,在A手机和B手机上分别录入不相同的生物特征,反复多次通过生物特征解锁A手机或B手机,在此情况下可以观察到:提供给A手机和B手机的与账号X绑定的服务或资源不同,这是因为通过第一实施例提供的方法,如果确定出登录同一账号的多个手机是不同用户使用,则向不同用户有区别地提供服务或资源。
下面再描述采用本申请第二实施例提供的方法的测试场景,假设A手机和B手机登录了账号X。关闭两个手机的Wi-Fi和蓝牙功能,仅开启蜂窝数据功能。一方面,在A手机和B手机上分别录入相同的生物特征,反复多次通过生物特征解锁A手机或B手机,在此情况下若服务器下发与账号X绑定的服务或资源,则可以观察到:提供给A手机和B手机的服务或资源相同,这是因为通过第二实施例提供的方法,如果确定出登录同一账号的多个手机是同一用户使用,则向多个手机提供相同的服务或资源。另一方面,在A手机和B手机上分别录入不相同的生物特征,反复多次通过生物特征解锁A手机或B手机,在此情况下若服务器下发与账号X绑定的服务或资源,则可以观察到:提供给A手机和B手机的服务或资源不同,这是因为通过第二实施例提供的方法,如果确定出登录同一账号的多个手机是不同用户使用,则向不同用户有区别地提供服务或资源。
在第一实施例中,利用多终端的端端交叉互检方法,在不获取TEE环境内的生物特征值的情况下完成多终端用户身份识别。在第二实施例中,利用多终端的云侧数据碰撞方法,在不获取TEE环境内的生物特征值的情况下完成多终端用户身份识别。综合上述第一实施例的方法和第二实施例提供的方法,本申请技术方案与传统方案相比主要有两方面提升:
第一,提升用户体验:减少尴尬场景、保护个人隐私、减少不必要的骚扰,画像更加精准,推荐模型精度有效提升。
第二,提高运营效果:可以缓解用户自身未区分帐号造成的舆情问题,并且激活更多帐号,可提高运营绩效。
需要说明的是,在第一实施例中,多个终端设备需具有端端后台的通信能力以及生物特征管理能力。在第一实施例中,多个终端设备需具有端端后台的通信能力以及端云通信能力。由于按照一般数据保护条例等要求这类业务的相关描述必须在隐私协议中呈现,因此可以通过隐私协议的相关描述确定终端设备是否有上述相应能力。
需要说明的是,本申请提供了端端交叉互检和端云仲裁两种识别方式,除了应用于识别单帐号下多用户这一场景,还可以使用在其它不方便进行直接比较而需要间接比较的情况下。例如,某分析系统需要获取某个目标对象的特征,则可以先基于了解目标对象的概貌信息进行基础设定,然后不断尝试构造用例,通过在基础设定和目标对象上实施交叉互检或端云仲裁识别方式,逐渐逼近目标对象的最小包络,以获取该目标对象的特征。
目前厂商支持多个终端设备登录同一个帐号,共享该帐号绑定的服务或资源,下面列举了多个终端设备登录同一个帐号的几种可能情况。
第一种情况:家里老人不会注册帐号,由子女直接登录自己帐号。
第二种情况:用户的手机没有退出帐号,直接转给家人或朋友使用。
第三种情况:家人和/或朋友之间直接为了共享同一帐号绑定的服务,而选择使用同一个帐号登录。
由于上述情况的客观存在,目前传统方案在单帐号下的多用户使用场景下可能出现多种问题。下面结合具体应用场景,与传统方案中单帐号下的多用户使用场景下的解决方案进行比较,说明本申请实施例提供的针对多个设备进行用户身份识别的方法应用后的有益效果。首先,假设用户A为自己注册了一个帐号,并在自己手机上登录了该帐号,并且将该帐号分享给用户B使用,用户B的手机也登录了该帐号。即用户A为主要用户,用户B为次要用户。
【场景1:云图库的维护】
传统方案:由于两个手机登录了同一帐号,因此两个手机各自的图库中的图片或视频会自动同步到该帐号对应的云图库,共用同一帐号后的结果是云图库里不仅有用户A的图片或视频,还有用户B的图片或视频。这样导致用户A的云图库数据杂乱,不利于维护。
本申请方案:在两个手机登录了同一帐号的情况下,可以对这两个手机有区别地提供服务,例如可以禁止用户B的手机中的图片或视频同步到云图库,同时允许用户A的手机中的图片或视频同步到云图库,这样便于用户A维护自己的云图库。
【场景2:云空间的使用】
传统方案:登录了同一帐号的两个手机的数据(尤其是备份数据)均会自动同步到该帐号对应的云空间,在此情况下,用户A的云空间很可能被用户B的数据占用甚至占满。
本申请方案:类似于场景1,在两个手机登录了同一帐号的情况下,可以对这两个手机有区别地提供服务,例如可以禁止用户B的手机中的数据存储到云空间中,同时允许用户A的手机中的数据存储到云空间中,这样有利于用户A维护自己的云空间。
【场景3:服务消息的推送】
传统方案:用户A的手机接收到服务消息,例如以情景智能卡片的形式显示:您的飞机将在3小时内起飞。这些应用提示信息同样会在用户B的手机上自动同步显示,但是这些应用提示信息并不是用户B想要看到的信息,因此会造成信息干扰。
本申请方案:在两个手机登录了同一帐号的情况下,可以对这两个手机有区别地提供服务,例如为用户A的手机提供的服务不变,可以禁止向用户B的手机发送预设类型的服务消息,这样可以避免信息干扰或者信息泄露。
【场景4:视频/音频通话】
传统方案:在用户A的手机接收到畅联通话呼叫时,用户B的手机也会接收到畅联通话呼叫,但是该畅联通话呼叫并不是呼叫用户B的,因此会造成信息干扰。
本申请方案:在两个手机登录了同一帐号的情况下,可以对这两个手机有区别地提供服务,例如为用户A的手机提供的服务不变,可以禁止向用户B的手机发送视频 /音频通话呼叫消息,这样可以避免信息干扰或者信息泄露。
【场景5:用户画像】
传统方案:基于用户A的行为数据和用户B的行为数据汇聚合成的用户画像,无法为用户A提供准确的服务。
本申请方案:在两个手机登录了同一帐号的情况下,在对这两个手机有区别地提供服务之后,可以基于用户A的行为数据形成用户A的用户画像,从而可以为用户A提供准确的服务。
由此可见,本申请实施例提供的方法可以解决以上三种情况造成的五种典型问题场景。本申请实施例能够识别出同一帐号下多个设备,到底有几个用户在使用,用户与终端设备的对应关系是如何的,在用户身份识别之后确定登录同一帐号的多个手机的用户身份不同时,可以对不同用户有区别地提供针对性的服务,让业务更智能。
本文中描述的各个实施例可以为独立的方案,也可以根据内在逻辑进行组合,这些方案都落入本申请的保护范围中。
可以理解的是,上述各个方法实施例中由服务器实现的方法和操作,也可以由可用于服务器的部件(例如芯片或者电路)实现。上述各个方法实施例中由终端设备实现的方法和操作,也可以由可用于终端设备的部件(例如芯片或者电路)实现。
上文描述了本申请提供的方法实施例,下文将描述本申请提供的装置实施例。应理解,装置实施例的描述与方法实施例的描述相互对应,因此,未详细描述的内容可以参见上文方法实施例,为了简洁,这里不再赘述。
上文主要从设备与设备之间交互的角度对本申请实施例提供的方案进行了描述。可以理解的是,各个设备,例如终端设备或者服务器,为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的保护范围。
本申请实施例可以根据上述方法示例,对终端设备或者服务器进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有其它可行的划分方式。下面以采用对应各个功能划分各个功能模块为例进行说明。
图9为本申请实施例提供的针对多个设备进行用户身份识别的装置700的示意性框图。该装置700可以用于执行上文方法实施例中终端设备所执行的动作。该装置700包括收发单元710和处理单元720。收发单元710用于执行上文方法实施例中终端设备侧的收发相关的操作。收发单元710还可以称为通信接口或通信单元。处理单元720用于执行上文方法实施例中终端设备侧的处理相关的操作。为了便于描述,以下将装置700称为第一装置,将与装置700交互的装置称为第二装置。
收发单元710,用于向第二装置发送第一生物特征信息,该第一生物特征信息为装置700解锁屏幕成功时用户输入的生物特征信息,该第二装置为与第一装置登录同一帐号的设备;
收发单元710,还用于接收第二装置发送的第一消息,该第一消息用于指示第一生物特征信息是否与第二装置中预先存储的第二生物特征信息匹配成功;
处理单元720,用于根据该第一消息确定第一装置的用户身份与第二装置的用户身份是否相同。
通过上述方案,可以将解锁屏幕时用户输入的生物特征信息发送给第二装置,该第二装置利用该生物特征信息尝试解锁屏幕并将尝试解锁结果返回给第一装置,第一装置可以根据尝试解锁结果确定这两个装置的用户是否为同一用户。这样,本申请针对登录同一帐号的多个装置进行用户身份识别,能够区分登录同一帐号的多个装置是同一用户使用,还是不同用户使用,进而可以更准确地为用户提供有针对性的服务。
可选的,上述生物特征信息包括指纹特征信息、人脸特征信息、虹膜特征信息、掌纹特征信息等,当然还可以包括其他满足实际使用需求的特征信息。
在可能的实现方式中,上述处理单元720,具体用于:若第一消息指示第一生物特征信息与第二生物特征信息匹配成功,则确定第一装置的用户身份与第二装置的用户身份相同;或者,若第一消息指示第一生物特征信息与第二生物特征信息匹配失败,则确定第一装置的用户身份与第二装置的用户身份不同。
通过上述方案,对于登录同一帐号的两个装置,其中任一个装置在解锁屏幕成功时,可以将解锁屏幕时用户输入的生物特征信息发送给另一装置,若该另一装置利用该生物特征信息尝试解锁屏幕成功,则由此可以确定这两个装置的用户是同一用户。若该另一装置利用该生物特征信息尝试解锁屏幕失败,则由此可以确定这两个装置的用户是不同用户。
在可能的实现方式中,收发单元710具体用于第一装置通过点到点直连链路向第二装置发送第一生物特征信息,以及通过该点到点直连链路接收第二装置发送的第一消息。
在可能的实现方式中,第一装置700还包括显示单元,该显示单元用于显示第一提示消息,该第一提示消息用于提示第一装置和第二装置均登录了第一帐号,是否禁止将与第一应用相关的第一应用信息发送给第一装置或者第二装置。其中,上述第一应用为与第一帐号对应的应用。
在可能的实现方式中,收发单元710还用于响应于用户输入的第一操作,向与第一应用对应的服务器发送第二消息,该第二消息用于指示服务器将应用信息发送给第一装置发送而不发送给第二装置。其中,第一操作用于确认禁止将第一应用信息发送给第二装置。
在可能的实现方式中,收发单元710还用于接收第一应用信息;显示单元还用于显示第一应用信息对应的界面。
在可能的实现方式中,上述第一应用信息可以包括以下至少一项:基于第一应用的视频通话来电提醒、基于第一应用的语音通话来电提醒、基于第一应用的文字通话消息提醒,基于第一应用的推荐信息。
在可能的实现方式中,显示单元还用于第二提示消息,该第二提示消息用于提示第一装置和第二装置登录了同一帐号,是否同意第一装置和第二装置登录不同的帐号。
根据本申请实施例的装置700可对应于执行本申请第一实施例中描述的方法,并且装置700中的单元的上述和其它操作和/或功能分别用于实现方法的相应流程,为了简洁,在此不再赘述。
图10为本申请实施例提供的针对多个设备进行用户身份识别的装置800的示意性框图。该装置800可以用于执行上文方法实施例中服务器或者终端设备所执行的动作。该装置800包括收发单元810和处理单元820。收发单元810用于执行上文方法实施例中服务器侧或者终端设备侧的收发相关的操作。收发单元810还可以称为通信接口或通信单元。处理单元820用于进行数据处理,处理单元820用于执行上文方法实施例中服务器侧或者终端设备侧的处理相关的操作。
收发单元810,用于获取第一信息和第二信息,该第一信息为第三生物特征信息经过第一加密处理得到的信息,该第二信息为第四生物特征信息经过第二加密处理得到的信息,该第三生物特征信息为第一终端设备解锁屏幕成功时所采用的生物特征信息,该第四生物特征信息为第二终端设备解锁屏幕成功时所采用的生物特征信息,该第一终端设备和第二终端设备为登录同一帐号的设备;
处理单元820,用于对第一信息进行第二加密处理,得到第三信息,并且对第二信息进行第一加密处理,得到第四信息;
处理单元820,还用于根据第三信息与第四信息,确定第一终端设备的用户身份与第二终端设备的用户身份是否相同。
在本申请实施例中,可以将两个终端设备各自发送的生物特征数据变换后的数据进行补偿变换,进而根据补偿变换后的数据是否相同,确定这两个终端设备的用户是否相同。通过本方案,针对登录同一帐号的多个终端设备进行用户身份识别,能够区分登录同一帐号的多个终端设备是同一用户使用,还是不同用户使用,进而可以更准确地为用户提供有针对性的服务。
在可能的实现方式中,处理单元820具体用于:若第三信息与第四信息相同,则确定第一终端设备的用户身份与第二终端设备的用户身份相同;或者,若第三信息与第四信息不同,则确定第一终端设备的用户身份与第二终端设备的用户身份不同。
在可能的实现方式中,所述收发单元810具体用于获取第一信息和第一加密处理所采用的算法,并且获取第二信息和第二加密处理所采用的算法。
可选的,第一加密处理所采用的算法可以为哈希算法、重编码算法和自定义变换算法中的任一项。第二加密处理所采用的算法可以为哈希算法、重编码算法和自定义变换算法中的任一项。需要说明的是,第一加密处理所采用的算法和第二加密处理所采用的算法均是从加密算法库中随机选择的,因此第一加密处理所采用的算法与第二加密处理所采用的算法可以相同,也可以不同。
在可能的实现方式中,收发单元810还用于向第一终端设备和/或第二终端设备发送第一提示信息,该第一提示信息用于提示第一终端设备和第二终端设备均登录了第一帐号,是否禁止将与第一应用相关的第一应用信息发送给第一终端设备或者第二终端设备。其中,第一应用为与第一帐号对应的应用。
在可能的实现方式中,收发单元810还用于接收第一终端设备发送的第二消息,该第二消息用于指示禁止将第一应用信息发送给第二终端设备;并根据第二消息,在获取到第一应用信息时,将第一应用信息发送给第一终端设备而不发送给第二终端设备。
在可能的实现方式中,上述第一应用信息可以包括以下至少一项:基于第一应用的视频通话来电提醒、基于第一应用的语音通话来电提醒、基于第一应用的文字通话消息提醒,基于第一应用的推荐信息。
在可能的实现方式中,收发单元810还用于向第一终端设备和第二终端设备发送第二提示信息,该第二提示信息用于提示第一终端设备和第二终端设备登录了同一帐号,是否同意第一终端设备和第二终端设备登录不同的帐号。
根据本申请实施例的装置800可对应于执行本申请第二实施例中描述的方法,并且装置800中的单元的上述和其它操作和/或功能分别用于实现方法的相应流程,为了简洁,在此不再赘述。
本申请实施例中的终端设备可以为移动终端,也可以为非移动终端。示例性的,移动终端可以为手机、平板电脑、笔记本电脑、掌上电脑、车载终端、可穿戴设备、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本或者个人数字助理(personal digital assistant,PDA)等,非移动终端可以为个人计算机(personal computer,PC)、电视机(television,TV)、柜员机或者自助机等,本申请实施例不作具体限定。
图11是本申请实施例提供的终端设备900的结构性示意性图。所述终端设备900包括:处理器910、存储器920、通信接口930、总线940。
在一种可能的实现方式中,图11所示的终端设备900中的处理器910可以对应于图9中的装置700中的处理单元720。图11所示的终端设备900中的通信接口930可以对应于图9中的装置700中的收发单元710。
在一种可能的实现方式中,图11所示的终端设备900中的处理器910可以对应于图10中的装置800中的处理单元820。图11所示的终端设备900中的通信接口930可以对应于图10中的装置800中的收发单元810。
其中,该处理器910可以与存储器920连接。该存储器920可以用于存储该程序代码和数据。因此,该存储器920可以是处理器910内部的存储单元,也可以是与处理器910独立的外部存储单元,还可以是包括处理器910内部的存储单元和与处理器910独立的外部存储单元的部件。
可选的,终端设备900还可以包括总线940。其中,存储器920、通信接口930可以通过总线940与处理器910连接。总线940可以是外设部件互连标准(peripheral component interconnect,PCI)总线或扩展工业标准结构(extended industry standard architecture,EISA)总线等。所述总线940可以分为地址总线、数据总线、控制总线等。为便于表示,图11中仅用一条线表示,但并不表示仅有一根总线或一种类型的总线。
应理解,在本申请实施例中,该处理器910可以采用中央处理单元(central processing unit,CPU)。该处理器还可以是其它通用处理器、数字信号处理器(digital  signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate Array,FPGA)或者其它可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。或者该处理器810采用一个或多个集成电路,用于执行相关程序,以实现本申请实施例所提供的技术方案。
该存储器920可以包括只读存储器和随机存取存储器,并向处理器910提供指令和数据。处理器910的一部分还可以包括非易失性随机存取存储器。例如,处理器910还可以存储设备类型的信息。
在终端设备900运行时,所述处理器910执行所述存储器920中的计算机执行指令以执行上述方法的操作步骤。
应理解,根据本申请实施例的终端设备900可对应于本申请实施例中的装置700和装置800,并且装置700和装置800中的各个单元的上述和其它操作和/或功能分别为了实现方法的相应流程,为了简洁,在此不再赘述。
可选地,在一些实施例中,本申请实施例还提供了一种计算机可读介质,该计算机可读介质存储有程序代码,当所述计算机程序代码在计算机上运行时,使得计算机执行上述各方面中的方法。
可选地,在一些实施例中,本申请实施例还提供了一种计算机程序产品,该计算机程序产品包括:计算机程序代码,当所述计算机程序代码在计算机上运行时,使得计算机执行上述各方面中的方法。
在本申请实施例中,终端设备或网络设备包括硬件层、运行在硬件层之上的操作系统层,以及运行在操作系统层上的应用层。其中,硬件层可以包括中央处理器(central processing unit,CPU)、内存管理单元(memory management unit,MMU)和内存(也称为主存)等硬件。操作系统层的操作系统可以是任意一种或多种通过进程(process)实现业务处理的计算机操作系统,例如,Linux操作系统、Unix操作系统、Android操作系统、iOS操作系统或windows操作系统等。应用层可以包含浏览器、通讯录、文字处理软件、即时通信软件等应用。
本申请实施例并未对本申请实施例提供的方法的执行主体的具体结构进行特别限定,只要能够通过运行记录有本申请实施例提供的方法的代码的程序,以根据本申请实施例提供的方法进行通信即可。例如,本申请实施例提供的方法的执行主体可以是终端设备或网络设备,或者,是终端设备或网络设备中能够调用程序并执行程序的功能模块。
本申请的各个方面或特征可以实现成方法、装置或使用标准编程和/或工程技术的制品。本文中使用的术语“制品”可以涵盖可从任何计算机可读器件、载体或介质访问的计算机程序。例如,计算机可读介质可以包括但不限于:磁存储器件(例如,硬盘、软盘或磁带等),光盘(例如,压缩盘(compact disc,CD)、数字通用盘(digital versatile disc,DVD)等),智能卡和闪存器件(例如,可擦写可编程只读存储器(erasable programmable read-only memory,EPROM)、卡、棒或钥匙驱动器等)。
本文描述的各种存储介质可代表用于存储信息的一个或多个设备和/或其它机器可读介质。术语“机器可读介质”可以包括但不限于:无线信道和能够存储、包含和/或 承载指令和/或数据的各种其它介质。
应理解,本申请实施例中提及的处理器可以是中央处理单元(central processing unit,CPU),还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
还应理解,本申请实施例中提及的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM)。例如,RAM可以用作外部高速缓存。作为示例而非限定,RAM可以包括如下多种形式:静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。
需要说明的是,当处理器为通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件时,存储器(存储模块)可以集成在处理器中。
还需要说明的是,本文描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的保护范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。此外,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到 多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上,或者说对现有技术做出贡献的部分,或者该技术方案的部分,可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,该计算机软件产品包括若干指令,该指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。前述的存储介质可以包括但不限于:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
除非另有定义,本文所使用的所有的技术和科学术语与属于本申请的技术领域的技术人员通常理解的含义相同。本文中在本申请的说明书中所使用的术语只是为了描述具体的实施例的目的,不是旨在于限制本申请。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (18)

  1. 一种针对多个设备进行用户身份识别的方法,其特征在于,包括:
    第一终端设备向第二终端设备发送第一生物特征信息,所述第一生物特征信息为所述第一终端设备解锁屏幕成功时用户输入的生物特征信息,所述第二终端设备为与所述第一终端设备登录同一帐号的设备;
    所述第一终端设备接收所述第二终端设备发送的第一消息,所述第一消息用于指示所述第一生物特征信息是否与所述第二终端设备中预先存储的第二生物特征信息匹配成功;
    所述第一终端设备根据所述第一消息确定所述第一终端设备的用户身份与所述第二终端设备的用户身份是否相同。
  2. 根据权利要求1所述的方法,其特征在于,所述根据所述第一消息确定所述第一终端设备的用户身份与所述第二终端设备的用户身份是否相同,包括:
    若所述第一消息指示所述第一生物特征信息与所述第二生物特征信息匹配成功,则所述第一终端设备确定所述第一终端设备的用户身份与所述第二终端设备的用户身份相同;
    若所述第一消息指示所述第一生物特征信息与所述第二生物特征信息匹配失败,则所述第一终端设备确定所述第一终端设备的用户身份与所述第二终端设备的用户身份不同。
  3. 根据权利要求1或2所述的方法,其特征在于,所述第一终端设备向第二终端设备发送第一生物特征信息,包括:
    所述第一终端设备通过点到点直连链路向所述第二终端设备发送所述第一生物特征信息;
    所述第一终端设备接收所述第二终端设备发送的第一消息,包括:
    所述第一终端设备通过所述点到点直连链路接收所述第二终端设备发送的第一消息。
  4. 根据权利要求2所述的方法,其特征在于,在所述第一终端设备确定所述第一终端设备的用户身份与所述第二终端设备的用户身份不同之后,所述方法还包括:
    所述第一终端设备显示第一提示消息,所述第一提示消息用于提示所述第一终端设备和所述第二终端设备均登录了第一帐号,是否禁止将与第一应用相关的第一应用信息发送给所述第一终端设备或者所述第二终端设备;
    其中,所述第一应用为与所述第一帐号对应的应用。
  5. 根据权利要求4所述的方法,其特征在于,在所述第一终端设备显示第一提示信息之后,所述方法还包括:
    响应于用户输入的第一操作,所述第一终端设备向与所述第一应用对应的服务器发送第二消息,所述第二消息用于指示所述服务器将所述第一应用信息发送给所述第一终端设备发送而不发送给所述第二终端设备,所述第一操作用于确认禁止将所述第一应用信息发送给所述第二终端设备。
  6. 根据权利要求5所述的方法,其特征在于,在所述第一终端设备向与所述第一应用对应的服务器发送第二消息之后,所述方法还包括:
    所述第一终端设备接收所述第一应用信息,并在所述第一终端设备的屏幕上显示所述第一应用信息对应的界面。
  7. 根据权利要求4至6中任一项所述的方法,其特征在于,所述第一应用信息包括以下至少一项:基于所述第一应用的视频通话来电提醒、基于所述第一应用的语音通话来电提醒、基于所述第一应用的文字通话消息提醒,基于所述第一应用的推荐信息。
  8. 根据权利要求2至7中任一项所述的方法,其特征在于,在所述第一终端设备确定所述第一终端设备的用户身份与所述第二终端设备的用户身份不同之后,所述方法还包括:
    所述第一终端设备显示第二提示消息,所述第二提示消息用于提示所述第一终端设备和所述第二终端设备登录了同一帐号,是否同意所述第一终端设备和所述第二终端设备登录不同的帐号。
  9. 一种针对多个设备进行用户身份识别的方法,其特征在于,包括:
    获取第一信息和第二信息,所述第一信息为第三生物特征信息经过第一加密处理得到的信息,所述第二信息为第四生物特征信息经过第二加密处理得到的信息,所述第三生物特征信息为第一终端设备解锁屏幕成功时所采用的生物特征信息,所述第四生物特征信息为第二终端设备解锁屏幕成功时所采用的生物特征信息,所述第一终端设备和所述第二终端设备为登录同一帐号的设备;
    对所述第一信息进行所述第二加密处理,得到第三信息,并且对所述第二信息进行所述第一加密处理,得到第四信息;
    根据所述第三信息与所述第四信息,确定所述第一终端设备的用户身份与所述第二终端设备的用户身份是否相同。
  10. 根据权利要求9所述的方法,其特征在于,所述根据所述第三信息与所述第四信息,确定所述第一终端设备的用户身份与所述第二终端设备的用户身份是否相同,包括:
    若所述第三信息与所述第四信息相同,则服务器确定所述第一终端设备的用户身份与所述第二终端设备的用户身份相同;
    若所述第三信息与所述第四信息不同,则所述服务器确定所述第一终端设备的用户身份与所述第二终端设备的用户身份不同。
  11. 根据权利要求9或10所述的方法,其特征在于,所述获取第一信息和第二信息,包括:
    服务器获取所述第一信息和所述第一加密处理所采用的算法;
    所述服务器获取所述第二信息和所述第二加密处理所采用的算法。
  12. 根据权利要求10所述的方法,其特征在于,在所述服务器确定所述第一终端设备的用户身份与所述第二终端设备的用户身份不同之后,所述方法还包括:
    所述服务器向所述第一终端设备和/或所述第二终端设备发送第一提示信息,所述第一提示信息用于提示所述第一终端设备和所述第二终端设备均登录了第一帐号,是否禁止将与第一应用相关的第一应用信息发送给所述第一终端设备或者所述第二终端设备;
    其中,所述第一应用为与所述第一帐号对应的应用。
  13. 根据权利要求12所述的方法,其特征在于,在所述服务器向所述第一终端设备和所述第二终端设备发送第一提示信息之后,所述方法还包括:
    所述服务器接收所述第一终端设备发送的第二消息,所述第二消息用于指示禁止将所述第一应用信息发送给所述第二终端设备;
    所述服务器根据所述第二消息,在获取到所述第一应用信息时,将所述第一应用信息发送给所述第一终端设备而不发送给所述第二终端设备。
  14. 根据权利要求12或13所述的方法,其特征在于,所述第一应用信息包括以下至少一项:基于所述第一应用的视频通话来电提醒、基于所述第一应用的语音通话来电提醒、基于所述第一应用的文字通话消息提醒,基于所述第一应用的推荐信息。
  15. 根据权利要求10至14中任一项所述的方法,其特征在于,在所述服务器确定所述第一终端设备的用户身份与所述第二终端设备的用户身份不同之后,所述方法还包括:
    所述服务器向所述第一终端设备和/或所述第二终端设备发送第二提示信息,所述第二提示信息用于提示所述第一终端设备和所述第二终端设备登录了同一帐号,是否同意所述第一终端设备和所述第二终端设备登录不同的帐号。
  16. 一种终端设备,其特征在于,包括处理器,所述处理器与存储器耦合,所述处理器用于执行所述存储器中存储的计算机程序或指令,以实现如权利要求1至8中任一项所述的方法或者如权利要求9至15中任一项所述的方法。
  17. 一种芯片,其特征在于,所述芯片包括处理器,所述处理器与存储器耦合,所述处理器用于读取并执行所述存储器中存储的计算机程序,以实现如权利要求1至8中任一项所述的方法或者如权利要求9至15中任一项所述的方法。
  18. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,当所述计算机程序被运行时,实现如权利要求1至8中任一项所述的方法或者如权利要求9至15中任一项所述的方法。
PCT/CN2021/137958 2020-12-28 2021-12-14 针对多个设备进行用户身份识别的方法及终端设备 WO2022143160A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011589093.8A CN114756843A (zh) 2020-12-28 2020-12-28 针对多个设备进行用户身份识别的方法及终端设备
CN202011589093.8 2020-12-28

Publications (1)

Publication Number Publication Date
WO2022143160A1 true WO2022143160A1 (zh) 2022-07-07

Family

ID=82258662

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/137958 WO2022143160A1 (zh) 2020-12-28 2021-12-14 针对多个设备进行用户身份识别的方法及终端设备

Country Status (2)

Country Link
CN (1) CN114756843A (zh)
WO (1) WO2022143160A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115348116A (zh) * 2022-10-20 2022-11-15 中国信息通信研究院 工业互联网的网页登录方法和装置、设备和介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070288560A1 (en) * 2006-06-13 2007-12-13 International Business Machines Corporation Chat tool for concurrently chatting over more than one interrelated chat channels
US20140378099A1 (en) * 2013-06-19 2014-12-25 Huawei Device Co., Ltd. Method and Apparatus for Processing Data and Message
CN104954237A (zh) * 2015-07-15 2015-09-30 山西佰纳得科技有限公司 一种即时通信方法
CN106453514A (zh) * 2016-09-14 2017-02-22 广东欧珀移动通信有限公司 一种聊天信息区别同步的方法及装置
CN106506443A (zh) * 2016-09-14 2017-03-15 广东欧珀移动通信有限公司 一种信息查看方法及装置
CN110140344A (zh) * 2017-09-26 2019-08-16 华为技术有限公司 一种通知消息的处理方法以及终端

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070288560A1 (en) * 2006-06-13 2007-12-13 International Business Machines Corporation Chat tool for concurrently chatting over more than one interrelated chat channels
US20140378099A1 (en) * 2013-06-19 2014-12-25 Huawei Device Co., Ltd. Method and Apparatus for Processing Data and Message
CN104954237A (zh) * 2015-07-15 2015-09-30 山西佰纳得科技有限公司 一种即时通信方法
CN106453514A (zh) * 2016-09-14 2017-02-22 广东欧珀移动通信有限公司 一种聊天信息区别同步的方法及装置
CN106506443A (zh) * 2016-09-14 2017-03-15 广东欧珀移动通信有限公司 一种信息查看方法及装置
CN110140344A (zh) * 2017-09-26 2019-08-16 华为技术有限公司 一种通知消息的处理方法以及终端

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115348116A (zh) * 2022-10-20 2022-11-15 中国信息通信研究院 工业互联网的网页登录方法和装置、设备和介质
CN115348116B (zh) * 2022-10-20 2023-03-03 中国信息通信研究院 工业互联网的网页登录方法和装置、设备和介质

Also Published As

Publication number Publication date
CN114756843A (zh) 2022-07-15

Similar Documents

Publication Publication Date Title
US11080378B1 (en) Hybrid device having a personal digital key and receiver-decoder circuit and methods of use
US10367817B2 (en) Systems and methods for challengeless coauthentication
US9391985B2 (en) Environment-based two-factor authentication without geo-location
US10575347B2 (en) Delivery of shared WiFi credentials
US9392104B2 (en) Limiting user interaction with a computing device based on proximity of a user
US9439072B2 (en) System and method for authentication
CN113272805B (zh) 公用计算设备的基于邻近度的解锁
US10027648B2 (en) Geolocation dependent variable authentication
US20150350820A1 (en) Beacon additional service of electronic device and electronic device for same background arts
WO2015070732A1 (en) Access control system, authorization method and device thereof, and storage medium
EP3864541B1 (en) Progressive access to data and device functionality
US11074327B2 (en) Methods and systems for ensuring that an individual is authorized to conduct an activity
CN112205019A (zh) 用于使计算设备能够识别何时彼此接近的技术
JP2021174528A (ja) 短距離トランシーバを使用したデータアクセス制御のためのシステムおよび方法
WO2022143160A1 (zh) 针对多个设备进行用户身份识别的方法及终端设备
US20160316371A1 (en) Location-based access control methods, cloud server, and client terminal utilizing the same
US10148436B2 (en) Fingerprint revocation
WO2023137757A1 (zh) 数字车钥匙的分享方法、装置、设备及存储介质
WO2015070032A1 (en) System and method for authentication
US8572216B2 (en) Social network building
CN105763428A (zh) 基于用户历史数据的防信息诈骗方法
US20240169778A1 (en) Voice based access control with increased assurance
CN112840339B (zh) 对数据和设备功能性的渐进访问
US11138339B2 (en) System and method of controlling contact information
US20230198981A1 (en) Systems and methods for credentials sharing

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21913901

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21913901

Country of ref document: EP

Kind code of ref document: A1