CN104636653A - System method for realizing user identity authentication based on non-contact mode by intelligent terminal equipment - Google Patents
System method for realizing user identity authentication based on non-contact mode by intelligent terminal equipment Download PDFInfo
- Publication number
- CN104636653A CN104636653A CN201310550900.9A CN201310550900A CN104636653A CN 104636653 A CN104636653 A CN 104636653A CN 201310550900 A CN201310550900 A CN 201310550900A CN 104636653 A CN104636653 A CN 104636653A
- Authority
- CN
- China
- Prior art keywords
- terminal device
- authentication
- intelligent terminal
- user
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000005516 engineering process Methods 0.000 claims description 17
- 238000004891 communication Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims description 2
- 230000006399 behavior Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 238000012795 verification Methods 0.000 description 3
- 201000001880 Sexual dysfunction Diseases 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 208000008918 voyeurism Diseases 0.000 description 1
Landscapes
- Collating Specific Patterns (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明提供了一种智能终端设备基于非接触性方式实现用户身份认证的系统方法。该系统包括:智能终端设备、对用户身份进行认证的模块装置(如红外线装置、蓝牙装置、RFID装置等)、智能终端设备通过与身份认证模块装置进行非接触通信方式,实现认证协议。认证方法包括以下步骤:首先,将身份认证的模块装置做成可人体穿戴的物件(如手镯、戒子等)并穿戴在人体身上;其次,要使用智能终端设备时,智能终端设备向认证的模块装置发出口令询问命令,该模块装置则回答口令,智能终端设备通过验证该口令来实现对使用者的身份认证。该认证方式简化了智能终端设备用户身份识别过程,实现在各种不同智能终端设备应用中身份认证方式的统一,方便智能终端设备各种应用业务的简便实现。本系统结合智能终端设备的多因素认证方式,可以组成功能更强大的认证系统。
The present invention provides a system method for realizing user identity authentication based on a contactless method for an intelligent terminal device. The system comprises: an intelligent terminal device, a module device for authenticating the user identity (such as an infrared device, a Bluetooth device, an RFID device, etc.), and the intelligent terminal device realizes the authentication protocol by communicating with the identity authentication module device in a contactless manner. The authentication method comprises the following steps: first, the module device for identity authentication is made into a wearable object (such as a bracelet, a ring, etc.) and worn on the human body; second, when the intelligent terminal device is to be used, the intelligent terminal device sends a password inquiry command to the module device for authentication, and the module device answers the password, and the intelligent terminal device realizes the identity authentication of the user by verifying the password. The authentication method simplifies the user identity identification process of the intelligent terminal device, realizes the unification of the identity authentication method in various intelligent terminal device applications, and facilitates the simple implementation of various application services of the intelligent terminal device. The system can form a more powerful authentication system by combining the multi-factor authentication method of the intelligent terminal device.
Description
技术领域 technical field
本发明涉及智能终端设备的通信领域和终端安全领域,具体是通过智能终端设备与认证设备之间微距离的非接触方式交换数据,实现对智能终端用户的身份认证。 The invention relates to the field of communication of intelligent terminal equipment and the field of terminal security, in particular, the identity authentication of intelligent terminal users is realized by exchanging data in a non-contact manner with a small distance between the intelligent terminal equipment and authentication equipment. the
the
背景技术 Background technique
随着电子通信技术的飞速发展,包含智能手机在内的智能终端设备得到越来越广泛的应用,但这些智能终端设备在给人们带来极大方便的同时,也带来智能终端设备的安全性问题,比如:非认证用户非法使用智能终端设备,造成对智能终端设备用户隐私的侵犯。 With the rapid development of electronic communication technology, smart terminal devices including smart phones are more and more widely used, but these smart terminal devices bring great convenience to people, but also bring security of smart terminal devices Sexual problems, such as: illegal use of smart terminal devices by non-authenticated users, resulting in violation of the privacy of smart terminal device users. the
为了提高智能终端设备的安全性,现有技术中出现了如下三类用户身份认证方法:传统的基于用户知识的识别技术(如口令、图形锁等)、基于生物特征的识别技术(如人脸识别、指纹识别等)以及基于行为特征的用户认证方法。 In order to improve the security of smart terminal equipment, the following three types of user identity authentication methods have emerged in the prior art: traditional identification technologies based on user knowledge (such as passwords, pattern locks, etc.), identification technologies based on biometrics (such as face recognition, fingerprint recognition, etc.) and user authentication methods based on behavioral characteristics. the
其中,传统的基于用户知识的识别技术主要进行如下操作:认证用户在智能终端设备中预先设定一套认证信息,如数字字母一类的口令或图形方式。要对用户身份进行识别时,智能终端设备要求用户再次输入认证信息,若输入的认证信息与预设的认证信息一致,则认为该用户为认证用户;否则,则认为该用户为非认证用户。 Among them, the traditional identification technology based on user knowledge mainly performs the following operations: the authenticated user pre-sets a set of authentication information in the smart terminal device, such as passwords such as numbers and letters or graphics. To identify the identity of the user, the smart terminal device requires the user to input authentication information again. If the input authentication information is consistent with the preset authentication information, the user is considered to be an authenticated user; otherwise, the user is considered to be an unauthenticated user. the
传统的基于用户知识的识别技术有如下缺点:1)安全级别低:一是由于智能终端设备本身的限制,身份认证用的信息不能太长,因此易于遭到蛮力攻击,缺乏安全性。另一种原因是,当用户输入认证信息时,容易被周围其他人窥视、模仿,这就降低了安全性。2)不易记忆:为了增加安全性,多个个人电子设备使用不同的口令,由于个人电子设备的数量增多,需要记忆许多的口令,给用户带来记忆上的不方便,可能造成遗忘口令不能通过认证的情况。3)方便性和快捷性差:输入认证信息的方式较复杂,增加了正常人认证的难度,对于老、弱、病、残等人更不方便。 The traditional identification technology based on user knowledge has the following disadvantages: 1) Low security level: First, due to the limitation of the smart terminal device itself, the information used for identity authentication cannot be too long, so it is easy to be attacked by brute force and lacks security. Another reason is that when the user enters the authentication information, it is easy to be peeped and imitated by other people around, which reduces the security. 2) Not easy to remember: In order to increase security, multiple personal electronic devices use different passwords. Due to the increase in the number of personal electronic devices, many passwords need to be memorized, which brings inconvenience to users in memory and may cause forgotten passwords to fail certification status. 3) Poor convenience and quickness: the way of inputting authentication information is more complicated, which increases the difficulty of authentication for normal people, and is even more inconvenient for the old, weak, sick, and disabled. the
而基于生物认证的识别技术可以避免以上缺点,因为该识别技术具有以下特点:1)生物认证的特征信息难以被模仿或破解,非验证用户无法通过窥视或者蛮力攻击得到认证信息,并通过智能终端设备的认证;2)基于生物特征的认证信息识别技术是对用户生物特征固有信息的认证,不需要用户特别记忆任何预置的信息,不存在用户因为遗忘认证信息不能通过验证的情况;3)现有大部分基于生物特征信息的识别技术操作简单,不需要繁琐的解锁过程,具有较好的便捷性。 The identification technology based on biometric authentication can avoid the above shortcomings, because the identification technology has the following characteristics: 1) The characteristic information of biometric authentication is difficult to be imitated or cracked, and non-authenticated users cannot obtain authentication information through peeping or brute force attacks, and through intelligent Authentication of terminal equipment; 2) Authentication information identification technology based on biometrics is the authentication of the inherent information of the user's biometrics, and does not require the user to memorize any preset information, and there is no situation where the user cannot pass the verification because the authentication information is forgotten; 3 ) Most of the existing identification technologies based on biometric information are simple to operate, do not require cumbersome unlocking processes, and have good convenience. the
目前较为成熟的生物识别技术包括:指纹识别、虹膜识别、人脸识别、声音识别等。其中,指纹识别、虹膜识别等方法识别精度最高。但受限于智能终端设备的硬件资源,在智能终端设备上应用这两类识别技术时,需要增加特殊的设备,从而大大增加了智能终端设备的成本,无法广泛推广应用。而人脸识别和声音识别技术,可以直接使用如智能手机一类的智能终端设备的资源(如摄像头、麦克风)而无需额外的设备,便于大规模应用。但使用该类识别技术会消耗大量智能终端设备资源,影响智能终端设备其他功能的正常工作。同时,周围环境变化如光线等、指纹等特征受损情况,也会对识别效果产生很大影响,鲁棒性低,因而降低用户体验效果。 At present, more mature biometric technologies include: fingerprint recognition, iris recognition, face recognition, voice recognition, etc. Among them, fingerprint recognition, iris recognition and other methods have the highest recognition accuracy. However, limited by the hardware resources of smart terminal devices, special equipment needs to be added when applying these two types of identification technologies on smart terminal devices, which greatly increases the cost of smart terminal devices and cannot be widely used. Face recognition and voice recognition technologies can directly use the resources of smart terminal devices such as smartphones (such as cameras and microphones) without additional equipment, which is convenient for large-scale applications. However, the use of this type of identification technology will consume a large amount of resources of the smart terminal device and affect the normal operation of other functions of the smart terminal device. At the same time, changes in the surrounding environment, such as light, damage to fingerprints and other features, will also have a great impact on the recognition effect, and the robustness is low, thus reducing the user experience effect. the
基于人体行为特征的用户身份认证方法对用户的行为特征进行识别,根据一定的判决范围确定该行为是否是智能终端设备拥有者的特有行为特征。该方法的优点是避免了基于用户拥有知识的验证判决带来的不便,也避免了生物特征识别技术固有的弱点,用户使用起来会感到方便快捷,提高了用户体验效果。 The user identity authentication method based on human behavior characteristics identifies the user's behavior characteristics, and determines whether the behavior is a unique behavior characteristic of the owner of the smart terminal device according to a certain range of judgment. The advantage of this method is that it avoids the inconvenience caused by the verification judgment based on the user's knowledge, and also avoids the inherent weakness of the biometric identification technology. The user will feel convenient and quick to use, and the user experience effect is improved. the
目前已经出现了基于人体行为特征的用户身份识别方式,由于它采用了基于一个范围的判断方式,因此他的识别准确性还有待提高。该方法的另一个特点是要利用较多的计算资源,因此,该方法还需要进行算法上的进一步精简。 At present, a user identification method based on human behavior characteristics has appeared. Since it uses a judgment method based on a range, its identification accuracy needs to be improved. Another feature of this method is that it needs to use more computing resources, so this method needs to be further simplified on the algorithm. the
发明内容 Contents of the invention
本发明的目的是提供一种既方便快捷,又有较高安全性的智能终端设备身份认证方法,使得用户在使用智能终端设备的过程中,几乎意识不到已经经过了身份认证,非常方便智能终端设备各种应用业务的各种安全简易实现。 The purpose of the present invention is to provide a convenient, fast, and highly secure identity authentication method for smart terminal equipment, so that users hardly realize that they have passed identity authentication during the use of smart terminal equipment, which is very convenient and intelligent. Various secure and simple implementations of various application services of terminal equipment. the
本发明的方法包括如下步骤: The method of the present invention comprises the steps:
1)将同样的口令随机数种子分别存入智能终端设备和认证模块装置中,认证模块装置 1) Store the same password random number seed in the smart terminal device and the authentication module device respectively, and the authentication module device
与智能终端设备分别作n次散列运算,并存储n次散列运算的结果; Perform n hash operations with the smart terminal device respectively, and store the results of n hash operations;
2) 当智能终端设备需要第i次验证用户身份时,他发出第i次进行身份认证的命令给认证模块装置,认证模块装置取出第n-i+1次散列运算的结果,将该结果值送回智能终端设备; 2) When the smart terminal device needs to verify the identity of the user for the i-th time, he sends the i-th identity authentication command to the authentication module device, and the authentication module device takes out the result of the n-i+1 hash operation, and the result The value is sent back to the smart terminal device;
3) 智能终端设备将收到的数据与存在自己存储器中的第n-i+1次散列运算的结果进行比较,如果相同,则认证成功; 3) The smart terminal device compares the received data with the result of the n-i+1th hash operation stored in its own memory, and if they are the same, the authentication is successful;
4) 当n次散列的值用完之后,两个设备(或装置)又同时存入同样的口令随机数种子(该随机数的产生方式很多,比如可以用Diffie-Hellan公共密钥产生方法等产生随机数),然后重复前述1)到3)的步骤。 4) When the value of the n hashes is used up, the two devices (or devices) store the same password random number seed at the same time (there are many ways to generate the random number, for example, the Diffie-Hellan public key generation method can be used and so on to generate random numbers), and then repeat steps 1) to 3).
所述智能终端设备的非接触认证模块具有如下特征: The non-contact authentication module of the intelligent terminal device has the following characteristics:
1)可做成人体便于携带的可穿戴式物件,便于智能终端设备与用户进行无线身份识别(含红外线等非接触方式); 1) It can be made into a wearable object that is easy to carry by the human body, which is convenient for wireless identification between smart terminal equipment and users (including non-contact methods such as infrared rays);
2)该身份认证模块与使用者之间已进行过安全严格的身份认证,用户定期进行这一种身份认证,以保证该认证模块成为使用者身上不可分割的一部分; 2) The identity authentication module and the user have undergone safe and strict identity authentication, and the user regularly performs this identity authentication to ensure that the authentication module becomes an inseparable part of the user;
3)该身份认证模块能够进行运算和存储,实现简单的身份认证校验。 3) The identity authentication module can perform calculation and storage, and realize simple identity authentication verification.
一种智能终端设备用户身份认证系统,由非接触认证模块、智能终端设备以及对非 An intelligent terminal device user identity authentication system, which consists of a contactless authentication module, an intelligent terminal device, and an
接触模块进行安全严格身份认证的认证系统(该认证系统可由常规的生物特征、口令等因素 An authentication system for secure and strict authentication of the contact module (the authentication system can be composed of conventional biometrics, passwords, etc.
认证实现)组成。 authentication implementation) composition.
本发明的特点是:实际上结合了基于知识的认证方式和基于人体生物特征的认证方 The feature of the present invention is that it actually combines the authentication method based on knowledge and the authentication method based on human biological characteristics.
式,便于各种智能终端设备的使用者(包括老、弱、病、残等人)进行身份认证,能够基本 It is convenient for users of various smart terminal devices (including the old, weak, sick, disabled, etc.) to perform identity authentication, and can basically
上统一智能终端设备的使用者身份认证方案;当智能终端设备离开非接触认证模块一定距离 Unify the user identity authentication scheme for smart terminal devices; when the smart terminal device is a certain distance away from the non-contact authentication module
后,就无法再次进行安全认证,防止了智能终端设备被盗用的可能性,保证了智能终端设备 After that, security authentication cannot be performed again, which prevents the possibility of the smart terminal device being stolen and ensures that the smart terminal device
的安全。 safety.
附图说明 Description of drawings
图1是本发明的智能终端设备用户身份识别系统的组成结构图。 Figure 1 is a structural diagram of the smart terminal device user identification system of the present invention. the
图2是本发明的智能终端设备用户身份识别方法的算法实现流程图。 Fig. 2 is an algorithm implementation flow chart of the smart terminal device user identification method of the present invention. the
具体实施方式 Detailed ways
以下将参照附图对本发明的实施内容进行详细说明。 The implementation content of the present invention will be described in detail below with reference to the accompanying drawings. the
如图1所示,本发明的智能终端用户身份识别系统由非接触认证模块、对非接触认 As shown in Figure 1, the intelligent terminal user identity recognition system of the present invention consists of a contactless authentication module, a non-contact authentication
证模块本身进行多因素认证的认证部件、智能终端设备本身。其中,对非接触认证模块本身 The authentication component for multi-factor authentication of the authentication module itself, and the intelligent terminal device itself. Among them, the contactless authentication module itself
进行多因素认证的认证部件可由现有的认证服务器实现,或者由单独的认证设备完成。 The authentication component for multi-factor authentication can be implemented by an existing authentication server, or completed by a separate authentication device.
如图2所示,本发明的智能终端设备用户身份识别方法为: As shown in Figure 2, the smart terminal device user identification method of the present invention is:
步骤S01,对非接触认证模块本身进行多因素认证(可由现有的认证服务器实现,或者 Step S01, perform multi-factor authentication on the non-contact authentication module itself (can be realized by an existing authentication server, or
由单独的认证设备完成。); Completed by a separate authentication device. );
步骤S02,将智能终端设备用户的号码(如手机用户的手机号码或者该手机的MAC地 Step S02, the number of the user of the smart terminal device (such as the mobile phone number of the mobile phone user or the MAC address of the mobile phone)
址码)送给非接触认证模块,非接触认证模块存储该号码; address code) to the non-contact authentication module, and the non-contact authentication module stores the number;
步骤S03,将同样通过Diffie-Hellman等方法产生的口令随机数种子分别存入智能终端设 Step S03, the random number seeds of passwords generated by methods such as Diffie-Hellman are respectively stored in the smart terminal device
备和认证模块装置中,认证模块装置与智能终端设备分别作n次散列运算,并存储n次散列运算的结果; In the equipment and authentication module device, the authentication module device and the intelligent terminal device perform n hash operations respectively, and store the results of n hash operations;
步骤S04,具体的认证步骤如下: Step S04, the specific authentication steps are as follows:
1)每次智能终端设备进行口令认证时,先发送自己的号码给非接触认证模块,非接触认证模块将该号码与存储在自己存储器中的号码比较一致后,进入认证流程,否则拒绝认证。这是非接触认证模块对智能终端设备进行的认证; 1) Every time the smart terminal device performs password authentication, it first sends its own number to the non-contact authentication module, and the non-contact authentication module compares the number with the number stored in its own memory, and then enters the authentication process, otherwise it rejects the authentication. This is the authentication of the smart terminal device by the non-contact authentication module;
2) 当智能终端设备需要第i次验证用户身份时,他发出第i次进行身份认证的命令给认证模块装置,认证模块装置取出第n-i+1次散列运算的结果,将该结果值送回智能终端设备; 2) When the smart terminal device needs to verify the identity of the user for the i-th time, he sends the i-th identity authentication command to the authentication module device, and the authentication module device takes out the result of the n-i+1 hash operation, and the result The value is sent back to the smart terminal device;
3) 智能终端设备将收到的数据与存在自己存储器中的第n-i+1次散列运算的结果进行比较,如果相同,则认证成功; 3) The smart terminal device compares the received data with the result of the n-i+1th hash operation stored in its own memory, and if they are the same, the authentication is successful;
4) 当n次散列的值用完之后,两个设备(或装置)又同时存入同样的口令随机数种子(该随机数的产生方式很多,比如可以用Diffie-Hellan公共密钥产生方法等产生随机数),然后重复前述1)到3)的步骤。 4) When the value of the n hashes is used up, the two devices (or devices) store the same password random number seed at the same time (there are many ways to generate the random number, for example, the Diffie-Hellan public key generation method can be used and so on to generate random numbers), and then repeat steps 1) to 3).
本发明的方案实施过程中,智能终端设备对用户的身份认证过程是自动进行的,用户不需要进行任何干预,除非智能终端设备离开用户一定距离才会造成无法验证身份的效果,因此,智能终端设备可以自动对用户进行识别,保证只有合法用户才能对智能终端设备进行操作,满足了用户对智能终端设备具有安全认证功能的需求。 During the implementation of the solution of the present invention, the identity authentication process of the smart terminal device to the user is carried out automatically, and the user does not need to perform any intervention, unless the smart terminal device is separated from the user by a certain distance, it will cause the effect that the identity cannot be verified. Therefore, the smart terminal The device can automatically identify the user to ensure that only legitimate users can operate the smart terminal device, which meets the user's demand for smart terminal devices with security authentication functions. the
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310550900.9A CN104636653A (en) | 2013-11-09 | 2013-11-09 | System method for realizing user identity authentication based on non-contact mode by intelligent terminal equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310550900.9A CN104636653A (en) | 2013-11-09 | 2013-11-09 | System method for realizing user identity authentication based on non-contact mode by intelligent terminal equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104636653A true CN104636653A (en) | 2015-05-20 |
Family
ID=53215393
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310550900.9A Pending CN104636653A (en) | 2013-11-09 | 2013-11-09 | System method for realizing user identity authentication based on non-contact mode by intelligent terminal equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104636653A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107634835A (en) * | 2017-09-11 | 2018-01-26 | 山东渔翁信息技术股份有限公司 | A kind of auth method, device, equipment and storage medium |
CN108431840A (en) * | 2015-07-10 | 2018-08-21 | Novatec公司 | For declaration item, for the registration in citizenship liber and the device and method for signing and issuing verified formal certificate |
CN110059460A (en) * | 2017-12-21 | 2019-07-26 | 丰田自动车株式会社 | Verification System and authentication device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060059344A1 (en) * | 2004-09-10 | 2006-03-16 | Nokia Corporation | Service authentication |
CN101083486A (en) * | 2006-05-31 | 2007-12-05 | 盛年 | Information management device |
CN101116281A (en) * | 2005-02-10 | 2008-01-30 | 国际商业机器公司 | Challenge-response signatures and secure diffie-hellman protocols |
CN101133420A (en) * | 2005-12-19 | 2008-02-27 | 日本电信电话株式会社 | Terminal identification method, authentication method, authentication system, server, terminal, radio base station, program, and recording medium |
CN101174953A (en) * | 2007-03-27 | 2008-05-07 | 兰州大学 | A Method of Identity Authentication Based on S/Key System |
US20120317622A1 (en) * | 2011-06-13 | 2012-12-13 | Uniloc Usa, Inc. | Hardware identity in multi-factor authentication at the application layer |
CN103310142A (en) * | 2013-05-22 | 2013-09-18 | 复旦大学 | Man-machine fusion security authentication method based on wearable equipment |
-
2013
- 2013-11-09 CN CN201310550900.9A patent/CN104636653A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060059344A1 (en) * | 2004-09-10 | 2006-03-16 | Nokia Corporation | Service authentication |
CN101116281A (en) * | 2005-02-10 | 2008-01-30 | 国际商业机器公司 | Challenge-response signatures and secure diffie-hellman protocols |
CN101133420A (en) * | 2005-12-19 | 2008-02-27 | 日本电信电话株式会社 | Terminal identification method, authentication method, authentication system, server, terminal, radio base station, program, and recording medium |
CN101083486A (en) * | 2006-05-31 | 2007-12-05 | 盛年 | Information management device |
CN101174953A (en) * | 2007-03-27 | 2008-05-07 | 兰州大学 | A Method of Identity Authentication Based on S/Key System |
US20120317622A1 (en) * | 2011-06-13 | 2012-12-13 | Uniloc Usa, Inc. | Hardware identity in multi-factor authentication at the application layer |
CN103310142A (en) * | 2013-05-22 | 2013-09-18 | 复旦大学 | Man-machine fusion security authentication method based on wearable equipment |
Non-Patent Citations (3)
Title |
---|
刘嘉勇: "《应用密码学》", 30 September 2008, 清华大学出版社 * |
杨义先等: "《应用密码学(第2版)》", 30 June 2013, 北京邮电大学出版社 * |
王洪莹: ""移动商务身份认证系统的研究与设计"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108431840A (en) * | 2015-07-10 | 2018-08-21 | Novatec公司 | For declaration item, for the registration in citizenship liber and the device and method for signing and issuing verified formal certificate |
CN108431840B (en) * | 2015-07-10 | 2022-03-25 | Novatec公司 | Device and method for declaring items, registering citizen identity and issuing official certificate |
CN107634835A (en) * | 2017-09-11 | 2018-01-26 | 山东渔翁信息技术股份有限公司 | A kind of auth method, device, equipment and storage medium |
CN110059460A (en) * | 2017-12-21 | 2019-07-26 | 丰田自动车株式会社 | Verification System and authentication device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107251477B (en) | System and method for securely managing biometric data | |
EP2901353B1 (en) | Multi-factor authentication using biometric data | |
US20140380445A1 (en) | Universal Authentication and Data Exchange Method, System and Service | |
CN105554035B (en) | An electronic lock system and its control method | |
US20100138667A1 (en) | Authentication using stored biometric data | |
US20190174304A1 (en) | Universal Authentication and Data Exchange Method, System and Service | |
CN103346888B (en) | A kind of remote identity authentication method based on password, smart card and biological characteristic | |
CN103310510B (en) | Start-up system and start-up method based on dynamic human body characteristic recognition | |
KR101575687B1 (en) | Biometrics user authentication method | |
WO2012097362A2 (en) | Protecting codes, keys and user credentials with identity and patterns | |
US20130179944A1 (en) | Personal area network (PAN) ID-authenticating systems, apparatus, method | |
Zheng et al. | UDhashing: Physical unclonable function-based user-device hash for endpoint authentication | |
CN108900296B (en) | Secret key storage method based on biological feature identification | |
CA2686801C (en) | Authetication using stored biometric data | |
CN105049405A (en) | Key generation unit and method based on combined fingerprint, and verification system and equipment | |
CN114120487A (en) | Automobile digital key management method, system, equipment and storage medium | |
CN112334897B (en) | Method and electronic device for authenticating user | |
Papaioannou et al. | User authentication and authorization for next generation mobile passenger ID devices for land and sea border control | |
CN104636653A (en) | System method for realizing user identity authentication based on non-contact mode by intelligent terminal equipment | |
CN106304052A (en) | A kind of method of secure communication, device, terminal and client identification module card | |
CN110619228B (en) | File decryption method, file encryption method, file management system and storage medium | |
CN110321687A (en) | A kind of personal identification method | |
Syta et al. | RFID-based authentication middleware for mobile devices | |
Singh | Multi-factor authentication and their approaches | |
US12200131B1 (en) | Methods and apparatus facilitating high security transactions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150520 |
|
RJ01 | Rejection of invention patent application after publication |