WO2015188410A1 - 一种将手机硬件的物理特征作为认证密钥的方法及系统 - Google Patents
一种将手机硬件的物理特征作为认证密钥的方法及系统 Download PDFInfo
- Publication number
- WO2015188410A1 WO2015188410A1 PCT/CN2014/081361 CN2014081361W WO2015188410A1 WO 2015188410 A1 WO2015188410 A1 WO 2015188410A1 CN 2014081361 W CN2014081361 W CN 2014081361W WO 2015188410 A1 WO2015188410 A1 WO 2015188410A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile phone
- hardware
- verification
- module
- terminal
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Definitions
- the present invention relates to the field of device security, and in particular, to a method and system for using physical characteristics of a mobile phone hardware as an authentication key.
- mobile phones can protect the software such as life, payment and communication if they can be used as an entry key for software such as life, payment and communication.
- the present invention provides a method and system for using the physical characteristics of a mobile phone hardware as an authentication key.
- the method can be simply and conveniently
- the mobile phone is protected and user-friendly.
- the verification end sends a hardware verification request to the mobile terminal;
- the mobile terminal performs a hardware response test on the mobile phone according to the hardware verification request, and obtains a feature function of the mobile terminal hardware;
- the verification end compares the feature function with a feature function corresponding to the mobile phone terminal prestored in the database, to obtain a comparison result;
- the verification end identifies the mobile phone end according to the comparison result
- the mobile terminal hardware is one or more of a speaker, a lens, a memory, and an audio and video module.
- a speaker is one or more of a speaker, a lens, a memory, and an audio and video module.
- the method further includes:
- the mobile phone end is bound to the user biometric by binding the feature function of the mobile phone end to the user biometric.
- the user biometrics include:
- the verification end includes a mobile phone, a software server, and a client.
- the mobile terminal hardware is a mobile phone
- the mobile phone end performs a pulse frequency response test on the mobile phone speaker according to the speaker verification request, and obtains a pulse frequency response curve; the verification end compares the pulse frequency response curve with a pulse frequency response corresponding to the mobile phone terminal prestored in the database. Compare the curves and get the comparison results;
- the verification end identifies the mobile phone end according to the comparison result.
- the verification end is a mobile phone verification end in a communication phase with the mobile phone end;
- the Rabba verification request is to perform an ultrasonic or low acoustic wave response test on the mobile phone.
- the verification end includes a first sending module, a comparing module and an identifying module, and the mobile phone end includes a testing module and a second sending module;
- the first sending module is configured to send a hardware verification request to the mobile phone end
- the testing module is configured to perform hardware response testing on the mobile phone hardware according to the hardware verification request, and obtain a feature function of the mobile terminal hardware;
- the second sending module is configured to send the feature function to the verification end
- the comparing module is configured to compare the feature function with a feature function corresponding to the mobile phone terminal pre-stored in the database, to obtain a comparison result;
- the identification module is configured to identify the mobile phone end according to the comparison result
- the mobile phone end hardware is one or more of a lens, a lens, a memory, and an audio and video module.
- a lens is one or more of a lens, a lens, a memory, and an audio and video module.
- the mobile terminal further includes a binding module
- the binding module is configured to bind the mobile phone end to the user biometric by binding a feature function of the mobile phone end to a user biometric.
- the verification end sends a hardware verification request to the mobile terminal;
- the mobile terminal controls the mobile phone hardware to make a hardware response according to the hardware verification request, and obtains response data;
- the verification end generates a feature function according to the response data, and compares the feature function with a feature function corresponding to the mobile phone terminal prestored in the database to obtain a comparison result;
- the verification end identifies the mobile phone end according to the comparison result
- the mobile terminal hardware is one or more of a speaker, a lens, a memory, and an audio and video module.
- a speaker is one or more of a speaker, a lens, a memory, and an audio and video module.
- the method further includes: The mobile phone end is bound to the user biometric by binding the feature function of the mobile phone end to the user biometric.
- the user biometrics include:
- the verification end includes a mobile phone, a software server, and a client.
- the mobile terminal hardware is a mobile phone
- the verification terminal sends a speaker verification request to the mobile terminal
- the mobile phone end controls the mobile phone to send an audio response according to the rabid verification request to obtain audio data
- the mobile phone end sends the audio data to the verification end;
- the verification end generates a pulse frequency response curve according to the audio data, and compares the pulse frequency to a result;
- the verification end identifies the mobile phone end according to the comparison result.
- the verification end is a mobile phone verification end in a communication phase with the mobile phone end;
- the Rabba verification request is to perform an ultrasonic or low acoustic wave response test on the mobile phone.
- the verification end includes a first sending module, a generating comparison module, and an identifying module, and the mobile phone end includes a control module and a second sending module;
- the first sending module is configured to send a hardware verification request to the mobile phone end
- the test module is configured to control a hardware response of the mobile phone hardware according to the speaker verification request, and obtain response data;
- the second sending module is configured to send the response data to the verification end
- the generating comparison module is configured to generate a feature function according to the response data, and the feature function The number is compared with a feature function corresponding to the mobile phone end pre-stored in the database, and a comparison result is obtained; the identification module is configured to identify the mobile phone end according to the comparison result;
- the mobile phone end hardware is one or more of a lens, a lens, a memory, and an audio and video module.
- the mobile terminal further includes a binding module
- the binding module is configured to bind the mobile phone end to the user biometric by binding a feature function of the mobile phone end to a user biometric.
- the verification end first sends a hardware verification request to the mobile phone end; then the mobile phone end performs a hardware response test on the mobile phone according to the hardware verification request, and obtains a feature function of the mobile phone end hardware; Transmitting the feature function to the verification end; and then the verification end compares the feature function with a feature function corresponding to the mobile phone end pre-stored in the database to obtain a comparison result; wherein the verification end is based on the comparison result Identifying the mobile phone terminal; the mobile phone terminal hardware is one or more of a speaker, a lens, a memory, and an audio and video module.
- the method and system for using the physical characteristics of the mobile phone hardware as the authentication key can easily and conveniently identify the mobile phone, and at the same time, the physical characteristics of the mobile phone hardware can be User biometric binding, which protects the user's mobile phone and facilitates user's use.
- FIG. 1 is a flow chart of a first embodiment of a method for using a physical feature of a mobile phone hardware as an authentication key according to the present invention
- FIG. 2 is a flow chart of a second embodiment of a method for using a physical feature of a mobile phone hardware as an authentication key according to the present invention
- FIG. 3 is a flow chart of a third embodiment of a method for using a physical feature of a mobile phone hardware as an authentication key according to the present invention
- FIG. 4 is a flow chart of a fourth embodiment of a method for using a physical feature of a mobile phone hardware as an authentication key according to the present invention
- FIG. 5 is a flow chart of a fifth embodiment of a method for using a physical feature of a mobile phone hardware as an authentication key according to the present invention
- 6 is a flowchart of a sixth embodiment of a method for using a physical feature of a mobile phone hardware as an authentication key according to the present invention
- 7 is a flowchart of a seventh embodiment of a method for using a physical feature of a mobile phone hardware as an authentication key according to the present invention
- FIG. 8 is a flow chart of the first embodiment of the present invention, in which the physical characteristics of the mobile phone hardware are used as the authentication key system;
- FIG. 9 is a flow chart showing a second embodiment of the physical characteristics of the mobile phone hardware as an authentication key system according to the present invention.
- the present invention provides a method and system for using the physical characteristics of a mobile phone hardware as an authentication key.
- the physical characteristics of the mobile phone hardware as a key for the identification of the mobile phone, the mobile phone can be easily and conveniently protected and convenient for the user. usage of.
- the first embodiment includes:
- the verification end sends a hardware verification request to the mobile terminal.
- the verification side pre-stores the relationship between the mobile phone and the hardware. Since the hardware characteristics of different individuals of the same hardware are different, the mobile phone end corresponding to the hardware can be obtained by sending a hardware verification request to the mobile phone.
- the mobile terminal performs a hardware response test on the mobile phone according to the hardware verification request, and obtains a feature function of the mobile terminal hardware;
- the mobile terminal After receiving the hardware verification request sent by the verification end, the mobile terminal can perform hardware response test on the mobile phone hardware according to the hardware verification request, and obtain a characteristic function of the mobile terminal hardware.
- the mobile terminal sends a feature function to the verification end.
- the mobile terminal can send a feature function to the verification end.
- the verification end compares the feature function with a feature function corresponding to the mobile phone terminal prestored in the database, and obtains a comparison result;
- the feature function is compared with the feature function corresponding to the mobile phone terminal stored in the database, and the comparison result can be obtained.
- the verification end identifies the mobile phone end according to the comparison result.
- the verification end can identify the mobile terminal according to the comparison result.
- the above mobile phone hardware may be one or more of a speaker, a lens, a memory, and an audio and video module.
- the first embodiment of the method for using the physical characteristics of the mobile phone hardware as the authentication key is described.
- the second embodiment of the method for using the physical characteristics of the mobile phone hardware as the authentication key is described below.
- the verification end sends a hardware verification request to the mobile terminal.
- the mobile terminal performs a hardware response test on the mobile phone according to the hardware verification request, and obtains a feature function of the mobile terminal hardware;
- the mobile terminal sends a feature function to the verification end.
- the verification end compares the feature function with a feature function corresponding to the mobile phone terminal prestored in the database, to obtain a comparison result;
- the verification end identifies the mobile phone end according to the comparison result
- the steps 201 to 205 of the embodiment of the present invention are the same as the steps 101 to 105 of the first embodiment of the method for using the physical characteristics of the mobile phone hardware as the authentication key, and are not described here.
- Bind the mobile terminal to the user biometric by binding the feature function of the mobile terminal to the user biometric.
- the biometric feature binding can further protect the mobile phone end or facilitate the user to use the mobile phone end.
- the feature function of the mobile phone end can be used as a login key to improve the convenience of use.
- the present invention can easily and conveniently identify the mobile phone by using the physical characteristics of the mobile phone hardware as the authentication key, and can physically and physically analyze the physical characteristics of the mobile phone hardware.
- Feature binding which protects the user's mobile phone and facilitates user's use.
- the second embodiment of the method for using the physical characteristics of the mobile phone hardware as the authentication key is described above.
- the third embodiment of the method for using the physical characteristics of the mobile phone hardware as the authentication key is described below. Examples include:
- the verification end sends a speaker verification request to the mobile terminal.
- the verification terminal pre-stores the relationship information between the mobile phone and the rabid. Since the frequency response characteristics of the different babies are different, the mobile terminal corresponding to the rabid can be obtained by sending the RADIUS authentication request to the mobile terminal.
- the mobile terminal performs a pulse frequency response test on the mobile phone speaker according to the verification request of the rabid, and obtains a pulse frequency response curve.
- the mobile terminal After receiving the speaker verification request sent by the verification terminal, the mobile terminal can perform a pulse frequency response test on the mobile phone according to the speaker verification request, and obtain a pulse frequency response curve.
- the mobile terminal sends a pulse frequency response curve to the verification end;
- the mobile terminal After obtaining the pulse frequency response curve, the mobile terminal can send a pulse frequency response curve to the verification end.
- the verification end compares the pulse frequency response curve with a pulse frequency response curve corresponding to the pre-stored mobile phone end in the database, and obtains a comparison result;
- the pulse frequency response curve is compared with the pulse frequency response curve corresponding to the pre-stored mobile phone end in the database, and the comparison result can be obtained.
- the verification end identifies the mobile phone end according to the comparison result.
- the verification end can identify the mobile terminal according to the comparison result.
- the present invention can easily and conveniently identify the mobile phone by using the physical characteristics of the mobile phone hardware as the authentication key.
- the third embodiment of the method for using the physical characteristics of the mobile phone hardware as the authentication key is described.
- the verification end sends a speaker verification request to the mobile terminal.
- the verification side pre-stores the relationship information between the mobile phone and the rabid. Since the frequency response characteristics of the different babies are different, the mobile phone end corresponding to the rabid can be obtained by sending the RADIUS authentication request to the mobile terminal.
- the verification terminal may specifically include a mobile phone, a software server, and a client. For example, the mobile phone end of the call may initiate an authentication request to the other mobile phone.
- the mobile terminal performs a pulse frequency response test on the mobile phone speaker according to the verification request of the rabid, and obtains a pulse frequency response curve.
- the mobile terminal After receiving the speaker verification request sent by the verification terminal, the mobile terminal can perform a pulse frequency response test on the mobile phone according to the speaker verification request, and obtain a pulse frequency response curve.
- the mobile terminal sends a pulse frequency response curve to the verification end;
- the mobile terminal After obtaining the pulse frequency response curve, the mobile terminal can send a pulse frequency response curve to the verification end.
- the verification end compares the pulse frequency response curve with a pulse frequency response curve corresponding to the pre-stored mobile phone end in the database, and obtains a comparison result;
- the pulse frequency response curve is compared with the pulse frequency response curve corresponding to the pre-stored mobile phone end in the database, and the comparison result can be obtained.
- the verification end identifies the mobile phone end according to the comparison result
- the verification end can identify the mobile terminal according to the comparison result.
- Bind the mobile terminal to the user biometric by binding the pulse frequency response curve of the mobile terminal to the user biometric.
- the mobile phone end By binding the pulse frequency response curve of the mobile terminal to the user's biometrics, the mobile phone end can be bound to the user biometrics, thereby protecting the mobile phone end or facilitating the user's use of the mobile phone end, for example, the pulse frequency response of the mobile phone end can be The curve acts as a login key to increase ease of use.
- the user biometrics described above may include: a human face and/or an iris and/or a voiceprint.
- the verification end is the calling party mobile phone end
- the mobile phone end corresponding to the verification end is the answering party mobile phone end.
- the answering party mobile phone end can pass Sending an ultrasonic or low acoustic wave response test to the calling party mobile phone, obtaining the pulse frequency response curve of the calling party mobile phone without affecting the call, and obtaining the pulse frequency response curve and the calling party stored in the answering party mobile phone end
- the comparison of the pulse frequency response curve data corresponding to the mobile phone end can identify the identity of the calling party mobile phone end; if the responding party mobile phone end stores the pulse frequency response curve data corresponding to the calling party mobile phone end, the identity of the calling party mobile phone end is confirmed.
- the pulse frequency response curve data corresponding to the calling party mobile phone end can be established according to the obtained pulse frequency response curve.
- the speaker of the calling party mobile phone sends ultrasonic audio data or low acoustic audio data to the responding mobile phone end according to the test requirement of the responding mobile phone end.
- the present invention can easily and conveniently identify the mobile phone by using the physical characteristics of the mobile phone hardware as the authentication key, and can also physically distinguish the physical characteristics of the mobile phone.
- User biometric binding which protects the user's mobile phone and facilitates user's use.
- the fourth embodiment of the method for using the physical characteristics of the mobile phone hardware as the authentication key is described.
- the verification end sends a hardware verification request to the mobile terminal.
- the verification side pre-stores the relationship between the mobile phone and the hardware. Since the hardware characteristics of different individuals of the same hardware are different, the mobile phone end corresponding to the hardware can be obtained by sending a hardware verification request to the mobile phone.
- the mobile terminal controls the mobile phone hardware to perform a hardware response according to the hardware verification request, and obtains response data.
- the mobile terminal After receiving the hardware verification request sent by the verification terminal, the mobile terminal can control the mobile phone hardware to make a hardware response according to the hardware verification request, and obtain response data.
- the mobile terminal sends response data to the verification end.
- the mobile terminal After receiving the response data, the mobile terminal can send the response data to the verification terminal.
- the verification end generates a feature function according to the response data, and compares the feature function with a feature function corresponding to the mobile phone terminal prestored in the database, to obtain a comparison result; After the verification end obtains the response data, the feature function can be generated according to the response data, and the feature function is compared with the feature function corresponding to the mobile phone terminal stored in the database to obtain a comparison result.
- the verification end identifies the mobile phone end according to the comparison result.
- the verification end can identify the mobile terminal according to the comparison result.
- the above mobile phone hardware is one or more of a speaker, a lens, a memory, and an audio and video module.
- the present invention can easily and conveniently identify the mobile phone by using the physical characteristics of the mobile phone hardware as the authentication key, and can physically and physically analyze the physical characteristics of the mobile phone hardware.
- Feature binding which protects the user's mobile phone and facilitates user's use.
- the fifth embodiment of the method for using the physical characteristics of the mobile phone hardware as the authentication key is described.
- the verification end sends a hardware verification request to the mobile terminal.
- the mobile terminal controls the mobile phone hardware to perform a hardware response according to the hardware verification request, and obtains response data.
- the mobile terminal sends response data to the verification end.
- the verification end generates a feature function according to the response data, and compares the feature function with a feature function corresponding to the mobile phone terminal prestored in the database, to obtain a comparison result;
- the verification end identifies the mobile phone end according to the comparison result
- the steps 601 to 605 of the embodiment of the present invention are the same as the steps 501 to 505 of the first embodiment of the method for using the physical characteristics of the mobile phone hardware as the authentication key, and are not repeated here.
- Bind the mobile terminal to the user biometric by binding the feature function of the mobile terminal to the user biometric.
- the mobile phone By binding the feature function of the mobile terminal to the user's biometrics, the mobile phone can be bound to the user's biometrics, thereby protecting the mobile phone or facilitating the user's use of the mobile phone.
- the feature function of the mobile phone can be used as the login password. Key to improve the convenience of use.
- the mobile phone end By binding the pulse frequency response curve of the mobile terminal to the user biometrics, the mobile phone end can be bound to the user biometrics, thereby protecting the mobile phone end or facilitating the user to the mobile phone end.
- the pulse frequency response curve of the mobile phone end can be used as a login key to improve the convenience of use.
- the present invention can easily and conveniently identify the mobile phone by using the physical characteristics of the mobile phone hardware as the authentication key, and can physically and physically analyze the physical characteristics of the mobile phone hardware.
- Feature binding which protects the user's mobile phone and facilitates user's use.
- the sixth embodiment of the method for using the physical characteristics of the mobile phone hardware as the authentication key is described.
- the verification end sends a speaker verification request to the mobile terminal.
- the verification terminal pre-stores the relationship information between the mobile phone and the rabid. Since the frequency response characteristics of the different babies are different, the mobile terminal corresponding to the rabid can be obtained by sending the RADIUS authentication request to the mobile terminal.
- the verification terminal may specifically include a mobile phone, a software server, and a client.
- the mobile phone end of the call may initiate an authentication request to the other mobile phone.
- the mobile terminal controls the mobile phone to perform an audio response according to the rabid verification request, and obtains audio data.
- the mobile terminal After receiving the speaker verification request sent by the verification terminal, the mobile terminal can control the mobile phone speaker to generate an audio response according to the speaker verification request, and obtain the audio data.
- the mobile terminal sends audio data to the verification end.
- the mobile terminal can send audio data to the verification terminal.
- the verification end generates a pulse frequency response curve according to the audio data, and after the pulse frequency response curve obtains the audio data, the pulse frequency response curve may be generated according to the audio data, and the comparison result is obtained.
- the 705 verification end identifies the mobile phone end according to the comparison result
- the verification end can identify the mobile terminal according to the comparison result.
- Bind the mobile terminal to the user biometric by binding the pulse frequency response curve of the mobile terminal to the user biometric.
- the mobile phone end By binding the pulse frequency response curve of the mobile terminal to the user's biometrics, the mobile phone end can be bound to the user biometrics, thereby protecting the mobile phone end or facilitating the user's use of the mobile phone end, for example, the pulse frequency response of the mobile phone end can be The curve acts as a login key to increase ease of use.
- the user biometrics described above may include: a human face and/or an iris and/or a voiceprint.
- the verification end is the calling party mobile phone end
- the mobile phone end corresponding to the verification end is the answering party mobile phone end.
- the calling party mobile phone is in a call state with the answering party mobile phone end
- the responding party mobile phone end stores the pulse frequency response curve data corresponding to the calling party mobile phone end
- the responding mobile phone end can send an ultrasonic wave or a low sound to the calling party mobile phone end.
- the wave response test method obtains the audio data of the calling party mobile phone without affecting the call, and processes the audio data to obtain the pulse frequency response curve pulse frequency response curve data comparison to identify the identity of the calling party mobile phone end;
- the pulse frequency response curve data corresponding to the calling party mobile phone end can be established according to the obtained pulse frequency response curve. .
- the speaker of the calling party mobile phone sends ultrasonic audio data or low acoustic audio data to the responding mobile phone end according to the test requirement of the responding mobile phone end.
- the present invention can easily and conveniently identify the mobile phone by using the physical characteristics of the mobile phone hardware as the authentication key, and can physically and physically analyze the physical characteristics of the mobile phone hardware.
- Feature binding which protects the user's mobile phone and facilitates user's use.
- the seventh embodiment of the method for using the physical characteristics of the mobile phone hardware as the authentication key is described above.
- the following describes a first embodiment of a system for using physical characteristics of a mobile phone hardware as an authentication key.
- Embodiments include:
- the verification terminal 81 includes a first sending module 811, a comparing module 812, and an identifying module 813, and the mobile terminal
- 82 includes a test module 821 and a second sending module 822;
- the first sending module 811 is configured to send a hardware verification request to the mobile terminal.
- the test module 821 is configured to perform hardware response test on the mobile phone hardware according to the hardware verification request, and obtain a feature function of the mobile terminal hardware;
- the second sending module 822 is configured to send a feature function to the verification end
- the comparison module 812 is configured to compare the feature function with a feature function corresponding to the mobile phone terminal pre-stored in the database, to obtain a comparison result;
- the identification module 813 is configured to identify the mobile phone end according to the comparison result
- the mobile terminal hardware is one or more of a speaker, a lens, a memory, and an audio and video module.
- the mobile terminal 82 also includes a binding module 823:
- the binding module 823 is used to bind the mobile terminal to the user biometric by binding the pulse frequency response curve of the mobile terminal to the user biometric.
- the verification end 81 may be a service provider, and the mobile terminal 82 is bound to the number.
- the user end feature function may be used as the user end and the service. The key verified between the providers, which in turn simplifies the security verification process between the client and the service provider.
- the system in which the physical characteristics of the mobile phone is used as the authentication key is the first embodiment corresponding to the first to fourth embodiments of the method for using the physical characteristics of the mobile phone hardware as the authentication key.
- the present invention can use the physical characteristics of the mobile phone hardware as the authentication key system. Thereby protecting the user's mobile phone and facilitating the use of the user.
- the first embodiment of the system for using the physical characteristics of the mobile phone hardware as the authentication key is described.
- the second embodiment of the system for using the physical characteristics of the mobile phone hardware as the authentication key is described below.
- the verification terminal 91 includes a first sending module 911, a generating comparison module 912 and an identifying module 913, and the mobile terminal 92 includes a control module 921 and a second sending module 922;
- the first sending module 911 is configured to send a hardware verification request to the mobile terminal.
- the test module 921 is configured to control the hardware of the mobile phone according to the hardware verification request to make a hardware response, and obtain response data;
- the second sending module 922 is configured to send the response data to the verification end
- the generating comparison module 912 is configured to generate a pulse frequency response curve according to the response data, and compare the feature function with a feature function corresponding to the mobile phone terminal prestored in the database to obtain a comparison result;
- the identification module 913 is configured to identify the mobile terminal according to the comparison result.
- the mobile terminal 92 also includes a binding module 923:
- the binding module 923 is used to bind the mobile terminal to the user biometric by binding the pulse frequency response curve of the mobile terminal to the user biometric.
- the embodiment in which the physical feature of the mobile phone hardware is used as the authentication key is the fifth embodiment corresponding to the fifth embodiment to the seventh embodiment of the method for using the physical characteristics of the mobile phone hardware as the authentication key.
- Advantages of the seventh embodiment By using the physical characteristics of the mobile phone hardware as the key for the identification of the mobile phone, the system of the present invention uses the physical characteristics of the mobile phone hardware as the authentication key to protect the user's mobile phone and facilitate the use of the user.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
一种将手机硬件的物理特征作为认证密钥的方法及系统,通过将手机硬件的物理特征作为该手机认证识别的密钥的方式,能够简单便捷地识别手机,同时可以将手机硬件的物理特征与用户生物特性绑定,从而对用户的手机进行保护及方便用户的使用。本发明将手机硬件的物理特征作为认证密钥的方法包括:验证端向手机端发送硬件验证请求;手机端根据硬件验证请求对手机进行硬件响应测试,得到手机端硬件的特征函数;手机端向验证端发送特征函数;验证端将所述特征函数与数据库内预存的手机端对应的特征函数比较,得到比较结果;验证端根据比较结果识别手机端;手机端硬件为喇叭、镜头、内存和音视频模块中的一种或多种。
Description
一种将手机硬件的物理特征作为认证密钥的方法及系统
本申请要求于 2014 年 6 月 13 日提交中国专利局、 申请号为 201410261811.7, 发明名称为 "一种将手机硬件的物理特征作为认证密钥的方 法及系统" 的中国专利申请的优先权, 其全部内容通过引用结合在本申请中。
技术领域
本发明涉及设备安全领域,具体涉及一种将手机硬件的物理特征作为认证 密钥的方法及系统。
背景技术
随着科技的发展和人民生活水平的提高, 手机已经成为人们的生活必需 品, 与人们的生活息息相关。 手机里有很多涉及生活、 支付及通信等软件, 而 这些软件大多与手机进行绑定, 由于这些软件与人们的财产或隐私密切相关, 因此此类软件的安全对于人们而言至关重要。
现在,用户主要通过数字密码的形式对生活、支付及通信等软件进行保护, 但是由于数字密码较容易破解或通过其他手段获得,因此数字密码的方式并不 能很好地保护生活、 支付及通信等软件的安全; 此外, 还可以通过人体的生物 特征作为密钥对生活、 支付及通信等软件进行保护, 例如苹果最新的产品 iphone5 中就利用了人体的指纹特征对设备进行保护, 但是虽然人体的生物特 征是独一无二的, 并且难以模仿, 但是可以被复制, 例如上述的指纹特征就可 以被复制, 因此即便是生物特征也不能很好地保护生活、 支付及通信等软件的 安全。
此外, 当用户的手机被盗或丟失后, 即便借助定位系统获得手机的位置, 也可能因为手机难以分辨是否为自身的手机而难以取回。
而手机作为生活、 支付及通信等软件的载体, 如果可以将手机作为生活、 支付及通信等软件的进入密钥, 即可对生活、 支付及通信等软件进行良好的保 护。
发明内容
本发明提供了一种将手机硬件的物理特征作为认证密钥的方法及系统,通 过将手机硬件的物理特征作为该手机认证识别的密钥的方式,能够简单便捷地
的手机进行保护及方便用户的使用。 验证端向手机端发送硬件验证请求;
所述手机端根据所述硬件验证请求对手机进行硬件响应测试,得到手机端 硬件的特征函数;
所述手机端向所述验证端发送所述特征函数;
所述验证端将所述特征函数与数据库内预存的所述手机端对应的特征函 数比较, 得到比较结果;
所述验证端根据所述比较结果识别所述手机端;
所述手机端硬件为喇叭、 镜头、 内存和音视频模块中的一种或多种。 优选的,
所述方法还包括:
通过将所述手机端的特征函数与用户生物特征绑定的方式将所述手机端 与所述用户生物特征绑定。
优选的,
所述用户生物特征包括:
人脸和 /或眼睛虹膜和 /或声纹。
优选的,
所述验证端包括手机、 软件服务端及用户端。
优选的,
所述手机端硬件为手机喇八;
所述验证端向手机端发送喇八验证请求;
所述手机端根据所述喇叭验证请求对手机喇叭进行脉冲频率响应测试,得 到脉冲频率响应曲线; 所述验证端将所述脉冲频率响应曲线与数据库内预存的所述手机端对应 的脉冲频率响应曲线比较, 得到比较结果;
所述验证端根据所述比较结果识别所述手机端。
优选的,
所述验证端为与所述手机端处于通信阶段的手机验证端;
所述喇八验证请求为对所述手机喇八进行超声波或低声波响应测试。 一险证端和至少一个手机端;
所述验证端包括第一发送模块、 比较模块和识别模块, 所述手机端包括测 试模块和第二发送模块;
所述第一发送模块用于向所述手机端发送硬件验证请求;
所述测试模块用于根据所述硬件验证请求对手机硬件进行硬件响应测试, 得到手机端硬件的特征函数;
所述第二发送模块用于向所述验证端发送所述特征函数;
所述比较模块用于将所述特征函数与数据库内预存的所述手机端对应的 特征函数比较, 得到比较结果;
所述识别模块用于根据所述比较结果识别所述手机端;
所述手机端硬件为喇八、 镜头、 内存和音视频模块中的一种或多种。 优选的,
所述手机端还包括绑定模块;
所述绑定模块用于通过将所述手机端的特征函数与用户生物特征绑定的 方式将所述手机端与所述用户生物特征绑定。 验证端向手机端发送硬件验证请求;
所述手机端根据所述硬件验证请求控制手机硬件做出硬件响应,得到响应 数据;
所述手机端向所述验证端发送所述响应数据;
所述验证端根据所述响应数据生成特征函数,并将所述特征函数与数据库 内预存的所述手机端对应的特征函数比较, 得到比较结果;
所述验证端根据所述比较结果识别所述手机端;
所述手机端硬件为喇叭、 镜头、 内存和音视频模块中的一种或多种。 优选 的,
所述方法还包括:
通过将所述手机端的特征函数与用户生物特征绑定的方式将所述手机端 与所述用户生物特征绑定。
优选的,
所述用户生物特征包括:
人脸和 /或眼睛虹膜和 /或声纹。
优选的,
所述验证端包括手机、 软件服务端及用户端。
优选的,
所述手机端硬件为手机喇八;
所述验证端向手机端发送喇叭验证请求;
所述手机端根据所述喇八验证请求控制手机喇八发出声音响应,得到音频 数据;
所述手机端向所述验证端发送所述音频数据;
所述验证端根据所述音频数据生成脉冲频率响应曲线,并将所述脉冲频率 较结果;
所述验证端根据所述比较结果识别所述手机端。
优选的,
所述验证端为与所述手机端处于通信阶段的手机验证端;
所述喇八验证请求为对所述手机喇八进行超声波或低声波响应测试。 一险证端和至少一个手机端;
所述验证端包括第一发送模块、生成比较模块和识别模块, 所述手机端包 括控制模块和第二发送模块;
所述第一发送模块用于向手机端发送硬件验证请求;
所述测试模块用于根据所述喇叭验证请求控制手机硬件做出硬件响应,得 到响应数据;
所述第二发送模块用于向所述验证端发送所述响应数据;
所述生成比较模块用于根据所述响应数据生成特征函数,并将所述特征函
数与数据库内预存的所述手机端对应的特征函数比较, 得到比较结果; 所述识别模块用于根据所述比较结果识别所述手机端;
所述手机端硬件为喇八、 镜头、 内存和音视频模块中的一种或多种。
优选的,
所述手机端还包括绑定模块;
所述绑定模块用于通过将所述手机端的特征函数与用户生物特征绑定的 方式将所述手机端与所述用户生物特征绑定。
本发明实施例中,验证端首先向手机端发送硬件验证请求;接着所述手机 端根据所述硬件验证请求对手机进行硬件响应测试,得到所述手机端硬件的特 征函数; 然后所述手机端向所述验证端发送所述特征函数; 接着所述验证端将 所述特征函数与数据库内预存的所述手机端对应的特征函数比较,得到比较结 果;中所述验证端根据所述比较结果识别所述手机端;上述手机端硬件为喇叭、 镜头、 内存和音视频模块中的一种或多种。通过将手机硬件的物理特征作为该 手机认证识别的密钥的方式,本发明将手机硬件的物理特征作为认证密钥的方 法及系统能够简单便捷地识别手机,同时可以将手机硬件的物理特征与用户生 物特性绑定, 从而对用户的手机进行保护及方便用户的使用。
附图说明
图 1 为本发明将手机硬件的物理特征作为认证密钥方法第一实施例流程 图;
图 2 为本发明将手机硬件的物理特征作为认证密钥方法第二实施例流程 图;
图 3 为本发明将手机硬件的物理特征作为认证密钥方法第三实施例流程 图;
图 4 为本发明将手机硬件的物理特征作为认证密钥方法第四实施例流程 图;
图 5 为本发明将手机硬件的物理特征作为认证密钥方法第五实施例流程 图;
图 6 为本发明将手机硬件的物理特征作为认证密钥方法第六实施例流程 图;
图 7 为本发明将手机硬件的物理特征作为认证密钥方法第七实施例流程 图;
图 8 为本发明将手机硬件的物理特征作为认证密钥系统第一实施例流程 图;
图 9 为本发明将手机硬件的物理特征作为认证密钥系统第二实施例流程 图。
具体实施方式
本发明提供了一种将手机硬件的物理特征作为认证密钥的方法及系统,通 过将手机硬件的物理特征作为该手机认证识别的密钥的方式,能够简单便捷地 的手机进行保护及方便用户的使用。 第一实施例包括:
101、 验证端向手机端发送硬件验证请求;
验证端预存储手机端与硬件关系信息,由于同一种硬件的不同个体的硬件 特征不一样, 因此通过向手机端发送硬件验证请求的方式, 可以获知该硬件对 应的手机端。
102、 手机端根据硬件验证请求对手机进行硬件响应测试, 得到手机端硬 件的特征函数;
手机端接收到验证端发送的硬件验证请求之后,可以根据硬件验证请求对 手机硬件进行硬件响应测试, 得到手机端硬件的特征函数。
103、 手机端向验证端发送特征函数;
得到特征函数之后, 手机端可以向验证端发送特征函数。
104、 验证端将特征函数与数据库内预存的手机端对应的特征函数比较, 得到比较结果;
验证端得到特征函数之后,将特征函数与数据库内预存的手机端对应的特 征函数比较, 可以得到比较结果。
105、 验证端根据比较结果识别手机端。
验证端根据比较结果可以识别手机端。
上述手机端硬件可以为喇叭、 镜头、 内存和音视频模块中的一种或多种。 通过将手机硬件的物理特征作为该手机认证识别的密钥的方式,本发明将 手机硬件的物理特征作为认证密钥的方法能够简单便捷地识别手机,同时可以 将手机硬件的物理特征与用户生物特性绑定,从而对用户的手机进行保护及方 便用户的使用。
上面介绍了本发明将手机硬件的物理特征作为认证密钥的方法的第一实 施例, 下面介绍将手机硬件的物理特征作为认证密钥的方法的第二实施例,请 实施例包括:
201、 验证端向手机端发送硬件验证请求;
202、 手机端根据硬件验证请求对手机进行硬件响应测试, 得到手机端硬 件的特征函数;
203、 手机端向验证端发送特征函数;
204、 验证端将特征函数与数据库内预存的手机端对应的特征函数比较, 得到比较结果;
205、 验证端根据比较结果识别手机端;
本发明实施例的步骤 201至步骤 205与本发明将手机硬件的物理特征作为 认证密钥的方法第一实施例的步骤 101至步骤 105—致, 在此处不再累述。
206、 通过将手机端的特征函数与用户生物特征绑定的方式将手机端与用 户生物特征绑定。 户生物特征绑定,进而可以对手机端进行保护或方便用户对手机端的使用, 例 如可以将手机端的特征函数作为登录密钥以提高使用的便利性。
通过将手机硬件的物理特征作为该手机认证识别的密钥的方式,本发明将 手机硬件的物理特征作为认证密钥的方法能够简单便捷地识别手机,同时可以 将手机硬件的物理特征与用户生物特性绑定,从而对用户的手机进行保护及方 便用户的使用。
上面介绍了本发明将手机硬件的物理特征作为认证密钥的方法的第二实 施例, 下面介绍将手机硬件的物理特征作为认证密钥的方法的第三实施例,请
实施例包括:
301、 验证端向手机端发送喇叭验证请求;
验证端预存储手机端与喇八关系信息,由于不同的喇八的频率响应特征不 一样, 因此通过向手机端发送喇八验证请求的方式,可以获知该喇八对应的手 机端。
302、 手机端根据喇八验证请求对手机喇叭进行脉冲频率响应测试, 得到 脉冲频率响应曲线;
手机端接收到验证端发送的喇叭验证请求之后,可以根据喇叭验证请求对 手机喇八进行脉冲频率响应测试, 得到脉冲频率响应曲线。
303、 手机端向验证端发送脉冲频率响应曲线;
得到脉冲频率响应曲线之后, 手机端可以向验证端发送脉冲频率响应曲 线。
304、 验证端将脉冲频率响应曲线与数据库内预存的手机端对应的脉冲频 率响应曲线比较, 得到比较结果;
验证端得到脉冲频率响应曲线之后,将脉冲频率响应曲线与数据库内预存 的手机端对应的脉冲频率响应曲线比较, 可以得到比较结果。
305、 验证端根据比较结果识别手机端。
验证端根据比较结果可以识别手机端。
通过将手机喇八的物理特征作为该手机认证识别的密钥的方式,本发明将 手机硬件的物理特征作为认证密钥的方法能够简单便捷地识别手机。
上面介绍了本发明将手机硬件的物理特征作为认证密钥的方法的第三实 施例, 下面介绍将手机硬件的物理特征作为认证密钥的方法的第四实施例,请 实施例包括:
401、 验证端向手机端发送喇叭验证请求;
验证端预存储手机端与喇八关系信息,由于不同的喇八的频率响应特征不 一样, 因此通过向手机端发送喇八验证请求的方式,可以获知该喇八对应的手 机端。
上述的验证端具体可以包括手机、软件服务端及用户端, 例如可以为通话 中的一方手机端向另一方手机端发起验证请求。
402、 手机端根据喇八验证请求对手机喇叭进行脉冲频率响应测试, 得到 脉冲频率响应曲线;
手机端接收到验证端发送的喇叭验证请求之后,可以根据喇叭验证请求对 手机喇八进行脉冲频率响应测试, 得到脉冲频率响应曲线。
由于不同的喇八的频率响应特征不一样,亦即通过脉冲频率响应测得到的 分辨。
403、 手机端向验证端发送脉冲频率响应曲线;
得到脉冲频率响应曲线之后, 手机端可以向验证端发送脉冲频率响应曲 线。
404、 验证端将脉冲频率响应曲线与数据库内预存的手机端对应的脉冲频 率响应曲线比较, 得到比较结果;
验证端得到脉冲频率响应曲线之后,将脉冲频率响应曲线与数据库内预存 的手机端对应的脉冲频率响应曲线比较, 可以得到比较结果。
405、 验证端根据比较结果识别手机端;
验证端根据比较结果可以识别手机端。
406、 通过将手机端的脉冲频率响应曲线与用户生物特征绑定的方式将手 机端与用户生物特征绑定。
通过将手机端的脉冲频率响应曲线与用户生物特征绑定的方式可以将手 机端与用户生物特征绑定,进而可以对手机端进行保护或方便用户对手机端的 使用,例如可以将手机端的脉冲频率响应曲线作为登录密钥以提高使用的便利 性。
上述的用户生物特征可以包括: 人脸和 /或眼睛虹膜和 /或声纹。
下面以一个具体实例来说明本发明实施例各步骤的工作过程:
在本发明实施例中,验证端为呼叫方手机端, 与验证端对应的手机端为应 答方手机端。呼叫方手机端与应答方手机端处于通话状态时, 若应答方手机端 内存储有呼叫方手机端对应的脉冲频率响应曲线数据,应答方手机端可以通过
向呼叫方手机端发送超声波或低声波响应测试的方式,在不影响通话的情况下 获得呼叫方手机端的脉冲频率响应曲线,将获得的脉冲频率响应曲线与应答方 手机端内存储的呼叫方手机端对应的脉冲频率响应曲线数据对比即可识别该 呼叫方手机端的身份;若应答方手机端内存储没有呼叫方手机端对应的脉冲频 率响应曲线数据,在已确认呼叫方手机端的身份的情况下, 可以根据获得的脉 冲频率响应曲线建立呼叫方手机端对应的脉冲频率响应曲线数据。
需要说明的是, 上述的超声波或低声波响应测试具体为: 呼叫方手机端的 喇叭根据应答方手机端的测试要求,向应答方手机端发送超声波音频数据或低 声波音频数据。
通过将手机喇八的物理特征作为该手机认证识别的密钥的方式,本发明将 手机硬件的物理特征作为认证密钥的方法能够简单便捷地识别手机,同时可以 将手机喇八的物理特征与用户生物特性绑定,从而对用户的手机进行保护及方 便用户的使用。
上面介绍了本发明将手机硬件的物理特征作为认证密钥的方法的第四实 施例, 下面介绍将手机硬件的物理特征作为认证密钥的方法的第五实施例,请 实施例包括:
501、 验证端向手机端发送硬件验证请求;
验证端预存储手机端与硬件关系信息,由于同一种硬件的不同个体的硬件 特征不一样, 因此通过向手机端发送硬件验证请求的方式, 可以获知该硬件对 应的手机端。
502、 手机端根据硬件验证请求控制手机硬件做出硬件响应, 得到响应数 据;
手机端接收到验证端发送的硬件验证请求之后,可以根据硬件验证请求控 制手机硬件做出硬件响应, 得到响应数据。
503、 手机端向验证端发送响应数据;
得到响应数据之后, 手机端可以向验证端发送响应数据。
504、 验证端根据响应数据生成特征函数, 并将特征函数与数据库内预存 的手机端对应的特征函数比较, 得到比较结果;
验证端得到响应数据之后, 可以根据响应数据生成特征函数, 并将特征函 数与数据库内预存的手机端对应的特征函数比较, 得到比较结果。
505、 验证端根据比较结果识别手机端。
验证端根据比较结果可以识别手机端。
上述手机端硬件为喇叭、 镜头、 内存和音视频模块中的一种或多种。 通过将手机硬件的物理特征作为该手机认证识别的密钥的方式,本发明将 手机硬件的物理特征作为认证密钥的方法能够简单便捷地识别手机,同时可以 将手机硬件的物理特征与用户生物特性绑定,从而对用户的手机进行保护及方 便用户的使用。
上面介绍了本发明将手机硬件的物理特征作为认证密钥的方法的第五实 施例, 下面介绍将手机硬件的物理特征作为认证密钥的方法的第六实施例,请 实施例包括:
601、 验证端向手机端发送硬件验证请求;
602、 手机端根据硬件验证请求控制手机硬件做出硬件响应, 得到响应数 据;
603、 手机端向验证端发送响应数据;
604、 验证端根据响应数据生成特征函数, 并将特征函数与数据库内预存 的手机端对应的特征函数比较, 得到比较结果;
605、 验证端根据比较结果识别手机端;
本发明实施例的步骤 601至步骤 605与本发明将手机硬件的物理特征作为 认证密钥的方法第一实施例的步骤 501至步骤 505—致, 在此处不再累述。
606、 通过将手机端的特征函数与用户生物特征绑定的方式将手机端与用 户生物特征绑定。
通过将手机端的特征函数与用户生物特征绑定的方式可以将手机端与用 户生物特征绑定,进而可以对手机端进行保护或方便用户对手机端的使用, 例 如可以将手机端的特征函数作为登录密钥以提高使用的便利性。
通过将手机端的脉冲频率响应曲线与用户生物特征绑定的方式可以将手 机端与用户生物特征绑定,进而可以对手机端进行保护或方便用户对手机端的
使用,例如可以将手机端的脉冲频率响应曲线作为登录密钥以提高使用的便利 性。
通过将手机硬件的物理特征作为该手机认证识别的密钥的方式,本发明将 手机硬件的物理特征作为认证密钥的方法能够简单便捷地识别手机,同时可以 将手机硬件的物理特征与用户生物特性绑定,从而对用户的手机进行保护及方 便用户的使用。
上面介绍了本发明将手机硬件的物理特征作为认证密钥的方法的第六实 施例, 下面介绍将手机硬件的物理特征作为认证密钥的方法的第七实施例,请 实施例包括:
701、 验证端向手机端发送喇叭验证请求;
验证端预存储手机端与喇八关系信息,由于不同的喇八的频率响应特征不 一样, 因此通过向手机端发送喇八验证请求的方式,可以获知该喇八对应的手 机端。
上述的验证端具体可以包括手机、软件服务端及用户端, 例如可以为通话 中的一方手机端向另一方手机端发起验证请求。
702、 手机端根据喇八验证请求控制手机喇八发出声音响应, 得到音频数 据;
手机端接收到验证端发送的喇叭验证请求之后,可以根据喇叭验证请求控 制手机喇叭发出声音响应, 得到音频数据。
703、 手机端向验证端发送音频数据;
得到音频数据之后, 手机端可以向验证端发送音频数据。
704、 验证端根据音频数据生成脉冲频率响应曲线, 并将脉冲频率响应曲 验证端得到音频数据之后, 可以根据音频数据生成脉冲频率响应曲线, 并 得到比较结果。
由于不同的喇八的频率响应特征不一样,亦即通过脉冲频率响应测得到的
分辨。
705验证端根据比较结果识别手机端;
验证端根据比较结果可以识别手机端。
706、 通过将手机端的脉冲频率响应曲线与用户生物特征绑定的方式将手 机端与用户生物特征绑定。
通过将手机端的脉冲频率响应曲线与用户生物特征绑定的方式可以将手 机端与用户生物特征绑定,进而可以对手机端进行保护或方便用户对手机端的 使用,例如可以将手机端的脉冲频率响应曲线作为登录密钥以提高使用的便利 性。
上述的用户生物特征可以包括: 人脸和 /或眼睛虹膜和 /或声纹。
下面以一个具体实例来说明本发明实施例各步骤的工作过程:
在本发明实施例中,验证端为呼叫方手机端, 与验证端对应的手机端为应 答方手机端。呼叫方手机端与应答方手机端处于通话状态时, 若应答方手机端 内存储有呼叫方手机端对应的脉冲频率响应曲线数据,应答方手机端可以通过 向呼叫方手机端发送超声波或低声波响应测试的方式,在不影响通话的情况下 获得呼叫方手机端的音频数据,对音频数据进行处理可以得到脉冲频率响应曲 脉冲频率响应曲线数据对比即可识别该呼叫方手机端的身份;若应答方手机端 内存储没有呼叫方手机端对应的脉冲频率响应曲线数据,在已确认呼叫方手机 端的身份的情况下,可以根据获得的脉冲频率响应曲线建立呼叫方手机端对应 的脉冲频率响应曲线数据。
需要说明的是, 上述的超声波或低声波响应测试具体为: 呼叫方手机端的 喇叭根据应答方手机端的测试要求,向应答方手机端发送超声波音频数据或低 声波音频数据。
通过将手机硬件的物理特征作为该手机认证识别的密钥的方式,本发明将 手机硬件的物理特征作为认证密钥的方法能够简单便捷地识别手机,同时可以 将手机硬件的物理特征与用户生物特性绑定,从而对用户的手机进行保护及方 便用户的使用。
上面介绍了本发明将手机硬件的物理特征作为认证密钥的方法的第七实
施例, 下面介绍将手机硬件的物理特征作为认证密钥的系统的第一实施例,请 实施例包括:
脸证端 81和至少一个手机端 82;
验证端 81包括第一发送模块 811、 比较模块 812和识别模块 813, 手机端
82包括测试模块 821和第二发送模块 822;
第一发送模块 811用于向手机端发送硬件验证请求;
测试模块 821用于根据硬件验证请求对手机硬件进行硬件响应测试,得到 手机端硬件的特征函数;
第二发送模块 822用于向验证端发送特征函数;
比较模块 812 用于将特征函数与数据库内预存的手机端对应的特征函数 比较, 得到比较结果;
识别模块 813用于根据比较结果识别手机端;
手机端硬件为喇叭、 镜头、 内存和音视频模块中的一种或多种。
可选地,
手机端 82还包括绑定模块 823:
绑定模块 823 用于通过将手机端的脉冲频率响应曲线与用户生物特征绑 定的方式将手机端与用户生物特征绑定。
需要说明的是, 上述的验证端 81可以为服务提供商, 上述手机端 82为与 数绑定, 当用户端与服务提供商之间进行交互时, 可以将用户端特征函数作为 用户端与服务提供商之间验证的密钥,进而可以简化用户端与服务提供商之间 的安全验证过程。
本发明实施例将手机喇八的物理特征作为认证密钥的系统为与本发明将 手机硬件的物理特征作为认证密钥的方法的第一实施例至第四实施例相对应 的第一实施例至第四实施例的优点。通过将手机硬件的物理特征作为该手机认 证识别的密钥的方式,本发明将手机硬件的物理特征作为认证密钥的系统能够
从而对用户的手机进行保护及方便用户的使用。
上面介绍了本发明将手机硬件的物理特征作为认证密钥的系统的第一实 施例, 下面介绍将手机硬件的物理特征作为认证密钥的系统的第二实施例,请 实施例包括:
证端 91和至少一个手机端 92;
验证端 91包括第一发送模块 911、生成比较模块 912和识别模块 913, 手 机端 92包括控制模块 921和第二发送模块 922;
第一发送模块 911用于向手机端发送硬件验证请求;
测试模块 921用于根据硬件验证请求控制手机硬件做出硬件响应,得到响 应数据;
第二发送模块 922用于向验证端发送响应数据;
生成比较模块 912用于根据响应数据生成脉冲频率响应曲线,并将特征函 数与数据库内预存的手机端对应的特征函数比较, 得到比较结果;
识别模块 913用于根据比较结果识别手机端。
可选地,
手机端 92还包括绑定模块 923:
绑定模块 923 用于通过将手机端的脉冲频率响应曲线与用户生物特征绑 定的方式将手机端与用户生物特征绑定。
本发明实施例将手机硬件的物理特征作为认证密钥的系统为与本发明将 手机硬件的物理特征作为认证密钥的方法的第五实施例至第七实施例相对应 的第五实施例至第七实施例的优点。通过将手机硬件的物理特征作为该手机认 证识别的密钥的方式,本发明将手机硬件的物理特征作为认证密钥的系统能够 从而对用户的手机进行保护及方便用户的使用。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于 此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可轻易想到 变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本发明的保护范围应
所述以权利要求的保护范围为准
Claims
1、 一种将手机硬件的物理特征作为认证密钥的方法, 其特征在于, 包括: 验证端向手机端发送硬件验证请求;
所述手机端根据所述硬件验证请求对手机进行硬件响应测试,得到手机端 硬件的特征函数;
所述手机端向所述验证端发送所述特征函数;
所述验证端将所述特征函数与数据库内预存的所述手机端对应的特征函 数比较, 得到比较结果;
所述验证端根据所述比较结果识别所述手机端;
所述手机端硬件为喇叭、 镜头、 内存和音视频模块中的一种或多种。
2、 根据权利要求 1所述的将手机硬件的物理特征作为认证密钥的方法, 其特征在于, 所述方法还包括:
通过将所述手机端的特征函数与用户生物特征绑定的方式将所述手机端 与所述用户生物特征绑定。
3、 根据权利要求 2所述的将手机硬件的物理特征作为认证密钥的方法, 其特征在于, 所述用户生物特征包括:
人脸和 /或眼睛虹膜和 /或声纹。
4、 根据权利要求 1所述的将手机硬件的物理特征作为认证密钥的方法, 其特征在于,
所述验证端包括手机、 软件服务端及用户端。
5、 根据权利要求 1至 4中任一项所述的将手机硬件的物理特征作为认证 密钥的方法, 其特征在于, 所述手机端硬件为手机喇叭;
所述验证端向手机端发送喇八验证请求;
所述手机端根据所述喇叭验证请求对手机喇叭进行脉冲频率响应测试,得 到脉冲频率响应曲线; 所述验证端将所述脉冲频率响应曲线与数据库内预存的所述手机端对应 的脉冲频率响应曲线比较, 得到比较结果;
所述验证端根据所述比较结果识别所述手机端。
OP140478
WO 2015/188410 PCT/CN2014/081361
6、 根据权利要求 5所述的将手机硬件的物理特征作为认证密钥的方法, 其特征在于,
所述验证端为与所述手机端处于通信阶段的手机验证端;
所述喇八验证请求为对所述手机喇八进行超声波或低声波响应测试。
7、 一种将手机硬件的物理特征作为认证密钥的系统, 其特征在于, 包括: 一险证端和至少一个手机端;
所述验证端包括第一发送模块、 比较模块和识别模块, 所述手机端包括测 试模块和第二发送模块;
所述第一发送模块用于向所述手机端发送硬件验证请求;
所述测试模块用于根据所述硬件验证请求对手机硬件进行硬件响应测试, 得到手机端硬件的特征函数;
所述第二发送模块用于向所述验证端发送所述特征函数;
所述比较模块用于将所述特征函数与数据库内预存的所述手机端对应的 特征函数比较, 得到比较结果;
所述识别模块用于根据所述比较结果识别所述手机端;
所述手机端硬件为喇八、 镜头、 内存和音视频模块中的一种或多种。
8、 根据权利要求 7所述的将手机硬件的物理特征作为认证密钥的系统, 其特征在于, 所述手机端还包括绑定模块;
所述绑定模块用于通过将所述手机端的特征函数与用户生物特征绑定的 方式将所述手机端与所述用户生物特征绑定。
9、 一种将手机硬件的物理特征作为认证密钥的方法, 其特征在于, 包括: 验证端向手机端发送硬件验证请求;
所述手机端根据所述硬件验证请求控制手机硬件做出硬件响应,得到响应 数据;
所述手机端向所述验证端发送所述响应数据;
所述验证端根据所述响应数据生成特征函数,并将所述特征函数与数据库 内预存的所述手机端对应的特征函数比较, 得到比较结果;
所述验证端根据所述比较结果识别所述手机端;
所述手机端硬件为喇八、 镜头、 内存和音视频模块中的一种或多种。
OP140478
WO 2015/188410 PCT/CN2014/081361
10、 根据权利要求 9所述的将手机硬件的物理特征作为认证密钥的方法, 其特征在于, 所述方法还包括:
通过将所述手机端的特征函数与用户生物特征绑定的方式将所述手机端 与所述用户生物特征绑定。
11、根据权利要求 10所述的将手机硬件的物理特征作为认证密钥的方法, 其特征在于, 所述用户生物特征包括:
人脸和 /或眼睛虹膜和 /或声纹。
12、 根据权利要求 9所述的将手机硬件的物理特征作为认证密钥的方法, 其特征在于,
所述验证端包括手机、 软件服务端及用户端。
13、 根据权利要求 9至 12中任一项所述的将手机硬件的物理特征作为认 证密钥的方法, 其特征在于, 包括: 所述手机端硬件为手机喇叭;
所述验证端向手机端发送喇八验证请求;
所述手机端根据所述喇八验证请求控制手机喇八发出声音响应,得到音频 数据;
所述手机端向所述验证端发送所述音频数据;
所述验证端根据所述音频数据生成脉冲频率响应曲线,并将所述脉冲频率 较结果;
所述验证端根据所述比较结果识别所述手机端。
14、根据权利要求 13所述的将手机硬件的物理特征作为认证密钥的方法, 其特征在于,
所述验证端为与所述手机端处于通信阶段的手机验证端;
所述喇八验证请求为对所述手机喇八进行超声波或低声波响应测试。
15、一种将手机硬件的物理特征作为认证密钥的系统,其特征在于, 包括: 一险证端和至少一个手机端;
所述验证端包括第一发送模块、生成比较模块和识别模块, 所述手机端包 括控制模块和第二发送模块;
所述第一发送模块用于向手机端发送硬件验证请求;
OP140478
WO 2015/188410 PCT/CN2014/081361
所述测试模块用于根据所述喇叭验证请求控制手机硬件做出硬件响应,得 到响应数据;
所述第二发送模块用于向所述验证端发送所述响应数据;
所述生成比较模块用于根据所述响应数据生成特征函数,并将所述特征函 数与数据库内预存的所述手机端对应的特征函数比较, 得到比较结果;
所述识别模块用于根据所述比较结果识别所述手机端;
所述手机端硬件为喇八、 镜头、 内存和音视频模块中的一种或多种。
16、根据权利要求 15所述的将手机硬件的物理特征作为认证密钥的方法, 其特征在于, 所述手机端还包括绑定模块;
所述绑定模块用于通过将所述手机端的特征函数与用户生物特征绑定的 方式将所述手机端与所述用户生物特征绑定。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410261811.7A CN104010308A (zh) | 2014-06-13 | 2014-06-13 | 一种将手机硬件的物理特征作为认证密钥的方法及系统 |
CN201410261811.7 | 2014-06-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015188410A1 true WO2015188410A1 (zh) | 2015-12-17 |
Family
ID=51370769
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/081361 WO2015188410A1 (zh) | 2014-06-13 | 2014-07-01 | 一种将手机硬件的物理特征作为认证密钥的方法及系统 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104010308A (zh) |
WO (1) | WO2015188410A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11138302B2 (en) | 2019-02-27 | 2021-10-05 | International Business Machines Corporation | Access control using multi-authentication factors |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5790862B1 (ja) | 2014-12-25 | 2015-10-07 | 千住金属工業株式会社 | やに入りはんだ用フラックス、フラックスコートはんだ用フラックス、やに入りはんだ及びフラックスコートはんだ |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102088691A (zh) * | 2009-12-07 | 2011-06-08 | 中国电信股份有限公司 | 手机移动互联网应用用户认证识别系统和方法 |
CN102932788A (zh) * | 2012-10-26 | 2013-02-13 | 南宁佰睿技术开发有限公司 | 一种手机的身份识别和近场支付的方法 |
CN103428699A (zh) * | 2013-07-16 | 2013-12-04 | 李锦风 | 一种基于手机硬件特征信息的注册绑定和身份认证的方法 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2214117B1 (en) * | 2007-09-19 | 2012-02-01 | Verayo, Inc. | Authentication with physical unclonable functions |
CN101635743B (zh) * | 2009-04-02 | 2014-11-26 | 杭州亚泽信息科技有限公司 | 使用生物特征认证结果确认移动终端持有者身份的系统和方法 |
JP5499358B2 (ja) * | 2010-03-24 | 2014-05-21 | 独立行政法人産業技術総合研究所 | 認証処理方法及び装置 |
US8458489B2 (en) * | 2010-03-25 | 2013-06-04 | Empire Technology Development Llc | Differential uncloneable variability-based cryptography |
-
2014
- 2014-06-13 CN CN201410261811.7A patent/CN104010308A/zh active Pending
- 2014-07-01 WO PCT/CN2014/081361 patent/WO2015188410A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102088691A (zh) * | 2009-12-07 | 2011-06-08 | 中国电信股份有限公司 | 手机移动互联网应用用户认证识别系统和方法 |
CN102932788A (zh) * | 2012-10-26 | 2013-02-13 | 南宁佰睿技术开发有限公司 | 一种手机的身份识别和近场支付的方法 |
CN103428699A (zh) * | 2013-07-16 | 2013-12-04 | 李锦风 | 一种基于手机硬件特征信息的注册绑定和身份认证的方法 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11138302B2 (en) | 2019-02-27 | 2021-10-05 | International Business Machines Corporation | Access control using multi-authentication factors |
Also Published As
Publication number | Publication date |
---|---|
CN104010308A (zh) | 2014-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI667585B (zh) | 一種基於生物特徵的安全認證方法及裝置 | |
US10868672B1 (en) | Establishing and verifying identity using biometrics while protecting user privacy | |
US9454656B2 (en) | System and method for verifying status of an authentication device through a biometric profile | |
JP5805846B2 (ja) | モバイルデバイス用の連続的音声認証 | |
US8751801B2 (en) | System and method for authenticating users using two or more factors | |
AU2013205396B2 (en) | Methods and Systems for Conducting Smart Card Transactions | |
WO2017032263A1 (zh) | 身份认证方法及装置 | |
CN106330442B (zh) | 身份认证方法、装置及系统 | |
AU2011268279A1 (en) | System and method for controlling access to network services using biometric authentication | |
JP2017536598A5 (zh) | ||
JPWO2012042775A1 (ja) | 生体認証システム、通信端末装置、生体認証装置、および生体認証方法 | |
JP2018205906A5 (zh) | ||
EP3032845A1 (en) | Hearing device configured to authenticate a mode request and related method | |
JP2015521813A (ja) | デバイス間でのアカウントの転送 | |
JP6752013B2 (ja) | サービス・モードを備えた聴覚装置および関連の方法 | |
TW201729562A (zh) | 伺服器、行動終端機、網路實名認證系統及方法 | |
JP2016506101A (ja) | 近傍ベースのマルチファクタ認証 | |
CN106060027B (zh) | 基于验证码进行验证的方法、装置、设备及系统 | |
CN112020716A (zh) | 远程生物特征识别 | |
CN107070918B (zh) | 一种网络应用登录方法和系统 | |
WO2015188410A1 (zh) | 一种将手机硬件的物理特征作为认证密钥的方法及系统 | |
KR101718368B1 (ko) | 생체 인식을 통한 보안 통신 시스템 및 방법 | |
WO2017006559A1 (ja) | 操作者確認サーバ、操作者確認システム、操作者確認方法および操作者確認プログラム | |
US20150319180A1 (en) | Method, device and system for accessing a server | |
JP5495333B2 (ja) | 認証装置、認証システム、認証方法、およびプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14894494 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 07/04/2017) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14894494 Country of ref document: EP Kind code of ref document: A1 |