CN105160226A - Method, apparatus and system of user identity verification and smart home - Google Patents

Method, apparatus and system of user identity verification and smart home Download PDF

Info

Publication number
CN105160226A
CN105160226A CN201510534923.XA CN201510534923A CN105160226A CN 105160226 A CN105160226 A CN 105160226A CN 201510534923 A CN201510534923 A CN 201510534923A CN 105160226 A CN105160226 A CN 105160226A
Authority
CN
China
Prior art keywords
information
finger print
authorization information
print information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510534923.XA
Other languages
Chinese (zh)
Other versions
CN105160226B (en
Inventor
周福家
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510534923.XA priority Critical patent/CN105160226B/en
Priority to PCT/CN2015/095783 priority patent/WO2017031850A1/en
Publication of CN105160226A publication Critical patent/CN105160226A/en
Application granted granted Critical
Publication of CN105160226B publication Critical patent/CN105160226B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention discloses a method of user identity verification. The method comprises: receiving fingerprint information collected by a terminal and previously stored first verification information; verifying whether the first verification information matches second verification information previously stored in a local device; if yes, merging the first verification information and the second verification information to generate fingerprint verification information; performing comparison verification on the fingerprint verification information and the fingerprint information; and if the verification is passed, passing the user identity verification. The method provided by the present invention can enhance the security of the user identity verification. The present invention further discloses an apparatus and a system of user identity verification and a smart home

Description

User ID authentication method, device, system and Smart Home
Technical field
The present invention relates to data processing field, particularly a kind of user ID authentication method, device, system and Smart Home.
Background technology
At present along with the development of technology, the security of simple finger print identifying user identity is queried.Such as in field of intelligent control, if time simple finger print identifying starts a leak, huge hidden danger can be brought to the use of opertaing device and safety.
Therefore, how improving the security of subscriber authentication, is those skilled in the art's technical issues that need to address.
Summary of the invention
The object of this invention is to provide a kind of user ID authentication method, the method can improve the security of subscriber authentication; Another object of the present invention is to provide a kind of subscriber authentication device, system and Smart Home.
For solving the problems of the technologies described above, the invention provides a kind of user ID authentication method, comprising:
The finger print information of receiving terminal collection and the first authorization information prestored;
Verify whether the second authorization information that described first authorization information and local device prestore mates;
Upon a match, described first authorization information and described second authorization information merge generation checking finger print information;
Described checking finger print information and described finger print information are carried out contrast verification;
If after being verified, subscriber authentication is passed through.
Wherein, the acquisition methods of described first authorization information and described second authorization information comprises:
Gather the finger print information of user, and obtain the characteristic information of finger print information;
The characteristic information of described finger print information is divided into two parts according to pre-defined rule, forms the first authorization information and the second authorization information.
Wherein, described user ID authentication method also comprises:
After being verified, described terminal obtains the control authority corresponding with user identity.
Wherein, described user ID authentication method also comprises:
After being verified, obtain the distance difference of described terminal location and described local device position;
When described distance difference is in the first scope, then described terminal obtains the first control authority;
When described distance difference is in the second scope, then described terminal obtains the second control authority.
The invention provides a kind of subscriber authentication device, comprising:
Receiver module, for finger print information and first authorization information that prestores of receiving terminal collection;
Matching module, for verifying whether the second authorization information that described first authorization information and local device prestore mates;
Generation module, for upon a match, described first authorization information and described second authorization information merge and generate checking finger print information;
Authentication module, for carrying out contrast verification by described checking finger print information and described finger print information; If after being verified, subscriber authentication is passed through.
Wherein, described subscriber authentication device also comprises:
First authority setting module, for after being verified, described terminal obtains the control authority corresponding with user identity.
Wherein, described subscriber authentication device also comprises:
Spacing module, for after being verified, obtains the distance difference of described terminal location and described local device position;
Second authority setting module, for working as described distance difference in the first scope, then described terminal obtains the first control authority; When described distance difference is in the second scope, then described terminal obtains the second control authority.
The invention provides a kind of Smart Home and comprise described subscriber authentication device.
The invention provides a kind of subscriber identity authentication system, comprising:
Terminal, for the finger print information gathered; To the first authorization information that equipment sends finger print information and prestores;
Equipment, for the finger print information that receives described terminal collection and the first authorization information prestored; Verify whether the second authorization information that described first authorization information and local device prestore mates; Upon a match, described first authorization information and described second authorization information merge generation checking finger print information; Described checking finger print information and described finger print information are carried out contrast verification; If after being verified, subscriber authentication is passed through.
Wherein, described terminal also for gathering the finger print information of user, and obtains the characteristic information of finger print information; The characteristic information of described finger print information is divided into two parts according to pre-defined rule, forms the first authorization information and the second authorization information, and described second authorization information is sent to described equipment.
User ID authentication method provided by the present invention, comprising: the finger print information of receiving terminal collection and the first authorization information prestored; Verify whether the second authorization information that described first authorization information and local device prestore mates; Upon a match, described first authorization information and described second authorization information merge generation checking finger print information; Described checking finger print information and described finger print information are carried out contrast verification; If after being verified, subscriber authentication is passed through.
First authorization information and the second authorization information by advance the finger print information of user being divided into the first authorization information and the second authorization information, and are stored in user terminal and equipment by the method respectively.When user will carry out authentication, need the first authorization information stored in the finger print information of terminal collection and terminal to send to equipment; First the second authorization information stored in the first authorization information received and equipment mates by equipment, after the match is successful, is carrying out fusion generation checking finger print information.Equipment carries out contrast verification at the finger print information that will receive and checking finger print information; If after being verified, subscriber authentication is passed through.
Do not store complete checking finger print information in the method equipment, therefore, if user only has finger print information not have the first authorization information, can not fingerprint recognition be carried out.If user has the first authorization information and user fingerprints information is wrong, fingerprint contrast identification can not be passed through.Therefore, only have the finger print information sent when user terminal to be correct and the first authorization information is also correct, can pass through subscriber authentication, therefore, the method can improve the security of subscriber authentication, the legitimate rights and interests of guarantee user.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only embodiments of the invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to the accompanying drawing provided.
The process flow diagram of the user ID authentication method that Fig. 1 provides for the embodiment of the present invention;
The structured flowchart of the subscriber authentication device that Fig. 2 provides for the embodiment of the present invention;
The structured flowchart of the subscriber identity authentication system that Fig. 3 provides for the embodiment of the present invention.
Embodiment
Core of the present invention is to provide a kind of user ID authentication method, and the method can improve the security of subscriber authentication; Another core of the present invention is to provide a kind of subscriber authentication device, system and Smart Home.
For making the object of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Please refer to Fig. 1, the process flow diagram of the user ID authentication method that Fig. 1 provides for the embodiment of the present invention; The method can comprise:
The finger print information of step s100, receiving terminal collection and the first authorization information prestored;
Step s110, verify whether the second authorization information that described first authorization information and local device prestore mates;
Wherein, the acquisition methods of the first authorization information and the second authorization information can be multiple, and preferably, the acquisition methods of the first authorization information and the second authorization information can comprise:
Gather the finger print information of user, and obtain the characteristic information of finger print information;
The characteristic information of described finger print information is divided into two parts according to pre-defined rule, forms the first authorization information and the second authorization information.
Concrete mode such as equipment carries out user fingerprints and gathers picture, and this fingerprint picture is carried out feature extraction, these fingerprint characteristics are divided into two parts, and every part is all the picture with fingerprint feature information, and two parts are combined and can form complete fingerprint authentication picture; In part storage terminal, another part stores in a device.Also can be that terminal gathers user fingerprints collection picture, and this fingerprint picture is carried out feature extraction, these fingerprint characteristics are divided into two parts, and every part is all the picture with fingerprint feature information, and two parts are combined and can form complete fingerprint authentication picture; In part storage terminal, another part stores in a device.Certainly here also can other devices extraction first authorization information of carrying out and the second authorization information, and respectively the first authorization information is sent to terminal, the second authorization information is sent to equipment.Wherein two parts can be on average assigned to by characteristic information in two width figure, also can be divide according to no weight.
Wherein, lower mask body obtains the first authorization information and the second authorization information for example with terminal and is described: wherein, terminal take mobile phone as example, and certain terminal can also be the device with finger print collecting function.
1) first set up the connection of mobile console (mobile phone) and facilities control console, data transmission (also can carry out data transmission by other means here, such as bluetooth) can be carried out by NFC near field.
2) authorization information typing selected by facilities control console, gathered the finger print information of user by the fingerprint authentication module of mobile phone.
3) mobile phone application end is by the field of direction of typing fingerprint, reference point, and the characteristic information of the core bases for estimation such as minutia is divided into two parts A and B, and has coupling checking binding relationship between A and B.
Wherein, the mode of a kind of division A and B is specifically:
Gather a width user fingerprints picture, identify the characteristic information in this fingerprint picture, each in the drawings characteristic information is the unique point of a little rectangle;
Utilize the central point of curve unique point through little rectangle as much as possible in Uncrossed situation, what pass due to curve is all the central point of unique point, and therefore, the unique point can passed along this curve is divided into two parts; Therefore, characteristic information can be divided into two parts A and B according to curve; User fingerprints picture can be divided into picture A and picture B by curve, wherein picture A has characteristic information A and picture B has characteristic information B simultaneously.
Wherein, the algorithm being divided into A and B also has a lot, can be divided in two width fingerprint pictures by characteristic information, become the fingerprint picture that a width has complete characterization information after they can be merged as long as reach here.
4) a part of information B is passed to facilities control console by NFC to store.Mobile phone terminal only retains the information A of half.Prevent by hacker black enter and obtain whole verifying authorization.
Step s120, upon a match, described first authorization information and described second authorization information merge and generate checking finger print information;
When not mating, the first authorization information and the second authorization information can not merge the checking finger print information becoming complete.
Step s130, described checking finger print information and described finger print information are carried out contrast verification;
The characteristic information being about to checking finger print information and finger print information contrasts, and when the threshold is met, then thinks that contrast verification passes through.
If after step s140 is verified, subscriber authentication is passed through.
Wherein, after being verified, then user identity is legal, safe.Can carry out carrying out follow-up operation to equipment.
Based on technique scheme, the user ID authentication method that the embodiment of the present invention provides, first authorization information and the second authorization information by advance the finger print information of user being divided into the first authorization information and the second authorization information, and are stored in user terminal and equipment by the method respectively.When user will carry out authentication, need the first authorization information stored in the finger print information of terminal collection and terminal to send to equipment; First the second authorization information stored in the first authorization information received and equipment mates by equipment, after the match is successful, is carrying out fusion generation checking finger print information.Equipment carries out contrast verification at the finger print information that will receive and checking finger print information; If after being verified, subscriber authentication is passed through.Do not store complete checking finger print information in the method equipment, therefore, if user only has finger print information not have the first authorization information, can not fingerprint recognition be carried out.If user has the first authorization information and user fingerprints information is wrong, fingerprint contrast identification can not be passed through.Therefore, only have the finger print information sent when user terminal to be correct and the first authorization information is also correct, can pass through subscriber authentication, therefore, the method can improve the security of subscriber authentication, the legitimate rights and interests of guarantee user.
Preferably, based on the user ID authentication method of above-described embodiment, it can also comprise:
After being verified, described terminal obtains the control authority corresponding with user identity.
Wherein, after being verified, equipment just can know the identity information of this user, and can search by the identity information of this user the control authority information corresponded.Such as, according to the information of user M, find the control authority of M for only can check.Then equipment can control the operation of user M, and M only can check, can not carry out other instructions to equipment, namely other operational orders all can be thought disable instruction by equipment.
By such setting, can the safety of guarantee equipment of maximum possible, ensure that confidential information does not return leakage.Conveniently personal management is carried out to user right.
Wherein, preferably, be also need to carry out different settings at different conditions to the authority of same user in some situations.
Such as, be all user M, the authority under the different ruuning situations of equipment is different, when needing the setting of user right in a device like this, specifies accordingly, gives different authorities by user M under the different operating state of equipment.This method needs to carry out arranging according to the actual service condition of equipment.
Wherein, the imparting of preferred above-mentioned authority is also to add the restriction of time, such as, user M have passed checking, obtains the authority of user M, but the execution time of this authority is the schedule time, it can be 1 hour etc., after then exceeding the schedule time, authority can be cancelled, if user M also thinks that the words of operating equipment must carry out authentication again.
Preferably, on the basis of the embodiment of Fig. 1, user ID authentication method can also comprise:
After being verified, obtain the distance difference of described terminal location and described local device position;
When described distance difference is in the first scope, then described terminal obtains the first control authority;
When described distance difference is in the second scope, then described terminal obtains the second control authority.
Wherein, this according to range information, the situation that user right is different, may be used on remote control equipment, such as, remote control intelligent household, when distance, be merely able to the switch conditions carrying out checking whole Smart Home in family, and the unlatching authority of minority Smart Home; But at home apart near situation, whole rights of using of all Smart Homes of user can be given.
Illustrating with specific embodiment below with Smart Home:
(1) Intelligent housing platform, is connected into network by router, and mobile phone domestic applications end sets up the connection with control desk by network.
(2) after being verified, the distance difference of described mobile phone location and described local device position is obtained; When described distance difference is in the first scope, then described terminal obtains the first control authority; Namely can only obtain and check that the unlatching authority of authority and small part household electrical appliance closed by authority and electrical equipment.In Timeliness coverage man electrical equipment running status and close.Need user manually to give authority to control desk for unlatching authority, guarantee safety.
(3) just need when when the user is at home (namely when described distance difference is in the second scope, then described terminal obtains the second control authority) is wanted to obtain whole operating rights after being verified, allow mobile phone and control desk near field NFC verify (control desk need manually open NFC once) again.Now give mobile phone application end the connection control authority of 12 hours.
(4) when user is away from home, mobile phone application end judges in the position range that is away from home, control desk automatically will be reported to cancel and connect.Default privilege is become when again connecting.
Wherein, control desk can be the equipment being used for carrying out subscriber authentication specially, and also can be the part in use equipment, such as console device can be arranged in Smart Home.
Based on technique scheme, the user ID authentication method that the embodiment of the present invention provides, does not store complete checking finger print information in the method equipment, therefore, if user only has finger print information not have the first authorization information, can not carry out fingerprint recognition.If user has the first authorization information and user fingerprints information is wrong, fingerprint contrast identification can not be passed through.Therefore, only have the finger print information sent when user terminal to be correct and the first authorization information is also correct, can pass through subscriber authentication, therefore, the method can improve the security of subscriber authentication, the legitimate rights and interests of guarantee user.And give different authority informations can also to the user by verifying, ensure the use safety of equipment.
Please refer to Fig. 2, the structured flowchart of the subscriber authentication device that Fig. 2 provides for the embodiment of the present invention; This device can comprise:
Receiver module 100, for finger print information and first authorization information that prestores of receiving terminal collection;
Wherein, user terminal can be mobile phone also can be the terminals such as flat board.
Matching module 200, for verifying whether the second authorization information that described first authorization information and local device prestore mates;
Generation module 300, for upon a match, described first authorization information and described second authorization information merge and generate checking finger print information;
Authentication module 400, for carrying out contrast verification by described checking finger print information and described finger print information; If after being verified, subscriber authentication is passed through.
Preferably, above-mentioned subscriber authentication device can also comprise:
First authority setting module, for after being verified, described terminal obtains the control authority corresponding with user identity.
Preferably, above-mentioned subscriber authentication device can also comprise:
Spacing module, for after being verified, obtains the distance difference of described terminal location and described local device position;
Second authority setting module, for working as described distance difference in the first scope, then described terminal obtains the first control authority; When described distance difference is in the second scope, then described terminal obtains the second control authority.
The embodiment of the present invention provides a kind of Smart Home, comprises above-mentioned subscriber authentication device.
Wherein, above-mentioned subscriber authentication device here can be arranged on Smart Home inside, also can be arranged at outside parametric controller, refers to that platform realizes subscriber authentication and priority assignation by control.
Based on technique scheme, the Smart Home that the embodiment of the present invention provides adopts the segmentation of finger print information to be stored in user terminal and subscriber authentication device, strengthen the security verified of user's Long-distance Control household, realize different rights managements, to the understanding of household and control when facilitating user house and work.Enhance security, the operation of lawless person can be prevented.Improve rights management and the safety in utilization of Smart Home.
Please refer to Fig. 3, the structured flowchart of the subscriber identity authentication system that Fig. 3 provides for the embodiment of the present invention; This system can comprise:
Terminal 500, for the finger print information gathered; To the first authorization information that equipment sends finger print information and prestores;
Equipment 600, for the finger print information that receives described terminal collection and the first authorization information prestored; Verify whether the second authorization information that described first authorization information and local device prestore mates; Upon a match, described first authorization information and described second authorization information merge generation checking finger print information; Described checking finger print information and described finger print information are carried out contrast verification; If after being verified, subscriber authentication is passed through.
Wherein, preferably, described terminal also for gathering the finger print information of user, and obtains the characteristic information of finger print information; The characteristic information of described finger print information is divided into two parts according to pre-defined rule, forms the first authorization information and the second authorization information, and described second authorization information is sent to described equipment.
In instructions, each embodiment adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar portion mutually see.For device disclosed in embodiment, because it corresponds to the method disclosed in Example, so description is fairly simple, relevant part illustrates see method part.
Professional can also recognize further, in conjunction with unit and the algorithm steps of each example of embodiment disclosed herein description, can realize with electronic hardware, computer software or the combination of the two, in order to the interchangeability of hardware and software is clearly described, generally describe composition and the step of each example in the above description according to function.These functions perform with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel can use distinct methods to realize described function to each specifically should being used for, but this realization should not thought and exceeds scope of the present invention.
The software module that the method described in conjunction with embodiment disclosed herein or the step of algorithm can directly use hardware, processor to perform, or the combination of the two is implemented.Software module can be placed in the storage medium of other form any known in random access memory (RAM), internal memory, ROM (read-only memory) (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field.
Above user ID authentication method provided by the present invention, device, system and Smart Home are described in detail.Apply specific case herein to set forth principle of the present invention and embodiment, the explanation of above embodiment just understands method of the present invention and core concept thereof for helping.It should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention, can also carry out some improvement and modification to the present invention, these improve and modify and also fall in the protection domain of the claims in the present invention.

Claims (10)

1. a user ID authentication method, is characterized in that, comprising:
The finger print information of receiving terminal collection and the first authorization information prestored;
Verify whether the second authorization information that described first authorization information and local device prestore mates;
Upon a match, described first authorization information and described second authorization information merge generation checking finger print information;
Described checking finger print information and described finger print information are carried out contrast verification;
If after being verified, subscriber authentication is passed through.
2. user ID authentication method as claimed in claim 1, it is characterized in that, the acquisition methods of described first authorization information and described second authorization information comprises:
Gather the finger print information of user, and obtain the characteristic information of finger print information;
The characteristic information of described finger print information is divided into two parts according to pre-defined rule, forms the first authorization information and the second authorization information.
3. user ID authentication method as claimed in claim 1, is characterized in that, also comprise:
After being verified, described terminal obtains the control authority corresponding with user identity.
4. the user ID authentication method as described in any one of claims 1 to 3, is characterized in that, also comprises:
After being verified, obtain the distance difference of described terminal location and described local device position;
When described distance difference is in the first scope, then described terminal obtains the first control authority;
When described distance difference is in the second scope, then described terminal obtains the second control authority.
5. a subscriber authentication device, is characterized in that, comprising:
Receiver module, for finger print information and first authorization information that prestores of receiving terminal collection;
Matching module, for verifying whether the second authorization information that described first authorization information and local device prestore mates;
Generation module, for upon a match, described first authorization information and described second authorization information merge and generate checking finger print information;
Authentication module, for carrying out contrast verification by described checking finger print information and described finger print information; If after being verified, subscriber authentication is passed through.
6. subscriber authentication device as claimed in claim 5, is characterized in that, also comprise:
First authority setting module, for after being verified, described terminal obtains the control authority corresponding with user identity.
7. the subscriber authentication device as described in claim 5 or 6, is characterized in that, also comprise:
Spacing module, for after being verified, obtains the distance difference of described terminal location and described local device position;
Second authority setting module, for working as described distance difference in the first scope, then described terminal obtains the first control authority; When described distance difference is in the second scope, then described terminal obtains the second control authority.
8. a Smart Home, is characterized in that, comprises the subscriber authentication device described in any one of claim 5 to 7.
9. a subscriber identity authentication system, is characterized in that, comprising:
Terminal, for the finger print information gathered; To the first authorization information that equipment sends finger print information and prestores;
Equipment, for the finger print information that receives described terminal collection and the first authorization information prestored; Verify whether the second authorization information that described first authorization information and local device prestore mates; Upon a match, described first authorization information and described second authorization information merge generation checking finger print information; Described checking finger print information and described finger print information are carried out contrast verification; If after being verified, subscriber authentication is passed through.
10. subscriber identity authentication system as claimed in claim 9, is characterized in that,
Described terminal also for gathering the finger print information of user, and obtains the characteristic information of finger print information; The characteristic information of described finger print information is divided into two parts according to pre-defined rule, forms the first authorization information and the second authorization information, and described second authorization information is sent to described equipment.
CN201510534923.XA 2015-08-27 2015-08-27 User ID authentication method, device, system and smart home Active CN105160226B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510534923.XA CN105160226B (en) 2015-08-27 2015-08-27 User ID authentication method, device, system and smart home
PCT/CN2015/095783 WO2017031850A1 (en) 2015-08-27 2015-11-27 User identity authentication method, device, system and smart home

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510534923.XA CN105160226B (en) 2015-08-27 2015-08-27 User ID authentication method, device, system and smart home

Publications (2)

Publication Number Publication Date
CN105160226A true CN105160226A (en) 2015-12-16
CN105160226B CN105160226B (en) 2018-09-07

Family

ID=54801082

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510534923.XA Active CN105160226B (en) 2015-08-27 2015-08-27 User ID authentication method, device, system and smart home

Country Status (2)

Country Link
CN (1) CN105160226B (en)
WO (1) WO2017031850A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516203A (en) * 2016-01-27 2016-04-20 北京博明信德科技有限公司 Safety methodology based on fingerprint scatter storage and system
CN105867141A (en) * 2016-03-30 2016-08-17 宁波三博电子科技有限公司 Intelligent home control method and system based on effective instruction scope
CN106647300A (en) * 2016-11-30 2017-05-10 桂林师范高等专科学校 Indoor temperature intelligent detection and control method and system of smart home
WO2018014263A1 (en) * 2016-07-20 2018-01-25 张志慧 Control method for intelligent humidifier
WO2018014255A1 (en) * 2016-07-20 2018-01-25 张志慧 Security control system for smart humidifier based on palmprint and cloud
WO2018014262A1 (en) * 2016-07-20 2018-01-25 张志慧 Communication system
WO2018014265A1 (en) * 2016-07-20 2018-01-25 张志慧 Control system for smart humidifier
CN108875337A (en) * 2017-12-12 2018-11-23 北京视联动力国际信息技术有限公司 A kind of unlocking method and system
CN109544173A (en) * 2017-08-16 2019-03-29 浙江绍兴苏泊尔生活电器有限公司 Air purifier and identity verification method and device thereof
CN113485141A (en) * 2021-07-21 2021-10-08 湖南世光实业有限公司 Intelligent furniture control system based on Internet of things
CN113836509A (en) * 2021-09-23 2021-12-24 百度在线网络技术(北京)有限公司 Information acquisition method and device, electronic equipment and storage medium

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110162938A (en) * 2018-03-26 2019-08-23 中州大学 A kind of multifunctional internet of things service platform
CN111970260B (en) * 2020-08-05 2022-11-11 上海中葆护卫商务咨询有限公司 Authority control method and device based on safety cabin
CN114194964A (en) * 2021-12-16 2022-03-18 西子快速科技有限公司 Operation mode for lifting sightseeing elevator in stable scenic spot

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102222368A (en) * 2011-04-28 2011-10-19 王鑫 Electronic ticket authentication system applying short-distance communication technology and detection method
CN103699996A (en) * 2012-09-27 2014-04-02 ***股份有限公司 Payment authentication method based on human biological characteristics
CN103941654A (en) * 2013-01-21 2014-07-23 上海科斗电子科技有限公司 Intelligent household control system with automatically activated functions and accessories thereof
CN104601331A (en) * 2014-12-26 2015-05-06 深圳市科陆电子科技股份有限公司 System and method for monitoring and controlling charging pile
CN104714414A (en) * 2015-03-25 2015-06-17 小米科技有限责任公司 Smart home equipment control method and device and electronic equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040042641A1 (en) * 2002-08-30 2004-03-04 Jakubowski Peter Joel Personnel identity verification system
FI122260B (en) * 2010-05-10 2011-11-15 Kone Corp Procedure and system for limiting passing rights
US20140003681A1 (en) * 2012-06-29 2014-01-02 Apple Inc. Zero Enrollment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102222368A (en) * 2011-04-28 2011-10-19 王鑫 Electronic ticket authentication system applying short-distance communication technology and detection method
CN103699996A (en) * 2012-09-27 2014-04-02 ***股份有限公司 Payment authentication method based on human biological characteristics
CN103941654A (en) * 2013-01-21 2014-07-23 上海科斗电子科技有限公司 Intelligent household control system with automatically activated functions and accessories thereof
CN104601331A (en) * 2014-12-26 2015-05-06 深圳市科陆电子科技股份有限公司 System and method for monitoring and controlling charging pile
CN104714414A (en) * 2015-03-25 2015-06-17 小米科技有限责任公司 Smart home equipment control method and device and electronic equipment

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516203B (en) * 2016-01-27 2018-07-17 北京博明信德科技有限公司 A kind of safety certifying method and system based on fingerprint dispersion storage
CN105516203A (en) * 2016-01-27 2016-04-20 北京博明信德科技有限公司 Safety methodology based on fingerprint scatter storage and system
CN105867141A (en) * 2016-03-30 2016-08-17 宁波三博电子科技有限公司 Intelligent home control method and system based on effective instruction scope
CN105867141B (en) * 2016-03-30 2019-02-01 上海汉枫电子科技有限公司 A kind of intelligent home furnishing control method and system based on effective instruction range
WO2018014263A1 (en) * 2016-07-20 2018-01-25 张志慧 Control method for intelligent humidifier
WO2018014262A1 (en) * 2016-07-20 2018-01-25 张志慧 Communication system
WO2018014265A1 (en) * 2016-07-20 2018-01-25 张志慧 Control system for smart humidifier
WO2018014255A1 (en) * 2016-07-20 2018-01-25 张志慧 Security control system for smart humidifier based on palmprint and cloud
CN106647300A (en) * 2016-11-30 2017-05-10 桂林师范高等专科学校 Indoor temperature intelligent detection and control method and system of smart home
CN109544173A (en) * 2017-08-16 2019-03-29 浙江绍兴苏泊尔生活电器有限公司 Air purifier and identity verification method and device thereof
CN108875337A (en) * 2017-12-12 2018-11-23 北京视联动力国际信息技术有限公司 A kind of unlocking method and system
CN113485141A (en) * 2021-07-21 2021-10-08 湖南世光实业有限公司 Intelligent furniture control system based on Internet of things
CN113836509A (en) * 2021-09-23 2021-12-24 百度在线网络技术(北京)有限公司 Information acquisition method and device, electronic equipment and storage medium
CN113836509B (en) * 2021-09-23 2024-03-01 百度在线网络技术(北京)有限公司 Information acquisition method, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN105160226B (en) 2018-09-07
WO2017031850A1 (en) 2017-03-02

Similar Documents

Publication Publication Date Title
CN105160226A (en) Method, apparatus and system of user identity verification and smart home
CN106991317B (en) Security verification method, platform, device and system
CN103116922B (en) Networking management system and management method for wireless gate lock
CN104394531A (en) Wireless network connecting method of a terminal device
CN109151820A (en) One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 "
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN103905194B (en) Identity traceability authentication method and system
CN104811428A (en) Method, device and system for verifying client identity by social relation data
CN105164689A (en) User authentication
CN105488875B (en) A kind of gate inhibition's verification method and device
CN104424676A (en) Identity information sending method, identity information sending device, access control card reader and access control system
CN105813072A (en) Terminal authentication method, system and cloud server
CN104853354A (en) Bluetooth authentication method and system thereof
CN112950201A (en) Node management method and related device applied to block chain system
CN107046516B (en) Wind control method and device for identifying mobile terminal identity
CN104601602A (en) Terminal device network security enhanced access and authentication method
CN104270754A (en) SIM authentication method and device
CN104469736A (en) Data processing method, server and terminal
CN105722084A (en) Authentication method based on embedded subscriber identity module, and terminal
CN106331010A (en) Network file access control method and device
CN105025548B (en) A kind of the connection control method and device of SIM card
CN104702573A (en) Home network terminal, automatic authentication method and automatic authentication system thereof
CN109495500A (en) A kind of double factor authentication method based on smart phone
CN104918244A (en) Terminal and terminal communication method
CN105704705A (en) Method for switching terminals with shared eSIM information, terminal and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant