CN117874734A - Identity authentication method, device, handwriting pen, terminal equipment and medium - Google Patents

Identity authentication method, device, handwriting pen, terminal equipment and medium Download PDF

Info

Publication number
CN117874734A
CN117874734A CN202311742458.XA CN202311742458A CN117874734A CN 117874734 A CN117874734 A CN 117874734A CN 202311742458 A CN202311742458 A CN 202311742458A CN 117874734 A CN117874734 A CN 117874734A
Authority
CN
China
Prior art keywords
handwriting
current user
identity authentication
information
terminal equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311742458.XA
Other languages
Chinese (zh)
Inventor
李朝
张如昌
徐崇龙
陈智豪
李国军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Xingji Meizu Technology Co ltd
Original Assignee
Wuhan Xingji Meizu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Xingji Meizu Technology Co ltd filed Critical Wuhan Xingji Meizu Technology Co ltd
Priority to CN202311742458.XA priority Critical patent/CN117874734A/en
Publication of CN117874734A publication Critical patent/CN117874734A/en
Pending legal-status Critical Current

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The disclosure relates to an identity authentication method, an identity authentication device, a handwriting pen, terminal equipment and a medium, and relates to the technical field of authentication. The method comprises the steps of establishing communication connection with terminal equipment, and receiving an identity authentication instruction of the terminal equipment for a current user; determining that the handwriting pen is matched with hardware information of the terminal equipment, and acquiring signature handwriting characteristics generated by signing the current user by the handwriting pen and biological identification characteristics of the current user; based on the signature handwriting characteristics and the biological identification characteristics, generating identity authentication information of the current user; the identity authentication information is sent to the terminal equipment, so that the terminal equipment authenticates the identity of the current user based on the identity authentication information, the identity of the user can be authenticated through the signature handwriting characteristics and the biological recognition characteristics of the user, authentication indexes are enriched, and the accuracy and the safety of the identity authentication are improved.

Description

Identity authentication method, device, handwriting pen, terminal equipment and medium
Technical Field
The disclosure relates to the technical field of authentication, and in particular relates to an identity authentication method, an identity authentication device, a handwriting pen, terminal equipment and a medium.
Background
At present, the terminal equipment performs authentication on the identity of the user mainly through signature handwriting of the user, and the authentication index is single, so that the authentication result is inaccurate, the authentication error or failure often occurs, the signature handwriting is easy to imitate by a person, and the security of the identity authentication is reduced.
Disclosure of Invention
In order to solve the technical problems, the disclosure provides an identity authentication method, an identity authentication device, a handwriting pen, terminal equipment and a medium.
A first aspect of the present disclosure provides an identity authentication method, applied to a handwriting pen, including:
establishing communication connection with terminal equipment, and receiving an identity authentication instruction of the terminal equipment for a current user;
determining that the handwriting pen is matched with hardware information of the terminal equipment, and acquiring signature handwriting characteristics generated by signing the current user by the handwriting pen and biological identification characteristics of the current user;
based on the signature handwriting characteristics and the biological identification characteristics, generating identity authentication information of the current user;
and sending the identity authentication information to the terminal equipment so that the terminal equipment authenticates the identity of the current user based on the identity authentication information.
A second aspect of the present disclosure provides an identity authentication method, applied to a terminal device, including:
responding to an identity authentication request of an application program in the terminal equipment to a current user, and generating an identity authentication instruction of the current user;
establishing communication connection with a handwriting pen, sending an identity authentication instruction to the handwriting pen so that the handwriting pen can determine that the handwriting pen is matched with hardware information of the terminal equipment, and generating identity authentication information of the current user based on signature handwriting characteristics generated by signing the current user with the handwriting pen and biological identification characteristics of the current user;
receiving identity authentication information of a current user sent by a handwriting pen;
and authenticating the identity of the current user based on the identity authentication information.
A third aspect of the present disclosure provides an identity authentication device, including:
the first receiving module is used for establishing communication connection with the terminal equipment and receiving an identity authentication instruction of the terminal equipment for the current user;
the acquisition module is used for determining that the handwriting pen is matched with the hardware information of the terminal equipment, and acquiring signature handwriting characteristics generated by signing the current user by using the handwriting pen and biological identification characteristics of the current user;
the first generation module is used for generating the identity authentication information of the current user based on the signature handwriting characteristics and the biological recognition characteristics;
and the first sending module is used for sending the identity authentication information to the terminal equipment so that the terminal equipment authenticates the identity of the current user based on the identity authentication information.
A fourth aspect of the present disclosure provides an identity authentication device, including:
the second generation module is used for responding to an identity authentication request of an application program in the terminal equipment to the current user and generating an identity authentication instruction of the current user;
the second sending module is used for establishing communication connection with the handwriting pen and sending an identity authentication instruction to the handwriting pen so that the handwriting pen can determine that the handwriting pen is matched with hardware information of the terminal equipment;
the second receiving module is used for receiving the identity authentication information of the current user sent by the handwriting pen;
and the authentication module is used for extracting signature handwriting characteristics and biological recognition characteristics of the current user from the identity authentication information so as to authenticate the identity of the current user.
A fifth aspect of the present disclosure provides a stylus comprising a memory and a processor, wherein the memory stores a computer program which, when executed by the processor, implements the identity authentication method of the first aspect.
A sixth aspect of the present disclosure provides a terminal device comprising a memory and a processor, wherein the memory stores a computer program, which when executed by the processor, enables the identity authentication method of the second aspect to be implemented.
Compared with the prior art, the technical scheme provided by the disclosure has the following advantages:
the method comprises the steps of establishing communication connection with terminal equipment, and receiving an identity authentication instruction of the terminal equipment for a current user; determining that the handwriting pen is matched with hardware information of the terminal equipment, and acquiring signature handwriting characteristics generated by signing the current user by the handwriting pen and biological identification characteristics of the current user; based on the signature handwriting characteristics and the biological identification characteristics, generating identity authentication information of the current user; the identity authentication information is sent to the terminal equipment, so that the terminal equipment authenticates the identity of the current user based on the identity authentication information, the identity of the user can be authenticated through the signature handwriting characteristics and the biological recognition characteristics of the user, authentication indexes are enriched, and the accuracy and the safety of the identity authentication are improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments of the present disclosure or the solutions in the prior art, the drawings that are required for the description of the embodiments or the prior art will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
Fig. 1 is a flowchart of an identity authentication method provided in an embodiment of the present disclosure;
FIG. 2 is a flow chart of another method of authentication provided by an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an identity authentication device according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of another authentication device according to an embodiment of the present disclosure.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, a further description of aspects of the present disclosure will be provided below. It should be noted that, without conflict, the embodiments of the present disclosure and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced otherwise than as described herein; it will be apparent that the embodiments in the specification are only some, but not all, embodiments of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order and/or performed in parallel. Furthermore, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those of ordinary skill in the art will appreciate that "one or more" is intended to be understood as "one or more" unless the context clearly indicates otherwise.
In order to better understand the inventive concepts of the embodiments of the present disclosure, the technical solutions of the embodiments of the present disclosure are described below in conjunction with exemplary embodiments.
Fig. 1 is a flowchart of an identity authentication method provided in an embodiment of the present disclosure, which may be performed by a stylus that may be understood as any device with computing functionality and processing capabilities having handwriting functionality. As shown in fig. 1, the method provided in this embodiment includes the following steps:
step 110, establishing communication connection with the terminal equipment, and receiving an identity authentication instruction of the terminal equipment for the current user.
In the embodiment of the disclosure, the stylus may establish a communication connection, such as a bluetooth connection, with the terminal device, and then receive an authentication instruction sent by the terminal device for the current user.
The identity authentication instruction may be understood as an instruction to verify the authority of the user identity.
And 120, determining that the handwriting pen is matched with the hardware information of the terminal equipment, and acquiring signature handwriting characteristics generated by signing the current user with the handwriting pen and the biological recognition characteristics of the current user.
In the embodiment of the disclosure, after the identity authentication instruction is obtained, the handwriting pen can judge whether the handwriting pen is matched with the hardware information of the terminal equipment, and when the fact that the handwriting pen is matched with the hardware information of the terminal equipment is determined, signature handwriting characteristics generated by signing the current user with the handwriting pen and biological identification characteristics of the current user are obtained.
The signature handwriting feature may include at least one of signed dynamics information, signed movement trace information. For example, a pressure sensor in a stylus may collect signed force information and a gyroscope in the stylus may collect signed motion profile information.
The biometric characteristic may include at least one of a fingerprint characteristic, an iris characteristic, a facial characteristic.
In some embodiments, determining that the stylus matches hardware information of the terminal device may include steps 1201-1203:
step 1201, obtaining the device identifier of the terminal device from the identity authentication instruction.
In the embodiment of the disclosure, after the identity authentication instruction is obtained, the handwriting pen can obtain the equipment identifier of the terminal equipment from the identity authentication instruction. The device identification of the terminal device is understood to be identification information capable of uniquely identifying the terminal device.
Step 1202, comparing the device identifier of the terminal device with a preset device identifier pre-bound to the handwriting pen.
In the embodiment of the disclosure, the preset device identifier may be understood as a device identifier of at least one terminal device that is pre-bound to the handwriting pen, where the bound terminal device may perform data transmission with the handwriting pen.
The handwriting pen can compare the device identifier of the terminal device with a preset device identifier pre-bound by the handwriting pen.
Step 1203, determining that the stylus is matched with hardware information of the terminal device in response to the device identifier of the terminal device existing in the preset device identifiers.
In the embodiment of the disclosure, in response to the existence of the device identifier of the terminal device in the preset device identifier, the device identifier of the terminal device is the device identifier bound by the handwriting pen, and the handwriting pen can determine that the handwriting pen is matched with the hardware information of the terminal device.
And 130, generating the identity authentication information of the current user based on the signature handwriting characteristics and the biological recognition characteristics.
In the embodiment of the disclosure, the handwriting pen can generate the identity authentication information of the current user based on the signature handwriting characteristics and the biological recognition characteristics of the current user.
And 140, transmitting the identity authentication information to the terminal equipment so that the terminal equipment authenticates the identity of the current user based on the identity authentication information.
In the embodiment of the disclosure, the handwriting pen can send the identity authentication information of the current user to the terminal equipment, so that the terminal equipment authenticates the identity of the current user based on the identity authentication information.
In some embodiments, sending the identity authentication information to the terminal device may include steps 1401-1402:
step 1401, encrypting the identity authentication information based on a preset key to obtain encrypted identity authentication information.
In the embodiment of the disclosure, the handwriting pen is pre-stored with a preset key, and the identity authentication information of the current user can be encrypted based on the preset key to obtain the identity authentication information.
The preset key can be generated based on pre-stored signature handwriting characteristic information, pre-stored biological recognition characteristic information or pre-stored signature handwriting characteristic information and biological recognition characteristic information and respectively stored in the terminal equipment and the handwriting pen. The signature handwriting feature information may include signature handwriting features of at least one user and the biometric feature information may include biometric features of at least one user.
In some embodiments, the preset key may be generated based on pre-stored signature handwriting feature information and stored in the terminal device and the stylus, respectively.
In other embodiments, the preset key may be generated based on pre-stored biometric characteristic information and stored in the terminal device and the stylus, respectively.
In still other embodiments, the preset key may be generated based on pre-stored signature handwriting feature information and biometric feature information stored in advance and stored in the terminal device and the stylus, respectively.
In some embodiments, the stylus may generate and store a preset key, and then send the preset key to the terminal device.
In other embodiments, the terminal device may generate and store the preset key and then send the preset key to the stylus.
Specifically, the preset key may be generated by extracting (e.g., hash algorithm), combining, converting, etc. signature handwriting features and/or biometric features of at least one user.
Step 1402, the encrypted identity authentication information is sent to the terminal device, so that the terminal device authenticates the identity of the current user based on the encrypted identity authentication information and a preset key stored in the terminal device.
In the embodiment of the disclosure, a preset key is stored in the terminal device in advance. The handwriting pen can send the encrypted identity authentication information to the terminal equipment, and the terminal equipment can authenticate the identity of the current user based on the encrypted identity authentication information and a preset key stored by the terminal equipment.
Therefore, the accuracy and the safety of the identity authentication can be further improved.
According to the embodiment of the disclosure, communication connection is established between the handwriting pen and the terminal equipment, and an identity authentication instruction of the terminal equipment to a current user is received; determining that the handwriting pen is matched with hardware information of the terminal equipment, and acquiring signature handwriting characteristics generated by signing the current user by the handwriting pen and biological identification characteristics of the current user; based on the signature handwriting characteristics and the biological identification characteristics, generating identity authentication information of the current user; the identity authentication information is sent to the terminal equipment, so that the terminal equipment authenticates the identity of the current user based on the identity authentication information, the identity of the user can be authenticated through the signature handwriting characteristics and the biological recognition characteristics of the user, authentication indexes are enriched, and the accuracy and the safety of the identity authentication are improved.
Fig. 2 is a flowchart of an identity authentication method provided by an embodiment of the present disclosure, which may be performed by a terminal device, which may be understood as any device having computing functions and processing capabilities, including, but not limited to, mobile terminal devices such as smartphones, notebook computers, personal Digital Assistants (PDAs), tablet computers (PADs), portable Multimedia Players (PMPs), wearable devices, etc., and stationary electronic devices such as digital TVs, desktop computers, smart home devices, etc. As shown in fig. 2, the identity authentication method provided in this embodiment includes the following steps:
step 210, generating an identity authentication instruction of the current user in response to an identity authentication request of the application program in the terminal equipment for the current user.
In the embodiment of the disclosure, before or during the running of an application program in a terminal device, the identity of a current user needs to be authenticated, that is, the authority of the identity of the current user needs to be checked, whether the current user has the authority of using the application program or not is determined, the application program in the terminal device can generate an authentication request for the identity of the current user, and the terminal device can generate an authentication instruction for the identity of the current user in response to the authentication request for the identity of the current user by the application program in the terminal device.
And 220, establishing communication connection with the handwriting pen, and sending an identity authentication instruction to the handwriting pen so that the handwriting pen can determine that the handwriting pen is matched with the hardware information of the terminal equipment.
In the embodiment of the disclosure, the terminal device may establish a communication connection with the handwriting pen, and then send an authentication instruction to the handwriting pen for the identity of the current user, so that the handwriting pen determines that the handwriting pen is matched with the hardware information of the terminal device, and generates authentication information of the current user based on signature handwriting characteristics generated by signing the current user with the handwriting pen and biometric identification characteristics of the current user.
Step 230, receiving the identity authentication information of the current user sent by the handwriting pen.
In the embodiment of the disclosure, the terminal equipment can receive the identity authentication information of the current user sent by the handwriting pen.
Step 240, extracting signature handwriting characteristics and biological recognition characteristics of the current user from the identity authentication information of the current user to authenticate the identity of the current user.
In the embodiment of the disclosure, the identity authentication information of the current user may include signature handwriting characteristics generated by signing the current user with a handwriting pen and biometric characteristics of the current user. The terminal device may extract signature handwriting features and biometric features of the current user from the identity authentication information of the current user to authenticate the identity of the current user.
In some embodiments, extracting the signature handwriting feature and biometric feature of the current user from the identity authentication information of the current user to authenticate the identity of the current user may include steps 2401-2404:
step 2401, obtaining signature handwriting characteristics and biometric identification characteristics of the current user in the identity authentication information.
Step 2402, comparing the signature handwriting feature of the current user with the original signature handwriting feature in the original authentication information of the pre-stored authorized user, and comparing the biometric feature of the current user with the original biometric feature in the original authentication information of the pre-stored authorized user.
In the embodiment of the disclosure, original authentication information of an authorized user is prestored in a terminal device, and the original authentication information comprises original signature handwriting characteristics and original biological identification characteristics of the authorized user. An authorized user may be understood as a user having the right to use the application.
The terminal device may compare the signature handwriting feature of the current user with the original signature handwriting feature in the original authentication information of the pre-stored authorized user, and compare the biometric feature of the current user with the original biometric feature in the original authentication information of the pre-stored authorized user.
Step 2403, determining that the authentication of the current user is successful in response to the signature handwriting feature of the current user existing in the original signature handwriting feature and the biometric feature of the current user existing in the original biometric feature, or determining that the authentication of the current user is failed in response to the signature handwriting feature of the current user not existing in the original signature handwriting feature or the biometric feature of the current user not existing in the original biometric feature.
In the embodiment of the disclosure, when the signature handwriting characteristics of the current user exist in the original signature handwriting characteristics and the biometric characteristics of the current user exist in the original biometric characteristics, the terminal equipment can determine that the identity authentication of the current user is successful.
In the embodiment of the disclosure, when the signature handwriting feature of the current user does not exist in the original signature handwriting feature or the biometric feature of the current user does not exist in the original biometric feature, the terminal device can determine that the identity authentication of the current user fails.
In some embodiments, the handwriting pen has a signature handwriting feature collection function and a biometric feature collection function, before the signature handwriting feature and the biometric feature of the current user are extracted from the identity authentication information of the current user to authenticate the identity of the current user, the terminal device may send a first input instruction to the handwriting pen, so that the handwriting pen responds to the first input instruction, and generates original authentication information of the authorized user based on original signature handwriting features generated by signing the authorized user with the handwriting pen and original biometric features of the authorized user; the terminal device may then receive and store the original signature information of the authorized user sent by the stylus.
The terminal equipment has a biological recognition feature acquisition function, can acquire target biological recognition features of the authorized user in advance, and can compare the original biological recognition features of the authorized user in the original signature information with the target biological recognition features of the authorized user acquired in advance after the original signature information of the authorized user sent by the handwriting pen is received and stored;
responding to the consistency of the original biological recognition characteristic and the target biological recognition characteristic, the terminal equipment can display first prompt information that handwriting pen is successfully recorded into the original biological recognition characteristic;
in response to the original biometric characteristic being inconsistent with the target biometric characteristic, the terminal device may display a second prompt for failure of writing the original biometric characteristic with the handwriting pen, and prompt the authorized user to re-enter the original biometric characteristic with the handwriting pen.
In other embodiments, the terminal device has a biometric feature collection function, and before extracting the signature handwriting feature and the biometric feature of the current user from the identity authentication information of the current user to authenticate the identity of the current user, the terminal device may obtain the original biometric feature that is already input by the authorized user through the terminal device; sending a second input instruction to the handwriting pen so that the handwriting pen responds to the second input instruction to acquire original signature handwriting characteristics which authorize a user to sign by using the handwriting pen; receiving and storing original signature handwriting characteristics of an authorized user sent by a handwriting pen; and generating original authentication information of the authorized user based on the original biological identification characteristic and the original signature handwriting characteristic of the authorized user.
In other embodiments, extracting the signature handwriting feature and biometric feature of the current user from the identity authentication information of the current user to authenticate the identity of the current user may include steps 2411-2412:
step 2411, in response to the identity authentication information being encrypted information, decrypting the identity authentication information of the current user based on a preset key to obtain signature handwriting features and biometric features of the current user.
In the embodiment of the disclosure, the terminal device and the handwriting pen are pre-stored with a preset key, and the preset key can be generated based on pre-stored signature handwriting feature information, pre-stored biological recognition feature information or pre-stored signature handwriting feature information and biological recognition feature information and respectively stored in the terminal device and the handwriting pen.
If the identity authentication information of the current user is encrypted information by the handwriting pen based on a preset key, the terminal equipment can respond to the identity authentication information as the encrypted information and decrypt the identity authentication information of the current user based on the preset key to obtain signature handwriting characteristics and biological recognition characteristics of the current user.
Step 2412, authenticating the identity of the current user based on the signature handwriting features and the biometric features.
Therefore, the accuracy and the safety of the identity authentication can be further improved.
The embodiment of the disclosure generates an identity authentication instruction of a current user by responding to an identity authentication request of an application program in terminal equipment to the current user; establishing communication connection with the handwriting pen, and sending an identity authentication instruction to the handwriting pen so that the handwriting pen can determine that the handwriting pen is matched with hardware information of the terminal equipment; receiving identity authentication information of a current user sent by a handwriting pen; the signature handwriting characteristics and the biological identification characteristics of the current user are extracted from the identity authentication information to authenticate the identity of the current user, the identity of the user can be authenticated through the signature handwriting characteristics and the biological identification characteristics of the user, authentication indexes are enriched, and the accuracy and the safety of the identity authentication are improved.
Fig. 3 is a schematic structural diagram of an identity authentication device according to an embodiment of the present disclosure, where the device may be understood as the above-mentioned stylus or a part of functional modules in the above-mentioned stylus. As shown in fig. 3, the authentication apparatus 300 may include:
a first receiving module 310, configured to establish a communication connection with a terminal device, and receive an authentication instruction of the terminal device for a current user;
the obtaining module 320 is configured to determine that the handwriting pen is matched with the hardware information of the terminal device, and obtain signature handwriting characteristics generated by signing the current user with the handwriting pen and biometric characteristics of the current user;
a first generation module 330, configured to generate identity authentication information of the current user based on the signature handwriting feature and the biometric feature;
the first sending module 340 is configured to send the identity authentication information to the terminal device, so that the terminal device authenticates the identity of the current user based on the identity authentication information.
Optionally, the acquiring module includes:
the first acquisition sub-module is used for acquiring the equipment identifier of the terminal equipment from the identity authentication instruction;
the first comparison sub-module is used for comparing the equipment identifier with a preset equipment identifier which is pre-bound with the handwriting pen;
the first determining submodule is used for determining that the handwriting pen is matched with the hardware information of the terminal equipment in response to the fact that the equipment identifier exists in the preset equipment identifier.
Optionally, the first sending module includes:
the encryption sub-module is used for encrypting the identity authentication information based on a preset secret key to obtain encrypted identity authentication information;
the first sending sub-module is used for sending the encrypted identity authentication information to the terminal equipment so that the terminal equipment authenticates the identity of the current user based on the encrypted identity authentication information and a preset key stored by the terminal equipment;
the preset key is generated based on pre-stored signature handwriting characteristic information, pre-stored biological recognition characteristic information or pre-stored signature handwriting characteristic information and biological recognition characteristic information and is respectively stored in the terminal equipment and the handwriting pen.
Optionally, the signature handwriting feature includes at least one of signed dynamics information and signed motion trail information.
Optionally, the biometric characteristic includes at least one of a fingerprint characteristic, an iris characteristic, and a facial characteristic.
The identity authentication device provided in the embodiment of the present disclosure may implement the method of any one of the embodiments in fig. 1, and the implementation manner and the beneficial effects thereof are similar, and are not repeated herein.
Fig. 4 is a schematic structural diagram of an identity authentication device according to an embodiment of the present disclosure, where the device may be understood as the above-mentioned stylus or a part of functional modules in the above-mentioned stylus. As shown in fig. 4, the authentication apparatus 400 may include:
a second generating module 410, configured to generate an authentication instruction for the current user in response to an authentication request for the current user by an application program in the terminal device;
the second sending module 420 is configured to establish a communication connection with the handwriting pen, and send an identity authentication instruction to the handwriting pen, so that the handwriting pen determines that the handwriting pen matches with hardware information of the terminal device;
a second receiving module 430, configured to receive authentication information of a current user sent by the handwriting pen;
the authentication module 440 is configured to extract signature handwriting features and biometric features of the current user from the identity authentication information to authenticate the identity of the current user.
Optionally, the authentication module includes:
the second acquisition sub-module is used for acquiring signature handwriting characteristics and biological identification characteristics of the current user in the identity authentication information;
the second comparison sub-module is used for comparing the signature handwriting characteristics with the original signature handwriting characteristics in the original authentication information of the prestored authorized user and comparing the biological recognition characteristics with the original biological recognition characteristics in the original authentication information of the prestored authorized user;
the second determining submodule is used for determining that the identity authentication of the current user is successful in response to the existence of signature handwriting features in original signature handwriting features and the existence of biological recognition features in original biological recognition features; or alternatively, the first and second heat exchangers may be,
and the third determining submodule is used for determining that the identity authentication of the current user fails in response to the fact that the signature handwriting characteristics are not existed in the original signature handwriting characteristics or the biometric characteristics are not existed in the original biometric characteristics.
Optionally, the authentication module includes:
the second sending sub-module is used for sending a first input instruction to the handwriting pen so that the handwriting pen responds to the first input instruction and generates original authentication information of the authorized user based on original signature handwriting characteristics generated by the authorized user signing with the handwriting pen and original biological recognition characteristics of the authorized user;
and the first receiving sub-module is used for receiving and storing the original signature information of the authorized user sent by the handwriting pen.
Optionally, the authentication module includes:
the third comparison sub-module is used for comparing the original biological identification characteristics of the authorized user in the original signature information with the target biological identification characteristics of the authorized user acquired in advance;
the first display sub-module is used for responding to the consistency of the original biological recognition characteristics and the target biological recognition characteristics and displaying first prompt information that handwriting strokes are successfully recorded into the original biological recognition characteristics; or alternatively, the first and second heat exchangers may be,
and the second display sub-module is used for responding to the inconsistency of the original biological recognition characteristic and the target biological recognition characteristic, displaying second prompt information of failure of the handwriting pen to input the original biological recognition characteristic, and prompting an authorized user to input the original biological recognition characteristic in the handwriting pen again.
Optionally, the authentication module includes:
the third acquisition sub-module is used for acquiring original biological identification characteristics which are input by the authorized user;
the third sending submodule is used for sending a second input instruction to the handwriting pen so that the handwriting pen responds to the second input instruction to acquire original signature handwriting characteristics which are signed by the handwriting pen by an authorized user;
the second receiving sub-module is used for receiving and storing the original signature handwriting characteristics of the authorized user sent by the handwriting pen;
and the generation sub-module is used for generating the original authentication information of the authorized user based on the original biological identification characteristics and the original signature handwriting characteristics.
Optionally, the authentication module includes:
the decryption sub-module is used for responding to the identity authentication information as encryption information, decrypting the identity authentication information of the current user based on a preset key, and obtaining signature handwriting characteristics and biological recognition characteristics of the current user;
an authentication sub-module for authenticating the identity of the current user based on the signature handwriting features and the biometric features;
the preset key is generated based on pre-stored signature handwriting characteristic information, pre-stored biological recognition characteristic information or pre-stored signature handwriting characteristic information and biological recognition characteristic information and is respectively stored in the terminal equipment and the handwriting pen.
The identity authentication device provided in the embodiment of the present disclosure may implement the method of any one of the embodiments in fig. 2, and the implementation manner and the beneficial effects thereof are similar, and are not repeated herein.
The embodiment of the disclosure further provides a stylus pen, where the stylus pen includes a processor and a memory, where the memory stores a computer program, and when the computer program is executed by the processor, the method of any embodiment in fig. 1 may be implemented, and the implementation manner and the beneficial effects are similar, and are not repeated herein.
The embodiment of the present disclosure further provides a terminal device, including a memory and a processor, where the memory stores a computer program, and when the computer program is executed by the processor, the method of any one of the embodiments in fig. 2 may be implemented, and the implementation manner and the beneficial effect of the method are similar, and are not repeated herein.
The embodiments of the present disclosure provide a non-volatile computer readable storage medium, in which a computer program is stored, where when the computer program is executed by a processor, the method of any of the foregoing embodiments may be implemented, and the implementation manner and the beneficial effects are similar, and are not repeated herein.
The computer readable storage media described above can employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may include, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer programs described above may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer device, partly on the user's device, as a stand-alone software package, partly on the user's computer device and partly on a remote computer device or entirely on the remote computer device or server.
The foregoing description is only of the preferred embodiments of the present disclosure and description of the principles of the technology being employed. It will be appreciated by persons skilled in the art that the scope of the disclosure referred to in this disclosure is not limited to the specific combinations of features described above, but also covers other embodiments which may be formed by any combination of features described above or equivalents thereof without departing from the spirit of the disclosure. Such as those described above, are mutually substituted with the technical features having similar functions disclosed in the present disclosure (but not limited thereto).
Moreover, although operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. In certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limiting the scope of the present disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
The foregoing is merely a specific embodiment of the disclosure to enable one skilled in the art to understand or practice the disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown and described herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (16)

1. An identity authentication method, characterized by being applied to a handwriting pen, the method comprising:
establishing communication connection with terminal equipment, and receiving an identity authentication instruction of the terminal equipment for a current user;
determining that the handwriting pen is matched with the hardware information of the terminal equipment, and acquiring signature handwriting characteristics generated by signing the current user by using the handwriting pen and biological identification characteristics of the current user;
generating identity authentication information of the current user based on the signature handwriting characteristics and the biological recognition characteristics;
and sending the identity authentication information to the terminal equipment so that the terminal equipment authenticates the identity of the current user based on the identity authentication information.
2. The method of claim 1, wherein the determining that the stylus matches hardware information of the terminal device comprises:
acquiring the equipment identifier of the terminal equipment from the identity authentication instruction;
comparing the equipment identifier with a preset equipment identifier which is pre-bound with the handwriting pen;
and responding to the existence of the equipment identifier in the preset equipment identifier, and determining that the handwriting pen is matched with the hardware information of the terminal equipment.
3. The method according to claim 1, characterized in that said sending said authentication information to said terminal device comprises:
encrypting the identity authentication information based on a preset secret key to obtain encrypted identity authentication information;
the encrypted identity authentication information is sent to the terminal equipment, so that the terminal equipment authenticates the identity of the current user based on the encrypted identity authentication information and a preset key stored by the terminal equipment;
the preset key is generated based on pre-stored signature handwriting characteristic information, pre-stored biological recognition characteristic information or pre-stored signature handwriting characteristic information and biological recognition characteristic information and is respectively stored in the terminal equipment and the handwriting pen.
4. The method of claim 1, wherein the signature handwriting feature comprises at least one of signed dynamics information, signed movement trace information.
5. The method of claim 1, wherein the biometric characteristic comprises at least one of a fingerprint characteristic, an iris characteristic, a facial characteristic.
6. An identity authentication method, applied to a terminal device, comprising:
responding to an identity authentication request of an application program in the terminal equipment for a current user, and generating an identity authentication instruction for the current user;
establishing communication connection with a handwriting pen, and sending the identity authentication instruction to the handwriting pen so that the handwriting pen can determine that the handwriting pen is matched with hardware information of the terminal equipment;
receiving the identity authentication information of the current user sent by the handwriting pen;
and extracting signature handwriting characteristics and biological identification characteristics of the current user from the identity authentication information to authenticate the identity of the current user.
7. The method of claim 6, wherein the extracting signature handwriting features and biometric features of the current user from the identity authentication information to authenticate the identity of the current user comprises:
acquiring signature handwriting characteristics and biological identification characteristics of the current user in the identity authentication information;
comparing the signature handwriting characteristics with original signature handwriting characteristics in original authentication information of a prestored authorized user, and comparing the biological identification characteristics with original biological identification characteristics in the original authentication information of the prestored authorized user;
determining that the identity authentication of the current user is successful in response to the presence of the signature handwriting feature in the original signature handwriting feature and the presence of the biometric feature in the original biometric feature; or alternatively, the first and second heat exchangers may be,
and determining that the identity authentication of the current user fails in response to the original signature handwriting feature not having the signature handwriting feature or the original biometric feature not having the biometric feature.
8. The method of claim 7, wherein prior to extracting signature handwriting features and biometric features of a current user from the identity authentication information to authenticate the identity of the current user, the method further comprises:
sending a first input instruction to the handwriting pen so that the handwriting pen responds to the first input instruction, and generating original authentication information of the authorized user based on original signature handwriting characteristics generated by signing the authorized user with the handwriting pen and original biological recognition characteristics of the authorized user;
and receiving and storing the original signature information of the authorized user sent by the handwriting pen.
9. The method of claim 8, wherein after receiving and storing the original signature information of the authorized user sent by the stylus, the method further comprises:
comparing the original biological identification characteristics of the authorized user in the original signature information with the target biological identification characteristics of the authorized user, which are acquired in advance;
responding to the original biological recognition characteristic consistent with the target biological recognition characteristic, and displaying first prompt information that the handwriting pen successfully inputs the original biological recognition characteristic; or alternatively, the first and second heat exchangers may be,
and responding to the inconsistency of the original biological recognition characteristic and the target biological recognition characteristic, displaying second prompt information of failure of the handwriting pen to input the original biological recognition characteristic, and prompting the authorized user to input the original biological recognition characteristic in the handwriting pen again.
10. The method of claim 7, wherein prior to extracting signature handwriting features and biometric features of a current user from the identity authentication information to authenticate the identity of the current user, the method further comprises:
acquiring original biological identification characteristics which are input by the authorized user;
sending a second input instruction to the handwriting pen so that the handwriting pen responds to the second input instruction to acquire original signature handwriting characteristics of the authorized user for signing by the handwriting pen;
receiving and storing original signature handwriting characteristics of the authorized user sent by the handwriting pen;
and generating original authentication information of the authorized user based on the original biological recognition characteristics and the original signature handwriting characteristics.
11. The method of claim 6, wherein the extracting signature handwriting features and biometric features of the current user from the identity authentication information to authenticate the identity of the current user comprises:
decrypting the identity authentication information of the current user based on a preset key in response to the identity authentication information as encryption information to obtain signature handwriting characteristics and the biological recognition characteristics of the current user;
authenticating the identity of the current user based on the signature handwriting features and the biometric features;
the preset key is generated based on pre-stored signature handwriting characteristic information, pre-stored biological recognition characteristic information or pre-stored signature handwriting characteristic information and biological recognition characteristic information and is respectively stored in the terminal equipment and the handwriting pen.
12. An identity authentication device, comprising:
the first receiving module is used for establishing communication connection with the terminal equipment and receiving an identity authentication instruction of the terminal equipment for the current user;
the acquisition module is used for determining that the handwriting pen is matched with the hardware information of the terminal equipment, and acquiring signature handwriting characteristics generated by the current user by signing with the handwriting pen and biological identification characteristics of the current user;
the first generation module is used for generating the identity authentication information of the current user based on the signature handwriting characteristics and the biological recognition characteristics;
and the first sending module is used for sending the identity authentication information to the terminal equipment so that the terminal equipment authenticates the identity of the current user based on the identity authentication information.
13. An identity authentication device, comprising:
the second generation module is used for responding to an identity authentication request of an application program in the terminal equipment for a current user and generating an identity authentication instruction for the current user;
the second sending module is used for establishing communication connection with a handwriting pen and sending the identity authentication instruction to the handwriting pen so that the handwriting pen can determine that the handwriting pen is matched with hardware information of the terminal equipment;
the second receiving module is used for receiving the identity authentication information of the current user sent by the handwriting pen;
and the authentication module is used for extracting signature handwriting characteristics and biological recognition characteristics of the current user from the identity authentication information so as to authenticate the identity of the current user.
14. A stylus, comprising:
a memory and a processor, wherein the memory has stored therein a computer program which, when executed by the processor, implements the authentication method according to any of claims 1-5.
15. A terminal device, comprising:
a memory and a processor, wherein the memory has stored therein a computer program which, when executed by the processor, implements the authentication method according to any of claims 6-11.
16. A non-transitory computer readable storage medium, characterized in that the storage medium has stored therein a computer program which, when executed by a processor, implements the authentication method according to any of claims 1-11.
CN202311742458.XA 2023-12-15 2023-12-15 Identity authentication method, device, handwriting pen, terminal equipment and medium Pending CN117874734A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311742458.XA CN117874734A (en) 2023-12-15 2023-12-15 Identity authentication method, device, handwriting pen, terminal equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311742458.XA CN117874734A (en) 2023-12-15 2023-12-15 Identity authentication method, device, handwriting pen, terminal equipment and medium

Publications (1)

Publication Number Publication Date
CN117874734A true CN117874734A (en) 2024-04-12

Family

ID=90582048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311742458.XA Pending CN117874734A (en) 2023-12-15 2023-12-15 Identity authentication method, device, handwriting pen, terminal equipment and medium

Country Status (1)

Country Link
CN (1) CN117874734A (en)

Similar Documents

Publication Publication Date Title
KR102371997B1 (en) Information processing terminal, method, and system including information processing terminal
US9218473B2 (en) Creation and authentication of biometric information
US10027641B2 (en) Method and apparatus of account login
CN107864118B (en) Login verification method, system and computer readable storage medium
US20150358317A1 (en) Behavioral Authentication System using a biometric fingerprint sensor and User Behavior for Authentication
US20110264919A1 (en) Dynamic seed and key generation from biometric indicia
US20210266171A1 (en) Method and system for operating internet of things device
US9830445B1 (en) Personal identification number (PIN) replacement in a one-time passcode based two factor authentication system
EP2628133B1 (en) Authenticate a fingerprint image
US20180204049A1 (en) Manual signature authentication system and method
US11449586B2 (en) Authenticated intention
CN109145628B (en) Data acquisition method and system based on trusted execution environment
KR102317598B1 (en) Server, method for controlling the server and terminal apparatus
KR101052294B1 (en) Apparatus and method for contents security
WO2017071498A1 (en) Identity authentication method and device
US11706032B2 (en) Method and apparatus for user authentication
US11681787B1 (en) Ownership validation for cryptographic asset contracts using irreversibly transformed identity tokens
WO2016165537A1 (en) Method for controlling intelligent terminal and apparatus for controlling intelligent terminal
KR101500947B1 (en) Creation and authentication of biometric information
CN117874734A (en) Identity authentication method, device, handwriting pen, terminal equipment and medium
US11496469B2 (en) Apparatus and method for registering biometric information, apparatus and method for biometric authentication
CN106161365B (en) Data processing method and device and terminal
CN114238909A (en) Virtual asset storage method and device and virtual asset query method and device
CN114969777A (en) File access control method and device, electronic equipment and storage medium
KR20190052405A (en) Computer security system and method using authentication function in smart phone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination