WO2017041458A1 - 身份识别方法、发送端、接收端、可穿戴设备及身份识别*** - Google Patents
身份识别方法、发送端、接收端、可穿戴设备及身份识别*** Download PDFInfo
- Publication number
- WO2017041458A1 WO2017041458A1 PCT/CN2016/075372 CN2016075372W WO2017041458A1 WO 2017041458 A1 WO2017041458 A1 WO 2017041458A1 CN 2016075372 W CN2016075372 W CN 2016075372W WO 2017041458 A1 WO2017041458 A1 WO 2017041458A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identity
- user
- feature information
- digital signal
- identified
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/38—Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
- H04B1/3827—Portable transceivers
- H04B1/385—Transceivers carried on the body, e.g. in helmets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/33—Security of mobile devices; Security of mobile applications using wearable devices, e.g. using a smartwatch or smart-glasses
Definitions
- the present disclosure relates to the field of identity recognition technologies, and in particular, to an identity identification method, a sender, a receiver, a wearable device, and an identity recognition system.
- Recognition techniques such as iris recognition and fingerprint recognition have been widely used in various identification or authentication scenarios.
- fingerprint recognition the user needs to place his or her finger in the specified sensing area of the collecting device, so that the collecting device can collect the fingerprint information of the user; and then, the collecting device uses the fingerprint information of the user and the preset fingerprint information database. The fingerprint information in the comparison is compared to finally determine the identity of the user.
- the identity information of the user for example, the fingerprint information is easily left on the collection device, thereby causing the non-user to copy the identity information of the user, which may cause hidden danger to the user's information security.
- Embodiments of the present disclosure provide an identity identification method, a sender for receiving an identity, a receiver, a wearable device, and an identity recognition system, which can prevent user information from leaking during the identity recognition process and improve the security of identity recognition. .
- an identification method including:
- the sender collects identity feature information of the user to be identified, and the identity feature information is used to uniquely identify the identity of the user to be identified;
- the transmitting end converts the identity feature information into a digital signal
- the sending end converts the identity feature information into a digital signal, including:
- the transmitting end converts the electrical digital signal into a digital optical signal with a light wave as a carrier by electro-optical conversion.
- the transmitting end converts the identity feature information into an electrical digital signal that is a carrier by using an electrical signal by using analog-to-digital conversion
- the method further includes:
- the transmitting end encrypts the electrical digital signal.
- the identity feature information includes at least one of heart rate information, vein feature information, fingerprint information, sound information, and iris information.
- the sending end sends the digital signal to the receiving end, including:
- the transmitting end carries the digital signal in a first instruction triggered by the user to be identified, and the first instruction is used to instruct the receiving end to execute a program corresponding to the first instruction;
- the transmitting end sends the first instruction to the receiving end.
- an identification method including:
- the receiving end wirelessly receives the digital signal sent by the transmitting end
- the receiving end extracts identity feature information of the user to be identified from the digital signal, where the identity feature information is used to uniquely identify the identity of the user to be identified;
- the receiving end searches for a first identity feature information that matches the identity feature information in a pre-stored feature database; and if the first identity feature information that matches the identity feature information is stored, the The identity of the user to be identified.
- the receiving end receives the sending end to send a digital signal, including:
- the method further includes:
- the receiving end executes a program corresponding to the first instruction.
- some embodiments of the present disclosure provide a transmitting end, including:
- An acquiring unit configured to collect identity feature information of the user to be identified, where the identity feature information is used to uniquely identify the identity of the user to be identified;
- a converting unit configured to convert the identity feature information into a digital signal
- a sending unit configured to send the digital signal to the receiving end by using a wireless manner, so that the receiving end extracts identity characteristic information of the user to be identified from the digital signal, and performs a location according to the identity feature information. Identify the identified user for identification.
- the converting unit is specifically configured to convert the identity feature information into an electrical digital signal with an electrical signal as a carrier and convert the electrical digital signal into a light wave by analog-to-digital conversion.
- the sending end further includes:
- an encryption unit configured to encrypt the electrical digital signal.
- the sending end further includes an adding unit,
- the adding unit is configured to carry the digital signal in a first instruction triggered by the user to be identified, where the first instruction is used to instruct the receiving end to execute a program corresponding to the first instruction;
- the sending unit is specifically configured to send the first instruction to the receiving end.
- the sending end is a wearable device.
- some embodiments of the present disclosure provide a receiving end, including:
- a receiving unit configured to receive a digital signal sent by the transmitting end
- An extracting unit configured to extract identity feature information of the user to be identified from the digital signal, The identity information is used to uniquely identify the identity of the user to be identified;
- a identifying unit configured to search, in a pre-stored feature database, whether first identity feature information matching the identity feature information is stored; if first identity feature information matching the identity feature information is stored, the authentication device Describe the identity of the identified user.
- the sending end further includes an execution unit,
- the receiving unit is specifically configured to receive a first instruction sent by the sending end, where the first instruction carries the digital signal;
- the execution unit is configured to execute a program corresponding to the first instruction.
- some embodiments of the present disclosure provide a wearable device including a processor, a first sensor, a second sensor, and a transceiver connected to the processor, the first sensor being disposed in the wearable a first surface of the device in contact with the skin of the user, the second sensor being disposed on a surface opposite the first surface;
- the first sensor and the second sensor are configured to collect identity feature information of the user to be identified, where the identity feature information is used to uniquely identify the identity of the user to be identified;
- the processor is configured to convert the identity feature information into a digital signal
- the transceiver is configured to send the digital signal to the receiving end by using a wireless manner, so that the receiving end extracts identity characteristic information of the user to be identified from the digital signal, and according to the identity feature information Identifying the user to be identified.
- the processor is specifically configured to: convert the identity feature information into an electrical digital signal that is a carrier by using an electrical signal, and convert the electrical digital signal into a light wave by analog-to-digital conversion The digital optical signal of the carrier; or for converting the identity characteristic information into an electrical digital signal with the electrical signal as a carrier by analog-to-digital conversion.
- the processor is further configured to: encrypt the electrical digital signal.
- the wearable device further includes a display, and the display is also disposed on a surface opposite to the first surface,
- the display is configured to display identity feature information of the user to be identified.
- the wearable device further includes a memory, and the memory is connected to the processor, the first sensor, and the second sensor.
- some embodiments of the present disclosure provide an identification system, including the transmitting end of any of the above, and the receiving end of any one of the above, wherein the transmitting end is in a wireless manner, wherein The transmitting end is independent of the receiving end.
- An embodiment of the present disclosure provides an identity identification method, a sender, a receiver, a wearable device, and an identity recognition system, where the sender collects identity feature information of the user to be identified, and the identity feature information is used to uniquely identify the user to be identified. And the sender converts the identity feature information into a digital signal; and sends the digital signal to the receiving end, so that the receiving end extracts the identity feature information of the user to be identified from the digital signal, and treats the identity feature information according to the identity feature information. Identify the user for identification. In this way, since the transmitting end is independent of the receiving end, that is, the transmitting end and the receiving end are not integrated, the transmitting end for collecting the user identity information is relative to the receiving end for identity identification.
- the device can be relatively moved, so that when the sender and the receiver interact with each other for identification, the sender can carry the identity information of the user in the digital signal and send it to the receiver for identification by wireless. Therefore, the possibility of directly leaving the user's identity feature information on the receiving end for identity recognition is avoided, thereby avoiding leakage of user information in the identity recognition process and improving the security of the identity recognition.
- FIG. 1 is a schematic flowchart of an identity recognition method according to some embodiments of the present disclosure
- FIG. 2 is a schematic flowchart of an identity recognition method according to some embodiments of the present disclosure
- FIG. 3 is a schematic flowchart of an identity recognition method according to some embodiments of the present disclosure.
- FIG. 4 is a schematic structural diagram of a transmitting end according to some embodiments of the present disclosure.
- FIG. 5 is a schematic structural diagram of a sending end according to some embodiments of the present disclosure.
- FIG. 6 is a schematic structural diagram of a sending end according to some embodiments of the present disclosure.
- FIG. 7 is a schematic structural diagram of a receiving end according to some embodiments of the present disclosure.
- FIG. 8 is a schematic structural diagram of a receiving end according to some embodiments of the present disclosure.
- FIG. 9 is a schematic structural diagram of a receiving end according to some embodiments of the present disclosure.
- FIG. 10 is a schematic structural diagram of a wearable device according to some embodiments of the present disclosure.
- FIG. 11 is a schematic structural diagram of a wearable device according to some embodiments of the present disclosure.
- FIG. 12 is a schematic structural diagram of a wearable device according to some embodiments of the present disclosure.
- FIG. 13a is a front view of a wearable watch according to some embodiments of the present disclosure.
- Figure 13b is a top plan view of the wearable watch of Figure 13a;
- FIG. 14 is a schematic structural diagram of an identity recognition system according to some embodiments of the present disclosure.
- first and second are used for descriptive purposes only, and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated.
- features defining “first” and “second” may include one or more of the features either explicitly or implicitly.
- a plurality of means two or more unless otherwise stated.
- Some embodiments of the present disclosure provide an identification method, as shown in FIG. 1, including:
- the sender collects identity feature information of the user to be identified, where the identity feature information is used to uniquely identify the identity of the user to be identified.
- the transmitting end converts the identity feature information into a digital signal
- the transmitting end sends the digital signal to the receiving end, so that the receiving end is from the digital signal.
- the identity feature information of the user to be identified is extracted, and the user to be identified is identified according to the identity feature information.
- the sending end of the embodiment of the present disclosure may specifically be a wearable device, such as a wearable watch, a wearable wristband, a wearable helmet, etc., of course, the sending end may also be a mobile phone, a tablet computer, a notebook computer, or the like.
- the device of the present disclosure does not impose any limitation on the device such as an ultra-mobile personal computer (UMPC), a netbook, or a personal digital assistant (PDA).
- UMPC ultra-mobile personal computer
- PDA personal digital assistant
- the receiving end of the embodiment of the present disclosure may be a mobile phone, a tablet computer, a notebook computer, a UMPC, a netbook, a PDA, etc., and the embodiment of the present disclosure does not impose any limitation.
- the information security risk may be generated, and the identity information of the identity may be collected by the sending end, and sent through the sending end.
- the terminal sends the identity feature information to the receiving end, and the receiving end further identifies the user according to the identity feature information.
- the sending end may collect the identity feature information of the user to be identified through various types of sensors, where the identity feature information is used to uniquely identify the identity of the user to be identified.
- the unique identification of the identity of the user to be identified refers to a unique identification function within a certain range, for example, in a family, in a company, and the like.
- the identity feature information may specifically include at least one of heart rate information, vein feature information, fingerprint information, sound information, and iris information.
- At least one sensor may be disposed in the transmitting end, so as to collect the identity characteristic information of the user to be identified through the sensor.
- a temperature sensor and a fingerprint sensor are disposed in the transmitting end, so that the body temperature information of the user to be identified may be collected by the temperature sensor.
- the identity feature information includes body temperature information and fingerprint information of the user to be identified. Since the identity feature information is used to uniquely identify the identity of the user to be identified, the collected identity feature information can be used for identification of the user to be identified later.
- the identity feature information of the user to be identified may be pre-stored directly inside the sender.
- the fingerprint information and the sound information, etc. so that the sender can directly obtain the identity feature information of the user to be identified from its own storage unit, without acquiring the identity feature information through various sensors.
- the user to be identified may store the identity information of the user in the sender in advance.
- the operation sender may call the pre-stored identity feature information from the storage unit of the sender.
- step 102 the sender converts the identity feature information collected in step 101 into a digital signal.
- the transmitting end can convert the identity through analog-to-digital conversion.
- the characteristic information is converted into an electrical digital signal with the electrical signal as a carrier wave; further, the transmitting end can also convert the electrical digital signal into a digital optical signal with the optical wave as a carrier wave by electro-optical conversion.
- the transmitting end preferably converts the identity characteristic information into a digital optical signal with the optical wave as a carrier and transmits the digital optical signal to the receiving end.
- the transmitting end may directly convert the identity feature information into an electrical digital signal with the electrical signal as a carrier, and send the electrical digital signal to the receiving end. Since the electrical digital signal also includes the identity feature information, The receiving end can still extract the identity feature information of the user to be identified from the electrical digital signal for identity authentication.
- step 103 the transmitting end sends the digital signal (for example, a digital optical signal) generated in step 102 to the receiving end, so that the receiving end extracts the identity feature information of the user to be identified from the digital signal, because the identity feature The information is used to uniquely identify the identity of the user to be identified. Therefore, the receiving end can identify the user to be identified according to the identity feature information.
- the digital signal for example, a digital optical signal
- the light wave carrying the digital optical signal may be visible light or invisible light.
- Some embodiments of the present disclosure provide an identification method, as shown in FIG. 2, including:
- the receiving end receives the digital signal sent by the sending end.
- the receiving end extracts identity feature information of the user to be identified from the digital signal, where the identity feature information is used to uniquely identify an identity of the user to be identified;
- the receiving end searches, in the pre-stored feature database, whether the first identity feature information that matches the identity feature information is stored. If the first identity feature information that matches the identity feature information is stored, the user that is to be identified is authenticated. Identity.
- the receiving end receives the digital signal sent by the transmitting end, for example, a digital optical signal with a light wave as a carrier wave, or an electrical digital signal with the electrical signal as a carrier wave, and the digital signal carries the identity of the user to be identified.
- Characteristic information for example, heart rate information, vein information, sound information, and the like.
- step 202 the receiving end extracts the identity feature information of the to-be-identified user from the digital signal received in step 201, where the identity feature information is used to uniquely identify the identity of the user to be identified.
- the method for the receiving end to extract the identity feature information of the user to be identified may be the same as the inverse operation of converting the identity feature information into a digital signal in step 102.
- the receiving end can convert the digital optical signal into an electrical digital signal with an electrical signal as a carrier wave by photoelectric conversion; and further, the receiving end is converted by digital-to-analog. And converting the electrical digital signal into identity characteristic information of the user to be identified.
- step 203 the receiving end searches for a first identity feature information that matches the identity feature information extracted in step 202 in the pre-stored feature library.
- the feature library is pre-stored in the receiving end, and the feature database stores the identity feature information of the plurality of users.
- the feature library stores, for each authenticated user, a plurality of identity feature information, such as fingerprint information, pulse information, voice information, heart rate information, and iris information, etc.; and the extracted information items included in the identity feature information are characterized. A subset of the information items contained in the identity information stored in the library.
- the receiving end compares the identity feature information in the feature library with the identity feature information extracted in step 202, when At least one piece of information of the plurality of pieces of information included in the identity feature information extracted in step 202 is the same as at least one item corresponding to the first identity feature information of the first user in the feature database, or is extracted in step 202.
- the at least one piece of information may determine the identity feature information and the feature database of the user to be identified when the similarity of the at least one item corresponding to the first identity information of the first user in the feature database is greater than a certain threshold (for example, 98%) The first identity information of the first user is matched, and the receiving end authenticates by the identity of the user to be identified.
- a certain threshold for example, 98%
- the identity feature information extracted in step 202 includes only one piece of information; correspondingly, when the item information included in the identity feature information extracted in step 202 is found, the first in the feature library The item information corresponding to the first identity information of the user is the same, or the item information included in the identity feature information extracted in step 202 is corresponding to the first identity feature information of the first user in the feature database.
- a certain threshold for example, 98%), it may be determined that the identity feature information of the user to be identified matches the first identity feature information of the first user in the feature database, and the receiving end passes the user to be identified. Authentication.
- the feature library may further store a correspondence between the identity feature information of each authentication user and its corresponding authentication user identifier.
- the receiving end searches for at least one piece of information of the plurality of pieces of information included in the identity feature information extracted in step 202 in the feature library, and When the at least one information corresponding to the identity information of the first authentication user in the feature database is the same, the receiving end may determine that the user to be identified is the first authentication user; if the identity feature information extracted in step 202 includes only one Item information, when the receiving end finds the item information included in the identity feature information extracted in step 202 in the feature database, and is the same as the item information in the identity feature information of the first authentication user in the feature database, the receiving end Then, it can be determined that the user to be identified is the first authenticated user.
- an embodiment of the present disclosure provides an identity identification method, where a sender collects identity feature information of a user to be identified, and the identity feature information is used to uniquely identify an identity of a user to be identified; and further, the sender converts identity feature information And the digital signal is sent to the receiving end, so that the receiving end extracts the identity feature information of the user to be identified from the digital signal, and identifies the user to be identified according to the identity feature information.
- the transmitting end is independent of the receiving end, that is, the transmitting end and the receiving end are not integrated, the transmitting end for collecting the user identity information is relative to the receiving end for identity identification.
- the sender can carry the identity information of the user in the digital signal and send it to the receiver for identification by wireless, thus avoiding directly leaving the identity information of the user.
- the possibility of being used on the receiving end for identification further avoids leakage of user information during the identification process and improves the security of the identification.
- Some embodiments of the present disclosure provide an identification method, as shown in FIG. 3, including:
- the sending end collects identity feature information of the user to be identified, where the identity feature information is used to uniquely identify the identity of the user to be identified.
- the transmitting end encrypts the identity feature information, and converts the digital light signal into a digital optical signal that is a carrier wave.
- the transmitting end carries the digital optical signal in the first instruction and sends the digital optical signal to the receiving end.
- the receiving end receives a first instruction that is sent by the sending end and carries a digital optical signal.
- the receiving end decrypts the digital optical signal, so that the receiving end extracts identity feature information of the user to be identified, where the identity feature information is used to uniquely identify the identity of the user to be identified.
- the receiving end searches, in the pre-stored feature database, whether the first identity feature information that matches the identity feature information is stored. If the first identity feature information that matches the identity feature information is stored, the user that is to be identified is authenticated. Identity; and
- the receiving end executes a program corresponding to the first instruction according to the identity of the user to be identified.
- step 301 when the user to be identified triggers the corresponding function key of the transmitting end, the transmitting end generates a corresponding first instruction, wherein the first instruction is used to instruct the receiving end to execute a program corresponding to the first instruction.
- the triggering terminal when the user to be identified clicks the button of the remote control receiving card in the screen of the sender, the triggering terminal generates a first instruction, that is, instructs the receiving end to execute the card punching program.
- the sending end may collect the identity feature information of the user to be identified through various types of sensors, where the identity feature information is used to uniquely identify the identity of the user to be identified.
- the identity feature information may specifically include at least one of heart rate information, vein feature information, fingerprint information, sound information, and iris information.
- step 302 the transmitting end converts the identity feature information collected in step 301 into a digital optical signal with a light wave as a carrier.
- the transmitting end may first convert the identity characteristic information into an electrical digital signal with the electrical signal as a carrier by analog-to-digital conversion;
- the electrical digital signal is encrypted, and the encrypted electrical digital signal is converted by electro-optical conversion to convert the electrical digital signal into a digital optical signal with a light wave as a carrier.
- step 303 the transmitting end carries the digital optical signal obtained in step 302 in the first instruction, and sends the first instruction to the receiving end, so that the receiving end extracts the user to be identified according to the first instruction.
- the identity characteristic information if the identity of the user to be identified is authenticated, the program corresponding to the first instruction can be executed.
- the sending end encrypts the identity feature information of the user to be identified, and carries it in the digital optical signal with the optical wave as the carrier wave, and sends it to the receiving end for identification by the directional propagation mode of the optical communication. Therefore, the possibility of directly leaving the user's identity information on the collection device is avoided, and the security of the identity is improved.
- step 304 the receiving end receives the first instruction sent by the sending end in step 303, where the first instruction carries the digital optical signal.
- step 305 the receiving end extracts identity characteristic information of the user to be identified from the digital optical signal, and the identity feature information is used to uniquely identify the identity of the user to be identified.
- the receiving end can convert the digital optical signal into an electrical digital signal with the electrical signal as a carrier by photoelectric conversion; further, since the transmitting end encrypts the electrical digital signal by modulation in step 302, The receiving end decrypts the electrical digital signal by demodulation, and finally converts the electrical digital signal into the identity characteristic information of the user to be identified through digital-to-analog conversion.
- the feature library stores its multiple identity feature information for each authenticated user, and the information items included in the identity feature information extracted in step 305 are included in the identity feature information of the authenticated user stored in the feature database. A subset of information items.
- the correspondence between the identity feature information of each authenticated user and the identifier of the corresponding authenticated user is stored in the feature library of the receiving end, if the step is The identity feature information extracted in 305 includes a plurality of pieces of information, and the receiving end searches for at least one of the plurality of pieces of information included in the identity feature information extracted in step 305 in the feature library, and the first in the feature library.
- the receiving end may determine that the user to be identified is the first authentication user; if the identity feature information extracted in step 305 includes only one piece of information, when receiving When the terminal finds the item information included in the identity feature information extracted in step 305 in the feature database, and the item information in the identity feature information of the first authentication user in the feature database is the same, the receiving end may determine the waiting information. Identifying the user is the first authenticated user.
- the feature library stores a correspondence between the identifier of the authenticated user and the identity feature information of the authenticated user, where the identity feature information of the authenticated user specifically includes fingerprint information, pulse information, voice information, body temperature information, and iris of the authenticated user. information.
- the identity feature information extracted in step 305 includes fingerprint information
- the fingerprint information is compared with the fingerprint information in the identity feature information of each authentication user stored in the feature database, if the fingerprint information is related to the first authentication user. If the fingerprint information is the same, it can be determined that the user to be identified is the first authenticated user.
- the user to be identified is The identity cannot be authenticated, that is, the identity fails; or if the identity feature information extracted in step 305 contains only one piece of information, and the information contained in the identity information of each authentication user in the feature database is not When the same, the identity of the user to be identified cannot be authenticated, that is, the identity fails.
- the feature library may be stored in the sending end.
- the sending end collects the identity feature information of the user to be identified
- the identity of the user to be identified may be identified. If the identification of the identified user fails, it is no longer necessary to send the first instruction to the receiving end.
- the receiving end may execute a program corresponding to the first instruction according to the identity of the user to be identified.
- step 301 is used. If the identity of the user to be identified is successful, the first instruction instructs the receiving end to execute the punching program, so the receiving end can play the user to be identified at this time. card.
- the digital signal is an optical digital signal as an example.
- the digital signal may be an electrical digital signal, that is, the electrical digital signal is directly encrypted and carried in the first instruction without performing electro-optical conversion, and the first instruction is sent to the receiving end; Correspondingly, the receiving end does not need to perform photoelectric conversion, and only needs to decrypt the electrical digital signal in the first instruction to obtain the identity characteristic information of the user to be authenticated.
- an embodiment of the present disclosure provides an identity identification method, where a sender collects identity feature information of a user to be identified, and the identity feature information is used to uniquely identify an identity of a user to be identified; and further, the sender converts identity feature information And the digital signal is sent to the receiving end, so that the receiving end extracts the identity feature information of the user to be identified from the digital signal, and identifies the user to be identified according to the identity feature information.
- the transmitting end is independent of the receiving end, that is, the transmitting end and the receiving end are not integrated, the transmitting end for collecting the user identity information is relative to the receiving end for identity identification.
- the device can be relatively moved, so that when the sender and the receiver interact with each other for identification, the sender can carry the identity information of the user in the digital signal and send it to the receiver for identification by wireless. Therefore, the possibility of directly leaving the user's identity feature information on the receiving end for identity recognition is avoided, thereby avoiding leakage of user information in the identity recognition process and improving the security of the identity recognition.
- FIG. 4 is a schematic structural diagram of a transmitting end 01 according to some embodiments of the present disclosure.
- the sending end 01 provided in the embodiment of the present disclosure may be used to implement the method implemented in the foregoing embodiments shown in FIG. 1 to FIG. It is to be noted that only the parts related to the embodiments of the present disclosure are shown, and the specific technical details are not disclosed. Please refer to the embodiments of the present disclosure shown in FIG. 1 to FIG.
- the sending end 01 can be a wearable device, for example, a wearable watch, a wearable wristband, a wearable helmet, etc., of course, the sending end 01 can also be a mobile phone, a tablet computer, a notebook computer, a UMPC, a netbook, a PDA, and the like.
- the embodiment of the present disclosure does not impose any limitation on this.
- a sending end 01 including:
- the collecting unit 11 is configured to collect identity feature information of the user to be identified, and the identity feature information Used to uniquely identify the identity of the user to be identified;
- the converting unit 12 is configured to convert the identity feature information into a digital signal
- the sending unit 13 is configured to send the digital signal to the receiving end by using a wireless manner, so that the receiving end extracts identity characteristic information of the user to be identified from the digital signal, and according to the identity feature information The user to be identified performs identification.
- the converting unit 12 is specifically configured to convert the identity feature information into an electrical digital signal with an electrical signal as a carrier by analog-to-digital conversion and convert the electrical digital signal into a light wave by electro-optical conversion.
- a digital optical signal of the carrier wherein the digital signal is the digital optical signal; or used to convert the identity characteristic information into an electrical digital signal with an electrical signal as a carrier by analog-to-digital conversion.
- the digital signal is the electrical digital signal.
- the sending end further includes:
- An encryption unit 14 configured to encrypt the electrical digital signal
- the encryption unit 14 encrypts the electrical digital signal after performing analog-to-digital conversion; if the digital signal is a digital optical signal, the encryption unit 14 after analog-to-digital conversion The electrical digital signal is encrypted prior to electro-optical conversion.
- the sending end further includes an adding unit 15,
- the adding unit 15 is configured to carry the digital signal in a first instruction triggered by the user to be identified, where the first instruction is used to instruct the receiving end to execute a program corresponding to the first instruction;
- the sending unit 13 is specifically configured to send the first instruction to the receiving end.
- the sending end is a wearable device.
- FIG. 7 is a schematic structural diagram of a receiving end 02 according to some embodiments of the present disclosure.
- the receiving end 02 provided in the embodiment of the present disclosure may be used to implement the methods implemented in the foregoing embodiments shown in FIG. 1 to FIG. 3, for convenience of description. Only parts related to the embodiments of the present disclosure are shown, and the specific technical details are not disclosed. Please refer to the embodiments of the present disclosure shown in FIGS.
- the receiving end 02 can be a device such as a mobile phone, a tablet computer, a notebook computer, a UMPC, a netbook, a PDA, etc., and the embodiment of the present disclosure does not impose any limitation.
- some embodiments of the present disclosure provide a receiving end 02, including:
- the receiving unit 21 is configured to receive a digital signal sent by the transmitting end
- the extracting unit 22 is configured to extract, from the digital signal, identity feature information of the user to be identified, where the identity feature information is used to uniquely identify the identity of the user to be identified;
- the identifying unit 23 is configured to search, in a pre-stored feature database, whether the first identity feature information that matches the identity feature information is stored, and if the first identity feature information that matches the identity feature information is stored, The identity of the user to be identified.
- the sending end further includes an executing unit 24,
- the receiving unit 21 is specifically configured to receive a first instruction sent by the sending end, where the first instruction carries the digital signal;
- the executing unit 24 is configured to execute a program corresponding to the first instruction.
- the transmitting end may further include a decrypting unit 25, configured to decrypt the digital signal received by the receiving unit 21, so that the extracting unit 22 extracts the user to be identified from the digital signal. Identity characteristics information.
- the embodiment of the present disclosure provides a sender and a receiver for identity identification, where the sender collects identity feature information of the user to be identified, and the identity feature information is used to uniquely identify the identity of the user to be identified; Converting the identity information into a digital signal; and transmitting the digital signal to the receiving end, so that the receiving end extracts the identity feature information of the user to be identified from the digital signal, and identifies the user to be identified according to the identity feature information.
- the transmitting end is independent of the receiving end, that is, the transmitting end and the receiving end are not integrated, the transmitting end for collecting the user identity information is relative to the receiving end for identity identification.
- the device can be relatively moved, so that when the sender and the receiver interact with each other for identification, the sender can carry the identity information of the user in the digital signal and send it to the receiver for identification by wireless. Therefore, the possibility of directly leaving the user's identity feature information on the receiving end for identity recognition is avoided, thereby avoiding leakage of user information in the identity recognition process and improving the security of the identity recognition.
- FIG. 10 is a schematic structural diagram of a wearable device 03 according to some embodiments of the present disclosure.
- the wearable device 03 provided by the embodiment can be used to implement the method implemented by the embodiments of the present disclosure.
- the parts related to the embodiment of the present disclosure are shown, and the specific technical details are not disclosed, please refer to the figure.
- FIG. 1 Embodiments of the present disclosure shown in FIG.
- the wearable device 03 can be a wearable watch, a wearable wristband, a wearable helmet, etc., and the embodiment of the present disclosure does not limit this.
- some embodiments of the present disclosure provide a wearable device 03, including a processor 31, at least one first sensor 32, a second sensor 33, and a transceiver connected to the processor. 34.
- the first sensor 32 is disposed on a first surface of the wearable device in contact with the skin of the user, and the second sensor 33 is disposed on a surface opposite to the first surface.
- the first sensor 32 and the second sensor 33 are configured to collect identity feature information of the user to be identified, where the identity feature information is used to uniquely identify the identity of the user to be identified;
- the processor 31 is configured to convert the identity feature information into a digital signal
- the transceiver 34 is configured to send the digital signal to the receiving end by using a wireless manner, so that the receiving end extracts identity characteristic information of the user to be identified from the digital signal, and according to the identity feature The information identifies the user to be identified.
- the identity feature information may specifically include at least one of heart rate information, vein feature information, fingerprint information, sound information, and iris information.
- the processor 31 is further configured to: convert the identity feature information into an electrical digital signal with an electrical signal as a carrier by analog-to-digital conversion, and convert the electrical digital signal into a light wave by electro-optical conversion The digital optical signal of the carrier; or for converting the identity characteristic information into an electrical digital signal with the electrical signal as a carrier by analog-to-digital conversion.
- the processor 31 is further configured to: encrypt the electrical digital signal.
- the wearable device 03 further includes a display 35.
- the display 35 is also disposed on a surface opposite to the first surface, and the display 35 is configured to display the user to be identified. Identity characteristics information.
- the wearable device 03 further includes a memory 36 that is coupled to the processor 31, the first sensor 32, and the second sensor 33.
- the identity feature information of the user to be identified may be pre-stored directly in the memory 36 of the wearable device, such that the wearable device can directly obtain the user to be identified from its own memory 36.
- the identity feature information does not need to obtain the identity feature information through various sensors. That is to say, the user to be identified can store his own identity feature information in the wearable device in advance, and when the identity authentication is required, the operation wearable device can retrieve the pre-stored identity feature information from the memory 36 of the wearable device. .
- a front view of the wearable watch is a top view of the wearable watch.
- the wearable watch includes a first sensor 100, a second sensor 200, a display screen 300, a processor 400, and a transceiver 500 in contact with the skin of the user's wrist to be identified.
- the first sensor 100 is in contact with the skin of the user's wrist to be identified, and thus can be used to collect identity information such as heart rate information, pulse information, and body temperature information of the user to be identified, and the second sensor 200 can be used for collecting to be identified.
- identity information such as heart rate information, pulse information, and body temperature information of the user to be identified
- the second sensor 200 can be used for collecting to be identified.
- User identity information such as fingerprint information and face information.
- the first sensor 100 and the second sensor 200 send the collected identity feature information to the processor 400, and the processor 400 converts the identity feature information into a digital optical signal that is a carrier wave of the optical wave; and, the processor 400 may Sending the identity feature information to the display screen 300 for display.
- the processor 400 transmits the digital optical signal to the receiving end through the transceiver 500, so that the receiving end extracts the identity feature information of the user to be identified from the digital optical signal. And identifying the user to be identified based on the identity information.
- FIG. 14 is a schematic structural diagram of an identity recognition system according to an embodiment of the present disclosure.
- the identity recognition system provided by the embodiment of the present disclosure may be used to implement the implementation of the embodiments of the present disclosure shown in FIG. 1 to FIG.
- FIG. 14 For the convenience of the description, only the parts related to the embodiments of the present disclosure are shown.
- FIG. 1 to FIG. Please refer to the embodiments of the present disclosure shown in FIG. 1 to FIG.
- the identity recognition system includes a sender 01, and the sender 01 Data connected to the receiving end 02.
- the sending end 01 may be a wearable device 03, for example, a wearable watch, a wearable wristband, a wearable helmet, etc., and the details are not described herein.
- the receiving end 02 can be a device such as a mobile phone, a tablet computer, a notebook computer, a UMPC, a netbook, a PDA, etc., and details are not described herein.
- an embodiment of the present disclosure provides a wearable device and an identity recognition system, where a sender collects identity feature information of a user to be identified, and the identity feature information is used to uniquely identify an identity of a user to be identified; The identity information is converted into a digital signal; and the digital signal is sent to the receiving end, so that the receiving end extracts the identity feature information of the user to be identified from the digital signal, and identifies the user to be identified according to the identity feature information.
- the transmitting end is independent of the receiving end, that is, the transmitting end and the receiving end are not integrated, the transmitting end for collecting the user identity information is relative to the receiving end for identity identification.
- the device can be relatively moved, so that when the sender and the receiver interact with each other for identification, the sender can carry the identity information of the user in the digital signal and send it to the receiver for identification by wireless. Therefore, the possibility of directly leaving the user's identity feature information on the receiving end for identity recognition is avoided, thereby avoiding leakage of user information in the identity recognition process and improving the security of the identity recognition.
- embodiments of the present disclosure can be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware aspects. Moreover, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- the present disclosure is made with reference to a method, apparatus (system), and computer program according to an embodiment of the present disclosure.
- the flow chart and/or block diagram of the product is described. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG.
- These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Bioethics (AREA)
- Biomedical Technology (AREA)
- Medical Informatics (AREA)
- Data Mining & Analysis (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
- Telephone Function (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
Claims (21)
- 一种身份识别方法,包括:发送端采集待识别用户的身份特征信息,所述身份特征信息用于唯一标识所述待识别用户的身份;所述发送端将所述身份特征信息转化为数字信号;所述发送端通过无线方式将所述数字信号发送至接收端,以使得所述接收端从所述数字信号中提取所述待识别用户的身份特征信息,并根据所述身份特征信息对所述待识别用户进行身份识别。
- 根据权利要求1所述的方法,其中,所述发送端将所述身份特征信息转化为数字信号,包括:所述发送端通过模数转换,将所述身份特征信息转化为以电信号为载波的电数字信号;所述发送端通过电光转换,将所述电数字信号转化为以光波为载波的数字光信号。
- 根据权利要求2所述的方法,其中,在所述发送端通过模数转换,将所述身份特征信息转化为以电信号为载波的电数字信号之后,所述方法还包括:所述发送端对所述电数字信号进行加密。
- 根据权利要求1-3中任一项所述的方法,其中,所述采集的待识别用户的身份特征信息包括心率信息、静脉特征信息、指纹信息、声音信息以及虹膜信息中的至少一项。
- 根据权利要求1-3中任一项所述的方法,其中,所述发送端将所述数字信号发送至接收端,包括:所述发送端将所述数字信号携带在所述待识别用户触发的第一指令中,所述第一指令用于指示所述接收端执行与所述第一指令对应的程序;所述发送端将所述第一指令发送至所述接收端。
- 一种身份识别方法,包括:接收端通过无线方式接收发送端发送的数字信号;所述接收端从所述数字信号中提取待识别用户的身份特征信息,所述身份特征信息用于唯一标识所述待识别用户的身份;所述接收端在预先存储的特征库中查找是否存储有与所述身份特征信息匹配的第一身份特征信息;若存储有与所述身份特征信息匹配的第一身份特征信息,则认证所述待识别用户的身份。
- 根据权利要求6所述的方法,其中,所述接收端接收发送端发送数字信号,包括:所述接收端接收所述发送端发送的第一指令,所述第一指令中携带有所述数字信号;其中,在若存储有与所述身份特征信息匹配的第一身份特征信息,则认证所述待识别用户的身份之后,还包括:所述接收端执行与所述第一指令对应的程序。
- 一种发送端,用于身份识别,包括:采集单元,用于采集待识别用户的身份特征信息,所述身份特征信息用于唯一标识所述待识别用户的身份;转换单元,用于将所述身份特征信息转化为数字信号;发送单元,用于通过无线方式将所述数字信号发送至接收端,以使得所述接收端从所述数字信号中提取所述待识别用户的身份特征信息,并根据所述身份特征信息对所述待识别用户进行身份识别。
- 根据权利要求8所述的发送端,其中,所述转换单元,具体用于通过模数转换,将所述身份特征信息转化为以电信号为载波的电数字信号和通过电光转换,将所述电数字信号转化为以光波为载波的数字光信号;或者用于通过模数转换,将所述身份特征信息转化为以电信号为载波的电数字信号。
- 根据权利要求9所述的发送端,还包括:加密单元,用于对所述电数字信号进行加密。
- 根据权利要求8所述的发送端,还包括添加单元,所述添加单元,用于将所述数字信号携带在所述待识别用户触发的第一指令中,所述第一指令用于指示所述接收端执行与所述第一指令对应的程序;所述发送单元,具体用于将所述第一指令发送至所述接收端。
- 根据权利要求8-11中任一项所述的发送端,其中,所述发送端为可穿戴设备。
- 一种接收端,用于身份识别,包括:接收单元,用于接收发送端发送的数字信号;提取单元,用于从所述数字信号中提取待识别用户的身份特征信息,所述身份特征信息用于唯一标识所述待识别用户的身份;识别单元,用于在预先存储的特征库中查找是否存储有与所述身份特征信息匹配的第一身份特征信息;若存储有与所述身份特征信息匹配的第一身份特征信息,则认证所述待识别用户的身份。
- 根据权利要求13所述的接收端,还包括执行单元,所述接收单元,具体用于接收所述发送端发送的第一指令,所述第一指令中携带有所述数字信号;所述执行单元,用于执行与所述第一指令对应的程序。
- 一种可穿戴设备,用于身份识别,包括处理器,与所述处理器相连的第一传感器、第二传感器以及收发器,所述第一传感器设置在所述穿戴设备与用户皮肤接触的第一表面,所述第二传感器设置在与所述第一表面相对的表面;其中,所述第一传感器和所述第二传感器,用于采集待识别用户的身份特征信息,所述身份特征信息用于唯一标识所述待识别用户的身份;所述处理器,用于将所述身份特征信息转化为数字信号;所述收发器,用于通过无线方式将所述数字信号发送至接收端,以使得所述接收端从所述数字信号中提取所述待识别用户的身份特征信息,并根据所述身份特征信息对所述待识别用户进行身份识别。
- 根据权利要求15所述的可穿戴设备,其中,所述处理器具体用于:通过模数转换,将所述身份特征信息转化为以电信号为载波的电数字信号和通过电光转换,将所述电数字信号转化为以光波为载波的数字光信号;或者用于通过模数转换,将所述身份特征信息转化为以电信号为载波的电数字信号。
- 根据权利要求16所述的可穿戴设备,其中,所述处理器还用于:对所述电数字信号进行加密。
- 根据权利要求15所述的可穿戴设备,包括显示器,所述显示器也设置在与所述第一表面相对的表面,所述显示器,用于显示所述待识别用户的身份特征信息。
- 根据权利要求15所述的可穿戴设备,其还包括存储器,所述存储器与所述处理器、所述第一传感器和所述第二传感器均相连。
- 根据权利要求15-19中任一项所述的可穿戴设备,其中,所述可穿戴设备为可穿戴手表。
- 一种身份识别***,包括如权利要求8-12中任一项所述的发送端,以及与所述发送端通过无线方式通信的如权利要求13或14所述的接收端,其中,所述发送端独立于所述接收端之外。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/308,693 US20170265071A1 (en) | 2015-09-08 | 2016-03-02 | Identity recognition method, transmitter, receiver, wearable device and identity recognition system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510568227.0A CN105184136A (zh) | 2015-09-08 | 2015-09-08 | 一种身份识别方法、装置及*** |
CN201510568227.0 | 2015-09-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017041458A1 true WO2017041458A1 (zh) | 2017-03-16 |
Family
ID=54906210
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/075372 WO2017041458A1 (zh) | 2015-09-08 | 2016-03-02 | 身份识别方法、发送端、接收端、可穿戴设备及身份识别*** |
Country Status (3)
Country | Link |
---|---|
US (1) | US20170265071A1 (zh) |
CN (1) | CN105184136A (zh) |
WO (1) | WO2017041458A1 (zh) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105141997B (zh) * | 2015-08-18 | 2018-09-04 | 京东方科技集团股份有限公司 | 显示装置、遥控装置、显示***和节目推送方法 |
CN105184136A (zh) * | 2015-09-08 | 2015-12-23 | 京东方科技集团股份有限公司 | 一种身份识别方法、装置及*** |
DE102016203521A1 (de) | 2016-03-03 | 2017-09-07 | Volkswagen Aktiengesellschaft | Verfahren und System für ein Authentifizieren eines Benutzers sowie ein Kraftfahrzeug |
CN105912898A (zh) * | 2016-03-30 | 2016-08-31 | 深圳还是威健康科技有限公司 | 一种基于智能穿戴设备的身份认证方法及身份认证装置 |
CN106056915B (zh) * | 2016-06-17 | 2019-07-23 | 京东方科技集团股份有限公司 | 车辆身份信息识别方法及***、识别装置及采集装置 |
CN107623549A (zh) * | 2016-07-15 | 2018-01-23 | 深圳光启高等理工研究院 | 无线光通信*** |
CN106023525A (zh) * | 2016-07-27 | 2016-10-12 | 国网山东省电力公司惠民县供电公司 | 一种具有多种通信方式汇集的智能信息交互的安防装置 |
CN107844688A (zh) * | 2016-09-18 | 2018-03-27 | 中兴通讯股份有限公司 | 一种信息处理方法和装置 |
CN106778168A (zh) * | 2016-12-05 | 2017-05-31 | 深圳先进技术研究院 | 可穿戴式设备的身份识别方法、装置及可穿戴式设备 |
CN108534604A (zh) * | 2018-04-17 | 2018-09-14 | 南安建金工业设计有限公司 | 一种可识别敌我身份和级别的军用钢盔 |
CN109203736B (zh) * | 2018-09-30 | 2020-11-20 | 山东知味行网络科技有限公司 | 一种电子***及使用电子***进行身份识别的***和方法 |
CN112597860B (zh) * | 2020-12-16 | 2022-07-15 | 重庆电子工程职业学院 | 用于学生的实践安全管理*** |
WO2022140879A1 (zh) * | 2020-12-28 | 2022-07-07 | 京东方科技集团股份有限公司 | 一种身份识别方法、终端、服务器及*** |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020190125A1 (en) * | 2000-01-19 | 2002-12-19 | Rudolph Stockhammer | Authorization control device |
CN103106736A (zh) * | 2012-12-28 | 2013-05-15 | 华为软件技术有限公司 | 一种身份认证方法、终端及服务器 |
CN104536561A (zh) * | 2014-12-10 | 2015-04-22 | 金硕澳门离岸商业服务有限公司 | 采用可穿戴设备控制终端设备操作的方法及可穿戴设备 |
CN104794381A (zh) * | 2015-03-24 | 2015-07-22 | 百度在线网络技术(北京)有限公司 | 一种用于认证的方法、装置、设备与*** |
WO2015117507A1 (zh) * | 2014-07-23 | 2015-08-13 | 中兴通讯股份有限公司 | 鉴权方法、采集装置、鉴权装置及***、机柜及解锁方法 |
CN104852917A (zh) * | 2015-05-08 | 2015-08-19 | 浙江师范大学 | 一种可穿戴式的基于脉搏特征的远程认证方法 |
CN105184136A (zh) * | 2015-09-08 | 2015-12-23 | 京东方科技集团股份有限公司 | 一种身份识别方法、装置及*** |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5666873B2 (ja) * | 2010-10-13 | 2015-02-12 | 富士フイルム株式会社 | 超音波診断装置 |
-
2015
- 2015-09-08 CN CN201510568227.0A patent/CN105184136A/zh active Pending
-
2016
- 2016-03-02 US US15/308,693 patent/US20170265071A1/en not_active Abandoned
- 2016-03-02 WO PCT/CN2016/075372 patent/WO2017041458A1/zh active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020190125A1 (en) * | 2000-01-19 | 2002-12-19 | Rudolph Stockhammer | Authorization control device |
CN103106736A (zh) * | 2012-12-28 | 2013-05-15 | 华为软件技术有限公司 | 一种身份认证方法、终端及服务器 |
WO2015117507A1 (zh) * | 2014-07-23 | 2015-08-13 | 中兴通讯股份有限公司 | 鉴权方法、采集装置、鉴权装置及***、机柜及解锁方法 |
CN104536561A (zh) * | 2014-12-10 | 2015-04-22 | 金硕澳门离岸商业服务有限公司 | 采用可穿戴设备控制终端设备操作的方法及可穿戴设备 |
CN104794381A (zh) * | 2015-03-24 | 2015-07-22 | 百度在线网络技术(北京)有限公司 | 一种用于认证的方法、装置、设备与*** |
CN104852917A (zh) * | 2015-05-08 | 2015-08-19 | 浙江师范大学 | 一种可穿戴式的基于脉搏特征的远程认证方法 |
CN105184136A (zh) * | 2015-09-08 | 2015-12-23 | 京东方科技集团股份有限公司 | 一种身份识别方法、装置及*** |
Also Published As
Publication number | Publication date |
---|---|
US20170265071A1 (en) | 2017-09-14 |
CN105184136A (zh) | 2015-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017041458A1 (zh) | 身份识别方法、发送端、接收端、可穿戴设备及身份识别*** | |
US9942760B2 (en) | Wearable device and a method for storing credentials associated with an electronic device in said wearable device | |
US11468720B2 (en) | Wearable misplacement | |
US11720656B2 (en) | Live user authentication device, system and method | |
US10390225B2 (en) | Mobile terminal security authentication method and system and mobile terminal | |
EP3428818A1 (en) | Identity authentication method and system | |
US20150379255A1 (en) | Systems and methods for granting access to a computing device using a wearable device | |
WO2016082229A1 (zh) | 一种身份认证方法及可穿戴设备 | |
US9396378B2 (en) | User identification on a per touch basis on touch sensitive devices | |
Saxena et al. | Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags | |
CN105656627B (zh) | 身份验证方法、装置、***、处理方法、设备及存储介质 | |
CN103310142A (zh) | 基于可穿戴设备的人机融合安全认证方法 | |
CN103824012A (zh) | 智能移动终端射频近场用户身份识别 | |
US20240098491A1 (en) | Cryptographic process for portable devices, and user presence and/or access authorization system and method employing same | |
US20120032781A1 (en) | Remote personal authentication system and method using biometrics | |
US20170374065A1 (en) | Method and apparatus for performing operations associated with biometric templates | |
CN205883297U (zh) | 一种基于人脸和指纹识别的账号登录*** | |
WO2020082164A1 (en) | Digital certificate enrolment system and method, and challenge password management system and method therefor | |
CN204904276U (zh) | 一种可穿戴设备及身份识别*** | |
CN104486310A (zh) | 指静脉认证的方法、***及指静脉信息采集仪 | |
CN205354036U (zh) | 一种基于多模态生物识别技术的数据加密云存储*** | |
CN114341907A (zh) | 体域网辅助认证或支付授权 | |
WO2022142427A1 (zh) | 好友添加方法、装置、设备及存储介质 | |
KR20160016527A (ko) | 컨텐츠를 암호화 또는 복호화하는 방법 및 디바이스. | |
KR102674567B1 (ko) | 웨어러블 기기를 이용한 사용자 인증 시스템 및 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 15308693 Country of ref document: US |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16843398 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16843398 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 10/09/2018) |