CN104079405A - User identity verification method, device and system based on matrix value - Google Patents

User identity verification method, device and system based on matrix value Download PDF

Info

Publication number
CN104079405A
CN104079405A CN201310103000.XA CN201310103000A CN104079405A CN 104079405 A CN104079405 A CN 104079405A CN 201310103000 A CN201310103000 A CN 201310103000A CN 104079405 A CN104079405 A CN 104079405A
Authority
CN
China
Prior art keywords
terminal equipment
matrix
user
coordinate
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310103000.XA
Other languages
Chinese (zh)
Other versions
CN104079405B (en
Inventor
吴斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201310103000.XA priority Critical patent/CN104079405B/en
Publication of CN104079405A publication Critical patent/CN104079405A/en
Application granted granted Critical
Publication of CN104079405B publication Critical patent/CN104079405B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The application discloses a user identity verification method, device and system based on a matrix value. The method comprises the following steps: acquiring a first media signal output by second terminal equipment through a signal acquisition device of first terminal equipment; decoding the first media signal to obtain a matrix coordinate to be verified; and inquiring pre-acquired matrix relevant information generated for a specified user, acquiring a target value corresponding to the matrix coordinate to be verified, and outputting the target value through a signal output device of the first terminal equipment to allow the user to input the target value into the second terminal equipment and submit the target value to a server for verification. Through the user identity verification method, device and system, the safety of user matrix card information can be enhanced, and the effectiveness of safety verification performed on the basis of the matrix value is further improved.

Description

Based on matrix-valued user identity method of calibration, Apparatus and system
Technical field
The application relates to user identity calibration technology field, particularly relates to based on matrix-valued user identity method of calibration, Apparatus and system.
Background technology
Large-scale website ubiquity accounts information safety problem, the especially financial website target of public criticism especially.At present, the main flow of accounts information safe practice is that to improve the fail safe of verification authority be basis, adopts the mode of repeatedly verification.That is to say, when user name and login password are carried out to conventional proof of identity (being called for short conventional verification), also need to carry out complementary proof of identity (abbreviation auxiliary examination) by other approach, only conventional verification and auxiliary examination all by time, could allow active user to carry out follow-up operation.
About auxiliary examination, a kind of approach realizing is, adopts " put question to-reply " pattern, also carries out " enquirement " by Website server to user, and user carries out " answer ", if user answers correctly, verification is passed through.For common website, generally can show a picture with identifying code (generally by digital, alphabetical etc. form) to user, require user to input the identifying code in picture, if user inputs correctly, by checking.But in this mode, the answer of problem has directly been presented in problem in fact, therefore, if hacker can intercept this picture and can identify the identifying code in picture, can be more dangerous.Also relatively senior verification mode is taked in some website: in picture, show a problem (for example, inquiring the establishment condition of certain mathematics formula etc.), then provide corresponding answer by user.In this mode, directly do not demonstrate answer in problem, still, substantially all users know what the answer of problem is, corresponding, are also just easy to be cracked by machine.Therefore, the high website that requires for Web bank etc. for user information safety, above-mentioned auxiliary examination mode all seems reliable not.
In prior art, as by a representative of " put question to-reply " pattern, " matrix card " (claims again " password card " etc., modal form is 8 × 10 lattice two-dimensional digital matrixes, in each grid, there will be the random digit of to three, by the numeral of inputting in correct matrix coordinate correspondence position, user identity carried out to verification) tend to be adopted by financial class websites such as Web banks.For example, certain bank provides matrix card and is preserved voluntarily by user to net silver autograph user, in the time carrying out auxiliary examination, is initiated at random the enquirement of coordinate position by Website server, user finds corresponding value according to coordinate position, is submitted to server and carries out verification.For example, server is putd question to " 3D8E ", user can to inquire the value that coordinate " 3D " is corresponding be " 71 ", the value that coordinate " 8E " is corresponding is " 56 ", so, just can the answer using " 7156 " as this problem be submitted to server and carry out verification.Visible, under this implementation, can make answer can directly not be presented in problem, and only know that the user of the value on each coordinate in matrix card just can know the answer of problem, therefore, fail safe is higher.
But this verification mode of carrying out user identity based on matrix value exists potential safety hazard in the prior art, this potential safety hazard is mainly, the information in user's matrix card exist revealed may.For example, fishing website can imitate server site and initiate coordinate enquirement, and obtains the corresponding value of user's input.Then by the value obtaining record one by one, finally get value corresponding to each coordinate in matrix card.So just can pretend to be user login services device website, the enquirement of answering server website, and finally reach illegal objective.Or fishing website can also utilize phone etc. to swindle to know user's the corresponding value of each coordinate position of matrix card, and then the user that can disguise oneself as carries out illegal operation, etc.Visible, once user's matrix card information is revealed, thisly just lost efficacy based on matrix-valued proof of identity.In a word, the technical problem solving in the urgent need to those skilled in the art is just: how to improve the fail safe of user's matrix card information, and then improve the validity while carrying out safety check based on matrix value.
Summary of the invention
The application provides based on matrix-valued user identity method of calibration, Apparatus and system, the fail safe that can improve user's matrix card information, and then improve the validity while carrying out safety check based on matrix value.
The application provides following scheme:
A kind of based on matrix-valued user identity method of calibration, comprising:
Gather the first media signal of the second terminal equipment output by the signal pickup assembly of first terminal equipment; Wherein, in the time that to designated user, user identity verification is carried out in the operation on described the second terminal equipment, select matrix coordinate to be verified by described server, matrix coordinate to be verified is encoded and generated the first media data, and returning to described the second terminal equipment, described the second terminal equipment utilizes its signal output apparatus that described the first media data is output as to described the first media signal;
Described the first media signal is decoded, obtain described matrix coordinate to be verified;
The matrix correlation information for this designated user generation that inquiry is obtained in advance, obtain target value corresponding to described matrix coordinate to be verified, and by the signal output apparatus of described first terminal equipment, described target value is exported, so that inputting described target value described the second terminal equipment and be submitted to server, user carries out verification; Wherein, described matrix correlation information comprises the coordinate and value corresponding to each coordinate that in matrix, comprise.
A kind of based on matrix-valued user identity method of calibration, comprising:
In the time that user identity verification is carried out in the operation on the second terminal equipment to designated user, select matrix coordinate to be verified;
Matrix coordinate to be verified is encoded and generated the first media data;
Described the first media data is returned to described the second terminal equipment, so that described the second terminal equipment utilizes its signal output apparatus that described the first media data is output as to described the first media signal, gather described the first media signal by the signal pickup assembly of first terminal equipment, and after decoding, obtain described matrix coordinate to be verified, the matrix correlation information for this user's generation that inquiry is obtained in advance, obtain target value corresponding to described matrix coordinate to be verified, and by the signal output apparatus of described first terminal equipment, described target value is exported, wherein, described matrix correlation information comprises the coordinate and value corresponding to each coordinate that in matrix, comprise,
Receive after the described target value of described designated user by described the second terminal equipment input, carry out verification according to the matrix correlation information generating for this designated user in advance.
A kind of based on matrix-valued user identity calibration equipment, comprising:
Signal gathering unit, for gathering the first media signal of the second terminal equipment output by the signal pickup assembly of first terminal equipment; Wherein, in the time that to designated user, user identity verification is carried out in the operation on described the second terminal equipment, select matrix coordinate to be verified by described server, matrix coordinate to be verified is encoded and generated the first media data, and returning to described the second terminal equipment, described the second terminal equipment utilizes its signal output apparatus that described the first media data is output as to described the first media signal;
Signal resolution unit, for described the first media signal is decoded, obtains described matrix coordinate to be verified;
Value output unit, for inquiring about the matrix correlation information for this designated user generation of obtaining in advance, obtain target value corresponding to described matrix coordinate to be verified, and by the signal output apparatus of described first terminal equipment, described target value is exported, so that inputting described target value described the second terminal equipment and be submitted to server, user carries out verification; Wherein, described matrix correlation information comprises the coordinate and value corresponding to each coordinate that in matrix, comprise.
A kind of based on matrix-valued user identity check system, comprising:
Matrix coordinate selection unit, in the time that user identity verification is carried out in the operation on the second terminal equipment to designated user, selects matrix coordinate to be verified;
The first media data generation unit, encodes and generates the first media data for the matrix coordinate to be verified;
The first media data returns to unit, for described the first media data is returned to described the second terminal equipment, so that described the second terminal equipment utilizes its signal output apparatus that described the first media data is output as to described the first media signal, gather described the first media signal by the signal pickup assembly of first terminal equipment, and after decoding, obtain described matrix coordinate to be verified, the matrix correlation information for this user's generation that inquiry is obtained in advance, obtain target value corresponding to described matrix coordinate to be verified, and by the signal output apparatus of described first terminal equipment, described target value is exported, wherein, described matrix correlation information comprises the coordinate and value corresponding to each coordinate that in matrix, comprise,
Verification unit, for receiving after the described target value of described designated user by described the second terminal equipment input, carries out verification according to the matrix correlation information generating for this designated user in advance.
The specific embodiment providing according to the application, the application has reached following technique effect:
The embodiment of the present application has the following advantages:
First, user's matrix correlation information (comprising coordinate and value corresponding to each coordinate that matrix comprises) is to be kept in user's first terminal equipment, user no longer holds the entity cards such as matrix card, matrix correlation information is unknowable for user, therefore, can avoid lawless person to say the matrix correlation information of oneself by the mode user cheating such as make a phone call;
Secondly, belong to different physical individual for the first terminal equipment of preservation matrix relevant information and user's actual log server and to the second terminal equipment of account executable operations, therefore, also further reduced the probability that matrix correlation information is got by the rogue program in the second terminal;
Moreover, when server sends matrix coordinate to be verified to the second terminal equipment, can not direct transmission, but first utilize active user's PKI to be encrypted, and encode, make the second terminal equipment adopt the form of certain media signal to export; This media signal is what cannot obtain about the specifying information of matrix coordinate from surface, therefore, can avoid being identified concrete coordinate figure by rogue program on the one hand, on the other hand, even if wanting emulating server to generate similar media signal, rogue program inquires user, also can be due to each user's PKI difference, make the media signal that rogue program simulates can not be by first terminal recognition of devices, therefore, user also cannot make and replying to rogue program, therefore, avoid user by the matrix correlation leakage of information of oneself to rogue program.In a word, the embodiment of the present application can improve the fail safe of user's matrix correlation information from many aspects, thereby improves the validity while carrying out user identity verification based on matrix value.
Wherein, can second terminal equipment output and the collection of first terminal equipment can be the picture signals such as Quick Response Code, or can be also the audio signals such as music.
Certainly, arbitrary product of enforcement the application might not need to reach above-described all advantages simultaneously.
Brief description of the drawings
In order to be illustrated more clearly in the embodiment of the present application or technical scheme of the prior art, to the accompanying drawing of required use in embodiment be briefly described below, apparently, accompanying drawing in the following describes is only some embodiment of the application, for those of ordinary skill in the art, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the flow chart of the method for the first terminal equipment side that provides of the embodiment of the present application;
Fig. 2 is the display interface schematic diagram in the second terminal equipment of providing of the embodiment of the present application;
Fig. 3 is the schematic diagram that the employing first terminal equipment that provides of the embodiment of the present application gathers media signal;
Fig. 4 is the schematic diagram of the first terminal equipment export target value that provides of the embodiment of the present application;
Fig. 5 is the flow chart of the method for the server side that provides of the embodiment of the present application;
Fig. 6 is the method flow diagram that obtains private key and matrix correlation information that the embodiment of the present application provides;
Fig. 7 is the user identity checking procedure schematic diagram that the embodiment of the present application provides;
Fig. 8 is the schematic diagram of the device of the first terminal equipment side that provides of the embodiment of the present application;
Fig. 9 is the schematic diagram of the system of the server side that provides of the embodiment of the present application.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is clearly and completely described, obviously, described embodiment is only some embodiments of the present application, instead of whole embodiment.Based on the embodiment in the application, the every other embodiment that those of ordinary skill in the art obtain, belongs to the scope that the application protects.
First it should be noted that, in the process that realizes the application, find, while fail safe being carried out to aided verification by matrix value in prior art, why easily utilized by fishing website, a chief reason is that user directly holds matrix card, that is to say, user knows the corresponding relation between each value and matrix coordinate in matrix card, like this, if lawless person by mode user cheatings such as phones, user just may go out the matrix card leakage of information of oneself; On the other hand, server is in the time of inquiry, it is the direct coordinate of display matrix in the page, like this, rogue program can identify by technology such as picture recognition the coordinate of inquiry, after user inputs corresponding value, rogue program can grab again the value of user's input, therefore, once, rogue program just can grab the corresponding relation between coordinate and value to the every inquiry of server, after repeatedly capturing, just may get a user's complete matrix card information, be also all coordinates and value corresponding to difference comprising in matrix card.
Therefore, if can accomplish following 2 points, the fail safe that can improve matrix card information:
First the value condition that the coordinate, comprising in matrix card and each coordinate are corresponding is unknowable for user;
Secondly, server, when send inquiry to user, does not directly demonstrate matrix coordinate in the page, but with encrypt and encode after the form of the signal that obtains exist, sort signal only has the identification facility by preserving in advance particular solution decryption key to identify.
If can accomplish above 2 points, so, on the one hand, even if lawless person cheats by means such as phones, also can not know because of user the relevant information of its matrix card, and guarantee information can not be revealed; On the other hand, due to each user's cipher mode difference (encrypting and decruption key difference), so encrypted result is also just different.Like this, the signal sending when server interrogates is owing to being deciphered by rogue program, therefore, rogue program cannot be known concrete matrix coordinate, enables to grab the value of user's input, and which coordinate what also cannot know correspondence is, therefore, cannot get the complete information of matrix card; And fishing website allows to imitate a similar signal of server output to value corresponding to user's query coordinate, also can be due to user encryption mode difference, making this signal cannot be identified instrument correctly identifies, and then also obtain less than relevant value information, therefore, ensure the safety of user's matrix card information, and then ensured the validity while carrying out safety check based on matrix value.
In order to achieve the above object, the embodiment of the present application mainly realizes in the following manner:
First, the embodiment of the present application, in actual implementation procedure, relates to following functions entity:
Server, for example, the server of certain bank system of web etc., for example sign in to this server, while wanting to carry out certain operation (for certain electronic order payment etc.) certain user by certain account, need whether verification is the operation that user initiates, therefore, need to initiate inquiry to user, and the response message of submitting to according to user is carried out actual checking procedure;
First terminal equipment, it can be user's oneself the terminal equipment such as mobile phone, panel computer, this terminal equipment generally has signals collecting function, for example, can realize by the first-class image collecting device of making a video recording the acquisition function of picture signal, can realize by audio collecting devices such as microphones the acquisition function of audio signal, etc.; In addition, the operating system environment that this first terminal equipment also has certain information storage function and can install and run application.
The second terminal equipment, can be the terminal equipments such as PC, can certainly be the mobile terminal device such as mobile phone, panel computer, as long as belong to different physical entity from first terminal equipment.This second terminal equipment is the terminal equipment at user place while signing in to server by the Web page etc., also be, user carries out payment to wait the operation relevant to account on this second terminal equipment, accordingly, server is, need to initiate certain operation behavior on this second terminal equipment to user time, in advance user identity to be carried out to verification.
Also, the relation between three is: when user signs in to server on by the second terminal equipment, and when certain operation behavior of pre-execution, server carries out verification to user identity, in the process of verification, need to there is the cooperation of first terminal equipment, just can complete verification.
When specific implementation, first, server end is preserved each user corresponding matrix correlation information (be also the coordinate that matrix comprises, and on each coordinate corresponding value respectively) respectively in advance, and key for encrypting.For certain user A, on the first terminal equipment of specifying at this user A, preserve in advance the matrix correlation information of a this user A, in addition, also need to preserve a key for deciphering.Moreover, the application program (can certainly be solidificated in first terminal equipment with the form of hardware) that a embodiment of the present application provides also need to be installed on the first terminal equipment of this appointment, to carry out concrete operation by this application program.Also be, corresponding certain user A, its matrix correlation information is to bind and be kept on first terminal equipments such as the mobile phone of oneself, and user A no longer holds the cards in kind such as matrix card, and this user A also cannot check the matrix correlation information of preserving in the terminal equipment of oneself.
In the time that user A opens Web webpage and inputs user name and password login to server in the second terminal equipment, server can be selected matrix coordinate to be verified at random, then, be not directly matrix coordinate to be returned to the second terminal equipment, but utilize the key (PKI) of the user encryption that this user A is corresponding to be encrypted matrix coordinate to be verified, then the information after encrypting is encoded, and generate media data and return to the second terminal equipment.
The second terminal equipment, after receiving the media data that server returns, can utilize the signal output apparatus of its loading that media data is output as to media signal.
Now, user A can not directly know the implication of this each signal, but user A can start the application program that the embodiment of the present application of installing in first terminal equipment provides, the signal pickup assembly that this application program can start in first terminal equipment automatically gathers the media signal that the second terminal equipment sends, after the media signal collecting is decoded, utilize the key (private key) for deciphering of preserving to be in advance decrypted, so just can obtain matrix coordinate to be verified.First terminal equipment is after obtaining matrix coordinate, matrix coordinate can't be offered to user, but this user's that inquiry is preserved in advance matrix correlation information, get value corresponding to matrix coordinate to be verified, then by the signal output apparatus of first terminal equipment, corresponding value is exported, user just can be known the answer corresponding to problem of server interrogates like this, then be entered in the corresponding answer input frame of the Web page on the second terminal equipment, be then submitted to server and carry out verification.
Visible, in the embodiment of the present application, first, user's matrix correlation information is kept in user's first terminal equipment (comprising coordinate and value corresponding to each coordinate that matrix comprises), user no longer holds the entity cards such as matrix card, matrix correlation information is unknowable for user, therefore, can avoid lawless person to say the matrix correlation information of oneself by the mode user cheating of making a phone call; Secondly, belong to different physical individual for the first terminal equipment of preservation matrix relevant information and user's actual log server and to the second terminal equipment of account executable operations, therefore, also further reduced the probability that matrix correlation information is got by the rogue program in the second terminal.Moreover, when server sends matrix coordinate to be verified to the second terminal equipment, can not direct transmission, but first utilize active user's PKI to be encrypted, and encode, make the second terminal equipment adopt the form of certain media signal to export; This media signal is what cannot obtain about the specifying information of matrix coordinate from surface, therefore, can avoid being identified concrete coordinate figure by rogue program on the one hand, on the other hand, even if wanting emulating server to generate similar media signal, rogue program inquires user, also can be due to each user's PKI difference, make the media signal that rogue program simulates can not be by first terminal recognition of devices, therefore, user also cannot make and replying to rogue program, therefore, avoid user by the matrix correlation leakage of information of oneself to rogue program.In a word, the embodiment of the present application can improve the fail safe of user's matrix correlation information from many aspects, thereby improves the validity while carrying out user identity verification based on matrix value.
In sum, from the angle of first terminal equipment, it is a kind of based on matrix-valued user identity method of calibration that first the embodiment of the present application provides, and referring to Fig. 1, the method can comprise the following steps:
S101: the first media signal that gathers the second terminal equipment output by the signal pickup assembly of first terminal equipment; Wherein, described the first media signal is, in the time that to designated user, user identity verification is carried out in the operation on described the second terminal equipment, select matrix coordinate to be verified by described server, and matrix coordinate to be verified is encoded and generated the first media data, and returning to described the second terminal equipment, described the second terminal equipment utilizes its signal output apparatus by the signal of described the first media data output, i.e. described the first media signal;
S102: described the first media signal is decoded, obtain described matrix coordinate to be verified;
S103: the matrix correlation information for this designated user generation that inquiry is obtained in advance, obtain target value corresponding to described matrix coordinate to be verified, and by the signal output apparatus of described first terminal equipment, described target value is exported, so that inputting described target value described the second terminal equipment and be submitted to server, user carries out verification; Wherein, described matrix correlation information comprises the coordinate and value corresponding to each coordinate that in matrix, comprise.
Further, in described step S101, after described server is selected matrix coordinate to be verified, also comprise that utilization is in advance for the PKI that this designated user generates is encrypted described matrix coordinate to be verified, to generation the first media data of encode of the matrix coordinate to be verified after encrypting; In described step S102, when described the first media signal is decoded, the information of utilizing the private key corresponding with described PKI obtaining in advance to obtain decoding is decrypted, and obtains described matrix coordinate to be verified.
Wherein, when specific implementation, what export and gathered by first terminal equipment at the second terminal equipment can be picture signal, more specifically, can be a kind of bar code, for example, and bar code, Quick Response Code etc.That is to say, first server, after having selected matrix coordinate to be verified, can utilize PKI corresponding to active user to be encrypted matrix coordinate, then encodes, and obtains a kind of barcode data, and returns to the second terminal equipment.After the second terminal equipment is received, can barcode data be shown as to a kind of picture signal (being introduced as an example of Quick Response Code example) on display screen here.In this case, user cannot with the naked eye obtain any information from Quick Response Code, after only the application program on first terminal equipment is activated, just can get relevant information, specifically after application program is activated, can automatically open the first-class image-pickup device of shooting, then user can aim at the camera of first terminal equipment the image in 2 D code demonstrating in the second terminal equipment display screen and takes; Afterwards, application program in first terminal equipment just can be first to taking the decoding data that includes Quick Response Code obtaining, the information obtaining is exactly the matrix coordinate to be verified after encrypting, and then be decrypted with this user's of knowing in advance private key, just can obtain matrix coordinate to be verified, this user's that inquiry is known in advance again matrix correlation information, gets value corresponding to matrix coordinate to be verified.
For example, certain user signs in to the server of certain Web bank on the PC (corresponding the second terminal equipment) of oneself, in the time that needs carry out a certain payment operation, server sends Quick Response Code data to this PC, on the display screen of PC, can demonstrate this Quick Response Code, can also provide information simultaneously.For example, Figure 2 shows that the browser page that the display of certain user's PC demonstrates, wherein show an image in 2 D code, also show an input frame, and information is " please taking this Quick Response Code with the Quick Response Code matrix card device on mobile phone; after shooting, please check code is filled in and in input frame, carried out verification ", wherein, here " mobile phone " is with regard to the first terminal equipment in corresponding the embodiment of the present application, and " Quick Response Code matrix card device " is with regard to the application program of installing in first terminal equipment described in corresponding the embodiment of the present application.Afterwards, user just can start " Quick Response Code matrix card device " in binding in advance has the mobile phone of this user's matrix correlation information, be somebody's turn to do " Quick Response Code matrix card device " camera of starting hand-set automatically, as shown in Figure 3, user can aim at the Quick Response Code showing on PC display by the camera of mobile phone and take, afterwards, just can in mobile phone screen, see information of check code as shown in Figure 4.For example, demonstrate check code for " 458956 ", simultaneously can also display reminding information: " please check code is above input in webpage verification input frame, then webpage clicking verification button, carries out verification ".Wherein, " webpage verification frame " just refers to the input frame in the webpage demonstrating in the PC display shown in Fig. 2.Visible, in whole implementation procedure, user only knows that the check code of inputting in certain checking procedure is certain string numeral, but, because the information comprising in Quick Response Code is not by user is known, therefore, user do not know in the matrix correlation information of oneself corresponding relation between matrix coordinate and value.
Under another kind of implementation, what export and gathered by first terminal equipment at the second terminal equipment can be also audio signal, that is to say, server is after having selected matrix coordinate to be verified, can first utilize PKI corresponding to active user to be encrypted matrix coordinate, then encode, obtain a kind of voice data, and return to the second terminal equipment.After the second terminal equipment is received, can voice data be output as to audio signal by its programming audio frequency interface, for example, may be one section of music etc.In this case, user cannot be directly from music pleasant to the ear go out any information, after only the application program on first terminal equipment is activated, just can get relevant information.After specifically the application program on first terminal equipment is activated, can automatically open the voice collection device such as microphone, then, in order to gather better audio signal, user can aim at the microphone of first terminal equipment the loud speaker of the second terminal equipment; Afterwards, first application program in first terminal equipment just can decode to the audio signal receiving, the information obtaining is exactly the matrix coordinate to be verified after encrypting, and then be decrypted with this user's of knowing in advance private key, just can obtain matrix coordinate to be verified, this user's that inquiry is known in advance again matrix correlation information, gets value corresponding to matrix coordinate to be verified.
Wherein, for the implementation of above-mentioned audio signal, need on the second terminal equipment, play out corresponding audio signal, first terminal equipment just can effectively gather; Wherein, if the second terminal equipment is the mobile terminal such as portable notebook, mobile phone, generally can carry audio output device, therefore, as long as user is not set to mute state, as open loud speaker etc., just can play-over audio signal.Certainly, if find that the second terminal equipment is set to mute state by user, or volume is adjusted too low, can be before playing audio signal, prompting user opens the audio playing function of the second terminal equipment, know volume heightened, etc.And if the second terminal equipment is the equipment such as PC, may self not with audio output device, but may be circumscribed with the audio output devices such as audio amplifier, therefore, after receiving the voice data that server end returns, whether there is audio output device in the external world can to detect the second terminal equipment, if do not connected, points out user to connect, if connected audio output device, but power supply is not opened, can also point out user first to open this external audio output device.
No matter it should be noted that, be to adopt picture signal or audio signal to carry out the transmission of matrix coordinate to be verified, and concrete code encoding/decoding mode can, referring to the realization in the encoding and decoding technique of existing image, audio frequency, no longer describe in detail here.
In addition, about the matrix correlation information of preserving in first terminal equipment and the key information for deciphering, can be to be saved on the first terminal equipment of user's appointment by certain mode in advance.For example, get in the installation file of application program the process of set up applications at user A, can be directly by forms such as configuration files by matrix correlation information corresponding this installation file and the key for deciphering, be kept at first terminal equipment this locality as the information of distributing to this user A.Certainly, known by other users for fear of matrix correlation information and the key of distributing to a user, further to improve fail safe, the embodiment of the present application also provides first terminal equipment to obtain the implementation method of private key for user and user's matrix correlation information.
In the method, each user's private key generates at server end, and is sent to user's first terminal equipment by server.When specific implementation, can on the first terminal equipment of oneself, be inputted user name and password login by user to server, request server is this user assignment key, and turns back on this first terminal equipment.Server is according to user's log-on message, can generate for the key (PKI) encrypted and the key (private key) for deciphering for user, that is to say, for a user, server can generate pair of secret keys for it, one of them is for encrypting, be called PKI, and preserve at server end, another is for deciphering, be called private key, need to return to user., private key being sent to after user's first terminal equipment, preserved by user's first terminal equipment.Wherein, different in order to ensure public/private keys corresponding to each user, server can adopt the mode of arranging key, is respectively each user and generates public/private keys.Get the private key for deciphering on user's first terminal equipment after, follow-up in the time of transmission and this user-dependent information, first server end can utilize this user's PKI to transmit after being encrypted again, and comprises the transmission about this user's matrix correlation information.
That is to say, about user's matrix correlation information, comprise the coordinate comprising in matrix, and value corresponding to each coordinate etc., can be to be that user generates by server, and corresponding different users, matrix correlation information can be different; Then, server, after being active user's generator matrix relevant information, can be preserved a matrix correlation information voluntarily, and the while specifies to user on first terminal equipments such as the mobile phone of binding and sends a matrix correlation information.
Wherein, in the time specifically binding matrix correlation information on the first terminal equipment of specifying to user, user can directly arrive server by first terminal device logs, send bind request to server, server can utilize user's PKI to be encrypted this user's matrix correlation information, then be transferred to first terminal equipment, after first terminal equipment is received, after the private key having got before utilizing is decrypted, just can get matrix correlation information, then preserve and can complete binding in this locality.
Or in order better to ensure the fail safe of matrix correlation information in transmission, under another kind of implementation, first user can sign in to server by the second terminal equipment, initiates bind request on this second terminal equipment.Like this, server end just can, after being this user's generator matrix related data, first be encrypted with this user's PKI, then encodes and obtains a kind of media data, and return to the second terminal equipment.The second terminal equipment, after receiving this media data, can utilize the signal output apparatus of its loading that media data is output as to media signal equally.Now, user just can open the application program of installing in first terminal equipment, this application program automatically activated signal harvester, the media signal of exporting in the second terminal equipment is gathered, and to the decoding data collecting, this user's who gets before recycling afterwards private key is decrypted decoded data, can obtain this user's matrix correlation information, then preserves in first terminal equipment this locality.Wherein, involved media data, media signal etc. here, with described similar, equally both can adopt the picture signals such as Quick Response Code to realize above, also can adopt the audio signals such as music to realize, and concrete principle, with described similar above, repeats no more here.
The above proof of identity method mainly from first terminal equipment angle, the embodiment of the present application being provided is introduced, below from server side, what inventive embodiments was provided is introduced based on matrix-valued user identity method of calibration, and referring to Fig. 5, the method can comprise the following steps:
S501: in the time that user identity verification is carried out in the operation on the second terminal equipment to designated user, select matrix coordinate to be verified;
S502: matrix coordinate to be verified is encoded and generated the first media data;
S503: described the first media data is returned to described the second terminal equipment, so that described the second terminal equipment utilizes its signal output apparatus that described the first media data is output as to described the first media signal, gather described the first media signal by the signal pickup assembly of first terminal equipment, and after decoding, obtain described matrix coordinate to be verified, the matrix correlation information for this user's generation that inquiry is obtained in advance, obtain target value corresponding to described matrix coordinate to be verified, and by the signal output apparatus of described first terminal equipment, described target value is exported, wherein, described matrix correlation information comprises the coordinate and value corresponding to each coordinate that in matrix, comprise,
S504: receive after the described target value of described designated user by described the second terminal equipment input, carry out verification according to the matrix correlation information generating for this designated user in advance.
Further, in described step S502, utilize the PKI generating for this designated user to be in advance encrypted described matrix coordinate to be verified, and the matrix coordinate to be verified after encrypting is encoded and generated the first media data; In described step S503, after decoding, the information of utilizing the private key corresponding with described PKI obtaining in advance to obtain decoding is decrypted, and obtains described matrix coordinate to be verified.
It should be noted that, the method described in Fig. 5, compared with the method described in Fig. 1, is only that the angle described is different, other guide is all identical, in view of length restriction, no longer the method described in Fig. 5 is described in detail here, relevant content refers to introduction above.
Obtain user's private key and the process of matrix correlation information in order to embody better first terminal equipment in the method that the embodiment of the present application provides, be introduced below by the flow chart shown in Fig. 6.
First the process that, first terminal equipment obtains user's private key comprises:
S601: user opens Web webpage in first terminal equipment, signs in to server after the user name of registration and password before input, and obtains private key to server request;
S602: server generates PKI and private key for this user, preserves PKI in this locality;
S603: private key is returned to first terminal equipment by http protocol;
S604: the private key that first terminal equipment interconnection is received is preserved.
Afterwards, user just can ask to bind matrix correlation information in first terminal equipment, specifically can initiate bind request by the second terminal equipment, and its binding procedure comprises:
S605: user opens Web webpage in the second terminal equipment, signs in to server after the user name of registration and password before input, and to server request binding matrix correlation information;
S606: server generator matrix relevant information, and after being encrypted with this user's PKI, generate Quick Response Code data;
S607: described 2-D data is returned to the second terminal equipment;
S608: the Quick Response Code data that the second terminal equipment returns to server in the Web page are shown as two-dimension code image;
S609: user starts the destination application of installing in first terminal equipment, after image-pickup device is activated, takes this two-dimension code image;
S610: two-dimension code image is decoded, and utilize the private key getting in step S604 to be decrypted, obtain matrix correlation information;
S611: the matrix correlation information that deciphering is obtained is preserved in first terminal equipment.
In addition, referring to Fig. 7, it is the example of a concrete proof of identity process, can comprise the following steps:
S701: user opens Web webpage in the second terminal equipment, after inputting user name and password, sign in to server, and for example, in the time carrying out certain associative operation,, the operations such as transaction, payment payment for goods, account transfer, amendment user profile, enter into user identity verification interface;
S702: server is selected matrix coordinate to be verified, and utilize this user's PKI to be encrypted;
S703: the data after encrypting are encoded and obtained Quick Response Code data;
S704: Quick Response Code data are returned to the second terminal equipment;
S705: the second terminal equipment is two-dimensional code display picture in the Web page;
S706: user starts the destination application of installing in first terminal equipment, after image-pickup device is activated, takes this two-dimension code image;
S707: two-dimension code image is decoded, and utilize this user's private key to be decrypted, obtain matrix coordinate to be verified;
S708: inquire about the target value that this matrix coordinate to be verified is corresponding in this user's who preserves in advance matrix correlation information;
S709: demonstrate this target value on the display screen of first terminal equipment;
S710: user checks the target value showing in first terminal equipment, is input in the input frame showing in the Web page of the second terminal equipment;
S711: the value in input frame is submitted to server;
S712: the value that server is submitted to according to the second terminal equipment, and the active user's who preserves in advance matrix correlation information, active user is carried out to user identity verification.
Finally it should be noted that, in actual applications, involved matrix correlation information is not limited to two-dimensional matrix, can be also one or more dimensions.In addition, in the embodiment of the present application, first terminal equipment, after inquiring the target value that matrix coordinate to be verified is corresponding, also can convert thereof into voice signal, then plays by first terminal equipment.For example, target value is " 679834 ", can generate voice signal, also simulates voice and reads the character comprising in target value, user just can be according to the voice signal of hearing like this, and what the target value of knowing in the input frame that be input to the Web page is.Certainly, in actual applications, in can also both demonstrating target value on the display screen of first terminal equipment, play voice signal by the mode of voice, user can be seen and also can hear concrete target value.
The first terminal equipment side providing with the embodiment of the present application corresponding based on matrix-valued user identity method of calibration, it is a kind of based on matrix-valued user identity calibration equipment that the embodiment of the present application also provides, certainly, this device is to be applied in first terminal equipment, referring to Fig. 8, this device can comprise:
Signal gathering unit 801, for gathering the first media signal of the second terminal equipment output by the signal pickup assembly of first terminal equipment; Wherein, described the first media signal is, in the time that to designated user, user identity verification is carried out in the operation on described the second terminal equipment, select matrix coordinate to be verified by described server, and utilize the PKI generating for this designated user to be in advance encrypted described matrix coordinate to be verified, matrix coordinate to be verified after encrypting is encoded and generated the first media data, and return to described the second terminal equipment, described the second terminal equipment utilizes its signal output apparatus by the signal of described the first media data output, i.e. described the first media signal;
Signal resolution unit 802, for described the first media signal is decoded, and utilizes the private key corresponding with described PKI obtaining to be in advance decrypted the information obtaining of decoding, and obtains described matrix coordinate to be verified;
Value output unit 803, for inquiring about the matrix correlation information for this designated user generation of obtaining in advance, obtain target value corresponding to described matrix coordinate to be verified, and by the signal output apparatus of described first terminal equipment, described target value is exported, so that inputting described target value described the second terminal equipment and be submitted to server, user carries out verification; Wherein, described matrix correlation information comprises the coordinate and value corresponding to each coordinate that in matrix, comprise.
Wherein, described the first media signal is specially, in the time that to designated user, user identity verification is carried out in the operation on described the second terminal equipment, select matrix coordinate to be verified by described server, and utilize the PKI generating for this designated user to be in advance encrypted described matrix coordinate to be verified, matrix coordinate to be verified after encrypting is encoded and generated the first media data, and returning to described the second terminal equipment, described the second terminal equipment utilizes its signal output apparatus that described the first media data is output as to described the first media signal; Described signal resolution unit 802, specifically for described the first media signal is decoded, and utilizes the private key corresponding with described PKI obtaining to be in advance decrypted the information obtaining of decoding, and obtains described matrix coordinate to be verified.
Wherein, when specific implementation, the first media data that server generates can be barcode data (such as Quick Response Code etc.), and described the second terminal equipment is output as picture signal by its display screen by described barcode data, now, signal gathering unit 801 can comprise:
Image information collecting subelement, for gathering the picture signal of the demonstration screen display of the second terminal equipment by the image collecting device on first terminal equipment.
In addition, the first media data that server generates also can comprise voice data, and corresponding, the second terminal equipment can be output as audio signal by described voice data by its programming audio frequency interface, and now, signal gathering unit 801 can comprise:
Audio-frequency information gathers subelement, the audio signal of playing for gather the second terminal equipment by the audio collecting device on first terminal equipment.
Wherein, described first terminal equipment specifically can be by obtaining the private key for deciphering with lower unit:
Login unit, for in the time that described designated user signs in to server on by described first terminal equipment, the key to described server request for deciphering, so that described server generates after PKI and corresponding private key, PKI is kept to server this locality, private key is returned;
The first storage unit, receives after the private key that described server returns for described first terminal equipment, preserves in described first terminal equipment this locality.
Described first terminal equipment specifically can be by obtaining user's matrix correlation information with lower unit:
Collecting unit, for gathering the second media signal of the second terminal equipment output by the signal pickup assembly of first terminal equipment, wherein, described the second media signal is, in the time that user signs in to server request binding matrix correlation information on described the second terminal equipment, be value corresponding to this each coordinate of user's generator matrix by described server, be kept at server this locality, and utilize described PKI to be encrypted value corresponding to each coordinate of described matrix, information after encrypting is encoded and generated the second media data, and return to described the second terminal equipment, described the second terminal equipment utilizes its signal output apparatus that described the second media data is output as to described the second media signal,
The second storage unit, for described the second media signal is decoded, and utilizes described private key to be decrypted the information obtaining of decoding, and obtains value corresponding to each coordinate of matrix, and preserves in described first terminal equipment this locality.
When specific implementation, value output unit 803 can comprise:
Show subelement, for described target value being presented to the display screen of described first terminal equipment;
And/or,
Speech play subelement, for described target value is converted to voice signal, and plays this voice signal by the programming audio frequency interface of described first terminal equipment.
Described matrix comprises two-dimensional matrix or multi-dimensional matrix.
The server side providing with the embodiment of the present application corresponding based on matrix-valued user identity method of calibration, it is a kind of based on matrix-valued user identity check system that the embodiment of the present application also provides, this system applies is in server side, and referring to Fig. 9, this system can comprise:
Matrix coordinate selection unit 901, in the time that user identity verification is carried out in the operation on the second terminal equipment to designated user, selects matrix coordinate to be verified;
The first media data generation unit 902, for utilizing the PKI generating for this designated user to be in advance encrypted described matrix coordinate to be verified, and encodes and generates the first media data the matrix coordinate to be verified after encrypting;
The first media data returns to unit 903, for described the first media data is returned to described the second terminal equipment, so that described the second terminal equipment utilizes its signal output apparatus that described the first media data is output as to described the first media signal, gather described the first media signal by the signal pickup assembly of first terminal equipment, and after decoding, the information of utilizing the private key corresponding with described PKI obtaining in advance to obtain decoding is decrypted, obtain after described matrix coordinate to be verified, the matrix correlation information for this user's generation that inquiry is obtained in advance, obtain target value corresponding to described matrix coordinate to be verified, and by the signal output apparatus of described first terminal equipment, described target value is exported, wherein, described matrix correlation information comprises the coordinate and value corresponding to each coordinate that in matrix, comprise,
Verification unit 904, for receiving after the described target value of described designated user by described the second terminal equipment input, carries out verification according to the matrix correlation information generating for this designated user in advance.
Wherein, the concrete media data generating of described the first media data generation unit 901 can comprise the barcode data for showing at the second terminal equipment, or, for the voice data of playing at the second terminal equipment.In a word, in the second terminal equipment, can export a kind of media signal of having encrypted for the deciphering that gathers and decode of first terminal equipment, finally in first terminal equipment, export the target value that matrix coordinate to be verified is corresponding, be input in the Web page input frame of the second terminal equipment for user, and be submitted to server and carry out proof of identity.
In a word, in the embodiment of the present application, first, user's matrix correlation information (comprising coordinate and value corresponding to each coordinate that matrix comprises) is to be kept in user's first terminal equipment, user no longer holds the entity cards such as matrix card, matrix correlation information is unknowable for user, therefore, can avoid lawless person to say the matrix correlation information of oneself by the mode user cheating of making a phone call; Secondly, belong to different physical entities for the first terminal equipment of preservation matrix relevant information and user's actual log server and to the second terminal equipment of account executable operations, therefore, also further reduced the probability that matrix correlation information is got by the rogue program in the second terminal.Moreover, when server sends matrix coordinate to be verified to the second terminal equipment, can utilize active user's PKI to be encrypted, and encode, make the second terminal equipment adopt the form of certain media signal to export; This media signal is what cannot obtain about the specifying information of matrix coordinate from surface, therefore, can avoid being identified concrete coordinate figure by rogue program on the one hand, on the other hand, even if wanting emulating server to generate similar media signal, rogue program inquires user, also can be due to each user's PKI difference, make the media signal that rogue program simulates can not be by first terminal recognition of devices, therefore, user also cannot make and replying to rogue program, therefore, avoid user by the matrix correlation leakage of information of oneself to rogue program.In a word, the embodiment of the present invention can improve the fail safe of user's matrix correlation information from many aspects, thereby improves the validity while carrying out user identity verification based on matrix value.
As seen through the above description of the embodiments, those skilled in the art can be well understood to the mode that the application can add essential general hardware platform by software and realizes.Based on such understanding, the part that the application's technical scheme contributes to prior art in essence in other words can embody with the form of software product, this computer software product can be stored in storage medium, as ROM/RAM, magnetic disc, CD etc., comprise that some instructions (can be personal computers in order to make a computer equipment, server, or the network equipment etc.) carry out the method described in some part of each embodiment of the application or embodiment.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, between each embodiment identical similar part mutually referring to, what each embodiment stressed is and the difference of other embodiment.Especially,, for system or system embodiment, because it is substantially similar in appearance to embodiment of the method, so describe fairly simplely, relevant part is referring to the part explanation of embodiment of the method.System described above and system embodiment are only schematic, the wherein said unit as separating component explanation can or can not be also physically to separate, the parts that show as unit can be or can not be also physical locations, can be positioned at a place, or also can be distributed in multiple network element.Can select according to the actual needs some or all of module wherein to realize the object of the present embodiment scheme.Those of ordinary skill in the art, in the situation that not paying creative work, are appreciated that and implement.
Above the application is provided based on matrix-valued user identity method of calibration, Apparatus and system, be described in detail, applied principle and the execution mode of specific case to the application herein and set forth, the explanation of above embodiment is just for helping to understand the application's method and core concept thereof; Meanwhile, for one of ordinary skill in the art, according to the application's thought, all will change in specific embodiments and applications.In sum, this description should not be construed as the restriction to the application.

Claims (11)

1. based on a matrix-valued user identity method of calibration, it is characterized in that, comprising:
Gather the first media signal of the second terminal equipment output by the signal pickup assembly of first terminal equipment; Wherein, described the first media signal is, in the time that to designated user, user identity verification is carried out in the operation on described the second terminal equipment, select matrix coordinate to be verified by described server, matrix coordinate to be verified is encoded and generated the first media data, and returning to described the second terminal equipment, described the second terminal equipment utilizes its signal output apparatus by the signal of described the first media data output;
Described the first media signal is decoded, obtain described matrix coordinate to be verified;
The matrix correlation information for this designated user generation that inquiry is obtained in advance, obtain target value corresponding to described matrix coordinate to be verified, and by the signal output apparatus of described first terminal equipment, described target value is exported, so that inputting described target value described the second terminal equipment and be submitted to server, user carries out verification; Wherein, described matrix correlation information comprises the coordinate and value corresponding to each coordinate that in matrix, comprise.
2. method according to claim 1, is characterized in that,
After described server is selected matrix coordinate to be verified, utilize the PKI generating for this designated user to be in advance encrypted described matrix coordinate to be verified, the matrix coordinate to be verified after encrypting is encoded and generated the first media data;
After described the first media signal is decoded, the information of also utilizing the private key corresponding with described PKI obtaining in advance to obtain decoding is decrypted, to obtain described matrix coordinate to be verified.
3. method according to claim 1, is characterized in that,
The first media data that described server generates comprises barcode data, and described the second terminal equipment is output as picture signal by its display screen by described barcode data; Describedly gather by the signal pickup assembly on first terminal equipment the first media signal of exporting on the second terminal equipment and comprise:
Gather the picture signal of the demonstration screen display of the second terminal equipment by the image collecting device on first terminal equipment.
4. method according to claim 1, is characterized in that, the first media data that described server generates comprises voice data, and described the second terminal equipment is output as audio signal by its programming audio frequency interface by described voice data; Describedly gather by the signal pickup assembly on first terminal equipment the first media signal of exporting on the second terminal equipment and comprise:
Gather by the audio collecting device on first terminal equipment the audio signal that the second terminal equipment is play.
5. method according to claim 2, is characterized in that, obtains in the following manner the private key corresponding with described PKI:
In the time that described designated user signs in to server on by described first terminal equipment, key to described server request for deciphering, so that described server generates after the private key of PKI and correspondence at random, PKI is kept to server this locality, private key is returned;
Receive after the private key that described server returns, preserve in described first terminal equipment this locality.
6. method according to claim 2, is characterized in that, obtains in the following manner and described matrix correlation information:
Gather the second media signal of the second terminal equipment output by the signal pickup assembly of first terminal equipment; Wherein, described the second media signal is, in the time that user signs in to server request binding matrix correlation information on described the second terminal equipment, be value corresponding to each coordinate of the random generator matrix of this user by described server, be kept at server this locality, and utilize described PKI to be encrypted value corresponding to each coordinate of described matrix, information after encrypting is encoded and generated the second media data, and returning to described the second terminal equipment, described the second terminal equipment utilizes its signal output apparatus by the signal of described the second media data output;
Described the second media signal is decoded, and utilize described private key to be decrypted the information obtaining of decoding, obtain value corresponding to each coordinate of matrix, and preserve in described first terminal equipment this locality.
7. according to the method described in claim 1 to 6 any one, it is characterized in that, the described signal output apparatus by described first terminal equipment comprises described target value output:
Described target value is presented on the display screen of described first terminal equipment;
And/or,
Described target value is converted to voice signal, and plays this voice signal by the programming audio frequency interface of described first terminal equipment.
8. according to the method described in claim 1 to 6 any one, it is characterized in that, described matrix comprises two-dimensional matrix or multi-dimensional matrix.
9. based on a matrix-valued user identity method of calibration, it is characterized in that, comprising:
In the time that user identity verification is carried out in the operation on the second terminal equipment to designated user, select matrix coordinate to be verified;
Matrix coordinate to be verified is encoded and generated the first media data;
Described the first media data is returned to described the second terminal equipment, so that described the second terminal equipment utilizes its signal output apparatus that described the first media data is output as to described the first media signal, gather described the first media signal by the signal pickup assembly of first terminal equipment, and after decoding, , obtain described matrix coordinate to be verified, the matrix correlation information for this user's generation that inquiry is obtained in advance, obtain target value corresponding to described matrix coordinate to be verified, and by the signal output apparatus of described first terminal equipment, described target value is exported, wherein, described matrix correlation information comprises the coordinate and value corresponding to each coordinate that in matrix, comprise,
Receive after the described target value of described designated user by described the second terminal equipment input, carry out verification according to the matrix correlation information generating for this designated user in advance.
10. based on a matrix-valued user identity calibration equipment, it is characterized in that, comprising:
Signal gathering unit, for gathering the first media signal of the second terminal equipment output by the signal pickup assembly of first terminal equipment; Wherein, described the first media signal is, in the time that to designated user, user identity verification is carried out in the operation on described the second terminal equipment, select matrix coordinate to be verified by described server, matrix coordinate to be verified is encoded and generated the first media data, and returning to described the second terminal equipment, described the second terminal equipment utilizes its signal output apparatus by the signal of described the first media data output;
Signal resolution unit, for described the first media signal is decoded, obtains described matrix coordinate to be verified;
Value output unit, for inquiring about the matrix correlation information for this designated user generation of obtaining in advance, obtain target value corresponding to described matrix coordinate to be verified, and by the signal output apparatus of described first terminal equipment, described target value is exported, so that inputting described target value described the second terminal equipment and be submitted to server, user carries out verification; Wherein, described matrix correlation information comprises the coordinate and value corresponding to each coordinate that in matrix, comprise.
11. 1 kinds based on matrix-valued user identity check system, it is characterized in that, comprising:
Matrix coordinate selection unit, in the time that user identity verification is carried out in the operation on the second terminal equipment to designated user, selects matrix coordinate to be verified;
The first media data generation unit, for encoding and generate the first media data the matrix coordinate to be verified after encrypting;
The first media data returns to unit, for described the first media data is returned to described the second terminal equipment, so that described the second terminal equipment utilizes its signal output apparatus that described the first media data is output as to described the first media signal, gather described the first media signal by the signal pickup assembly of first terminal equipment, and after decoding, obtain described matrix coordinate to be verified, the matrix correlation information for this user's generation that inquiry is obtained in advance, obtain target value corresponding to described matrix coordinate to be verified, and by the signal output apparatus of described first terminal equipment, described target value is exported, wherein, described matrix correlation information comprises the coordinate and value corresponding to each coordinate that in matrix, comprise,
Verification unit, for receiving after the described target value of described designated user by described the second terminal equipment input, carries out verification according to the matrix correlation information generating for this designated user in advance.
CN201310103000.XA 2013-03-27 2013-03-27 User identity method of calibration based on matrix value, apparatus and system Active CN104079405B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310103000.XA CN104079405B (en) 2013-03-27 2013-03-27 User identity method of calibration based on matrix value, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310103000.XA CN104079405B (en) 2013-03-27 2013-03-27 User identity method of calibration based on matrix value, apparatus and system

Publications (2)

Publication Number Publication Date
CN104079405A true CN104079405A (en) 2014-10-01
CN104079405B CN104079405B (en) 2017-08-22

Family

ID=51600463

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310103000.XA Active CN104079405B (en) 2013-03-27 2013-03-27 User identity method of calibration based on matrix value, apparatus and system

Country Status (1)

Country Link
CN (1) CN104079405B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209738A (en) * 2015-05-05 2016-12-07 阿里巴巴集团控股有限公司 A kind of secret key verification method and equipment
CN112104652A (en) * 2020-09-15 2020-12-18 北京百度网讯科技有限公司 Identity verification method, apparatus, device and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5937068A (en) * 1996-03-22 1999-08-10 Activcard System and method for user authentication employing dynamic encryption variables
CN101060403A (en) * 2006-04-18 2007-10-24 钟曦辰 Wireless communication terminal-based interactive dynamic password safety service system
CN102130909A (en) * 2011-02-22 2011-07-20 中兴通讯股份有限公司 Authentication method and system
CN102821106A (en) * 2012-08-22 2012-12-12 句容市盛世软件有限公司 Electronic document non-repudiation method
CN102841997A (en) * 2012-07-10 2012-12-26 郭小卫 Method and device for achieving authentication on intelligent device by mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5937068A (en) * 1996-03-22 1999-08-10 Activcard System and method for user authentication employing dynamic encryption variables
CN101060403A (en) * 2006-04-18 2007-10-24 钟曦辰 Wireless communication terminal-based interactive dynamic password safety service system
CN102130909A (en) * 2011-02-22 2011-07-20 中兴通讯股份有限公司 Authentication method and system
CN102841997A (en) * 2012-07-10 2012-12-26 郭小卫 Method and device for achieving authentication on intelligent device by mobile terminal
CN102821106A (en) * 2012-08-22 2012-12-12 句容市盛世软件有限公司 Electronic document non-repudiation method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209738A (en) * 2015-05-05 2016-12-07 阿里巴巴集团控股有限公司 A kind of secret key verification method and equipment
CN106209738B (en) * 2015-05-05 2019-06-21 阿里巴巴集团控股有限公司 A kind of secret key verification method and equipment
CN112104652A (en) * 2020-09-15 2020-12-18 北京百度网讯科技有限公司 Identity verification method, apparatus, device and medium

Also Published As

Publication number Publication date
CN104079405B (en) 2017-08-22

Similar Documents

Publication Publication Date Title
CN105591744B (en) A kind of genuine cyber identification authentication method and system
CN102457378B (en) Security model for industrial devices
CN110226318B (en) Private transactions over a workflow management blockchain based network
US8122255B2 (en) Methods and systems for digital authentication using digitally signed images
CN110383759B (en) Method and system for managing communication between consensus node and client node
RU2610419C2 (en) Method, server and system for authentication of person
CN109314635A (en) Resource management based on block chain
US20120264405A1 (en) Verification of transactional integrity
CN103621128B (en) Safety based on context is calculated
CN104796257A (en) Flexible data authentication
US20140351583A1 (en) Method of implementing a right over a content
CN110933109B (en) Dynamic small program authentication method and device
CN103973445A (en) Two-channel login method and system
CN111931209B (en) Contract information verification method and device based on zero knowledge proof
CN112953970A (en) Identity authentication method and identity authentication system
CN104168117B (en) A kind of speech digit endorsement method
Young et al. BadVoice: Soundless voice-control replay attack on modern smartphones
CN103812837A (en) Electronic certificate sending method
US11282045B2 (en) Methods, devices, and systems for verifying digital tickets at a client
CN113569263A (en) Secure processing method and device for cross-private-domain data and electronic equipment
CN104079405A (en) User identity verification method, device and system based on matrix value
CN111464295B (en) Bank card making method and device
KR20140001442A (en) System, apparatus, method and computer readable recording medium for paymenting on the mobile terminal by the short message service
CN106102053A (en) A kind of implementation method of voice communication authentication based on the close algorithm of state
CN106713248B (en) Method for applying virtual card online, user terminal and system for applying virtual card online

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant