CN104079405B - User identity method of calibration based on matrix value, apparatus and system - Google Patents

User identity method of calibration based on matrix value, apparatus and system Download PDF

Info

Publication number
CN104079405B
CN104079405B CN201310103000.XA CN201310103000A CN104079405B CN 104079405 B CN104079405 B CN 104079405B CN 201310103000 A CN201310103000 A CN 201310103000A CN 104079405 B CN104079405 B CN 104079405B
Authority
CN
China
Prior art keywords
terminal equipment
matrix
user
coordinate
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310103000.XA
Other languages
Chinese (zh)
Other versions
CN104079405A (en
Inventor
吴斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201310103000.XA priority Critical patent/CN104079405B/en
Publication of CN104079405A publication Critical patent/CN104079405A/en
Application granted granted Critical
Publication of CN104079405B publication Critical patent/CN104079405B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

This application discloses the user identity method of calibration based on matrix value, apparatus and system, wherein, methods described includes:The first media signal that second terminal equipment is exported is gathered by the signal pickup assembly of first terminal equipment;First media signal is decoded, the matrix coordinate to be verified is obtained;Inquire about the matrix correlation information that user's generation is specified for this obtained in advance, obtain the corresponding target value of the matrix coordinate to be verified, and exported the target value by the signal output apparatus of the first terminal equipment, verified so that the target value is inputted the second terminal equipment and be submitted to server by user.Pass through the application, it is possible to increase the security of user's matrix card information, and then improve validity when safety check is carried out based on matrix value.

Description

User identity method of calibration based on matrix value, apparatus and system
Technical field
The application is related to user identity calibration technology field, the user identity verification side more particularly to based on matrix value Method, apparatus and system.
Background technology
Large-scale website generally existing accounts information safety problem, especially financial web site is even more the target of public criticism.At present, account The main flow of information security technology is based on improving verification authority security, by the way of repeatedly verifying.That is, While conventional proof of identity (referred to as conventional verification) is carried out to user name and login password, in addition it is also necessary to entered by other approach The complementary proof of identity (abbreviation auxiliary examination) of row, only routinely verification and auxiliary examination all by when, could allow Active user carries out follow-up operation.
On auxiliary examination, a kind of approach for realizing is, using " enquirement-response " pattern, namely from Website server to User carries out " enquirement ", and user carries out " answer ", if user answers correct, verification passes through.For general Websites, one As can be shown to user one carry identifying code (being typically made up of numeral, letter etc.) picture, it is desirable to user input picture In identifying code, if user's input is correct, pass through checking.But, in this fashion, the answer of problem is in fact straight Connect in the problem of being shown in, therefore, if hacker can intercept the picture and can recognize that the identifying code in picture, can compare It is relatively hazardous.Also relatively senior verification mode is taken in some websites:Show a problem (for example, inquiring certain mathematics in picture Establishment condition of formula etc.), corresponding answer is then provided by user.Do not directly display out and answer in this mode, in problem Case, still, what the answer that substantially all users both know about problem is, accordingly, is also just easy to be cracked by machine.Therefore, For the high website of requirement for Web bank etc. to user information safety, above-mentioned auxiliary examination mode all seems inadequate Reliably.
In the prior art, as a representative by " enquirement-response " pattern, " matrix card " (" password card " etc. is also known as, Most common form is that the random digit of one one to three occurs in 8 × 10 lattice two-dimensional digital matrixes, each grid, is passed through The numeral inputted in correct matrix coordinate correspondence position is verified to user identity) often by the financial class such as Web bank Website is used.For example, certain bank provides matrix card to net silver autograph user and voluntarily preserved by user, auxiliary examination is being carried out When, initiate the enquirement of coordinate position at random by Website server, user then finds corresponding value according to coordinate position, submit Verified to server.For example, server puts question to " 3D8E ", then user, which can inquire the corresponding value of coordinate " 3D ", is " 71 ", the corresponding value of coordinate " 8E " is " 56 ", then, it is possible to which " 7156 " are submitted into server as the answer of the problem Verified.It can be seen that, under this implementation, enable to answer not to be directly displayed in problem, and only know The user of value in road matrix card on each coordinate just can know that the answer of problem, therefore, and security is higher.
But, there is potential safety hazard in the prior art in this verification mode for carrying out user identity based on matrix value, this Plant potential safety hazard to essentially consist in, the information in the matrix card of user has compromised possibility.For example, fishing website can be imitated Server site is initiated coordinate and putd question to, and obtains the corresponding value of user's input.Then obtained value is recorded one by one, Finally get the corresponding value of each coordinate in matrix card.User login services device website can thus be pretended to be, clothes are answered The enquirement of business device website, and it is finally reached illegal objective.Or, fishing website can also be swindled to know using phone etc. Value corresponding to each coordinate position of the matrix card of user, so can disguise oneself as user come carry out it is illegal operation, etc..Can See, once the matrix card information of user is compromised, then this proof of identity based on matrix value is just failed.In a word, compel to be essential The technical problem for wanting those skilled in the art to solve is that:The security of user's matrix card information how is improved, and then is improved Validity during safety check is carried out based on matrix value.
The content of the invention
This application provides the user identity method of calibration based on matrix value, apparatus and system, it is possible to increase user's matrix The security of card information, and then improve validity when safety check is carried out based on matrix value.
This application provides following scheme:
A kind of user identity method of calibration based on matrix value, including:
The first media signal that second terminal equipment is exported is gathered by the signal pickup assembly of first terminal equipment;Its In, when to specifying operation of the user in the second terminal equipment to carry out user identity verification, selected by the server Matrix coordinate to be verified, coding the first media data of generation is carried out to matrix coordinate to be verified, and return to described second First media data is output as first matchmaker by terminal device, described its signal output apparatus of second terminal equipment utilization Body signal;
First media signal is decoded, the matrix coordinate to be verified is obtained;
The matrix correlation information that user's generation is specified for this obtained in advance is inquired about, the matrix coordinate to be verified is obtained Corresponding target value, and being exported the target value by the signal output apparatus of the first terminal equipment, so as to The target value is inputted the second terminal equipment and is submitted to server and verified by family;Wherein, the matrix correlation Information includes coordinate and the corresponding value of each coordinate included in matrix.
A kind of user identity method of calibration based on matrix value, including:
When to specifying operation of the user in second terminal equipment to carry out user identity verification, matrix to be verified is selected Coordinate;
Coding the first media data of generation is carried out to matrix coordinate to be verified;
First media data is returned into the second terminal equipment, so as to its letter of the second terminal equipment utilization First media data is output as first media signal by number output device, passes through the signal acquisition of first terminal equipment Device gathers first media signal, and after being decoded, obtains the matrix coordinate to be verified, and inquiry is obtained in advance The matrix correlation information generated for the user, obtain the corresponding target value of the matrix coordinate to be verified, and pass through institute The signal output apparatus for stating first terminal equipment exports the target value;Wherein, the matrix correlation information includes matrix In the coordinate that includes and the corresponding value of each coordinate;
Receive after the target value that the specified user is inputted by the second terminal equipment, according to being in advance This specifies the matrix correlation information of user's generation to be verified.
A kind of user identity calibration equipment based on matrix value, including:
Signal gathering unit, gathers what second terminal equipment was exported for the signal pickup assembly by first terminal equipment First media signal;Wherein, when to specifying operation of the user in the second terminal equipment to carry out user identity verification, by The server selects matrix coordinate to be verified, and coding the first media data of generation is carried out to matrix coordinate to be verified, and The second terminal equipment is returned to, described its signal output apparatus of second terminal equipment utilization is defeated by first media data Go out for first media signal;
Signal resolution unit, for being decoded to first media signal, obtains the matrix coordinate to be verified;
Value output unit, what is obtained in advance for inquiring about specifies the matrix correlation information of user's generation for this, obtains institute State the corresponding target value of matrix coordinate to be verified, and by the signal output apparatus of the first terminal equipment by the mesh Value output is marked, is verified so that the target value is inputted the second terminal equipment and be submitted to server by user; Wherein, the matrix correlation information includes coordinate and the corresponding value of each coordinate included in matrix.
A kind of user identity check system based on matrix value, including:
Matrix coordinate selecting unit, for specifying operation of the user in second terminal equipment to carry out user identity school When testing, matrix coordinate to be verified is selected;
First media data generation unit, for carrying out coding the first media data of generation to matrix coordinate to be verified;
First media data returning unit, for first media data to be returned into the second terminal equipment, with Toilet states its signal output apparatus of second terminal equipment utilization and first media data is output as into first media signal, First media signal is gathered by the signal pickup assembly of first terminal equipment, and after being decoded, obtains described treat The matrix coordinate of verification, inquires about the matrix correlation information generated for the user obtained in advance, obtains the matrix to be verified The corresponding target value of coordinate, and exported the target value by the signal output apparatus of the first terminal equipment;Its In, the matrix correlation information includes coordinate and the corresponding value of each coordinate included in matrix;
Verification unit, for receiving the target value that the specified user is inputted by the second terminal equipment Afterwards, verified according to the matrix correlation information generated in advance for the specified user.
The specific embodiment provided according to the application, the application has reached following technique effect:
The embodiment of the present application has advantages below:
First, the matrix correlation information (including the coordinate that includes of matrix and the corresponding value of each coordinate) of user is to protect In the first terminal equipment that there is user, user no longer holds the entity card such as matrix card, and matrix correlation information is for a user It is unknowable, believes it can thus be avoided criminal says the matrix correlation of oneself by the mode user cheating such as make a phone call Breath;
Secondly, for preservation matrix relevant information first terminal equipment and user's actual log server and account is held The second terminal equipment of row operation belongs to different physical individuals, therefore, also reduce further matrix correlation information by second The probability that rogue program in terminal is got;
Furthermore, when server is to second terminal equipment transmission matrix coordinate to be verified, it can not be and directly transmit, but It is encrypted, and is encoded first with the public key of active user so that second terminal equipment is using certain media signal Form is exported;This media signal is that can not obtain the specifying information on matrix coordinate from surface, therefore, on the one hand It can avoid identifying specific coordinate value by rogue program, on the other hand, even if rogue program wants emulating server generation class As media signal inquire user, also due to the public key of each user is different so that the media letter that rogue program simulates Number can not be recognized by first terminal equipment, therefore, user also responds without normal direction rogue program, therefore, it is to avoid user incite somebody to action from Oneself matrix correlation leakage of information is to rogue program.In a word, the embodiment of the present application can improve the matrix of user from many aspects The security of relevant information, so as to improve validity when user identity verification is carried out based on matrix value.
Wherein it is possible to second terminal equipment output and first terminal equipment collection can be the images such as Quick Response Code letter Number, or can also be the audio signals such as music.
Certainly, any product for implementing the application it is not absolutely required to while reaching all the above advantage.
Brief description of the drawings
, below will be to institute in embodiment in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art The accompanying drawing needed to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the application Example, for those of ordinary skill in the art, on the premise of not paying creative work, can also be obtained according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is the flow chart of the method for the first terminal equipment side that the embodiment of the present application is provided;
Fig. 2 is the display interface schematic diagram in the second terminal equipment that the embodiment of the present application is provided;
Fig. 3 is the schematic diagram that the use first terminal equipment that the embodiment of the present application is provided gathers media signal;
Fig. 4 is the schematic diagram that the first terminal equipment that the embodiment of the present application is provided exports target value;
Fig. 5 is the flow chart of the method for the server side that the embodiment of the present application is provided;
Fig. 6 is the acquisition private key that the embodiment of the present application is provided and the method flow diagram of matrix correlation information;
Fig. 7 is the user identity checking procedure schematic diagram that the embodiment of the present application is provided;
Fig. 8 is the schematic diagram of the device for the first terminal equipment side that the embodiment of the present application is provided;
Fig. 9 is the schematic diagram of the system for the server side that the embodiment of the present application is provided.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is carried out clear, complete Site preparation is described, it is clear that described embodiment is only some embodiments of the present application, rather than whole embodiments.It is based on Embodiment in the application, the every other embodiment that those of ordinary skill in the art are obtained belongs to the application protection Scope.
Firstly the need of explanation, found during the application is realized, in the prior art by matrix value to safety Property carry out auxiliary checking when why easily utilized by fishing website, one main reasons is that, user directly holds matrix card, That is, user knows the corresponding relation between the value of each in matrix card and matrix coordinate, so, if criminal is logical The mode user cheating such as phone is crossed, user may can go out the matrix card leakage of information of oneself;On the other hand, server exists It is the coordinate of the directly display matrix in the page, so, rogue program can be identified by technologies such as picture recognitions during inquiry The coordinate of inquiry, user is inputted after corresponding value, and rogue program can grab the value of user's input again, therefore, clothes Business device often inquires that once rogue program is with regard to that can grab a corresponding relation between coordinate and value, repeatedly after crawl, just The full matrix card information of a user may be got, namely all coordinates and difference that are included in matrix card are corresponding Value.
Therefore, if can accomplish at following 2 points, the security of matrix card information can be improved:
First, the coordinate and the corresponding value condition of each coordinate included in matrix card is unknowable for a user 's;
Secondly, server does not show matrix coordinate directly when issuing the user with inquiry in the page, but to encrypt And the form of the signal obtained after encoding is present, this signal only has the identification facility by pre-saving specific decruption key It could recognize.
If 2 points of the above can be accomplished, then, on the one hand, even if criminal is cheated by means such as phones, As user and be unaware of the relevant information of its matrix card, and ensure information will not be compromised;On the other hand, due to each The cipher mode of user is different (encryption and decruption key are all different), so encrypted result is also just different.So, server The signal sent during inquiry by rogue program due to that can not be decrypted, therefore, and rogue program can not know specific matrix coordinate, i.e., The value for grabbing user's input is enabled, can not also know which coordinate corresponding be, therefore, it is impossible to get the complete of matrix card Whole information;And fishing website be allow to imitate server export a similar signal it is corresponding to user's query coordinate Value, also due to user encryption mode is different so that the signal can not be identified instrument and correctly recognize, and then also obtain less than Related value information, thus it is guaranteed that the safety of user's matrix card information, and then ensure to carry out safety check based on matrix value When validity.
In order to achieve the above object, the embodiment of the present application is mainly accomplished by the following way:
First, the embodiment of the present application is related to following functions entity in actual implementation process:
Server, for example, server of certain bank system of web etc., certain Account Logon to the server is passed through in certain user When wishing to carry out certain operation (be, for example, certain electronic order payment etc.), it is necessary to verify whether be user's initiation operation, Accordingly, it would be desirable to initiate to inquire to user, and the response message submitted according to user carries out actual checking procedure;
First terminal equipment, can be the terminal devices such as mobile phone, the tablet personal computer of user oneself, and the terminal device typically has There is Signals collecting function, for example, the acquisition function of picture signal, Neng Goutong can be realized by imaging first-class image collecting device Cross the audio collecting devices such as microphone and realize acquisition function of audio signal, etc.;In addition, the first terminal equipment also has one Fixed information storage function and it can install and run the operating system environment of application program.
Second terminal equipment, can be the terminal devices such as PC, naturally it is also possible to be the mobile terminals such as mobile phone, tablet personal computer Equipment, as long as belonging to different physical entities from first terminal equipment.The second terminal equipment is that user passes through Web page Etc. the terminal device where when signing in server, that is, user is that payment etc. and account are performed in the second terminal equipment Related operation, accordingly, server is when needing to initiate certain operation behavior in the second terminal equipment to user, in advance User identity is verified.
That is, the relation between three is:When user in second terminal equipment by signing in server, and pre-execution During certain operation behavior, server is verified to user identity, during verification, it is desirable to have first terminal equipment is matched somebody with somebody Close, verification could be completed.
When implementing, first, server end pre-saved each user distinguish corresponding matrix correlation information (namely Corresponding value is distinguished on the coordinate that matrix is included, and each coordinate), and the key for encryption.For certain user A Speech, pre-saves portion user A matrix correlation information, in addition in the first terminal equipment that the user A is specified, in addition it is also necessary to Preserve a key for being used to decrypt.Furthermore, in addition it is also necessary to a application is installed in the first terminal equipment that this is specified and implemented The application program (can certainly be solidificated in the form of hardware in first terminal equipment) that example is provided, journey is applied will pass through this Sequence is specifically operated.That is, for corresponding to certain user A, its matrix correlation information is to bind and be stored in the hand of oneself In the first terminal equipment such as machine, user A no longer holds the card in kind such as matrix card, and the user A can not also check oneself The matrix correlation information preserved in terminal device.
When user A opens Web page in second terminal equipment inputs user name and password login to server, service Device can randomly choose matrix coordinate to be verified, then, be not that matrix coordinate directly is returned into second terminal equipment, and It is that matrix coordinate to be verified is encrypted using the key (public key) of the corresponding user encryptions of user A, then to encryption Information afterwards is encoded, and is generated media data and returned to second terminal equipment.
Second terminal equipment is after the media data of server return is received, it is possible to use its signal output loaded dress Put and media data is output as media signal.
Now, user A can not directly know the implication of this each signal, but user A can start first terminal The application program that the embodiment of the present application installed in equipment is provided, the application program can be with automatic start first terminal equipment The media signal that signal pickup assembly collection second terminal equipment is sent, after being decoded to the media signal collected, is utilized The key (private key) for being used to decrypt pre-saved is decrypted, and so can be obtained by matrix coordinate to be verified.First eventually Matrix coordinate can't be supplied to user, but inquire about the user pre-saved by end equipment after matrix coordinate is obtained Matrix correlation information, get the corresponding value of matrix coordinate to be verified, then the signal by first terminal equipment is defeated Go out device to export corresponding value, such user can just know the corresponding answer of the problem of server is inquired, then by it In the corresponding answer input box of Web page being input in second terminal equipment, then it is submitted to server and is verified.
It can be seen that, in the embodiment of the present application, first, the matrix correlation information of user (including the coordinate that includes of matrix and The corresponding value of each coordinate) it is stored in the first terminal equipment of user, user no longer holds the entity card such as matrix card, square Battle array relevant information is unknowable for a user, it can thus be avoided criminal's user cheating by way of making a phone call Say the matrix correlation information of oneself;Secondly, the first terminal equipment and user's actual log for preservation matrix relevant information Server and to account perform operation second terminal equipment belong to different physical individuals, therefore, also reduce further square The probability that battle array relevant information is got by the rogue program in second terminal.Furthermore, server sends to second terminal equipment and treated During the matrix coordinate of verification, it can not be and directly transmit, but be encrypted first with the public key of active user, and compiled Code so that second terminal equipment is exported in the form of certain media signal;This media signal is to obtain from surface To the specifying information on matrix coordinate, therefore, it on the one hand can avoid identifying specific coordinate value by rogue program, it is another Aspect, even if rogue program wants emulating server and generates similar media signal to inquire user, also due to each user Public key it is different so that the media signal that rogue program is simulated can not be recognized that therefore, user can not yet by first terminal equipment Responded to rogue program, therefore, it is to avoid user is by the matrix correlation leakage of information of oneself to rogue program.In a word, this Shen Please embodiment can improve from many aspects user matrix correlation information security, used so as to improve based on matrix value The validity during proof of identity of family.
In summary, for the angle of first terminal equipment, the embodiment of the present application provide firstly a kind of based on matrix The user identity method of calibration of value, referring to Fig. 1, this method may comprise steps of:
S101:The first media letter that second terminal equipment is exported is gathered by the signal pickup assembly of first terminal equipment Number;Wherein, first media signal is to carry out user identity to operation of the specified user in the second terminal equipment During verification, matrix coordinate to be verified is selected by the server, and coding generation first is carried out to matrix coordinate to be verified Media data, and return to the second terminal equipment, described its signal output apparatus of second terminal equipment utilization is by described The signal of one media data output, i.e., described first media signal;
S102:First media signal is decoded, the matrix coordinate to be verified is obtained;
S103:The matrix correlation information that user's generation is specified for this obtained in advance is inquired about, the square to be verified is obtained The corresponding target value of battle array coordinate, and exported the target value by the signal output apparatus of the first terminal equipment, Verified so that the target value is inputted the second terminal equipment and be submitted to server by user;Wherein, the square Battle array relevant information includes coordinate and the corresponding value of each coordinate included in matrix.
Further, in the step S101, the server is selected after matrix coordinate to be verified, also using Specify the public key of user's generation that the matrix coordinate to be verified is encrypted for this in advance, to the square to be verified after encryption Battle array coordinate carries out coding the first media data of generation;In the step S102, when being decoded to first media signal, profit The information obtained with the private key corresponding with the public key obtained in advance to decoding is decrypted, and obtains the matrix to be verified Coordinate.
Wherein, when implementing, second terminal equipment export and by first terminal equipment gather can be image letter Number, can be a kind of bar code more specifically, for example, bar code, Quick Response Code etc..That is, server treats school have selected After the matrix coordinate tested, matrix coordinate can be encrypted first with active user's corresponding public key, then be entered Row coding, obtains a kind of barcode data, and return to second terminal equipment., can be in display after second terminal equipment is received Barcode data is shown as a kind of picture signal (being introduced here by taking Quick Response Code as an example) on screen.In this case, user Any information can not be with the naked eye obtained from Quick Response Code, after only the application program in first terminal equipment is activated, The information of correlation can be got, specifically after application program is activated, the first-class image-pickup device of shooting can be automatically opened up, so User can enter the image in 2 D code shown in the camera alignment second terminal device display screen of first terminal equipment afterwards Row is shot;Afterwards, the data for including Quick Response Code that the application program in first terminal equipment can just be obtained to shooting first Decoded, obtained information is exactly the matrix coordinate to be verified after encryption, then again with the private for the user known in advance Key is decrypted, it is possible to obtain matrix coordinate to be verified, then inquires about the matrix correlation information for the user known in advance, obtains Get the corresponding value of matrix coordinate to be verified.
For example, certain user signs in the server of certain Web bank on the PC (correspondence second terminal equipment) of oneself, When needing to carry out a certain payment operation, server sends a two-dimensional code data to the PC, can be with the display screen of PC The Quick Response Code is shown, while prompt message can also be provided.For example, the display that Fig. 2 show certain user's PC is shown A browser page, wherein showing an image in 2 D code, also show an input frame, and prompt message is " Quick Response Code please is shot with the Quick Response Code matrix card device on mobile phone, please check code is filled in input frame after shooting and carried out Verification ", wherein, " mobile phone " here is with regard to the first terminal equipment in correspondence the embodiment of the present application, " Quick Response Code matrix card device " With regard to the application program installed in first terminal equipment described in correspondence the embodiment of the present application.Afterwards, user just can be pre- First binding, which has in the mobile phone of the matrix correlation information of the user, starts " Quick Response Code matrix card device ", should " Quick Response Code matrix clamp Put " camera of mobile phone can be automatically turned on, as shown in figure 3, the camera of mobile phone can be aligned on PC display by user The Quick Response Code of display is shot, afterwards, it is possible to information of check code as shown in Figure 4 is seen in mobile phone screen.For example, aobvious It is " 458956 " to show check code, while can be with display reminding information:" check code above is please input to webpage verification defeated Enter inframe, then webpage clicking verification button, verified ".Wherein, " webpage verification frame " just refers to that the PC shown in Fig. 2 shows Show the input frame in the webpage shown in device.It can be seen that, in whole implementation process, user only knows defeated in certain checking procedure The check code entered is certain string numeral, and still, by the information included in Quick Response Code is not known by user, therefore, user is simultaneously In the matrix correlation information for not knowing oneself, the corresponding relation between matrix coordinate and value.
Under another implementation, second terminal equipment is exported and gathered by first terminal equipment can also be sound Frequency signal, that is to say, that server, can be corresponding first with active user after it have selected matrix coordinate to be verified Matrix coordinate is encrypted public key, is then encoded, and obtains a kind of voice data, and return to second terminal setting It is standby.After second terminal equipment is received, voice data can be output as by audio signal by its programming audio frequency interface, for example, It is probably one section of music etc..In this case, user can not directly from music it is pleasant to the ear go out any information, only first eventually After application program in end equipment is activated, the information of correlation can be just got.The specifically application in first terminal equipment After program is activated, the voice collection devices such as microphone can be automatically opened up, then, in order to preferably gather audio signal, are used The microphone of first terminal equipment can be directed at the loudspeaker of second terminal equipment by family;Afterwards, answering in first terminal equipment Just the audio signal received can be decoded first with program, obtained information is exactly the matrix to be verified after encryption Coordinate, is then decrypted with the private key for the user known in advance again, it is possible to is obtained matrix coordinate to be verified, then is inquired about The matrix correlation information for the user known in advance, gets the corresponding value of matrix coordinate to be verified.
Wherein, for above-mentioned audio signal implementation in second terminal equipment, it is necessary to play out corresponding audio Signal, first terminal equipment could be gathered effectively;Wherein, if second terminal equipment is portable notebook, mobile phone Deng mobile terminal, then audio output device can be typically come with, therefore, as long as user is not set to mute state, such as Open loudspeaker etc., it is possible to direct playing audio signal.Certainly, if it find that second terminal equipment is set to Jing Yin shape by user State, or by volume adjust it is too low, then can before playing audio signal, point out user open second terminal equipment audio Playing function, knows and heightens volume, etc..And if second terminal equipment is the equipment such as PC, then may itself not band There is audio output device, but the audio output devices such as audio amplifier may be circumscribed with, therefore, receiving the audio of server end return It after data, can detect whether there is audio output device in the external world to second terminal equipment, if not connected, point out user to connect Connect, if being connected to audio output device, still, power supply is not opened, then user can also be pointed out to first turn on the external sound Frequency output device.
It should be noted that either carrying out the biography of matrix coordinate to be verified using picture signal or audio signal Defeated, specific code encoding/decoding mode can be referring to the realization in existing image, the encoding and decoding technique of audio, and I will not elaborate.
In addition, the key information on the matrix correlation information preserved in first terminal equipment and for decryption, can To be to be saved in beforehand through certain mode in the first terminal equipment that user specifies.Journey is applied for example, being got in user A The installation file of sequence and during installing application program, can be directly by forms such as configuration files by installation file correspondence Matrix correlation information and key for decryption, be stored in first terminal equipment sheet as the information for distributing to the user A Ground.Certainly, in order to avoid the matrix correlation information and key of distributing to user are known by other users, further to improve Security, the embodiment of the present application additionally provides the reality that first terminal equipment obtains private key for user and the matrix correlation information of user Existing method.
In the method, the private key of each user can be in server end generation, and be sent to the of user by server One terminal device.When implementing, user name and password login can be inputted in the first terminal equipment of oneself by user To server, request server is that the user distributes key, and is returned in the first terminal equipment.Server is according to user's Log-on message, can generate the key (public key) for encryption and the key (private key) for decryption for user, that is to say, that For a user, server can generate a pair of secret keys for it, and one of them is used to encrypt, referred to as public key, and in clothes Business device end is preserved, and another is used to decrypt, and referred to as private key is, it is necessary to return to user., private key is being sent to the of user After one terminal device, preserved by the first terminal equipment of user.Wherein, in order to ensure the corresponding public key/private of each user Key is different, and server can carry out respectively each user generation public/private keys by the way of arranging key.In user First terminal equipment on get the private key for decryption after, subsequently when transmitting the information related to the user, service Device end is transmitted again after being encrypted first with the public key of the user, including the matrix correlation information on the user Transmission.
That is, the matrix correlation information on user, including the coordinate included in matrix, and each coordinate pair should Value etc., it by server is user's generation that can be, and the different users of correspondence, and matrix correlation information can not Together;Then, server can voluntarily preserve a matrix correlation information, together after for active user's generator matrix relevant information When specified to user a matrix correlation information sent in the first terminal equipment such as mobile phone of binding.
Wherein, when specifically binding matrix correlation information in the first terminal equipment specified to user, user can be straight Connected first terminal equipment and sign in server, bind request is sent to server, server can then utilize the public affairs of user The matrix correlation information of the user is encrypted key, is then transferred to first terminal equipment, after first terminal equipment is received, Matrix correlation information can be just got after being decrypted using the private key got before, is then protected locally Binding can be completed by depositing.
Or, in order to preferably ensure the security of matrix correlation information in the transmission, under another implementation, use Family can sign in server by second terminal equipment first, and bind request is initiated in the second terminal equipment.So, take Business device end can be just encrypted, Ran Houjin with the public key of the user first after for user's generator matrix related data Row coding obtains a kind of media data, and returns to second terminal equipment.Second terminal equipment receive this media data it Afterwards, equally media data can be output as media signal using the signal output apparatus of its loading.Now, user can just beat The application program installed in first terminal equipment is opened, the application program automatically activated signal harvester, to second terminal equipment The media signal of middle output is acquired, and the data collected are decoded, the use got before recycling afterwards Decoded data are decrypted the private key at family, you can obtain the matrix correlation information of the user, then set in first terminal It is standby locally to be preserved.Wherein, involved media data, media signal etc. here, it is and described previously similar, equally both may be used To be realized using the picture signal such as Quick Response Code, it would however also be possible to employ the audio signal such as music realizes, concrete principle with it is described previously It is similar, repeat no more here.
It is described above that mainly the proof of identity method that the embodiment of the present application is provided is carried out from first terminal equipment angle Introduce, below from server side, the user identity method of calibration based on matrix value that inventive embodiments are provided be introduced, Referring to Fig. 5, this method may comprise steps of:
S501:When to specifying operation of the user in second terminal equipment to carry out user identity verification, select to be verified Matrix coordinate;
S502:Coding the first media data of generation is carried out to matrix coordinate to be verified;
S503:First media data is returned into the second terminal equipment, so as to second terminal equipment profit First media data is output as first media signal with its signal output apparatus, passes through the letter of first terminal equipment Number harvester gathers first media signal, and after being decoded, obtains the matrix coordinate to be verified, inquiry is in advance The matrix correlation information generated for the user first obtained, obtains the corresponding target value of the matrix coordinate to be verified, and The target value is exported by the signal output apparatus of the first terminal equipment;Wherein, the matrix correlation packet Include the coordinate included in matrix and the corresponding value of each coordinate;
S504:Receive after the target value that the specified user is inputted by the second terminal equipment, according to The matrix correlation information of user's generation is specified to be verified for this in advance.
Further, in the step S502, using the public key generated in advance for the specified user to described to be verified Matrix coordinate be encrypted, and coding the first media data of generation is carried out to the matrix coordinate to be verified after encryption;Institute State in step S503, after being decoded, the information obtained using the private key corresponding with the public key obtained in advance to decoding It is decrypted, obtains the matrix coordinate to be verified.
It should be noted that the method described in Fig. 5 is compared with the method described in Fig. 1, the angle only described is not Together, other guide is identical, in view of length is limited, no longer the method described in Fig. 5 is described in detail here, related content Refer to introduction above.
In order to preferably embody the embodiment of the present application offer method in first terminal equipment obtain user private key and The process of matrix correlation information, is introduced below by the flow chart shown in Fig. 6.
First, the process of the private key of first terminal equipment acquisition user includes:
S601:User opens in first terminal equipment and logged in after the user name registered before Web page, input and password To server, and to server acquisition request private key;
S602:Server is that the user generates public key and private key, is locally preserving public key;
S603:Private key is returned to by first terminal equipment by http protocol;
S604:The private key that first terminal equipment interconnection is received is preserved.
Afterwards, user can just ask to bind matrix correlation information in first terminal equipment, specifically can be by second eventually End equipment initiates bind request, and its binding procedure includes:
S605:User opens in second terminal equipment and logged in after the user name registered before Web page, input and password Matrix correlation information is bound to server, and to server request;
S606:Server generator matrix relevant information, and after being encrypted with the public key of the user, the two-dimentional yardage of generation According to;
S607:The 2-D data is returned into second terminal equipment;
S608:The two-dimensional code data that server is returned is shown as two-dimension code image by second terminal equipment in Web page;
S609:User starts the destination application installed in first terminal equipment, and it is activated in image-pickup device Afterwards, the two-dimension code image is shot;
S610:Two-dimension code image is decoded, and is decrypted using the private key got in step S604, square is obtained Battle array relevant information;
S611:The matrix correlation information that decryption is obtained is preserved in first terminal equipment.
In addition, referring to Fig. 7, it is the example of a specific proof of identity process, be may comprise steps of:
S701:User opens Web page in second terminal equipment, and server is signed in after inputting user name and password, And when performing certain associative operation, for example, the operation such as transaction, payment payment for goods, account transfer, modification user profile, enters user's body Part verification interface;
S702:Server selects matrix coordinate to be verified, and is encrypted using the public key of the user;
S703:Data after encryption encode to obtain two-dimensional code data;
S704:Two-dimensional code data is returned into second terminal equipment;
S705:Second terminal equipment two-dimensional code display picture in Web page;
S706:User starts the destination application installed in first terminal equipment, and it is activated in image-pickup device Afterwards, the two-dimension code image is shot;
S707:Two-dimension code image is decoded, and is decrypted using the private key of the user, matrix to be verified is obtained Coordinate;
S708:The corresponding mesh of matrix coordinate to be verified is inquired about in the matrix correlation information of the user pre-saved Mark value;
S709:The target value is shown on the display screen of first terminal equipment;
S710:User checks the target value shown in first terminal equipment, is input to the Web page of second terminal equipment In the input frame of middle display;
S711:Value in input frame is submitted to server;
S712:The value that server is submitted according to second terminal equipment, and the active user pre-saved matrix phase Information is closed, user identity verification is carried out to active user.
Finally it should be noted that in actual applications, involved matrix correlation information is not limited to two-dimensional matrix, It can also be one or more dimensions.In addition, in the embodiment of the present application, first terminal equipment is inquiring matrix coordinate to be verified After corresponding target value, voice signal can also be converted thereof into, is then played out by first terminal equipment.Example Such as, target value is " 679834 ", then can generate voice signal, namely simulation voice reads the word included in target value Symbol, such user just can know the target value that be input in the input frame of Web page according to the voice signal heard What is.Certainly, in actual applications, the same of target value can also be both shown on the display screen of first terminal equipment When, play voice signal with the mode of voice so that user, which can see, can also hear specific target value.
It is relative with the user identity method of calibration based on matrix value for the first terminal equipment side that the embodiment of the present application is provided Should, the embodiment of the present application additionally provides a kind of user identity calibration equipment based on matrix value, certainly, and the device is to be applied to the In one terminal device, referring to Fig. 8, the device can include:
Signal gathering unit 801, gathers second terminal equipment defeated for the signal pickup assembly by first terminal equipment The first media signal gone out;Wherein, first media signal is, to specifying behaviour of the user in the second terminal equipment When making to carry out user identity verification, matrix coordinate to be verified is selected by the server, and it is that this specifies user in advance to utilize The matrix coordinate to be verified is encrypted the public key of generation, and coding life is carried out to the matrix coordinate to be verified after encryption Into the first media data, and the second terminal equipment is returned to, described its signal output apparatus of second terminal equipment utilization will The signal of the first media data output, i.e., described first media signal;
Signal resolution unit 802, for being decoded to first media signal, and using obtain in advance with it is described The information that the corresponding private key of public key is obtained to decoding is decrypted, and obtains the matrix coordinate to be verified;
Value output unit 803, what is obtained in advance for inquiring about specifies the matrix correlation information of user's generation for this, obtains The corresponding target value of the matrix coordinate to be verified, and will be described by the signal output apparatus of the first terminal equipment Target value is exported, and school is carried out so that the target value is inputted the second terminal equipment and be submitted to server by user Test;Wherein, the matrix correlation information includes coordinate and the corresponding value of each coordinate included in matrix.
Wherein, first media signal is specifically, to specifying operation of the user in the second terminal equipment to enter When row user identity is verified, matrix coordinate to be verified is selected by the server, and utilize in advance as specified user's generation Public key the matrix coordinate to be verified is encrypted, coding generation the is carried out to the matrix coordinate to be verified after encryption One media data, and the second terminal equipment is returned to, described its signal output apparatus of second terminal equipment utilization will be described First media data is output as first media signal;The signal resolution unit 802, specifically for first media Signal is decoded, and the information obtained using the private key corresponding with the public key obtained in advance to decoding is decrypted, and is obtained To the matrix coordinate to be verified.
Wherein, when implementing, the first media data of server generation can be barcode data (such as Quick Response Code), The barcode data is output as picture signal by the second terminal equipment by its display screen, now, signal gathering unit 801 It can include:
Image information collecting subelement, for being set by the image acquisition device second terminal in first terminal equipment The picture signal of standby display screen display.
In addition, the first media data of server generation can also include voice data, accordingly, second terminal equipment can So that the voice data is output as into audio signal by its programming audio frequency interface, now, signal gathering unit 801 can be wrapped Include:
Audio-frequency information gathers subelement, is set for gathering second terminal by the audio collecting device in first terminal equipment The standby audio signal played.
Wherein, the first terminal equipment specifically can be by obtaining the private key for decryption with lower unit:
Unit is logged in, for when the specified user in the first terminal equipment by signing in server, to institute State server and ask key for decryption, so that the server is generated after public key and corresponding private key, public key is preserved In server local, private key is returned;
First storage unit, is received after the private key that the server is returned for the first terminal equipment, described First terminal equipment is locally preserved.
The first terminal equipment specifically can be by with the matrix correlation information of lower unit acquisition user:
Collecting unit, second terminal equipment is exported second is gathered for the signal pickup assembly by first terminal equipment Media signal;Wherein, second media signal is, when user signs in server in the second terminal equipment and asks When binding matrix correlation information, it is the corresponding value of user's generator matrix each coordinate by the server, is stored in service Device is local, and the corresponding value of the matrix each coordinate is encrypted using the public key, and the information after encryption is carried out Coding the second media data of generation, and return to the second terminal equipment, described its signal output of second terminal equipment utilization Second media data is output as second media signal by device;
Second storage unit, is obtained for being decoded to second media signal, and using the private key to decoding Information be decrypted, obtain the corresponding value of matrix each coordinate, and locally preserved in the first terminal equipment.
When implementing, value output unit 803 can include:
Subelement is shown, for the target value to be included into the display screen in the first terminal equipment;
And/or,
Speech play subelement, for the target value to be converted into voice signal, and is set by the first terminal Standby programming audio frequency interface plays the voice signal.
The matrix includes two-dimensional matrix or multi-dimensional matrix.
The user identity method of calibration based on matrix value with the server side that the embodiment of the present application is provided is corresponding, this Shen Please embodiment additionally provide a kind of user identity check system based on matrix value, the system is applied to server side, referring to figure 9, the system can include:
Matrix coordinate selecting unit 901, for specifying operation of the user in second terminal equipment to carry out user's body During part verification, matrix coordinate to be verified is selected;
First media data generation unit 902, for treating school to described using public key in advance for specified user's generation The matrix coordinate tested is encrypted, and coding the first media data of generation is carried out to the matrix coordinate to be verified after encryption;
First media data returning unit 903, for first media data to be returned into the second terminal equipment, Believe so that first media data is output as first media by described its signal output apparatus of second terminal equipment utilization Number, first media signal is gathered by the signal pickup assembly of first terminal equipment, and after being decoded, using advance The information that the private key corresponding with the public key obtained is obtained to decoding is decrypted, and obtains the matrix coordinate to be verified Afterwards, the matrix correlation information generated for the user that inquiry is obtained in advance, obtains the corresponding mesh of the matrix coordinate to be verified Value is marked, and is exported the target value by the signal output apparatus of the first terminal equipment;Wherein, the matrix phase Close coordinate and the corresponding value of each coordinate that information includes including in matrix;
Verification unit 904, for receiving the target that the specified user is inputted by the second terminal equipment After value, verified according to the matrix correlation information generated in advance for the specified user.
Wherein, the media data that the first media data generation unit 902 is specifically generated can include being used for second The barcode data shown in terminal device, or, for the voice data played in second terminal equipment.In a word, second A kind of media signal encrypted can be exported in terminal device to be acquired for first terminal equipment and decode decryption, finally existed The corresponding target value of matrix coordinate to be verified is exported in first terminal equipment, second terminal equipment is input to for user In Web page input frame, and it is submitted to server progress proof of identity.
In a word, in the embodiment of the present application, first, user matrix correlation information (including the coordinate that includes of matrix and The corresponding value of each coordinate) it is stored in the first terminal equipment of user, user no longer holds the entity card such as matrix card, Matrix correlation information is unknowable for a user, it can thus be avoided criminal cheats use by way of making a phone call Say the matrix correlation information of oneself in family;Secondly, first terminal equipment and user for preservation matrix relevant information are actual steps on The second terminal equipment recorded server and perform operation to account belongs to different physical entities, therefore, also reduce further The probability that matrix correlation information is got by the rogue program in second terminal.Furthermore, server is sent to second terminal equipment During matrix coordinate to be verified, it is possible to use the public key of active user is encrypted, and is encoded so that second terminal equipment Exported in the form of certain media signal;This media signal can not be obtained on the specific of matrix coordinate from surface Information, therefore, it on the one hand can avoid identifying specific coordinate value by rogue program, on the other hand, even if rogue program is thought Emulating server is wanted to generate similar media signal to inquire user, also due to the public key of each user is different so that malice The media signal that program is simulated can not be recognized that therefore, user also responds without normal direction rogue program by first terminal equipment, Therefore, it is to avoid user is by the matrix correlation leakage of information of oneself to rogue program.In a word, the embodiment of the present invention can be from many aspects Come the security of the matrix correlation information that improves user, so as to improve effective when user identity verification is carried out based on matrix value Property.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can Realized by the mode of software plus required general hardware platform.Understood based on such, the technical scheme essence of the application On the part that is contributed in other words to prior art can be embodied in the form of software product, the computer software product It can be stored in storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions are to cause a computer equipment (can be personal computer, server, or network equipment etc.) performs some of each embodiment of the application or embodiment Method described in part.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.Especially for system or For system embodiment, because it is substantially similar to embodiment of the method, so describing fairly simple, related part is referring to method The part explanation of embodiment.System and system embodiment described above is only schematical, wherein the conduct The unit that separating component illustrates can be or may not be it is physically separate, the part shown as unit can be or Person may not be physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can root Some or all of module therein is factually selected to realize the purpose of this embodiment scheme the need for border.Ordinary skill Personnel are without creative efforts, you can to understand and implement.
Above to the user identity method of calibration provided herein based on matrix value, apparatus and system, carry out in detail Thin to introduce, specific case used herein is set forth to the principle and embodiment of the application, and above example is said It is bright to be only intended to help and understand the present processes and its core concept;Simultaneously for those of ordinary skill in the art, foundation The thought of the application, will change in specific embodiments and applications.In summary, this specification content is not It is interpreted as the limitation to the application.

Claims (11)

1. a kind of user identity method of calibration based on matrix value, it is characterised in that including:
The first media signal that second terminal equipment is exported is gathered by the signal pickup assembly of first terminal equipment;Wherein, institute Stating the first media signal is, when to specifying operation of the user in the second terminal equipment to carry out user identity verification, by Server selects matrix coordinate to be verified, coding the first media data of generation is carried out to matrix coordinate to be verified, and return To the second terminal equipment, what described its signal output apparatus of second terminal equipment utilization exported first media data Signal;
First media signal is decoded, the matrix coordinate to be verified is obtained;
The matrix correlation information that user's generation is specified for this obtained in advance is inquired about, the matrix coordinate correspondence to be verified is obtained Target value, and the target value is exported by the signal output apparatus of the first terminal equipment, so that user will The target value inputs the second terminal equipment and is submitted to server and verified;Wherein, the matrix correlation information Including the coordinate included in matrix and the corresponding value of each coordinate.
2. according to the method described in claim 1, it is characterised in that
The server is selected after matrix coordinate to be verified, is treated using public key in advance for specified user's generation to described The matrix coordinate of verification is encrypted, and coding the first media data of generation is carried out to the matrix coordinate to be verified after encryption;
After being decoded to first media signal, also using obtain in advance private key corresponding with the public key to decoding Obtained information is decrypted, to obtain the matrix coordinate to be verified.
3. according to the method described in claim 1, it is characterised in that
First media data of server generation includes barcode data, and the second terminal equipment is by its display screen by institute State barcode data and be output as picture signal;The signal pickup assembly by first terminal equipment gathers second terminal equipment First media signal of upper output includes:
Pass through the picture signal of the display screen display of the image acquisition device second terminal equipment in first terminal equipment.
4. according to the method described in claim 1, it is characterised in that the first media data of the server generation includes audio The voice data is output as audio signal by data, the second terminal equipment by its programming audio frequency interface;It is described to pass through The first media signal exported in signal pickup assembly collection second terminal equipment in first terminal equipment includes:
The audio signal of second terminal device plays is gathered by the audio collecting device in first terminal equipment.
5. method according to claim 2, it is characterised in that obtain private corresponding with the public key in the following manner Key:
When the specified user in the first terminal equipment by signing in server, ask to be used to solve to the server Close key, so that the server is generated after public key and corresponding private key at random, server local is stored in by public key, will Private key is returned;
Receive after the private key that the server is returned, locally preserved in the first terminal equipment.
6. method according to claim 2, it is characterised in that obtain and the matrix correlation information in the following manner:
The second media signal that second terminal equipment is exported is gathered by the signal pickup assembly of first terminal equipment;Wherein, institute Stating the second media signal is, when user signs in server in the second terminal equipment and asks to bind matrix correlation information When, it is the corresponding value of the random generator matrix of the user each coordinate by the server, is stored in server local, and utilize The corresponding value of the matrix each coordinate is encrypted the public key, and coding the second matchmaker of generation is carried out to the information after encryption Volume data, and return to the second terminal equipment, described its signal output apparatus of second terminal equipment utilization is by described second The signal of media data output;
Second media signal is decoded, and the information obtained using the private key to decoding is decrypted, and obtains square The corresponding value of each coordinate of battle array, and locally preserved in the first terminal equipment.
7. the method according to any one of claim 1 to 6, it is characterised in that described by the first terminal equipment Signal output apparatus includes target value output:
The target value is included on the display screen of the first terminal equipment;
And/or,
The target value is converted into voice signal, and the language is played by the programming audio frequency interface of the first terminal equipment Message number.
8. the method according to any one of claim 1 to 6, it is characterised in that the matrix includes two-dimensional matrix or multidimensional Matrix.
9. a kind of user identity method of calibration based on matrix value, it is characterised in that including:
When to specifying operation of the user in second terminal equipment to carry out user identity verification, matrix to be verified is selected to sit Mark;
Coding the first media data of generation is carried out to matrix coordinate to be verified;
First media data is returned into the second terminal equipment, so that described its signal of second terminal equipment utilization is defeated Go out device and first media data is output as first media signal, pass through the signal pickup assembly of first terminal equipment First media signal is gathered, and after being decoded, obtains the matrix coordinate to be verified, what inquiry was obtained in advance is The matrix correlation information of user generation, obtains the corresponding target value of the matrix coordinate to be verified, and passes through described the The signal output apparatus of one terminal device exports the target value;Wherein, the matrix correlation information includes wrapping in matrix The coordinate contained and the corresponding value of each coordinate;
Receive after the target value that the specified user is inputted by the second terminal equipment, according to referring in advance for this The matrix correlation information for determining user's generation is verified.
10. a kind of user identity calibration equipment based on matrix value, it is characterised in that including:
Signal gathering unit, second terminal equipment is exported first is gathered for the signal pickup assembly by first terminal equipment Media signal;Wherein, first media signal is to be used to specified operation of the user in the second terminal equipment During the proof of identity of family, matrix coordinate to be verified is selected by server, coding generation first is carried out to matrix coordinate to be verified Media data, and return to the second terminal equipment, described its signal output apparatus of second terminal equipment utilization is by described The signal of one media data output;
Signal resolution unit, for being decoded to first media signal, obtains the matrix coordinate to be verified;
Value output unit, obtained in advance for inquiring about for this specify user generation matrix correlation information, obtain described in treat The corresponding target value of matrix coordinate of verification, and taken the target by the signal output apparatus of the first terminal equipment Value output, is verified so that the target value is inputted the second terminal equipment and be submitted to server by user;Wherein, The matrix correlation information includes coordinate and the corresponding value of each coordinate included in matrix.
11. a kind of user identity check system based on matrix value, it is characterised in that including:
Matrix coordinate selecting unit, for specifying operation of the user in second terminal equipment to carry out user identity verification When, select matrix coordinate to be verified;
First media data generation unit, for carrying out coding the first media number of generation to the matrix coordinate to be verified after encryption According to;
First media data returning unit, for first media data to be returned into the second terminal equipment, with toilet State its signal output apparatus of second terminal equipment utilization and first media data is output as first media signal, pass through The signal pickup assembly of first terminal equipment gathers first media signal, and after being decoded, obtains described to be verified Matrix coordinate, inquire about the matrix correlation information generated for the user obtained in advance, obtain the matrix coordinate to be verified Corresponding target value, and exported the target value by the signal output apparatus of the first terminal equipment;Wherein, institute Stating matrix correlation information includes the coordinate included in matrix and the corresponding value of each coordinate;
After verification unit, the target value inputted for receiving the specified user by the second terminal equipment, Matrix correlation information according to being generated in advance for the specified user is verified.
CN201310103000.XA 2013-03-27 2013-03-27 User identity method of calibration based on matrix value, apparatus and system Active CN104079405B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310103000.XA CN104079405B (en) 2013-03-27 2013-03-27 User identity method of calibration based on matrix value, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310103000.XA CN104079405B (en) 2013-03-27 2013-03-27 User identity method of calibration based on matrix value, apparatus and system

Publications (2)

Publication Number Publication Date
CN104079405A CN104079405A (en) 2014-10-01
CN104079405B true CN104079405B (en) 2017-08-22

Family

ID=51600463

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310103000.XA Active CN104079405B (en) 2013-03-27 2013-03-27 User identity method of calibration based on matrix value, apparatus and system

Country Status (1)

Country Link
CN (1) CN104079405B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209738B (en) * 2015-05-05 2019-06-21 阿里巴巴集团控股有限公司 A kind of secret key verification method and equipment
CN112104652B (en) * 2020-09-15 2023-04-07 北京百度网讯科技有限公司 Identity verification method, apparatus, device and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5937068A (en) * 1996-03-22 1999-08-10 Activcard System and method for user authentication employing dynamic encryption variables
CN101060403A (en) * 2006-04-18 2007-10-24 钟曦辰 Wireless communication terminal-based interactive dynamic password safety service system
CN102130909A (en) * 2011-02-22 2011-07-20 中兴通讯股份有限公司 Authentication method and system
CN102821106A (en) * 2012-08-22 2012-12-12 句容市盛世软件有限公司 Electronic document non-repudiation method
CN102841997A (en) * 2012-07-10 2012-12-26 郭小卫 Method and device for achieving authentication on intelligent device by mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5937068A (en) * 1996-03-22 1999-08-10 Activcard System and method for user authentication employing dynamic encryption variables
CN101060403A (en) * 2006-04-18 2007-10-24 钟曦辰 Wireless communication terminal-based interactive dynamic password safety service system
CN102130909A (en) * 2011-02-22 2011-07-20 中兴通讯股份有限公司 Authentication method and system
CN102841997A (en) * 2012-07-10 2012-12-26 郭小卫 Method and device for achieving authentication on intelligent device by mobile terminal
CN102821106A (en) * 2012-08-22 2012-12-12 句容市盛世软件有限公司 Electronic document non-repudiation method

Also Published As

Publication number Publication date
CN104079405A (en) 2014-10-01

Similar Documents

Publication Publication Date Title
CN105591744B (en) A kind of genuine cyber identification authentication method and system
RU2610419C2 (en) Method, server and system for authentication of person
CA2701055C (en) Method of providing assured transactions using secure transaction appliance and watermark verification
US8838988B2 (en) Verification of transactional integrity
CN107682378A (en) A kind of real name identification method and system based on block chain
CN104025503B (en) Use the webpage certification of client platform root of trust
CN103875211B (en) A kind of internet account number management method, manager, server and system
JP2018532301A (en) User authentication method and apparatus
CN106330850A (en) Biological characteristic-based security verification method, client and server
CN107800672A (en) A kind of Information Authentication method, electronic equipment, server and information authentication system
CN105162773B (en) A kind of convenient login method of Web system based on mobile terminal
CN105978994B (en) A kind of login method of web oriented system
CN112953970A (en) Identity authentication method and identity authentication system
CN108737080A (en) Storage method, device, system and the equipment of password
CN105681340A (en) Digital certificate use method and apparatus
CN104168117B (en) A kind of speech digit endorsement method
CN103139210B (en) A kind of safety certifying method
CN106713362A (en) Method for realizing security investigation of WiFi network access
CN104079405B (en) User identity method of calibration based on matrix value, apparatus and system
CN103281180B (en) User is protected to access the bill generation method of privacy in a kind of network service
CN107135076A (en) A kind of participatory of without TTP perceives incentive mechanism implementation method
CN106911659A (en) One seed account information processing system, method and device
CN103813321B (en) Agreement key based data processing method and mobile phone
Al-Rawy et al. A design for blockchain-based digital voting system
AU2006315079B2 (en) A method and apparatus for facilitating a secure transaction

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant