WO2022237859A1 - Procédé et appareil d'authentification d'informations de champ proche basés sur le contrôle et la gestion du temps - Google Patents
Procédé et appareil d'authentification d'informations de champ proche basés sur le contrôle et la gestion du temps Download PDFInfo
- Publication number
- WO2022237859A1 WO2022237859A1 PCT/CN2022/092355 CN2022092355W WO2022237859A1 WO 2022237859 A1 WO2022237859 A1 WO 2022237859A1 CN 2022092355 W CN2022092355 W CN 2022092355W WO 2022237859 A1 WO2022237859 A1 WO 2022237859A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- authorized merchant
- terminal device
- server
- hotspot
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
Definitions
- the embodiments of the present application relate to the technical field of information authentication, and in particular, to a near-field information authentication method and device based on time control.
- the current solution to this problem is to propose location information based on terminal equipment detection and feed back the location information to the server.
- the server simultaneously stores the location information of each merchant's equipment.
- the user's biometric information is compared between the terminal device and the merchant's device, and the identity authentication is completed based on the comparison to obtain the identity authentication result, which can realize identity information authentication without a physical ID card, and improve people's travel and handling of affairs. convenience.
- this method requires the terminal device to continuously detect its own location, which consumes a lot of power consumption and memory of the device, and there are certain unsafe factors in determining a valid terminal device based only on the location.
- Embodiments of the present application provide a near-field information authentication method, device, device, and storage medium based on time control, so as to solve the problems of inconvenient, high power consumption, and insufficient security in existing identity information authentication methods.
- the embodiment of the present application provides a near-field information authentication method based on time control, including:
- the terminal device When the terminal device detects that the current time meets the valid identification time period and the current location is within the hotspot range of a valid authorized merchant, it periodically sends location information to the server, and the terminal device is associated with the object to be authenticated;
- the authorized merchant device sends an information authentication request to the server, and the information authentication request includes the identification information of the authorized merchant device and at least one living biometric information of the object to be authenticated collected;
- the server determines the valid users within the preset range of the authorized merchant equipment based on the identification information of the authorized merchant equipment and the location information uploaded by each terminal equipment;
- the server compares the at least one living biometric information with the determined corresponding biometric information pre-stored by each valid user, and obtains an information authentication result of the object to be authenticated.
- the terminal device When the terminal device detects that the authorized merchant hotspot meets the set conditions, it downloads at least one authorized merchant hotspot information corresponding to the authorized merchant from the server and adds it to the display interface, wherein one authorized merchant is associated with one or more authorized merchant hotspots, and one authorized merchant A merchant hotspot is associated with one or more authorized merchant devices.
- the setting condition is that the location information of the hotspot of the authorized merchant is within the preset range of the current location or the virtual location of the terminal device.
- the terminal device When the terminal device detects that it is located within the preset geographic boundary based on the current location information, it obtains in real time the authorized merchant hotspots corresponding to all authorized merchants within the preset range of the current location, and downloads the authorized merchant hotspot information from the server and updates them in real time. display interface.
- the server When the server detects that the terminal device is associated with an authorized merchant application, APP or applet, it adds and saves the authorized merchant hotspot corresponding to the authorized merchant and the default preset time period setting to the display interface, wherein the authorized merchant application, APP or The Mini Program is associated with an authorized merchant.
- the server When the server receives and approves the authorized merchant application, APP or mini-program's operator's request to change the authorized merchant hotspot of the authorized merchant application, APP or mini-program, it saves the changed authorized merchant hotspot and generates an authorization Merchant hotspot change information is sent to the terminal device;
- the terminal device downloads and saves the changed authorized merchant hotspot from the server based on the authorized merchant hotspot change information to the display interface.
- the terminal device When the terminal device detects that the current display interface does not load the hotspot of the authorized merchant corresponding to the current authorized merchant, it opens the temporary user authorization interface, and when it detects that the object to be authenticated performs identity authentication based on the temporary user authorization interface within a set time interval When the number of times reaches the threshold, the hotspot information of the authorized merchant corresponding to the authorized merchant is downloaded from the server and added to the display interface, wherein the adding method includes automatic adding and manual adding.
- the authorized merchant hotspot includes the name of the authorized merchant hotspot, information of the operator, the application program, the item in the application program, location information, preset range, default preset time, whether it is visible to the user, authorized Whether the merchant hotspot is valid, one or more set time periods, and whether each time period is valid.
- the authorized merchant hotspot is set with the name of the merchant hotspot, the information of the operator it belongs to, the application it belongs to, the project it belongs to in the application it belongs to, the location information, the preset range, the default preset time, and whether it is visible to the user.
- the setting of the authorized merchant hotspot is whether the authorized merchant hotspot is valid, the time period, whether each time period is valid, and the default preset time is restored through the setting interface provided by the application program in the terminal device.
- the application program includes Certain Authorized Merchant Applications, APPs or Mini Programs.
- the authorized merchant hotspots are displayed on the display interface corresponding to the application program through at least one of map display, list display, and classification display, and the classification display indicates that the authorized merchant hotspots are respectively displayed according to the preset classification rules. Classify into corresponding category sets, and display different category sets on the display interface of the application program.
- the set time period of the authorized merchant hotspot includes a start time parameter, an end time parameter, a sustainable time parameter and whether it is valid, and the start time parameter and the end time parameter constitute the corresponding period of the set time period.
- the duration of time, the sustainable time parameter is used to indicate the length of time that the terminal device continues to send location information to the server after satisfying the set valid time period and the current location is within the range of a valid authorized merchant hotspot and completes an identity authentication.
- the whether it is valid is used to indicate whether the set time period participates in the actual operation of the terminal device.
- the effective identification time periods of different authorized merchant hotspots are all mapped to a timetable, and the timetable is used to represent the corresponding relationship between authorized merchant hotspots and set time periods.
- matching identification information is set in the time table corresponding to different set time periods, and the identification information is used to indicate the general attributes or individual attributes of different set time periods.
- the terminal device detects that the current time meets the valid identification time period and the current location is within the range of the authorized merchant's device, it also includes:
- the terminal device detects its own state every set period and whether the current time meets the valid identification time period
- the terminal device sends the current location information to the server when it detects that the current time meets the valid identification time period and its own state is in motion, and obtains the current location within the range of at least one valid authorized merchant hotspot;
- the terminal device When the terminal device detects that the current time meets the valid identification time period and its own state is static, and the time interval from the last time the location information is sent to the server meets the preset interval, it will send the location information to the server, otherwise it will not send the location information.
- the terminal device confirms that the current state is motion or stillness through an attitude sensor and/or a magnetic field sensor.
- the terminal device detects its own state as motion or stillness, including:
- the terminal device obtains the current status information, and compares the current status information with the last status information;
- the terminal When the change value between the current status information and the last status information is greater than a preset value, the terminal is defined as moving, otherwise, the terminal device is defined as stationary.
- the position information detected by the terminal device is obtained through real-time collection by a satellite positioning device in the terminal device, or calculated through real-time data collected by a gravity sensor and a magnetic field sensor in the terminal device.
- the server compares the at least one living biometric information with the determined corresponding biometric information pre-stored by each valid user, and obtains the information authentication result of the object to be authenticated, including:
- the server calculates the similarity between the at least one living biometric information and the determined corresponding biometric information pre-stored by each valid user;
- the server obtains the information authentication result of the object to be authenticated according to the similarity.
- the terminal device receives the mandatory location information reporting notification instruction, and determines the corresponding location reporting area according to the mandatory location information reporting notification instruction;
- the terminal device When the terminal device detects that it is within the range of the location reporting area, it reports the current location information.
- the server compares the at least one living biometric information with the determined corresponding biometric information pre-stored by each valid user, and obtains the information authentication result of the object to be authenticated, including:
- the server calculates the face similarity and expression similarity between the at least one living biometric information and the determined corresponding biometric information pre-stored by each valid user;
- the server obtains the information authentication result of the object to be authenticated and the corresponding execution instruction according to the face similarity and expression similarity.
- the server compares the at least one living biometric information with the determined corresponding biometric information pre-stored by each valid user, and obtains the information authentication result of the object to be authenticated, including:
- the server calculates the similarity between the living finger features, palmprint features, palm vein features and/or palmprint and palm vein feature information and the determined corresponding biological feature information pre-stored by each valid user;
- the server obtains the information authentication result of the object to be authenticated and the corresponding execution instruction according to the finger features, palm print features, palm vein features and/or similarity between palm print and palm vein features.
- the user presets custom emoticons and corresponding execution instructions, and the custom emoticons and corresponding execution instructions are set through the setting interface provided by the application program in the terminal device.
- the application program includes several authorized merchant applications, APPs or small programs.
- the embodiment of the present application provides a near-field information authentication device based on time control, including:
- Location sending module used for the terminal device to periodically send identification information to the server when it detects that the current time meets the valid identification time period and the current location is within the range of valid authorized merchant equipment, and the terminal device is associated with the object to be authenticated;
- Authentication request module used for the authorized merchant equipment to send an information authentication request to the server, the information authentication request including the identification information of the authorized merchant equipment and at least one living biometric information of the object to be authenticated collected;
- User determination module used for the server to determine valid users within the preset range of the authorized merchant equipment based on the identification information of the authorized merchant equipment and the location information uploaded by each terminal equipment;
- Feature comparison module used for the server to compare the at least one living biometric feature information with the determined corresponding biometric feature information pre-stored by each valid user, to obtain the information authentication result of the object to be authenticated.
- an embodiment of the present application provides a computer device, including: a memory and one or more processors;
- the memory is used to store one or more programs
- the one or more processors are made to implement the time management-based near-field information authentication method as described in the first aspect.
- the embodiment of the present application provides a storage medium containing computer-executable instructions, and the computer-executable instructions are used to perform the time-based proximity control as described in the first aspect when executed by a computer processor.
- Field information authentication method is used to perform the time-based proximity control as described in the first aspect when executed by a computer processor.
- the terminal device when the terminal device detects that the current time meets the valid identification time period and the current location is within the range of a valid authorized merchant hotspot, it periodically sends location information to the server, and the authorized merchant device sends an information authentication request to the server, and then Based on the identification information of the authorized merchant equipment and the location information uploaded by each terminal equipment, the server determines the valid users within the preset range of the authorized merchant equipment; Corresponding biometric information is compared, and finally the information authentication result of the object to be authenticated is obtained.
- the information authentication method of this embodiment is simple, and the user does not need to carry a physical ID card, which greatly improves the user experience, facilitates the user to travel, and is more suitable for the elderly.
- the dual consideration of the set time period and the current location is considered. Only when the authentication object meets the requirements of the time and location of the authorized merchant device at the same time, can the identity information authentication be started, so while providing convenience, it is also further guaranteed.
- the terminal device In order to ensure the security of identity information, the terminal device periodically sends location information to the server when it meets the set time period and location limit at the same time, thereby better protecting the privacy of personal whereabouts and tracks, and at the same time reducing the need for terminal devices to detect location information.
- Power consumption by setting the set time period as a switch, making the application more energy-saving; in this embodiment, when the terminal device detects that the current time meets the valid identification time period and its own state is in motion, the acquisition of the current location is satisfied with at least one valid authorization Send the current location information to the server when the merchant is within the hotspot range, further reducing energy consumption and keeping energy consumption at the lowest level; When the number of authentication times reaches the threshold value, download the authorized merchant hotspot information corresponding to the authorized merchant from the server and add it to the display interface, which provides an intelligent learning function and is more convenient to use; in addition, in this embodiment, the authorized merchant hotspot setting merchant Whether the hotspot is valid, the time period, whether each time period is valid, and restore the default preset time can be set through the setting interface provided by the application program in the terminal device.
- authorized merchant hotspots can be displayed on the corresponding display interface of the application program through map display and list display 1. At least one display mode in the classification display is displayed, and the classification display indicates that the authorized merchant hotspots are respectively classified into corresponding category sets according to the preset classification rules, and different category sets are displayed on the display interface of the application program, providing Simpler, quicker and more intuitive visual management functions are convenient for users to operate.
- FIG. 1 is a flowchart of a near-field information authentication method based on time control provided by an embodiment of the present application
- FIG. 2 is a flow chart of another near-field information authentication method based on time control provided by an embodiment of the present application
- Fig. 3 is a flow chart of another near-field information authentication method based on time control provided by the embodiment of the present application;
- FIG. 4 is a flow chart of another near-field information authentication method based on time control provided by the embodiment of the present application.
- Fig. 5 is a flow chart of another near-field information authentication method based on time control provided by the embodiment of the present application.
- FIG. 6 is a schematic structural diagram of a near-field information authentication device based on time control provided by an embodiment of the present application
- Fig. 7 is a schematic structural diagram of another near-field information authentication device based on time control provided by the embodiment of the present application.
- Fig. 8 is a schematic structural diagram of another near-field information authentication device based on time control provided by an embodiment of the present application.
- FIG. 9 is a schematic structural diagram of a computer device provided by an embodiment of the present application.
- Embodiments of the present application provide a near-field information authentication method, device, device, and storage medium based on time management.
- the terminal device detects that the current time meets the valid identification time period and the current location is within the range of a valid authorized merchant hotspot, it periodically sends location information to the server, and the authorized merchant device sends an information authentication request to the server, and then Based on the identification information of the authorized merchant device and the location information uploaded by each terminal device, the server determines valid users within the preset range of the authorized merchant device, thereby intelligently controlling whether the user account is valid; Compared with the corresponding biometric information pre-stored by each valid user, the information authentication result of the object to be authenticated is finally obtained.
- the information authentication method in this embodiment is simple, and the user does not need to carry a physical ID card, which greatly improves the user experience and is convenient for users. travel, and at the same time more suitable for the needs of the elderly; in this embodiment, combined with the dual consideration of the set time period and the current location, only when the authentication object meets the time and location requirements of the authorized merchant device, can the identity information authentication be started. Therefore, while providing convenience, it also further guarantees the security of identity information.
- the terminal device meets the set time period and location limit at the same time, it will periodically send location information to the server, thereby better protecting the privacy of personal whereabouts. It also reduces the power consumption of terminal equipment to detect location information.
- the application is more energy-saving, and the effective range and effective time of the user account are controlled, and the effective and invalid user account is intelligently controlled to ensure account security.
- the terminal device detects that the current time meets the valid identification time period and its own state is motion, the current location is obtained and the current location information is sent to the server when the hotspot range of at least one valid authorized merchant is satisfied, further reducing energy consumption. to keep energy consumption at the lowest level; in this embodiment, when it is detected that the number of identity authentications performed by the object to be authenticated based on the temporary user authorization interface within a set time interval reaches the threshold, the corresponding authorized merchant’s account is downloaded from the server.
- Authorized business hotspot information is added to the display interface, providing intelligent learning functions, and it is more convenient to use;
- the setting time is set through the setting interface provided by the application program in the terminal device.
- the hotspot of the authorized merchant is displayed on the display interface corresponding to the application program through at least one display mode in map display, list display, and classification display.
- the classification The display indicates that the hotspots of the authorized merchants are classified into the corresponding category sets according to the preset classification rules, and different category sets are displayed on the display interface of the application program, providing a simpler, faster and more intuitive visual management function, which is convenient for users to operate.
- Figure 1 shows the flow chart of the near-field information authentication method based on time control provided by the embodiment of the present application.
- the near-field information authentication device based on time control can be realized by means of hardware and/or software, and integrated into computer equipment.
- the near-field information authentication method based on time control includes:
- Step 101 When the terminal device detects that the current time meets the valid identification time period and the current location is within the hotspot range of a valid authorized merchant, the terminal device periodically sends location information to the server, and the terminal device is associated with the object to be authenticated.
- the application system in this application includes terminal equipment, authorized merchant equipment and servers.
- terminal devices are used by users, including smart devices such as smartphones, laptops, tablets, smart bracelets, smart watches, smart headphones, smart glasses, smart necklaces, smart wearable devices, mechanical exoskeletons, brain computers, etc.
- the device needs to have a location information collection function in this embodiment.
- the product implementing the function in this embodiment is actually an application program applied in the terminal device, such as a mobile phone app.
- Authorized merchant equipment is the equipment used by merchants to provide users with identity authentication. At the same time, it can also have functions such as transactions, such as smart transaction terminals, smart panel computers, smart robots, smart camera guns and other smart devices.
- An authorized merchant device usually corresponds to an authorized merchant, but an authorized merchant can usually correspond to one or more authorized merchant hotspots, and an authorized merchant hotspot can correspond to one or more authorized merchant devices.
- the server is used to connect the terminal device and the authorized merchant's device, and serves as a communication bridge between the terminal device and the authorized merchant's device.
- the server can be a service cloud.
- the terminal device has a location detection function, and at the same time, it has a clock itself, and the terminal device can detect its own current location at intervals, which may or may not be sent to the server.
- authorized merchant hotspots it is a virtual information in the application program.
- One authorized merchant hotspot in the same authorized merchant and the same place can correspond to multiple authorized merchant devices, which can reduce the number of authorized merchant devices displayed and the number stored in mobile terminals.
- the preset range of the authorized merchant’s hotspot can be set through the preset interface, for example, for the authorized merchant’s hotspot A, the preset range is set within 50 meters of the authorized merchant’s hotspot A to perform identity authentication , and the default range set by the authorized merchant hotspot B is within 200 meters of the hotspot where identity authentication can be performed.
- it also sets a time limit on authorized merchant hotspots through the setting interface, that is, the above-mentioned default setting time period. Therefore, it intelligently controls whether the user account is valid through time and place.
- An authorized merchant device is a physical device, and one authorized merchant hotspot can correspond to one or more authorized merchant devices.
- the terminal device Only when the current time satisfies the valid set time period and at the same time is within the preset range of the hotspot of the validly authorized merchant, the terminal device periodically and frequently sends location information to the server. Accordingly, the terminal device avoids sending its own location information continuously for a long time, and avoids violating the privacy and security of the user's personal trajectory.
- the authorized merchant hotspot is equivalent to a virtual activation point.
- user A downloads an application program for near-field information authentication on the terminal device A held by him.
- this application program some relevant authorized merchant hotspots of authorized merchant devices have been loaded, and in the application program
- the interface provides an interface for setting authorized merchant hotspots. Through this interface, you can set whether the authorized merchant hotspots corresponding to the authorized merchant hotspots are valid, the time period for identification, whether each time period is valid, and restore the default preset time.
- the identification time periods of each authorized merchant hotspot can be the same or completely different or overlapped, and each authorized merchant hotspot identification time period can be one or more.
- the authorized merchant hotspot has already contained the geographical location information and the preset range of the authorized merchant hotspot.
- the effective identification time period of the authorized merchant hotspot B is 8:00-9:00 in business
- the effective geographical location is point B
- the preset range is 300 meters.
- the authorized merchant device C is the authentication device of the authorized merchant hotspot B. Therefore, Its effective geographic location is also point B, and the default range is 300 meters.
- User A holds terminal device A and keeps moving the location. At this time, the current time is 8:10 am, which meets the set time period.
- the user moves to point A and detects that point A is within 300 meters of point B Location, which satisfies the conditions for periodically sending location information to the server. Assuming that user A needs to perform information authentication with authorized merchant device C, it means that user A is an object to be authenticated.
- a position acquisition device is provided, and the position acquisition device can be selected from commonly used Chinese Beidou satellite navigation system positioning devices, American GPS satellite navigation system positioning devices, European Galileo Satellite navigation system positioning device, Russian GLONASS satellite navigation system positioning device, base station positioning system (LBS), assisted global satellite positioning system (AGPS), global mobile communication system (GMS), IP address positioning (Internet Protocol) and other one or more positioning technology.
- LBS base station positioning system
- AGPS assisted global satellite positioning system
- GMS global mobile communication system
- IP address positioning Internet Protocol
- an acceleration sensor, an orientation sensor, and a magnetic field sensor are further provided in the terminal device.
- the acceleration sensor can detect the acceleration data of the terminal device
- the direction sensor can detect the direction data of the terminal device
- the magnetic field sensor can detect the state data of the terminal device. Therefore, the moving direction and moving distance of the terminal device are calculated by combining the real-time data collected by the acceleration sensor, the direction sensor, and the magnetic field sensor, and combined with the last position information.
- the last position information is also the last satellite position information collected before the signal of the satellite positioning device disappears.
- Step 102 The authorized merchant device sends an information authentication request to the server, and the information authentication request includes the identification information of the authorized merchant device and at least one kind of living biometric information collected about the object to be authenticated.
- the object to be authenticated When the object to be authenticated performs information authentication through the authorized merchant device, the object to be authenticated collects at least one living biometric information in real time through the authorized merchant device. Upload to server.
- the authorized merchant device sends an information authentication request, the information authentication process is started.
- the server subsequently selects a valid user of the terminal device for information authentication according to the information authentication request.
- the identification information of the authorized merchant equipment is used to identify the authorized merchant equipment, so that the server can perform a corresponding matching query.
- Step 103 The server determines valid users within a preset range of the authorized merchant device based on the identification information of the authorized merchant device and the location information uploaded by each terminal device.
- the identification information of each authorized merchant device is stored in advance, and the location information of each authorized merchant device is determined by querying the identification information, such as the current satellite positioning information filled in during registration.
- the location information of the authorized merchant hotspot corresponding to the authorized merchant device is determined, and the preset range corresponding to each authorized merchant device and the authorized merchant hotspot is also stored.
- the terminal device sends location information to the server, especially when it enters the preset range corresponding to the hotspot of the authorized merchant, periodically sends location information to the server, for example, sends location information to the server every 60 seconds, so that the server can know in time The movement of the terminal device.
- a valid user is a terminal device whose current location is within a set range when the authorized merchant device makes an information authentication request.
- the server receives the information authentication request, it determines the valid user. For example, when an authorized merchant's device submits an information authentication request, when the server receives the information authentication request, it determines the terminal devices within the scope of the authorized merchant's device according to the location of the authorized merchant. and terminal device C, then the terminal device A, terminal device B, and terminal device C are valid users, and the holders corresponding to the terminal devices A, B, and C are the objects to be authenticated.
- Step 104 The server compares the at least one living biometric information with the determined corresponding biometric information pre-stored by each valid user, and obtains an information authentication result of the object to be authenticated.
- the server completes the information authentication result by comparing at least one living biometric information from the authorized merchant's device with the corresponding biometric information pre-stored by the valid user. Further, assuming that at least one biometric information of the authorized merchant's device is sufficiently similar to the corresponding biometric information pre-stored by the valid user, it is generally considered that the two are consistent, and the information authentication result can correspond to the authentication. When the difference between the two Larger, the information authentication result usually corresponds to authentication failure. At this time, the server can feed back the information authentication result to the authorized merchant device, and the authorized merchant device performs the next business processing, financial transaction and other processes according to the information authentication result.
- the server compares the at least one living biometric information with the determined corresponding biometric information pre-stored by each valid user, and obtains the information authentication of the object to be authenticated.
- the server actually calculates the similarity between the at least one living biometric information and the determined corresponding biometric information pre-stored by each valid user; the server obtains the information authentication result of the object to be authenticated according to the similarity.
- This embodiment provides the server with a set threshold.
- the similarity is greater than or equal to the set threshold, it is considered that the living biometric information of the authorized merchant device is consistent with the corresponding biometric information pre-stored by the valid user, and the corresponding information authentication result
- the similarity is less than the set threshold, it is considered that the biometric information of the authorized merchant device is inconsistent with the corresponding biometric information pre-stored by the valid user, and the corresponding information authentication result is authentication failure.
- the server compares the at least one living biometric information with the determined corresponding biometric information pre-stored by each valid user, and obtains an information authentication result of the object to be authenticated, including:
- the user presets custom expressions and corresponding execution instructions; the server calculates the face similarity and expression similarity between the at least one living biometric information and the determined corresponding biometric information pre-stored by each valid user; The face similarity and expression similarity are used to obtain information authentication results and corresponding execution instructions of the object to be authenticated.
- the corresponding biological feature information of the living body is the biological feature information of the facial expression of the living body, and correspondingly, the corresponding biological feature information pre-stored in the valid user is the corresponding biological feature information of the facial expression.
- the custom emoticons and the corresponding execution instructions are set through the setting interface provided by the application program in the terminal device, and the application program includes several authorized merchant application programs, APPs or applets.
- the user presets user-defined finger features, palmprint features, palm vein features and/or palmprint and palm vein features and corresponding execution instructions; the server calculates the living finger features, palmprint features, palm vein features and/or palmprint And the similarity between the palm vein feature information and the determined corresponding biological feature information pre-stored by each valid user; the server according to the similarity of the finger features, palm print features, palm vein features and/or palm prints and palm veins, The information authentication result of the object to be authenticated and the corresponding execution instruction are obtained. Among them, finger features, palm print features, palm vein features, palm prints and palm vein features all belong to living biometric information.
- the custom emoticons preset by the user and the corresponding execution instructions are set through the setting interface provided by the application program in the terminal device.
- the user application program includes several authorized merchant applications, APPs or small programs.
- the embodiment of the present application also provides another near-field information authentication method based on time control, including the following steps:
- Step 201 When the terminal device detects that the authorized merchant hotspot meets the set conditions, it downloads at least one authorized merchant hotspot information corresponding to the authorized merchant from the server and adds it to the display interface, wherein one authorized merchant is associated with one or more authorized merchant hotspots , an authorized merchant hotspot is associated with one or more authorized merchant devices.
- the setting condition is that the hotspot of the authorized merchant is visible to the user and its location information is within the preset range of the current location or the virtual location of the terminal device.
- the location may be a virtual location, such as text input of certain address information, such as location information obtained by sending or sharing, such as clicking a certain location on a mobile phone map to generate corresponding location information.
- an application downloaded in the terminal device to accommodate authorized merchant hotspots, and provide authorized merchants with information authentication for the objects to be authenticated, which is equivalent to a framework to manage authorized merchant hotspots corresponding to different authorized merchants, such as authorized merchants Set the identification time period, etc.
- the user uses the application program for the first time, in the application program display interface of the terminal device, the user first adds an authorized merchant hotspot.
- the specific way of adding is that when the authorized merchant device is within the preset range of the current location of the terminal device, the authorized merchant hotspot information corresponding to the authorized merchant device is downloaded from the server and added.
- the operation of adding an authorized merchant hotspot for a merchant includes: selecting a new authorized merchant hotspot, setting its location information, preset range, default preset time and other information, confirming and uploading to the server, and then setting the authorized merchant device to correspond to the new increase hotspots.
- the terminal device takes the current location of the terminal device as the reference point, for example, the preset range is set to 3 kilometers, and the current location of the terminal device is point A, then obtain the information corresponding to all authorized merchant devices currently located within 3 kilometers of point A.
- the information of authorized merchant hotspots visible to the user is downloaded from the server, and loaded and displayed on the display interface of the terminal device.
- the terminal device is used as the reference object.
- the terminal device obtains its own current location and the authorized merchants within the preset range. Since the terminal device is owned by the user and is movable, when the geographical location of the terminal device changes or uses virtual geographic location, the corresponding preset range is also different accordingly, so the authorized merchants are also different.
- the method of adding the authorized merchant hotspot is dynamic update.
- the terminal device often changes its location or uses a virtual geographic location under the possession of the user, the change of location will bring about a difference in its preset range, and the corresponding authorized merchants will also be different. Therefore, the hotspots of authorized merchants will be dynamically updated according to the change of the geographical location of the terminal device.
- the terminal device when it detects that it is located within the preset geographic boundary based on the current location information, it obtains in real time the authorized merchant hotspots corresponding to all authorized merchants within the preset range of the current location, and downloads the authorized merchant hotspot information from the server and Real-time update to the display interface.
- the preset geographic boundary may be a geographical boundary artificially set for updating authorized merchant hotspots for the terminal device.
- Step 202 When the terminal device detects that the current time meets the valid identification time period and the current location is within the hotspot range of a valid authorized merchant, the terminal device periodically sends location information to the server, and the terminal device is associated with the object to be authenticated.
- the authorized merchant is a supermarket
- the supermarket has a card reader installed.
- the authorized merchant hotspot of the supermarket has a corresponding binding relationship with the supermarket.
- Supermarkets can install multiple card readers, but users don’t want to see many card readers on the operation interface, and they don’t care about which card reader will finally swipe their cards. Therefore, the supermarket can become a hotspot for authorized merchants. All card readers in the supermarket are authorized.
- Merchant hotspots should be authorized, that is, one authorized merchant hotspot can correspond to multiple authorized merchant devices, but an authorized merchant device can only be bound to one authorized merchant hotspot at a time; a supermarket can have multiple branches, and each branch is an authorized merchant Hotspot, that is, one authorized merchant can correspond to multiple authorized merchant hotspots, but an authorized merchant hotspot can only be bound to one authorized merchant at a time.
- the terminal device is held by the user, and the user is the object to be authenticated when performing information authentication.
- the object to be authenticated authorizes a merchant, and the merchant becomes an authorized merchant.
- the subway becomes an authorized merchant.
- the object to be authenticated also authorizes all the subway stations included in the subway. That is, an authorized merchant includes at least one merchant item. For example, a subway includes at least one subway station.
- the object to be authenticated authorizes the authorized merchant, all subway stations are authorized by default.
- each of the authorized merchants includes at least one merchant item, and the authorized merchant and the merchant item both correspond to an authentication time period, and the authentication time period corresponding to any merchant item is the same as the authentication time period corresponding to the authorized merchant Or not, the authentication time period corresponding to any merchant item in the same authorized merchant is the same or different from the authentication time period corresponding to other merchant items.
- the subway is an authorized merchant
- the subway includes many subway stations, and each subway station is a merchant project.
- the authorized merchant setting interface can be provided for uniform setting of authorized merchants, and an interface for setting each merchant item can also be provided separately. For example, the set time period of the subway is set from 8:00 am to 11:30 pm on the interface of the authorized merchant.
- all subway stations correspond to the set time period from 8:00 am to 11:30 pm.
- users can additionally set the set time period of the subway station through the interface. Therefore, the set time periods of different subway stations may be different, or the set time periods of all subway stations may be the same.
- Step 203 The authorized merchant device sends an information authentication request to the server, and the information authentication request includes the identification information of the authorized merchant device and at least one kind of living biometric information collected about the object to be authenticated.
- the information authentication request may also carry the identification information of the authorized merchant's device, such as the unique code of the device, so that the server can quickly match other information corresponding to the authorized merchant's device.
- Step 204 The server determines valid users within a preset range of the authorized merchant device based on the identification information of the authorized merchant device and the location information uploaded by each terminal device.
- Step 205 The server compares the at least one living biometric information with the determined corresponding biometric information pre-stored by each valid user, and obtains an information authentication result of the object to be authenticated.
- At least one kind of living biological feature information includes one or more of biological information such as face information, palmprint information, palm vein information, fingerprint information, voiceprint information, iris information, and DNA information. Facial biometric information is preferred.
- a collection device for collecting at least one type of biometric information of a corresponding type is installed in the terminal device.
- the error rate of face recognition technology to obtain the biometric information of the object to be authenticated is smaller, which can provide the accuracy of identification and is relatively convenient to apply.
- face recognition technology can also be combined with facial gesture recognition technology, and the subject to be authenticated can customize the expression required for identity recognition based on his own preferences, preventing theft of funds, etc.
- the palm vein recognition technology can also be combined with the finger gesture recognition technology, and the subject to be authenticated can customize the palm vein and finger gestures required for identification based on his own preferences, preventing theft of funds, etc.
- FIG. 3 shows a flow chart of another near-field information authentication method based on time control.
- the near-field information authentication method based on time control provided in this embodiment includes:
- Step 301 When the server detects that the terminal device is associated with an authorized merchant application, APP or applet, it adds and saves the authorized merchant hotspot corresponding to the authorized merchant and the default valid identification time period to the display interface, wherein the authorized merchant application , APP or Mini Program associated with authorized merchants.
- an application program of the terminal device is used as a framework of mini-programs corresponding to many authorized merchants, accommodating application programs, APPs or mini-programs of different authorized merchants.
- the Mini Program operator presets authorized merchant hotspots when designing the Mini Program, and registers the authorized merchant hotspots in the server when the Mini Program is launched, so when users search for Mini Program keywords through terminal devices and pay attention to the authorized
- the server will add the authorized merchant hotspot corresponding to the authorized merchant to the display interface.
- the hotspots of authorized merchants corresponding to authorized merchants within the preset range are selected and added to the display interface by using the terminal device as a geographical reference point.
- the geographical location will change, so the authorized Merchant hotspots are dynamically updated and added to the display interface.
- the server detects the terminal device to search for the keyword of the applet, when judging whether to pay attention to the authorized merchant application, APP or applet, when the terminal device pays attention to the authorized merchant application, APP or applet, then in the Except for the situation of artificial deletion of attention, it will not change objectively with the change of geographical location.
- the server after the server obtains the hotspot information of the authorized merchant, it will add the hotspot of the authorized merchant to the display interface, and also the hotspot of the authorized merchant. Save to the display interface, this embodiment does not adopt the method of dynamic update.
- the effective identification time period may be the default preset time of the hotspot of the authorized merchant, and may also be changed.
- the way to update the authorized merchant hotspots is that the server receives and approves the authorization of the authorized merchant application, APP or applet by the operator of the authorized merchant application, When the authorized merchant hotspot of the APP or applet makes a change request, save the changed authorized merchant hotspot, merchant hotspot name, location information, preset range, default preset time and/or whether it is visible to the user, etc., and generate an authorized merchant hotspot
- the change information is sent to the terminal device; the terminal device downloads and saves the changed hotspot update of the authorized merchant from the server based on the hotspot change information of the authorized merchant and saves it to the display interface.
- Step 302 When the terminal device detects that the current time meets the valid identification time period and the current location is within the hotspot range of a valid authorized merchant, the terminal device periodically sends location information to the server, and the terminal device is associated with the object to be authenticated.
- Step 303 The authorized merchant device sends an information authentication request to the server, and the information authentication request includes the identification information of the authorized merchant device and at least one kind of living biometric information of the object to be authenticated collected.
- Step 304 The server determines valid users within the preset range of the authorized merchant device based on the identification information of the authorized merchant device and the location information uploaded by each terminal device.
- Step 305 The server compares the at least one living biometric information with the determined corresponding biometric information pre-stored by each valid user, and obtains an information authentication result of the object to be authenticated.
- this application also provides another near-field information authentication method based on time control, including:
- Step 401 When the terminal device does not have a valid authorized merchant hotspot at the current location, activate the temporary user authorization interface, and when it is detected that the number of information authentications performed by the object to be authenticated based on the temporary user authorization interface within a set time interval reaches a threshold, The authorized merchant hotspot corresponding to the authorized merchant device is downloaded from the server and added to the display interface.
- the authorized merchant hotspot includes the name of the authorized merchant hotspot, the operator information, the application program, the item in the application program, the location information, the preset range, the default preset time, and whether it is visible to the user. , Whether the authorized merchant hotspot is valid, one or more identified time periods, and whether each time period is valid.
- This embodiment can provide users with different interfaces to set the set time period, including the setting of the merchant hotspot name, operator information, application program, item in the application program, location information, Preset range, default preset time, whether it is visible to users can be set through the setting interface provided by the authorized merchant application, APP or applet; or, the setting of authorized merchant hotspots Whether the authorized merchant hotspot is valid, the identification time period, and each time Whether the section is valid and restore the default preset time is set through the setting interface provided by the application program in the terminal device, and the application program includes several authorized merchant applications, APPs or small programs.
- the authorized merchant hotspots are displayed on the display interface corresponding to the application through any one of map display, list display, and classification display, and the classification display indicates that the authorized merchant hotspots follow the preset classification rules They are classified into corresponding category sets respectively, and different category sets are displayed on the display interface of the application program.
- the classification display can be classified according to the geographic location dimensions of provinces, cities, and streets, or according to the dimensions of the map space, or according to the dimensions of the applet to which it belongs, or the dimension of character name sorting, or the reference location by far It can be classified according to the dimension of near or near to far, and it can also be classified and managed according to the dimension of time order.
- the list display is to form a list of different authorized merchant hotspots in a preset order
- the map display is to display the authorized merchant hotspots corresponding to the position of each authorized merchant hotspot on the map.
- the set time period of the authorized merchant hotspot must include a start time parameter and an end time parameter, wherein the time period between the start time parameter and the end time parameter constitutes the set time period. corresponding length of time.
- the object to be authenticated can only be valid if it enters the range within this time period.
- the access control will be opened, but due to the long time period, it is easy to be faked and insulted by others.
- the time is set from 10:00 p.m. to 10:10 p.m., the length of the time period is shortened, but it also restricts the user himself.
- the set time period of the authorized merchant hotspot in this embodiment includes a start time parameter, an end time parameter, a sustainable time parameter and whether it is valid, and the time period between the start time parameter and the end time parameter constitutes the Set the length of time corresponding to the time period, and the sustainable time parameter is used to indicate the length of time that the terminal device continues to send location information to the server when the set time period is satisfied and the current location is within the hotspot range of a valid authorized merchant, The whether it is valid is used to indicate whether the set time period participates in the actual operation of the terminal device.
- the set time period for users to enter the community is set to 17:00-22:00, it is assumed that the user completes identity authentication and enters the community at 17:24. :00 minutes During this period, the user's location information will be continuously sent to the server; but if the sustainable time parameter is set to 2 minutes, the location signal will be continuously uploaded to the server within 2 minutes, that is, the authentication will be opened for 2 minutes state, after 2 minutes, the terminal device will no longer upload location information to the server to prevent others from entering by mistake; when the user leaves the area of the community and returns, it will start again, so the entry is valid within 17:00-22:00.
- this embodiment provides a timetable, and the effective identification time periods of different authorized merchant hotspots are mapped to a timetable, and the timetable is used to represent the correspondence between authorized merchant hot spots and valid identification time periods relation.
- Matching identification information is respectively set in the time table corresponding to different valid identification time periods, and the identification information is used to indicate general attributes or individual attributes of different valid identification time periods. Unify the timetable for users to view. Different attributes are identified by different identification information, which is more convenient for users to view.
- the identification information can be specific characters or different colors. For example, the yellow identification indicates the general time period, and the blue identification indicates the individual time. part.
- Step 402 When the terminal device detects that the current time meets the valid identification time period and the current location is within the hotspot range of a valid authorized merchant, the terminal device periodically sends location information to the server, and the terminal device is associated with the object to be authenticated.
- Step 403 The authorized merchant device sends an information authentication request to the server, and the information authentication request includes the identification information of the authorized merchant device and at least one living biometric information collected of the object to be authenticated;
- Step 404 The server determines valid users within the preset range of the authorized merchant device based on the identification information of the authorized merchant device and the location information uploaded by each terminal device;
- Step 405 The server compares the at least one living biometric information with the determined corresponding biometric information pre-stored by each valid user, and obtains an information authentication result of the object to be authenticated.
- the embodiment of the present application also provides a near-field information authentication method based on time control, including:
- Step 501 The terminal device detects its own state and whether the current time meets the valid identification time period every set period, and sends location information to the server according to its own state.
- the terminal device detects that the current time meets the valid identification time period and its own state is in motion, it obtains the current location and sends the location information to the server; when the terminal device detects that the current time meets the valid identification time period and its own state is stationary, the distance If the time interval for sending the location information to the server once satisfies the preset interval, then the location information is sent to the server; otherwise, the location information is not sent. That is to say, it is first determined whether the current time of the terminal device is valid, and on the premise of whether the current time is valid, the current location information is compared with the location information sent to the server last time.
- the terminal device before the terminal device detects whether its own current time meets the set time period and whether the current location is within the set range, it also detects its own motion state. Specifically, the terminal device calculates whether its own state is moving or stationary through the attitude sensor, magnetic field sensor or gravity sensor. Specifically, when the data of the attitude sensor, magnetic field sensor or gravity sensor is detected to change, the terminal device determines accordingly in a non-stationary state. In another embodiment, the horizontal angle and magnetic field direction are calculated in real time by the gravity sensor and the magnetic field sensor. If the horizontal angle and magnetic field direction change, it is determined that the terminal device is in a non-stationary state.
- the terminal device obtains the current location information, and compares the current location information with the last location information; when the change value between the current location information and the last location information is greater than the preset value, define The terminal equipment is defined as moving, otherwise, the terminal equipment is defined as stationary.
- the change value is set to be greater than 0.05 in any direction or the change in the magnetic field angle is greater than 8 degrees
- the first detection is that the mobile phone is placed on the table and it is just facing north
- the vertical angle X0 0.0
- the vertical direction Y0 0.0
- the second detection is that the user is picking up the mobile phone to look at and facing west
- the horizontal angle X1 0.0
- the vertical direction Y1 -0.8
- the vertical angle Z1 -0.6
- the third detection user holds the mobile phone but does not move
- the horizontal angle X2 0.0
- the vertical direction Y2 -0.8
- the vertical angle Z2 -0.6
- the preset interval should be within 10 minutes. Because the mobile phone is in a static state for a long time, for example, the mobile phone is put aside when sleeping, and the mobile phone is held but not moved when looking at the mobile phone, etc., and the clock, attitude sensor, magnetic field sensor and gravity sensor are the most energy-saving in the mobile phone. Modules, therefore, can greatly reduce the energy consumption of APP on terminal equipment.
- Step 502 When the terminal device detects that the current time meets the valid identification time period and the current location is within the hotspot range of a valid authorized merchant, the terminal device periodically sends location information to the server, and the terminal device is associated with the object to be authenticated.
- the location information detected by the terminal device is obtained through real-time collection by the satellite positioning device in the terminal device, or the moving direction and moving distance of the terminal device are calculated through the real-time data collected by the acceleration sensor, direction sensor, and magnetic field sensor in the terminal device, And combined with the last location information to calculate.
- Step 503 The authorized merchant device sends an information authentication request to the server, and the information authentication request includes the identification information of the authorized merchant device and at least one living biometric information collected of the object to be authenticated;
- Step 504 The server determines valid users within the preset range of the authorized merchant device based on the identification information of the authorized merchant device and the location information uploaded by each terminal device;
- Step 505 The server compares the at least one living biometric information with the determined corresponding biometric information pre-stored by each valid user, and obtains an information authentication result of the object to be authenticated.
- the server calculates the similarity between the at least one living biometric information and the determined corresponding biometric information pre-stored by each valid user; the server obtains the information authentication result of the object to be authenticated according to the similarity.
- the method for the terminal device to report location information may also be: the terminal device receives a mandatory location information reporting notification instruction, and determines the corresponding location reporting area according to the mandatory location information reporting notification instruction; when the terminal device detects that it is in the When the above location reporting area is within the range, report the current location information. Specifically, if a mandatory location information reporting point is set in some locations, the corresponding terminal device will establish a corresponding reporting strategy after receiving the corresponding instruction.
- the notification instruction of mandatory location information reporting may include a specific reporting time period. When the user carries the device and enters the location reporting area (such as 50 meters or 100 meters, etc.), the current location information is reported. It can be applied to scenarios such as police identity verification and verification.
- Fig. 6 shows a schematic structural diagram of a near-field information authentication device based on time control provided by an embodiment of the present application.
- a near-field information authentication device based on time control provided in this embodiment includes a position sending module 601.
- the location sending module 601 is used when the terminal device detect
- the position information detected by the terminal device is obtained through real-time collection by the satellite positioning device in the terminal device, or the real-time data collected by the acceleration sensor, the direction sensor, and the magnetic field sensor in the terminal device are used to calculate the moving direction of the terminal device and The moving distance is calculated by combining the last location information.
- the server compares the at least one living biometric information with the determined corresponding biometric information pre-stored by each valid user, and obtains the information authentication result of the object to be authenticated, including: the server calculates the at least one living biological The similarity between the characteristic information and the determined corresponding biological characteristic information pre-stored by each valid user; the server obtains the information authentication result of the object to be authenticated according to the similarity.
- the embodiment of the present application also provides another near-field information authentication device based on time management, including a hotspot adding module 701, a location sending module 702, an authentication request module 703, a user determining module 704, and a feature comparison module 705.
- the location sending module 702 is used for the terminal device to periodically send location information to the server when the terminal device detects that the current time meets the valid identification time period and the current location is within the hotspot range of a valid authorized merchant, and the terminal device is associated with the object to be authenticated
- the authentication request module 703 is used for the authorized merchant equipment to send an information authentication request to the server, the information authentication request including the identification information of the authorized merchant equipment and at least one living biometric information collected by the object to be authenticated;
- the user determination module 704 is used for the server to determine valid users within the preset range of the authorized merchant equipment based on the identification information of the authorized merchant equipment and the location information uploaded by each terminal equipment;
- the feature comparison module 705 is used for the server Comparing the at least one living biometric feature information with the determined corresponding biometric feature information pre-stored by each valid user, to obtain an information authentication result of the object to be authenticated.
- the hotspot adding module 701 of this embodiment is used to add at least one authorized merchant hotspot corresponding to the authorized merchant in the terminal device.
- one of the implementation methods is that when the terminal device detects that the authorized merchant hotspot meets the set conditions, it downloads the authorized merchant hotspot information corresponding to the authorized merchant from the server and adds it to the display interface, wherein an authorized merchant is associated with one or Multiple authorized merchant hotspots, one authorized merchant hotspot is associated with one or more authorized merchant devices.
- the setting condition is that the location information of the hotspot of the authorized merchant is within the preset range of the current location or the virtual location of the terminal device.
- the specific adding method in the hotspot adding module 701 is to download and add the authorized merchant hotspots corresponding to the authorized merchants within the preset range from the server to the display interface of the terminal device by taking the geographic location or virtual position of the terminal device as a reference point middle.
- the hotspots of authorized merchants will be dynamically updated according to changes in the geographic location or virtual location of the terminal device.
- the terminal device detects that it is located within the preset geographic boundary based on the current location information, it obtains in real time the authorized merchant hotspots corresponding to all authorized merchants within the preset range of the current location or virtual location, and sends the authorized merchant hotspot information from the server Download and update to the display interface in real time.
- the preset geographic boundary may be a geographical boundary artificially set for updating authorized merchant hotspots for the terminal device.
- hotspot adding module 701 may be that when the server detects that the terminal device is associated with an authorized merchant application, APP or applet, the authorized merchant hotspot corresponding to the authorized merchant and the default valid identification time period setting are added and saved to the display.
- the server after the server obtains the hotspot information of the authorized merchant, it adds the hotspot of the authorized merchant to the display interface, and also saves the hotspot of the authorized merchant to the display interface.
- This embodiment does not adopt a dynamic update method.
- the way to update the authorized merchant hotspots is that the server receives and approves the authorized merchant application, APP or applet.
- the authorized merchant hotspot of the authorized merchant application When the authorized merchant hotspot of the authorized merchant application, APP or applet makes a change request, the changed authorized merchant hotspot is saved, and the authorized merchant hotspot change information is generated and sent to the terminal device; the terminal device downloads it from the server based on the authorized merchant hotspot change information And save the modified hotspot update of the authorized merchant and save it to the display interface.
- the specific adding method of the hotspot adding module 701 can also be aimed at the situation that the merchant device that the terminal device is currently operating has not been loaded into the display interface of the terminal device. Specifically, the terminal device detects that the current display interface is not When the hotspot of the authorized merchant corresponding to the current authorized merchant is loaded, the temporary user authorization interface is opened, and when it is detected that the number of information authentications performed by the object to be authenticated based on the temporary user authorization interface within the set time interval reaches the threshold, download from the server The authorized merchant hotspot corresponding to the authorized merchant is added to the display interface.
- the authorized merchant hotspot includes the name of the authorized merchant hotspot, the information of the operator it belongs to, the application it belongs to, the project it belongs to in the application it belongs to, the location information, the preset range, the default preset time, whether it is visible to the user, whether the authorized merchant hotspot is Valid, one or more identified time periods, whether each time period is valid. Further, the authorized merchant hotspot is set with the name of the merchant hotspot, the information of the operator it belongs to, the application it belongs to, the project it belongs to in the application it belongs to, the location information, the preset range, the default preset time, and whether it is visible to the user.
- the setting of the hotspot of the authorized merchant is whether the hotspot of the authorized merchant is valid, the identification time period, whether each time period is valid, and the default preset time is set through the setting interface provided by the application program in the terminal device.
- the application program includes several authorizations. Merchant application, APP or Mini Program.
- the hotspots of authorized merchants are displayed on the display interface corresponding to the application through any one of map display, list display, and classification display. They are classified into corresponding category sets respectively, and different category sets are displayed on the display interface of the application program.
- the classification display can be classified according to the geographic location dimensions of provinces, cities, and streets, or according to the dimensions of the map space, or according to the dimensions of the applet to which it belongs, or the dimension of character name sorting, or the reference location by far It can be classified according to the dimension of near or near to far, and it can also be classified and managed according to the dimension of time order.
- the list display is to form a list of different authorized merchant hotspots in a preset order
- the map display is to display the authorized merchant hotspots corresponding to the position of each authorized merchant hotspot on the map.
- the valid identification time periods of different authorized merchant hotspots are all mapped to a timetable, and the timetable is used to represent the corresponding relationship between authorized merchant hotspots and valid identification time periods.
- the timetable is used to represent the corresponding relationship between authorized merchant hotspots and valid identification time periods.
- matching identification information is set in the time table corresponding to different set time periods, and the identification information is used to indicate the general attributes or individual attributes of different set time periods. Unify the timetable for users to view. Different attributes are identified by different identification information, which is more convenient for users to view.
- the identification information can be specific characters or different colors. For example, the yellow identification indicates the general time period, and the blue identification indicates the individual time. part.
- the embodiment of the present application also provides another near-field information authentication device based on time control.
- This embodiment adds a state detection module 801 on the basis of the above embodiment, and the state detection module 801 is configured as each terminal device Detect its own state every set period and whether the current time meets the set time period; when the terminal device detects that the current time meets the valid identification time period and its own state is in motion, it obtains the current location and sends the location information to the server; the terminal device is detecting When the current time meets the valid identification time period and the self-state is static, the time interval from the last sending of location information to the server meets the preset interval before sending the location information to the server.
- the location sending module 802 is used for the terminal device to periodically send location information to the server when the terminal device detects that the current time meets the valid identification time period and the current location is within the hotspot range of a valid authorized merchant, and the terminal device is associated with the object to be authenticated
- the authentication request module 803 is used for the authorized merchant equipment to send an information authentication request to the server, the information authentication request including the identification information of the authorized merchant equipment and at least one living biometric information collected by the object to be authenticated;
- the user determination module 804 is used for the server to determine valid users within the preset range of the authorized merchant equipment based on the identification information of the authorized merchant equipment and the location information uploaded by each terminal equipment;
- the feature comparison module 805 is used for the server Comparing the at least one living biometric feature information with the determined corresponding biometric feature information pre-stored by each valid user, to obtain an information authentication
- the terminal device confirms that the current state is motion or stillness through an attitude sensor and/or a magnetic field sensor. Specifically, the terminal device obtains the current location information, and compares the current location information with the last location information;
- the terminal device When the change value between the current position information and the last position information is greater than a preset value, the terminal device is defined as moving, otherwise, the terminal device is defined as stationary.
- the location information detected by the terminal equipment is obtained through real-time collection by the satellite positioning device in the terminal equipment, or by calculating the horizontal angle and magnetic field direction of the terminal equipment through real-time data collected by the gravity sensor and magnetic field sensor in the terminal equipment.
- the embodiment of the present application also provides a computer device, including: a memory 901 and one or more processors 902; the memory 901 is used to store one or more programs; when the one or more A program is executed by the one or more processors 902, so that the one or more processors implement the method for selecting a path based on Internet of Things data transmission as described in this application.
- the embodiment of the present application also provides a storage medium containing computer-executable instructions, and the computer-executable instructions are used to execute the near-field information authentication method based on time management as provided in the above-mentioned embodiments when executed by a computer processor.
- the near-field information authentication method based on time control includes: when the terminal device detects that the current time meets the valid identification time period and the current location is within the hotspot range of the valid authorized merchant, periodically send the location information to the server, the terminal device and the waiting time Authentication object association; the authorized merchant device sends an information authentication request to the server, and the information authentication request includes the identification information of the authorized merchant device and at least one living biometric information collected by the object to be authenticated; the server Based on the identification information of the authorized merchant equipment and the location information uploaded by each terminal equipment, valid users within the preset range of the authorized merchant equipment are determined; The corresponding biometric information pre-stored by the user is compared to obtain the information authentication result of the object to be authenticated.
- storage medium any of various types of memory devices or storage devices.
- storage medium is intended to include: installation media such as CD-ROMs, floppy disks, or tape drives; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Rambus RAM, etc. ; non-volatile memory, such as flash memory, magnetic media (eg hard disk or optical storage); registers or other similar types of memory elements, etc.
- the storage medium may also include other types of memory or combinations thereof.
- the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network such as the Internet.
- the second computer system may provide program instructions to the first computer for execution.
- storage medium may include two or more storage media that may reside in different locations, such as in different computer systems connected by a network.
- the storage medium may store program instructions (eg embodied as computer programs) executable by one or more processors.
- the storage medium containing computer-executable instructions provided in the embodiments of the present application is not limited to the above-mentioned near-field information authentication method based on time management and control, and may also execute the method described in any embodiment of the present application. Relevant operations in the provided near-field information authentication method based on time control.
- the time-control-based near-field information authentication device, device, and storage medium provided in the above-mentioned embodiments can implement the time-control-based near-field information authentication method provided in any embodiment of the present application, and the technologies that are not described in detail in the above-mentioned embodiments For details, refer to the near-field information authentication method based on time control provided in any embodiment of this application.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- Human Resources & Organizations (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- User Interface Of Digital Computer (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110515813.4A CN113204749A (zh) | 2021-05-12 | 2021-05-12 | 基于时间管控的近场信息认证方法及装置 |
| CN202110515813.4 | 2021-05-12 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2022237859A1 true WO2022237859A1 (fr) | 2022-11-17 |
Family
ID=77031947
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2022/092355 Ceased WO2022237859A1 (fr) | 2021-05-12 | 2022-05-12 | Procédé et appareil d'authentification d'informations de champ proche basés sur le contrôle et la gestion du temps |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN113204749A (fr) |
| WO (1) | WO2022237859A1 (fr) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113204749A (zh) * | 2021-05-12 | 2021-08-03 | 巽腾(广东)科技有限公司 | 基于时间管控的近场信息认证方法及装置 |
| CN116756719B (zh) * | 2023-08-16 | 2023-10-24 | 北京亚大通讯网络有限责任公司 | 基于指纹生物识别及uwb协议的身份验证系统 |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108353099A (zh) * | 2016-11-23 | 2018-07-31 | 华为技术有限公司 | 一种ppg认证的方法和设备 |
| CN109684811A (zh) * | 2018-12-26 | 2019-04-26 | 广州市巽腾信息科技有限公司 | 定点授权的身份识别方法、装置及服务器 |
| CN109711847A (zh) * | 2018-12-26 | 2019-05-03 | 广州市巽腾信息科技有限公司 | 近场信息认证的方法、装置、电子设备和计算机存储介质 |
| CN109711133A (zh) * | 2018-12-26 | 2019-05-03 | 广州市巽腾信息科技有限公司 | 身份信息的认证方法、装置及服务器 |
| CN113204749A (zh) * | 2021-05-12 | 2021-08-03 | 巽腾(广东)科技有限公司 | 基于时间管控的近场信息认证方法及装置 |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106533687B (zh) * | 2015-09-14 | 2019-11-08 | 阿里巴巴集团控股有限公司 | 一种身份认证方法和设备 |
| CN106789851A (zh) * | 2015-11-24 | 2017-05-31 | 阿里巴巴集团控股有限公司 | 身份验证方法、系统、业务服务器和验证服务器 |
-
2021
- 2021-05-12 CN CN202110515813.4A patent/CN113204749A/zh active Pending
-
2022
- 2022-05-12 WO PCT/CN2022/092355 patent/WO2022237859A1/fr not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108353099A (zh) * | 2016-11-23 | 2018-07-31 | 华为技术有限公司 | 一种ppg认证的方法和设备 |
| CN109684811A (zh) * | 2018-12-26 | 2019-04-26 | 广州市巽腾信息科技有限公司 | 定点授权的身份识别方法、装置及服务器 |
| CN109711847A (zh) * | 2018-12-26 | 2019-05-03 | 广州市巽腾信息科技有限公司 | 近场信息认证的方法、装置、电子设备和计算机存储介质 |
| CN109711133A (zh) * | 2018-12-26 | 2019-05-03 | 广州市巽腾信息科技有限公司 | 身份信息的认证方法、装置及服务器 |
| CN113204749A (zh) * | 2021-05-12 | 2021-08-03 | 巽腾(广东)科技有限公司 | 基于时间管控的近场信息认证方法及装置 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN113204749A (zh) | 2021-08-03 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7444931B2 (ja) | 振替口座のためのユーザインタフェース | |
| US12165127B2 (en) | User interfaces for stored-value accounts | |
| US12231986B2 (en) | Interlinked geo-fencing | |
| US20240265377A1 (en) | Computer-based systems configured to provide pre-staged transactions via lockers and methods of use thereof | |
| US20160232516A1 (en) | Predictive authorization of mobile payments | |
| US20210326824A1 (en) | Computer-based systems involving fingerprint or biometrically-activated transaction cards and methods of use thereof | |
| US11887089B2 (en) | Dynamic and predictive adjustment of payment attributes based on contextual data and metadata | |
| US12118067B2 (en) | Authentication system, authentication terminal, user terminal, authentication method, and program | |
| KR102607791B1 (ko) | 거래 이력 기반의 서비스 제공 방법 및 그 전자 장치 | |
| CN106855812A (zh) | 配置用户终端的方法和装置 | |
| US20210266737A1 (en) | Multi-usage configuration table for performing biometric validation of a user to activate an integrated proximity-based module | |
| KR102632841B1 (ko) | 복수의 결제들을 수행하는 전자 장치 및 그 방법 | |
| WO2022237859A1 (fr) | Procédé et appareil d'authentification d'informations de champ proche basés sur le contrôle et la gestion du temps | |
| US20210216840A1 (en) | Computer-based systems and methods involving biometric authentication aspects for handling exceptions, enabling deactivation and/or performing other functionality | |
| US20250390860A1 (en) | Systems and methods for authorizing a transfer | |
| US20240135351A1 (en) | Dynamic and predictive adjustment of payment attributes based on contextual data and metadata | |
| US12469022B2 (en) | Systems and methods for sharing a virtual card | |
| US20250156845A1 (en) | Systems and methods for preauthorizing transaction cards | |
| KR20180066657A (ko) | 결제가 실행된 오프라인매장의 위치정보를 이용하여 사용자의 지출동선을 트래킹하는 경제생활관리 애플리케이션이 설치된 스마트단말 | |
| Tait | Smart Wallet |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22806821 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 22806821 Country of ref document: EP Kind code of ref document: A1 |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 23/04/2024) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 22806821 Country of ref document: EP Kind code of ref document: A1 |