WO2017020426A1 - Procédé, appareil et système de communication reposant sur une identification de caractéristiques biologiques - Google Patents
Procédé, appareil et système de communication reposant sur une identification de caractéristiques biologiques Download PDFInfo
- Publication number
- WO2017020426A1 WO2017020426A1 PCT/CN2015/091375 CN2015091375W WO2017020426A1 WO 2017020426 A1 WO2017020426 A1 WO 2017020426A1 CN 2015091375 W CN2015091375 W CN 2015091375W WO 2017020426 A1 WO2017020426 A1 WO 2017020426A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- communication
- biometric information
- user
- verification
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1073—Registration or de-registration
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a biometric identification-based communication method, apparatus, and system.
- the encrypted password set by the user is usually relatively simple and can be easily deciphered.
- the terminal can be initialized by flashing or the like to invalidate the originally set password. Therefore, once a user's terminal is lost or stolen, there is a risk of privacy leakage of the user and its contacts, and even a significant loss.
- the pirate enters the dialing application in the terminal by deciphering the password, dials the user's contact phone, and swindles the user or takes the private information as the user's identity, while the other person actually receives the password.
- the user's phone When the user's phone is called, they may hear the thief's words, causing major economic losses or revealing their private information.
- the existing communication application encryption scheme cannot effectively guarantee the security of user communication, and thus there may be risks such as privacy leakage of the user and its contacts, causing significant loss.
- the technical problem to be solved by the embodiments of the present invention is to provide a communication method, device and system based on biometric identification, in order to enhance the security of user communication, thereby ensuring privacy and security of users.
- an embodiment of the present invention provides a communication method based on biometric identification, the method comprising:
- the communication request includes a communication identifier of the first terminal and biometric information of the first terminal user, so that the second terminal verifies the first terminal user Whether the biometric information is pre-stored with the second terminal and the communication identifier with the first terminal. The corresponding verification biometric information matches, and when the match is confirmed, the communication request is made.
- an embodiment of the present invention further provides a communication method based on biometric identification, the method comprising:
- the communication request is passed.
- an embodiment of the present invention provides a biometric identification-based communication device, including:
- a triggering module configured to receive a communication triggering instruction of the communication terminal user for the second terminal
- An acquiring module configured to acquire biometric information input by the user of the communication terminal
- a request sending module configured to send a communication request to the second terminal, where the communication request includes a communication identifier of the communication terminal and biometric information of the communication terminal user, so that the second terminal verifies the communication Whether the biometric information of the end user matches the verification biometric information corresponding to the communication identifier of the communication terminal prestored by the second terminal, and when the matching is confirmed, the communication request is passed.
- an embodiment of the present invention further provides a biometric identification-based communication device, including:
- a request receiving module configured to receive a call request sent by the first terminal, where the call request includes a communication identifier of the first terminal and biometric information of the first terminal user;
- a verification module configured to verify whether biometric information of the first terminal user matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal;
- the requesting module is configured to: when the biometric information of the first terminal user matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal, by using the communication request.
- an embodiment of the present invention further provides a biometric identification-based communication system, including:
- a first terminal configured to receive a communication triggering instruction of the first terminal user for the second terminal, acquire biometric information input by the first terminal user, and send a communication request to the second terminal, where the communication request includes the a communication identifier of the first terminal and biometric information of the first terminal user, so that the second terminal verifies whether biometric information of the first terminal user is related to the second terminal Pre-stored verification biometric information corresponding to the communication identifier of the first terminal is matched, and when the matching is confirmed, the communication request is passed;
- a second terminal configured to receive a call request sent by the first terminal, where the call request includes a communication identifier of the first terminal and biometric information of the first terminal user, and verify biometric characteristics of the first terminal user Whether the information matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal, if the biometric information of the first terminal user corresponds to the pre-stored communication identifier of the first terminal The verification biometric information is matched by the communication request.
- the embodiment of the present invention obtains biometric information input by the first terminal user by receiving a communication triggering instruction of the first terminal user for the second terminal, and sends a communication request to the second terminal, where the communication request includes the first a communication identifier of the terminal and the biometric information of the first terminal user, so that the second terminal verifies whether the biometric information of the first terminal user is pre-stored with the second terminal and the first terminal.
- the verification biometric information corresponding to the communication identifier is matched, and when the matching is confirmed, the communication request is used to facilitate the second terminal to determine whether the identity of the first terminal user is legal by matching the biometric information of the first terminal user to ensure the security of the communication. Sex, to prevent the leakage of private information of users, thereby protecting the privacy and security of users.
- FIG. 1 is a schematic flow chart of a biometric identification-based communication method according to an embodiment of the present invention
- FIG. 2 is a schematic flow chart of a biometric identification-based communication method according to another embodiment of the present invention.
- FIG. 3 is a schematic flow chart of a biometric identification-based communication method according to another embodiment of the present invention.
- FIG. 4 is a schematic flow chart of a biometric identification-based communication method according to another embodiment of the present invention.
- FIG. 5 is a schematic diagram of interaction of a biometric-based communication method according to an embodiment of the present invention.
- FIG. 6 is a schematic diagram of interaction of a biometric-based communication method according to another embodiment of the present invention.
- FIG. 7 is a schematic diagram of interaction of a biometric-based communication method according to another embodiment of the present invention.
- FIG. 8 is a schematic diagram of a composition of a biometric identification-based communication device according to an embodiment of the present invention.
- FIG. 9 is a schematic diagram showing the composition of a biometrics-based communication device according to another embodiment of the present invention.
- FIG. 10 is a schematic diagram showing the composition of a biometrics-based communication system according to an embodiment of the present invention.
- FIG. 1 is a schematic flowchart of a biometric-based communication method according to an embodiment of the present invention.
- the method flow may be implemented by a biometric-based communication device, and the biometric-based communication device may be a user terminal or a running device.
- the user terminal includes a mobile phone, a notebook computer, a tablet computer, a digital camera, and the like.
- the method flow in this embodiment as shown in the figure may include:
- Step S101 Receive a communication trigger instruction of the first terminal user for the second terminal.
- the communication triggering instruction may be an operation when the first terminal user initiates communication to the second terminal corresponding to the target contact in the communication application of the first terminal, where the communication application includes a dialing application, a short message, and an instant communication.
- Communication software such as software.
- the first terminal user inputs the phone number of the target contact in the dialing application, or clicks the name or phone number of the target contact in the contact list, or may be in the instant messaging software (SNS) with the target contact.
- SNS instant messaging software
- Step S102 Acquire biometric information input by the first terminal user.
- the user is prompted to input the biometric information feature information, so that the biometric information input by the first terminal user is collected and acquired.
- the biometric information may be fingerprint feature information, iris feature information, facial feature information, palm feature recognition, and the like, and may be used to identify biometric information of a unique user.
- the biometric information may be a user biometric template. Or the feature data information extracted by the collected user biometric template, or the same unique biometric identifier generated by the collected user biometric template.
- Step S103 sending a communication request to the second terminal, where the communication request includes a communication identifier of the first terminal and biometric information of the first terminal user, so that the second terminal verifies the first Whether the biometric information of the end user is pre-stored with the second terminal and the first terminal The verification biometric information corresponding to the communication identifier matches, and when the match is confirmed, the communication request is made.
- the contact that is selected or input by the first terminal user in step S101 may determine the second terminal corresponding to the contact, and the first terminal sends a communication request to the second terminal, where the communication request may be Call requests, SMS requests, voice requests, video requests, and more.
- the communication request includes a communication identifier of the first terminal and biometric information of the first terminal user, so that the second terminal verifies the biometric of the first terminal user after receiving the communication request Whether the feature information matches the verification biometric information corresponding to the communication identifier of the first terminal pre-stored by the second terminal, so as to determine whether the current communication request is initiated by the first terminal user himself.
- the communication identifier is mainly used to represent the identifier of the terminal and its user, and the communication identifier may be a phone number corresponding to the SIM card installed in the terminal, a mapping address corresponding to the terminal in the communication application, and the like. This is not limited, and its purpose is mainly to enable the opposite end to determine the identity of the user of the terminal and to return a message to the terminal through the communication identifier.
- the method further includes: after confirming that the second terminal passes the communication request, performing communication with the second terminal according to the communication triggering instruction.
- the communication request may indicate that the first terminal is in communication; if the second terminal is in the first After the verification of the biometric information of the terminal user is successful, the biometric information of the second terminal user is verified, and the subsequent steps are performed, or a notification is returned to allow the first terminal to determine the communication, and then the communication request may indicate the first After the verification of the biometric information of the end user is successful, the subsequent steps may be started, and then the first terminal determines to communicate with the second terminal according to the communication triggering instruction.
- the embodiment of the present invention obtains biometric information input by the first terminal user by receiving a communication triggering instruction of the first terminal user for the second terminal, and sends a communication request to the second terminal, where the communication request includes the first a communication identifier of the terminal and the biometric information of the first terminal user, so that the second terminal verifies whether the biometric information of the first terminal user is pre-stored with the second terminal and the first terminal.
- the verification biometric information corresponding to the communication identifier is matched, and when the matching is confirmed, the communication request is used to facilitate the second terminal to determine whether the identity of the first terminal user is legal by matching the biometric information of the first terminal user to ensure the security of the communication. Sex, to prevent the leakage of private information of users, thereby protecting the privacy and security of users.
- FIG. 2 is a schematic flowchart of a biometrics-based communication method according to another embodiment of the present invention. As shown in the figure, the method flow in this embodiment may include:
- Step S201 sending a registration request to the second terminal, where the registration request includes the communication identifier of the first terminal and the verification biometric information of the first terminal, so that the second terminal stores the The communication identifier of a terminal corresponds to the verification biometric information.
- the registration request includes the communication identifier of the first terminal and the verification biometric information of the first terminal
- the second terminal may be configured to establish the a mapping relationship between the communication identifier of the first terminal and the verification biometric information of the first terminal, so that when the second terminal receives the communication request sent by the first terminal, the communication request may be verified to be carried Whether the biometric information of the first terminal user matches the verification biometric information corresponding to the communication identifier of the first terminal.
- the verification biometric information of the first terminal is biometric information of a user having a communication application usage right corresponding to the target communication identifier preset in the first terminal.
- the verification biometric corresponding to the communication identifier of the user that sends the registration request operation to the second terminal is detected.
- the feature information is matched to ensure that the verification biometric information of the first terminal is not arbitrarily leaked.
- Step S202 Receive a registration request sent by the second terminal, where the registration request includes a communication identifier of the second terminal and verification biometric information of the second terminal.
- the registration request includes the communication identifier of the second terminal and the verification biometric information of the second terminal
- the first terminal is established by receiving the registration request sent by the second terminal.
- a mapping relationship between the communication identifier of the second terminal and the verification biometric information of the second terminal is established by receiving the registration request sent by the second terminal.
- Step S203 storing verification biometric information corresponding to the communication identifier of the second terminal.
- the verification biometric information corresponding to the communication identifier of the second terminal is stored, so that when the first terminal receives the communication request sent by the second terminal, the Whether the biometric information of the second terminal user matches the verification biometric information corresponding to the communication identifier of the second terminal.
- Step S204 Receive a communication trigger instruction of the first terminal user for the second terminal.
- step S101 For the specific method, refer to step S101.
- Step S205 Confirm that the communication identifier of the second terminal is a security communication identifier preset by the first terminal.
- the first terminal may confirm that the communication identifier of the second terminal is a security communication identifier preset by the first terminal.
- the secure communication identifier is preset by the first terminal, and if the second terminal has the secure communication identifier, the subsequent steps may be performed for secure communication, otherwise other processing may be performed, for example, without verifying biometric information. Direct communication, communication with some functions not available, or direct rejection of communication, etc.
- Step S206 acquiring biometric information input by the first terminal user.
- step S102 For specific methods, refer to step S102.
- Step S207 Determine that the biometric information of the first terminal user matches the verification biometric information of the first terminal preset in the first terminal.
- the verification biometric information of the first terminal may be one or more, and if yes, the biometric information of the obtained first terminal user may be directly compared with the verification biometric information of the first terminal. Determining whether the biometric information of the first terminal user matches the verification biometric information of the first terminal; if the verification biometric information of the first terminal is multiple, the biometric information of the first terminal user and the plurality of The verification biometric information of a terminal is compared to determine whether the biometric information of the first terminal user matches one of the verification biometric information of the first terminal.
- the subsequent steps may be performed; otherwise, the user who is operating the terminal or the communication application is an illegal user.
- the communication request cannot be sent to the second terminal having the secure communication identifier.
- Step S208 sending a communication request to the second terminal, where the communication request includes a communication identifier of the first terminal and biometric information of the first terminal user, so that the second terminal verifies the first Whether the biometric information of the end user matches the verification biometric information corresponding to the communication identifier of the first terminal prestored by the second terminal, and when the matching is confirmed, the communication request is passed.
- the contact that is selected or input by the first terminal user in step S204 may determine the second terminal corresponding to the contact, and the first terminal sends a communication request to the second terminal, where the communication request may be Call requests, SMS requests, voice requests, video requests, and more.
- the communication request includes a communication identifier of the first terminal and biometric information of the first terminal user, so that After receiving the communication request, the second terminal verifies whether the biometric information of the first terminal user matches the verification biometric information corresponding to the communication identifier of the first terminal prestored by the second terminal, Therefore, it is judged whether the current communication is initiated by the first terminal user himself.
- the communication identifier is mainly used to represent the identifier of the terminal and its user, and the communication identifier may be a phone number corresponding to the SIM card installed in the terminal, a mapping address corresponding to the terminal in the communication application, etc., which is not limited herein.
- the purpose is mainly for the second terminal to determine the identity of the user of the first terminal and to return a message to the terminal through the communication identifier.
- the communication request carries the biometric information of the first terminal user, so that the second terminal verifies the user identity of the first terminal, so as to avoid the verification error caused by the error in the first terminal verification process in step S207.
- the thief passes the step S207.
- the second terminal verifies whether the biometric information of the first terminal user matches the verification biometric information corresponding to the communication identifier of the first terminal, or can be found The holder of the first terminal is not a legitimate user. Further, if the second terminal does not store or store the verification biometric information of the first terminal user after the step S201, the biometric information of the first terminal user cannot pass the verification.
- Step S209 Receive biometric information of the second terminal user sent by the second terminal.
- the biometric information of the second terminal user may be acquired and sent to the first terminal, where the first terminal receives the second terminal user sent by the second terminal. After the biometric information is used, it is possible to confirm whether the second end user is a legitimate user, that is, whether the biometric information of the second terminal user matches the verification biometric information corresponding to the second terminal prestored by the first terminal.
- Step S210 Verify whether the biometric information of the second terminal user matches the verification biometric information corresponding to the second terminal prestored by the first terminal.
- comparing the acquired biometric information of the first terminal user with the verification biometric information corresponding to the second terminal pre-stored by the first terminal, and determining whether the biometric information of the second terminal user is pre-stored with the first terminal The verification biometric information corresponding to the second terminal matches.
- step S211 if the biometric information of the second terminal user matches the verification biometric information corresponding to the second terminal pre-stored by the first terminal, it is confirmed to communicate with the second terminal.
- the matching is successful, indicating that the second terminal user is a user that allows communication with the first terminal, then it is determined to communicate with the second terminal, that is, if the communication request is a call request, then both parties The call can be started. If the communication request is a short message request, the first terminal can send a short message to the second terminal. If the communication request is a video request, the two parties can start video and the like.
- the embodiment of the present invention obtains biometric information input by the first terminal user by receiving a communication triggering instruction of the first terminal user for the second terminal, and sends a communication request to the second terminal, where the communication request includes the first a communication identifier of the terminal and the biometric information of the first terminal user, so that the second terminal verifies whether the biometric information of the first terminal user is pre-stored with the second terminal and the first terminal.
- the verification biometric information corresponding to the communication identifier is matched, and when the matching is confirmed, the communication request is used to facilitate the second terminal to determine whether the identity of the first terminal user is legal by matching the biometric information of the first terminal user to ensure the security of the communication. Sex, to prevent the leakage of private information of users, thereby protecting the privacy and security of users.
- the first terminal is matched with the biometric information of the second terminal user to determine whether the identity of the second terminal user is legal, thereby further ensuring the security of the communication.
- FIG. 3 is a schematic flowchart of a biometric-based communication method according to another embodiment of the present invention. As shown in the figure, the method flow in this embodiment may include:
- Step S301 Receive a call request sent by the first terminal, where the call request includes a communication identifier of the first terminal and biometric information of the first terminal user.
- the communication request may be a call request, a short message request, a voice request, a video request, and the like, and includes a communication identifier of the first terminal and biometric information of the first terminal user.
- the communication identifier is mainly used to represent the identifier of the terminal and the user, and the communication identifier may be a phone number corresponding to the SIM card installed in the terminal, a mapping address corresponding to the terminal in the communication application, and the like, which is not limited herein.
- the purpose is mainly to enable the second terminal to determine the identity of the first terminal user and to return a message to the first terminal through the communication identifier.
- Step S302 Verify whether the biometric information of the first terminal user matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal.
- the second terminal After receiving the communication request, the second terminal enters the biometric information of the first terminal user in the communication request with the pre-stored verification biometric information corresponding to the communication identifier of the first terminal. And determining whether the biometric information of the first terminal user matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal, so as to determine whether the current communication request is initiated by the first terminal user.
- Step S303 if the biometric information of the first terminal user matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal, the communication request is passed.
- the communication request may indicate that the first terminal is in communication; if the second terminal is in the first After the verification of the biometric information of the terminal user is successful, the biometric information of the second terminal user is verified, and the subsequent steps are performed, or a notification is returned to allow the first terminal to determine the communication, and then the communication request may indicate the first After the verification of the biometric information of the end user is successful, the subsequent steps may be started, and then the first terminal determines to communicate with the second terminal according to the communication triggering instruction, and then starts to communicate with the first terminal.
- the embodiment of the present invention obtains biometric information input by the first terminal user by receiving a communication triggering instruction of the first terminal user for the second terminal, and sends a communication request to the second terminal, where the communication request includes the first a communication identifier of the terminal and the biometric information of the first terminal user, so that the second terminal verifies whether the biometric information of the first terminal user is pre-stored with the second terminal and the first terminal.
- the verification biometric information corresponding to the communication identifier is matched, and when the matching is confirmed, the communication request is used to facilitate the second terminal to determine whether the identity of the first terminal user is legal by matching the biometric information of the first terminal user to ensure the security of the communication. Sex, to prevent the leakage of private information of users, thereby protecting the privacy and security of users.
- FIG. 4 is a schematic flowchart of a biometric-based communication method according to another embodiment of the present invention. As shown in the figure, the method flow in this embodiment may include:
- Step S401 Receive a registration request sent by the first terminal, where the registration request includes a communication identifier of the first terminal and verification biometric information of the first terminal.
- the registration request includes the communication identifier of the first terminal and the verification biometric information of the first terminal
- the second terminal is established by receiving the registration request sent by the first terminal. And a mapping relationship between the communication identifier of the first terminal and the verification biometric information of the second terminal.
- Step S402 storing verification biometric information corresponding to the communication identifier of the first terminal.
- the verification biometric information corresponding to the communication identifier of the first terminal is stored, so that when the second terminal receives the communication request sent by the first terminal, the Whether the biometric information of the first terminal user matches the verification biometric information corresponding to the communication identifier of the first terminal.
- Step S403 sending a registration request to the first terminal, where the registration request includes the communication identifier of the second terminal and the verification biometric information of the second terminal, so that the first terminal stores the first The verification biometric information corresponding to the communication identifier of the second terminal.
- the registration request includes the communication identifier of the second terminal and the verification biometric information of the second terminal
- the first terminal may be configured to establish the a mapping relationship between the communication identifier of the second terminal and the verification biometric information of the second terminal, so that when the first terminal receives the communication request sent by the second terminal, the communication request may be verified to be carried Whether the biometric information of the second terminal user matches the verification biometric information corresponding to the communication identifier of the second terminal.
- the verification biometric information of the second terminal is biometric information of a user having a communication application usage right corresponding to the target communication identifier preset in the second terminal.
- the verification biometric corresponding to the communication identifier of the user that sends the registration request operation to the first terminal and the communication identifier of the second terminal may be further verified.
- the feature information is matched to ensure that the verification biometric information of the second terminal is not arbitrarily leaked.
- Step S404 Receive a call request sent by the first terminal, where the call request includes a communication identifier of the first terminal and biometric information of the first terminal user.
- step S301 The specific method refers to step S301.
- Step S405 confirming that the communication identifier of the first terminal is a security communication identifier preset by the second terminal.
- the second terminal may confirm that the communication identifier of the first terminal is a secure communication identifier preset by the second terminal.
- the secure communication identifier is preset by the second terminal, and if the first terminal has the secure communication identifier, the subsequent steps may be performed for secure communication, otherwise other processing may be performed, for example, some functions are unavailable. Communication or directly reject communication requests and so on.
- Step S406 Acquire biometric information input by the second terminal user.
- the user may be prompted to input biometric information feature information, thereby acquiring and acquiring the second Biometric information entered by the end user.
- the biometric information may be fingerprint feature information, iris feature information, facial feature information, palm feature recognition, and the like, and may be used to identify biometric information of a unique user.
- the biometric information may be a user biometric template. Or the feature data information extracted by the collected user biometric template, or the same unique biometric identifier generated by the collected user biometric template.
- Step S407 determining that the biometric information of the second terminal user matches the verification biometric information of the second terminal preset in the second terminal.
- the verification biometric information of the second terminal may be one or more than one. If yes, the biometric information of the acquired second terminal user may be directly compared with the verification biometric information of the second terminal. Determining whether the biometric information of the second terminal user matches the verification biometric information of the second terminal; if the verification biometric information of the second terminal is multiple, the biometric information of the second terminal user and the plurality of The verification biometric information of the two terminals is compared to determine whether the biometric information of the second terminal user matches one of the verification biometric information of the second terminal.
- the subsequent steps may be performed; otherwise, the user who is operating the terminal or the communication application is an illegal user. Cannot communicate with the first terminal with a secure communication identity.
- Step S408 Verify whether the biometric information of the first terminal user matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal.
- Step S409 if the biometric information of the first terminal user matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal, the communication request is passed.
- the communication request performs the subsequent steps.
- Step S410 Send biometric information of the second terminal user to the first terminal, so that the first terminal verifies whether the biometric information of the second terminal user is pre-stored with the first terminal.
- the verification biometric information corresponding to the second terminal is matched, and when the matching is confirmed, the communication with the second terminal is confirmed.
- the acquired biometric information of the second terminal user is sent to the first terminal, so that the first After receiving the biometric information of the second terminal user, the terminal verifies whether the biometric information of the second terminal user and the verification biometric information corresponding to the communication identifier of the second terminal prestored by the first terminal are Matching, thereby determining that the user of the communication partner is initiated by the second terminal user himself.
- the biometric information of the second terminal user is placed here to enable the first terminal to verify the identity of the user of the first terminal, so as to avoid a verification error caused by an error or the like in the verification process of the second terminal in step S407, for example, If the second terminal is held by the pirate, after some technical means or the biometric identification system of the second terminal itself may have some problems or be attacked, etc., the thief passes the step S407. Biometric verification, and the biometric information is sent to the first terminal. At this time, the first terminal verifies whether the biometric information of the second terminal user matches the verification biometric information corresponding to the communication identifier of the second terminal, or can find the first The holder of the second terminal is not a legitimate user.
- the embodiment of the present invention obtains biometric information input by the first terminal user by receiving a communication triggering instruction of the first terminal user for the second terminal, and sends a communication request to the second terminal, where the communication request includes the first a communication identifier of the terminal and the biometric information of the first terminal user, so that the second terminal verifies whether the biometric information of the first terminal user is pre-stored with the second terminal and the first terminal.
- the verification biometric information corresponding to the communication identifier is matched, and when the matching is confirmed, the communication request is used to facilitate the second terminal to determine whether the identity of the first terminal user is legal by matching the biometric information of the first terminal user to ensure the security of the communication. Sex, to prevent the leakage of private information of users, thereby protecting the privacy and security of users.
- the second terminal is matched with the biometric information of the first terminal user to determine whether the identity of the second terminal is legal, thereby further ensuring the security of the communication.
- FIG. 5 is a schematic diagram of interaction of a biometric-based communication method according to an embodiment of the present invention. As shown in the figure, the interaction process in this embodiment may include:
- Step S501 Receive a communication trigger instruction of the first terminal user for the second terminal.
- the communication triggering instruction may be an operation when the first terminal user initiates communication to the second terminal corresponding to the target contact in the communication application of the first terminal, where the communication application includes a dialing application, a short message, and an instant communication.
- Communication software such as software.
- the first terminal user inputs the phone number of the target contact in the dialing application, or clicks the name or phone number of the target contact in the contact list, or may be in the instant messaging software (SNS) with the target contact.
- SNS instant messaging software
- Step S502 Acquire biometric information input by the first terminal user.
- the user is prompted to input the biometric information feature information, so that the biometric information input by the first terminal user is collected and acquired.
- the biometric information may be fingerprint feature information, iris feature information, facial feature information, palm feature recognition, and the like, and may be used to identify biometric information of a unique user.
- the biometric information may be a user biometric template. Or the feature data information extracted by the collected user biometric template, or the same unique biometric identifier generated by the collected user biometric template.
- Step S503 The first terminal sends a communication request to the second terminal, where the communication request includes a communication identifier of the first terminal and biometric information of the first terminal user.
- the contact that is selected or input by the first terminal user in step S501 may determine a second terminal corresponding to the contact, where the first terminal sends a communication request to the second terminal, where the communication request may be Call requests, SMS requests, voice requests, video requests, and more.
- the communication request includes a communication identifier of the first terminal and biometric information of the first terminal user, so that the second terminal verifies the biometric of the first terminal user after receiving the communication request Whether the feature information matches the verification biometric information corresponding to the communication identifier of the first terminal pre-stored by the second terminal, so as to determine whether the current communication request is initiated by the first terminal user himself.
- the communication identifier is mainly used to represent the identifier of the terminal and its user, and the communication identifier may be a phone number corresponding to the SIM card installed in the terminal, a mapping address corresponding to the terminal in the communication application, and the like. This is not limited herein, and its purpose is mainly to enable the second terminal to determine the identity of the user of the terminal and to return a message to the first terminal through the communication identifier.
- Step S504 The second terminal verifies whether the biometric information of the first terminal user matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal.
- the second terminal compares the biometric information of the first terminal user in the communication request with the pre-stored verification biometric information corresponding to the communication identifier of the first terminal, and determines the first Whether the biometric information of the terminal user matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal, so as to determine whether the current communication request is initiated by the first terminal user himself.
- Step S505 if the biometric information of the first terminal user and the pre-stored and the first The verification biometric information corresponding to the communication identifier of the terminal matches, and the second terminal passes the communication request.
- the communication request may indicate that the first terminal is in communication.
- the embodiment of the present invention obtains biometric information input by the first terminal user by receiving a communication triggering instruction of the first terminal user for the second terminal, and sends a communication request to the second terminal, where the communication request includes the first a communication identifier of the terminal and the biometric information of the first terminal user, so that the second terminal verifies whether the biometric information of the first terminal user is pre-stored with the second terminal and the first terminal.
- the verification biometric information corresponding to the communication identifier is matched, and when the matching is confirmed, the communication request is used to facilitate the second terminal to determine whether the identity of the first terminal user is legal by matching the biometric information of the first terminal user to ensure the security of the communication. Sex, to prevent the leakage of private information of users, thereby protecting the privacy and security of users.
- FIG. 6 is a schematic diagram of interaction of a biometric-based communication method according to another embodiment of the present invention. As shown in the figure, the interaction process in this embodiment may include:
- Step S601 The first terminal sends a registration request to the second terminal, where the registration request includes the communication identifier of the first terminal and the verification biometric information of the first terminal.
- the registration request includes a communication identifier of the first terminal and verification biometric information of the first terminal.
- the verification biometric information of the first terminal is biometric information of a user having a communication application usage right corresponding to the target communication identifier preset in the first terminal.
- the verification biometric corresponding to the communication identifier of the user that sends the registration request operation to the second terminal is detected. The feature information is matched to ensure that the verification biometric information of the first terminal is not arbitrarily leaked.
- Step S602 The second terminal stores the verification biometric information corresponding to the communication identifier of the first terminal.
- the verification biometric information corresponding to the communication identifier of the first terminal is stored, so that when the second terminal receives the communication request sent by the first terminal, the Whether the biometric information of the first terminal user matches the verification biometric information corresponding to the communication identifier of the first terminal.
- Step S603 the second terminal sends a registration request to the first terminal, where the registration request includes Decoding a communication identifier of the second terminal and verifying biometric information of the second terminal.
- the registration request includes a communication identifier of the second terminal and verification biometric information of the second terminal.
- the verification biometric information of the second terminal is biometric information of a user having a communication application usage right corresponding to the target communication identifier preset in the second terminal.
- the verification biometric corresponding to the communication identifier of the user that sends the registration request operation to the first terminal and the communication identifier of the second terminal may be further verified. The feature information is matched to ensure that the verification biometric information of the second terminal is not arbitrarily leaked.
- Step S604 the first terminal stores the verification biometric information corresponding to the communication identifier of the second terminal.
- the verification biometric information corresponding to the communication identifier of the second terminal is stored, so that when the first terminal receives the communication request sent by the second terminal, the Whether the biometric information of the second terminal user matches the verification biometric information corresponding to the communication identifier of the second terminal.
- the embodiment of the present invention obtains biometric information input by the first terminal user by receiving a communication triggering instruction of the first terminal user for the second terminal, and sends a communication request to the second terminal, where the communication request includes the first a communication identifier of the terminal and the biometric information of the first terminal user, so that the second terminal verifies whether the biometric information of the first terminal user is pre-stored with the second terminal and the first terminal.
- the verification biometric information corresponding to the communication identifier is matched, and when the matching is confirmed, the communication request is used to facilitate the second terminal to determine whether the identity of the first terminal user is legal by matching the biometric information of the first terminal user to ensure the security of the communication. Sex, to prevent the leakage of private information of users, thereby protecting the privacy and security of users.
- FIG. 7 is a schematic diagram of interaction of a biometric-based communication method according to another embodiment of the present invention. As shown in the figure, the interaction process in this embodiment may include:
- Step S701 Receive a communication trigger instruction of the first terminal user for the second terminal.
- the communication triggering instruction may be an operation when the first terminal user initiates communication to the second terminal corresponding to the target contact in the communication application of the first terminal, where the communication application includes a dialing application, a short message, and an instant communication.
- Communication software such as software.
- the first end user enters the phone number of the target contact in the dialing application, or clicks on the name of the target contact in the contact list or The telephone number may also be a shortcut for clicking a send, a call button, or an upward slide in an interaction dialog box with the target contact in the instant messaging software (SNS), and is not specifically limited herein.
- Step S702 confirming that the communication identifier of the second terminal is a secure communication identifier preset by the first terminal.
- the first terminal may confirm that the communication identifier of the second terminal is a security communication identifier preset by the first terminal.
- the secure communication identifier is preset by the first terminal, and if the second terminal has the secure communication identifier, the subsequent steps may be performed for secure communication, otherwise other processing may be performed, for example, without verifying biometric information. Direct communication, communication with some functions not available, or direct rejection of communication, etc.
- Step S703 acquiring biometric information input by the first terminal user.
- the user is prompted to input the biometric information feature information, so that the biometric information input by the first terminal user is collected and acquired.
- the biometric information may be fingerprint feature information, iris feature information, facial feature information, palm feature recognition, and the like, and may be used to identify biometric information of a unique user.
- the biometric information may be a user biometric template. Or the feature data information extracted by the collected user biometric template, or the same unique biometric identifier generated by the collected user biometric template.
- Step S704 determining that the biometric information of the first terminal user matches the verification biometric information of the first terminal preset in the first terminal.
- the verification biometric information of the first terminal may be one or more, and if yes, the biometric information of the obtained first terminal user may be directly compared with the verification biometric information of the first terminal. Determining whether the biometric information of the first terminal user matches the verification biometric information of the first terminal; if the verification biometric information of the first terminal is multiple, the biometric information of the first terminal user and the plurality of The verification biometric information of a terminal is compared to determine whether the biometric information of the first terminal user matches one of the verification biometric information of the first terminal.
- the subsequent steps may be performed; otherwise, the user who is operating the terminal or the communication application is an illegal user.
- the communication request cannot be sent to the second terminal having the secure communication identifier.
- Step S705 sending a communication request to the second terminal, where the communication request includes the first terminal a communication identifier of the terminal and the biometric information of the first terminal user, so that the second terminal verifies whether the biometric information of the first terminal user is pre-stored with the second terminal The corresponding verification biometric information is matched and identified, and when the match is confirmed, the communication request is made.
- the contact that is selected or input by the first terminal user in step S701 may determine the second terminal corresponding to the contact, where the first terminal sends a communication request to the second terminal, where the communication request may be Call requests, SMS requests, voice requests, video requests, and more.
- the communication request includes a communication identifier of the first terminal and biometric information of the first terminal user, so that the second terminal verifies the biometric of the first terminal user after receiving the communication request Whether the feature information matches the verification biometric information corresponding to the communication identifier of the first terminal pre-stored by the second terminal, so as to determine whether the current communication is initiated by the first terminal user himself.
- the communication identifier is mainly used to represent the identifier of the terminal and its user, and the communication identifier may be a phone number corresponding to the SIM card installed in the terminal, a mapping address corresponding to the terminal in the communication application, etc., which is not limited herein.
- the purpose is mainly for the peer to determine the identity of the user of the terminal and to return a message to the terminal through the communication identifier.
- Step S706 confirming that the communication identifier of the first terminal is a security communication identifier preset by the second terminal.
- the second terminal may confirm that the communication identifier of the first terminal is a secure communication identifier preset by the second terminal.
- the secure communication identifier is preset by the second terminal, and if the first terminal has the secure communication identifier, the subsequent steps may be performed for secure communication, otherwise other processing may be performed, for example, some functions are unavailable. Communication or directly reject communication requests and so on.
- Step S707 Acquire biometric information input by the second terminal user.
- the user may be prompted to input biometric information feature information, thereby collecting and acquiring biometric information input by the second terminal user.
- the biometric information may be fingerprint feature information, iris feature information, facial feature information, palm feature recognition, and the like, and may be used to identify biometric information of a unique user.
- the biometric information may be a user biometric template. Or the feature data information extracted by the collected user biometric template, or the same unique biometric identifier generated by the collected user biometric template.
- Step S708 determining biometric information of the second terminal user and a preset in the second terminal The verification biometric information of the second terminal is matched.
- the verification biometric information of the second terminal may be one or more than one. If yes, the biometric information of the acquired second terminal user may be directly compared with the verification biometric information of the second terminal. Determining whether the biometric information of the second terminal user matches the verification biometric information of the second terminal; if the verification biometric information of the second terminal is multiple, the biometric information of the second terminal user and the plurality of The verification biometric information of the two terminals is compared to determine whether the biometric information of the second terminal user matches one of the verification biometric information of the second terminal.
- the subsequent steps may be performed; otherwise, the user who is operating the terminal or the communication application is an illegal user. Cannot communicate with the first terminal with a secure communication identity.
- Step S709 Verify whether the biometric information of the first terminal user matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal.
- the second terminal compares the biometric information of the first terminal user in the communication request with the pre-stored verification biometric information corresponding to the communication identifier of the first terminal, and determines the first Whether the biometric information of the terminal user matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal, so as to determine whether the current communication request is initiated by the first terminal user himself.
- Step S710 If the biometric information of the first terminal user matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal, the communication request is passed.
- the communication request performs the subsequent steps.
- Step S711 Send biometric information of the second terminal user to the first terminal.
- the biometric information of the second terminal user acquired in step S707 is sent to the first terminal.
- Step S712 it is verified whether the biometric information of the second terminal user matches the verification biometric information corresponding to the second terminal prestored by the first terminal.
- the obtained biometric information of the first terminal user is compared with the verification biometric information corresponding to the second terminal pre-stored by the first terminal, and the biometric information of the second terminal user is determined. Whether the verification biometric information corresponding to the second terminal pre-stored with the first terminal matches.
- Step S713 If the biometric information of the second terminal user matches the verification biometric information corresponding to the second terminal prestored by the first terminal, confirm that the second terminal is in communication.
- the matching is successful, indicating that the second terminal user is a user that allows communication with the first terminal, then it is determined to communicate with the second terminal, that is, if the communication request is a call request, then both parties The call can be started. If the communication request is a short message request, the first terminal can send a short message to the second terminal. If the communication request is a video request, the two parties can start video and the like.
- the embodiment of the present invention obtains biometric information input by the first terminal user by receiving a communication triggering instruction of the first terminal user for the second terminal, and sends a communication request to the second terminal, where the communication request includes the first a communication identifier of the terminal and the biometric information of the first terminal user, so that the second terminal verifies whether the biometric information of the first terminal user is pre-stored with the second terminal and the first terminal.
- the verification biometric information corresponding to the communication identifier is matched, and when the matching is confirmed, the communication request is used to facilitate the second terminal to determine whether the identity of the first terminal user is legal by matching the biometric information of the first terminal user to ensure the security of the communication. Sex, to prevent the leakage of private information of users, thereby protecting the privacy and security of users.
- the second terminal is matched with the biometric information of the first terminal user to determine whether the identity of the second terminal is legal, thereby further ensuring the security of the communication.
- FIG. 8 is a schematic diagram of a composition of a biometric-based communication device according to an embodiment of the present invention. As shown in the figure, the device in this embodiment may include:
- the triggering module 810 is configured to receive a communication triggering instruction of the communication terminal user for the second terminal.
- the communication triggering instruction may be an operation when the first terminal user initiates communication to the second terminal corresponding to the target contact in the communication application of the first terminal, where the communication application includes a dialing application, a short message, and an instant communication.
- Communication software such as software.
- the first terminal user inputs the phone number of the target contact in the dialing application, or clicks the name or phone number of the target contact in the contact list, or may be in the instant messaging software (SNS) with the target contact.
- SNS instant messaging software
- the obtaining module 812 is configured to acquire biometric information input by the user of the communication terminal.
- the module 812 prompts the user to input biometric information feature information, thereby collecting and acquiring biometric information input by the first terminal user.
- the biometric information may be fingerprint feature information, iris feature information, facial feature information, palm feature recognition, and the like, and may be used to identify biometric information of a unique user.
- the biometric information may be a user biometric template. Or the feature data information extracted by the collected user biometric template, or the same unique biometric identifier generated by the collected user biometric template.
- a request sending module 814 configured to send a communication request to the second terminal, where the communication request includes a communication identifier of the communication terminal and biometric information of the communication terminal user, so that the second terminal verifies the Whether the biometric information of the communication terminal user matches the verification biometric information corresponding to the communication identifier of the communication terminal prestored by the second terminal, and when the matching is confirmed, the communication request is passed.
- the contact that is selected or input by the first terminal user in the triggering module 810 may determine the second terminal corresponding to the contact, where the first terminal sends a communication request to the second terminal, where the communication request may be It is a call request, a text message request, a voice request, a video request, and the like.
- the communication request includes a communication identifier of the first terminal and biometric information of the first terminal user, so that the second terminal verifies the biometric of the first terminal user after receiving the communication request Whether the feature information matches the verification biometric information corresponding to the communication identifier of the first terminal pre-stored by the second terminal, so as to determine whether the current communication is initiated by the first terminal user himself.
- the communication identifier is mainly used to represent the identifier of the terminal and its user, and the communication identifier may be a phone number corresponding to the SIM card installed in the terminal, a mapping address corresponding to the terminal in the communication application, etc., which is not limited herein.
- the purpose is mainly for the second terminal to determine the identity of the user of the first terminal and to return a message to the terminal through the communication identifier.
- the matching module 816 is configured to determine that the biometric information of the communication terminal user matches the verification biometric information of the communication terminal preset in the communication terminal.
- the verification biometric information of the first terminal may be one or more. If yes, the matching module 816 may directly pass the acquired biometric information of the first terminal user and the verification biometrics of the first terminal. The information is compared to determine whether the biometric information of the first terminal user matches the verification biometric information of the first terminal; if the verification biometric information of the first terminal is multiple, the matching module 816 may use the biometric information of the first terminal user. The feature information is compared with the verification biometric information of the plurality of first terminals, thereby determining whether the biometric information of the first terminal user is the first end One of the verification biometric information of the end matches.
- the matching module 816 determines that the biometric information of the first terminal user matches the verification biometric information of the first terminal, and then performs the subsequent steps. Otherwise, the user who is operating the terminal or the communication application is illustrated. As an illegal user, a communication request cannot be sent to the second terminal having the secure communication identifier.
- the receiving module 818 is configured to receive biometric information of the second terminal user that is sent by the second terminal.
- the biometric information of the second terminal user may be acquired and sent to the first terminal, and the first terminal receiving module 818 receives the second information sent by the second terminal. After the biometric information of the end user, the biometric information of the second terminal user is determined to be the same as the verification biometric information corresponding to the second terminal prestored by the first terminal.
- the verification module 820 is configured to verify whether the biometric information of the second terminal user matches the verification biometric information corresponding to the second terminal prestored by the communication terminal.
- the verification module 820 compares the acquired biometric information of the first terminal user with the verification biometric information corresponding to the second terminal pre-stored by the first terminal, and determines whether the biometric information of the second terminal user is the same as the first The verification biometric information corresponding to the second terminal pre-stored by the terminal matches.
- the first communication module 822 is configured to confirm communication with the second terminal if the biometric information of the second terminal user matches the verification biometric information corresponding to the second terminal pre-stored by the communication terminal .
- the first communication module 822 determines to communicate with the second terminal, that is, if the communication request is a call If the request is made, the two parties can start the call. If the communication request is a short message request, the first terminal can send a short message to the second terminal. If the communication request is a video request, the two parties can start the video and the like.
- the registration receiving module 824 is configured to receive a registration request sent by the second terminal, where the registration request includes a communication identifier of the second terminal and verification biometric information of the second terminal.
- the registration request includes the communication identifier of the second terminal and the verification biometric information of the second terminal
- the registration receiving module 824 receives the registration request sent by the second terminal, so that the first Establishing, by the terminal, a communication identifier of the second terminal and a verification end of the second terminal Corresponding mapping relationship between object feature information.
- the registration module 826 is configured to store verification biometric information corresponding to the communication identifier of the second terminal.
- the registration module 826 stores the verification biometric information corresponding to the communication identifier of the second terminal, so that when the first terminal receives the communication request sent by the second terminal, the communication request may be verified to be carried. Whether the biometric information of the second terminal user matches the verification biometric information corresponding to the communication identifier of the second terminal.
- a registration sending module 828 configured to send a registration request to the second terminal, where the registration request includes a communication identifier of the communication terminal and verification biometric information of the communication terminal, so that the second terminal stores The verification biometric information corresponding to the communication identifier of the communication terminal.
- the registration request includes the communication identifier of the first terminal and the verification biometric information of the first terminal
- the registration request is sent to the second terminal by the registration sending module 828, so that the second terminal may be Establishing a mapping relationship between the communication identifier of the first terminal and the verification biometric information of the first terminal, so that when the second terminal receives the communication request sent by the first terminal, the Whether the biometric information of the first terminal user carried in the communication request matches the verification biometric information corresponding to the communication identifier of the first terminal.
- the verification biometric information of the first terminal is biometric information of a user having a communication application usage right corresponding to the target communication identifier preset in the first terminal.
- the verification biometric corresponding to the communication identifier of the user that sends the registration request operation to the second terminal is detected.
- the feature information is matched to ensure that the verification biometric information of the first terminal is not arbitrarily leaked.
- the second communication module 830 is configured to confirm, after the second terminal passes the communication request, to communicate with the second terminal according to the communication triggering instruction.
- the communication request may indicate that the biometric information verification of the first terminal user is successful, and the subsequent step may be started, and then the second communication module 830 determines to communicate with the second terminal according to the communication trigger instruction.
- the identifier module 832 is configured to confirm that the communication identifier of the second terminal is a preset secure communication identifier of the communication terminal.
- the identifier module 832 can confirm that the communication identifier of the second terminal is a preset safety communication identifier of the first terminal. Place The security communication identifier is preset by the identifier module 832. If the second terminal has the secure communication identifier, the subsequent steps may be performed to perform secure communication. Otherwise, other processing may be performed, for example, without directly verifying the biometric information. Communication, communication with some functions not available, or direct rejection of communication, etc.
- the embodiment of the present invention obtains biometric information input by the first terminal user by receiving a communication triggering instruction of the first terminal user for the second terminal, and sends a communication request to the second terminal, where the communication request includes the first a communication identifier of the terminal and the biometric information of the first terminal user, so that the second terminal verifies whether the biometric information of the first terminal user is pre-stored with the second terminal and the first terminal.
- the verification biometric information corresponding to the communication identifier is matched, and when the matching is confirmed, the communication request is used to facilitate the second terminal to determine whether the identity of the first terminal user is legal by matching the biometric information of the first terminal user to ensure the security of the communication. Sex, to prevent the leakage of private information of users, thereby protecting the privacy and security of users.
- FIG. 9 is a schematic diagram of a composition of a biometric-based communication device according to another embodiment of the present invention. As shown in the figure, the device in this embodiment may include:
- the request receiving module 910 is configured to receive a call request sent by the first terminal, where the call request includes a communication identifier of the first terminal and biometric information of the first terminal user.
- the communication request may be a call request, a short message request, a voice request, a video request, and the like, and includes a communication identifier of the first terminal and biometric information of the first terminal user.
- the communication identifier is mainly used to represent the identifier of the terminal and the user, and the communication identifier may be a phone number corresponding to the SIM card installed in the terminal, a mapping address corresponding to the terminal in the communication application, and the like, which is not limited herein.
- the purpose is mainly to enable the second terminal to determine the identity of the first terminal user and to return a message to the first terminal through the communication identifier.
- the verification module 912 is configured to verify whether the biometric information of the first terminal user matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal.
- the verification module 912 compares the biometric information of the first terminal user in the communication request with the pre-stored verification biometric information corresponding to the communication identifier of the first terminal, Determining whether the biometric information of the first terminal user matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal, so as to determine whether the current communication request is initiated by the first terminal user.
- the requesting pass module 914 is configured to: when the biometric information of the first terminal user matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal, by using the communication request.
- the requesting through module 914 can communicate with the first terminal; if the second terminal is in the first After the verification of the biometric information of the end user is successful, the biometric information of the second terminal user is verified, and the subsequent steps are performed, or a notification is returned to allow the first terminal to determine the communication, and then the request through the module 914 can indicate After the verification of the biometric information of an end user is successful, the subsequent steps may be started, and then the first terminal determines to communicate with the second terminal according to the communication triggering instruction, and then starts communicating with the first terminal.
- the first obtaining module 916 is configured to acquire biometric information input by the user of the communication terminal.
- the first obtaining module 916 may prompt the user to input the biometric information feature information, so as to collect and acquire biometric information input by the second terminal user.
- the biometric information may be fingerprint feature information, iris feature information, facial feature information, palm feature recognition, and the like, and may be used to identify biometric information of a unique user.
- the biometric information may be a user biometric template. Or the feature data information extracted by the collected user biometric template, or the same unique biometric identifier generated by the collected user biometric template.
- the matching module 918 is configured to determine that the biometric information of the communication terminal user matches the verification biometric information of the communication terminal preset in the communication terminal.
- the verification biometric information of the second terminal may be one or more. If yes, the matching module 918 performs the biometric information of the acquired second terminal user and the verification biometric information of the second terminal. Comparing to determine whether the biometric information of the second terminal user matches the verification biometric information of the second terminal; if the verification biometric information of the second terminal is multiple, the matching module 918 compares the biometric information of the second terminal user with The verification biometric information of the plurality of second terminals is compared to determine whether the biometric information of the second terminal user matches one of the verification biometric information of the second terminal. In any of the above cases, the matching module 918 determines that the biometric information of the second terminal user matches the verification biometric information of the second terminal, and then performs subsequent steps. Otherwise, the user who is operating the terminal or the communication application is illustrated. It is an illegal user and cannot communicate with the first terminal with a secure communication identifier.
- a sending module 920 configured to send, to the first terminal, a biometric signature of the communication terminal user And determining, by the first terminal, whether the biometric information of the communication terminal user matches the verification biometric information corresponding to the communication terminal pre-stored by the first terminal, and confirming the match when confirming the match
- the communication terminal performs communication.
- the sending module 920 sends the acquired biometric information of the second terminal user to the first terminal, so that the first terminal verifies the biometric information of the second terminal user after receiving the biometric information of the second terminal user. Whether the feature information matches the verification biometric information corresponding to the communication identifier of the second terminal pre-stored by the first terminal, so as to determine that the current communication partner user is initiated by the second terminal user himself.
- a registration sending module 922 configured to send a registration request to the first terminal, where the registration request includes a communication identifier of the communication terminal and verification biometric information of the communication terminal, so that the first terminal stores and stores The verification biometric information corresponding to the communication identifier of the communication terminal.
- the registration request includes the communication identifier of the second terminal and the verification biometric information of the second terminal
- the registration sending module 922 can enable the first terminal by sending a registration request to the first terminal. Establishing a mapping relationship between the communication identifier of the second terminal and the verification biometric information of the second terminal, so that when the first terminal receives the communication request sent by the second terminal, the Whether the biometric information of the second terminal user carried in the communication request matches the verification biometric information corresponding to the communication identifier of the second terminal.
- the verification biometric information of the second terminal is biometric information of a user having a communication application usage right corresponding to the target communication identifier preset in the second terminal.
- the verification biometric corresponding to the communication identifier of the user that sends the registration request operation to the first terminal and the communication identifier of the second terminal may be further verified.
- the feature information is matched to ensure that the verification biometric information of the second terminal is not arbitrarily leaked.
- the registration receiving module 924 is configured to receive a registration request sent by the first terminal, where the registration request includes a communication identifier of the first terminal and verification biometric information of the first terminal.
- the registration request includes the communication identifier of the first terminal and the verification biometric information of the first terminal
- the registration receiving module 924 can enable the second by receiving the registration request sent by the first terminal.
- the terminal establishes a mapping relationship between the communication identifier of the first terminal and the verification biometric information of the second terminal.
- the registration module 926 is configured to store verification biometric information corresponding to the communication identifier of the first terminal.
- the registration module 926 stores the verification biometric information corresponding to the communication identifier of the first terminal, so that when the second terminal receives the communication request sent by the first terminal, the communication request may be verified to be carried. Whether the biometric information of the first terminal user matches the verification biometric information corresponding to the communication identifier of the first terminal.
- the communication module 928 is configured to communicate with the first terminal.
- the communication module 928 triggers communication with the first terminal.
- the identifier module 930 is configured to confirm that the communication identifier of the first terminal is a preset secure communication identifier of the communication terminal.
- the identifier module 932 can confirm that the communication identifier of the first terminal is a secure communication identifier preset by the second terminal.
- the secure communication identifier is preset by the second terminal, and if the first terminal has the secure communication identifier, the subsequent steps may be performed for secure communication, otherwise other processing may be performed, for example, some functions are unavailable. Communication or directly reject communication requests and so on.
- the embodiment of the present invention obtains biometric information input by the first terminal user by receiving a communication triggering instruction of the first terminal user for the second terminal, and sends a communication request to the second terminal, where the communication request includes the first a communication identifier of the terminal and the biometric information of the first terminal user, so that the second terminal verifies whether the biometric information of the first terminal user is pre-stored with the second terminal and the first terminal.
- the verification biometric information corresponding to the communication identifier is matched, and when the matching is confirmed, the communication request is used to facilitate the second terminal to determine whether the identity of the first terminal user is legal by matching the biometric information of the first terminal user to ensure the security of the communication. Sex, to prevent the leakage of private information of users, thereby protecting the privacy and security of users.
- FIG. 10 is a schematic diagram of a composition of a biometric-based communication system according to an embodiment of the present invention. As shown in the figure, the system in this embodiment may include:
- the first terminal 10 is configured to receive a communication triggering instruction of the first terminal user for the second terminal 20, acquire biometric information input by the first terminal user, and send a communication request to the second terminal 20, where the communication request is And including the communication identifier of the first terminal 10 and the biometric information of the first terminal user, so that the second terminal 20 verifies whether the biometric information of the first terminal user is pre-stored with the second terminal 20 Verify biometric information corresponding to the communication identifier of the first terminal 10 Match, and when the match is confirmed, the communication request is made.
- the second terminal 20 is configured to receive a call request sent by the first terminal 10, where the call request includes a communication identifier of the first terminal 10 and biometric information of the first terminal user, and the first terminal user is verified. Whether the biometric information matches the pre-stored verification biometric information corresponding to the communication identifier of the first terminal 10, if the biometric information of the first terminal user and the pre-stored and the first terminal If the verification biometric information corresponding to the communication identifier of 10 matches, then the communication request is made.
- the embodiment of the present invention obtains biometric information input by the first terminal user by receiving a communication triggering instruction of the first terminal user for the second terminal, and sends a communication request to the second terminal, where the communication request includes the first a communication identifier of the terminal and the biometric information of the first terminal user, so that the second terminal verifies whether the biometric information of the first terminal user is pre-stored with the second terminal and the first terminal.
- the verification biometric information corresponding to the communication identifier is matched, and when the matching is confirmed, the communication request is used to facilitate the second terminal to determine whether the identity of the first terminal user is legal by matching the biometric information of the first terminal user to ensure the security of the communication. Sex, to prevent the leakage of private information of users, thereby protecting the privacy and security of users.
- the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Business, Economics & Management (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
L'invention concerne un procédé de communication reposant sur une identification de caractéristiques biologiques. Le procédé consiste à : recevoir une instruction de déclenchement de communication d'un premier utilisateur de terminal pour un second terminal ; acquérir des informations de caractéristiques biologiques entrées par le premier utilisateur de terminal ; et envoyer une demande de communication au second terminal, la demande de communication contenant un identifiant de communication d'un premier terminal et les informations de caractéristiques biologiques concernant le premier utilisateur de terminal, de sorte que le second terminal vérifie si les informations de caractéristiques biologiques concernant le premier utilisateur de terminal correspondent aux informations de vérification de caractéristiques biologiques préalablement mémorisées dans le second terminal et correspondent à l'identifiant de communication du premier terminal, et lorsque la correspondance est confirmée, la demande de communication est acceptée. L'invention concerne également un appareil et un système de communication reposant sur une identification de caractéristiques biologiques. Les modes de réalisation de l'invention sont bénéfiques dans l'amélioration de la sécurité de communication d'utilisateur, ce qui permet de garantir la confidentialité et la sécurité d'un utilisateur et d'un contact associé.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510466658.6A CN105553928B (zh) | 2015-07-31 | 2015-07-31 | 一种基于生物特征识别的通信方法、装置及系统 |
| CN201510466658.6 | 2015-07-31 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017020426A1 true WO2017020426A1 (fr) | 2017-02-09 |
Family
ID=55832864
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2015/091375 WO2017020426A1 (fr) | 2015-07-31 | 2015-09-30 | Procédé, appareil et système de communication reposant sur une identification de caractéristiques biologiques |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN105553928B (fr) |
| WO (1) | WO2017020426A1 (fr) |
Families Citing this family (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107451484A (zh) * | 2016-05-30 | 2017-12-08 | 宇龙计算机通信科技(深圳)有限公司 | 私密信息的访问方法、访问装置和终端 |
| CN106529624B (zh) * | 2016-10-31 | 2019-12-24 | 上海螺趣科技有限公司 | 一种生物特征鉴权的方法及装置 |
| CN106773762A (zh) * | 2016-12-28 | 2017-05-31 | 重庆金鑫科技产业发展有限公司 | 一种静脉纹识别终端及智能家居系统 |
| CN107070774A (zh) * | 2017-03-14 | 2017-08-18 | 广东小天才科技有限公司 | 一种社交消息处理方法及服务设备 |
| CN107318174A (zh) * | 2017-06-28 | 2017-11-03 | 广东欧珀移动通信有限公司 | 一种通信方法、装置及终端 |
| CN107333264B (zh) * | 2017-08-21 | 2021-06-15 | 上海掌门科技有限公司 | 一种用于对用户设备进行无线连接预授权的方法与设备 |
| WO2019127267A1 (fr) * | 2017-12-28 | 2019-07-04 | 成都天逸星辰信息技术服务有限公司 | Procédé et système de traitement de données |
| CN108564688A (zh) | 2018-03-21 | 2018-09-21 | 阿里巴巴集团控股有限公司 | 身份验证的方法及装置和电子设备 |
| CN109600296A (zh) * | 2018-10-10 | 2019-04-09 | 山西特信环宇信息技术有限公司 | 一种证件链即时通讯系统及其使用方法 |
| CN114640488A (zh) * | 2020-12-16 | 2022-06-17 | 中国移动通信有限公司研究院 | 一种信息传输方法、装置及网络侧设备 |
| CN116614253A (zh) * | 2021-09-17 | 2023-08-18 | 支付宝(杭州)信息技术有限公司 | 一种设备账户的处理方法、装置及设备 |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101378569A (zh) * | 2007-08-30 | 2009-03-04 | 株式会社日立制作所 | 通信系统、信息转移方法和信息通信装置 |
| CN101765111A (zh) * | 2009-12-25 | 2010-06-30 | 上海闻泰电子科技有限公司 | 指纹识别相关移动通信终端功能的实现方法 |
| CN103606084A (zh) * | 2013-12-03 | 2014-02-26 | 深圳市赛为智能股份有限公司 | 一种基于生物特征识别的移动在线支付方法及系统 |
| CN104156651A (zh) * | 2014-08-11 | 2014-11-19 | 广州三星通信技术研究有限公司 | 用于终端的访问控制方法和装置 |
| CN104346883A (zh) * | 2013-08-04 | 2015-02-11 | 郁晓东 | 一种识别顾客的pos装置 |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1209900C (zh) * | 2000-10-19 | 2005-07-06 | 国伟 | 电话防骚扰方法 |
| KR20030065659A (ko) * | 2002-01-30 | 2003-08-09 | 삼성전자주식회사 | 얼굴정보 검출을 이용하여 기지국 또는 단말기에서의보안을 제공하기 위한 장치 및 그 방법 |
| CN101699887A (zh) * | 2009-11-12 | 2010-04-28 | 深圳华为通信技术有限公司 | 一种处理通信事件的方法及移动终端 |
| CN103488918B (zh) * | 2013-09-18 | 2016-09-14 | 广东欧珀移动通信有限公司 | 智能终端应用加密方法及装置 |
| CN103778381B (zh) * | 2014-01-13 | 2017-07-21 | 中标软件有限公司 | 一种基于安卓系统的应用锁屏方法及装置 |
| CN104468988B (zh) * | 2014-11-20 | 2016-04-06 | 努比亚技术有限公司 | 一种移动终端及其在非安全模式下的电话接听方法和装置 |
| CN104657674B (zh) * | 2015-01-16 | 2018-02-23 | 北京邮电大学 | 一种手机中隐私数据的隔离保护系统及方法 |
-
2015
- 2015-07-31 CN CN201510466658.6A patent/CN105553928B/zh active Active
- 2015-09-30 WO PCT/CN2015/091375 patent/WO2017020426A1/fr active Application Filing
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101378569A (zh) * | 2007-08-30 | 2009-03-04 | 株式会社日立制作所 | 通信系统、信息转移方法和信息通信装置 |
| CN101765111A (zh) * | 2009-12-25 | 2010-06-30 | 上海闻泰电子科技有限公司 | 指纹识别相关移动通信终端功能的实现方法 |
| CN104346883A (zh) * | 2013-08-04 | 2015-02-11 | 郁晓东 | 一种识别顾客的pos装置 |
| CN103606084A (zh) * | 2013-12-03 | 2014-02-26 | 深圳市赛为智能股份有限公司 | 一种基于生物特征识别的移动在线支付方法及系统 |
| CN104156651A (zh) * | 2014-08-11 | 2014-11-19 | 广州三星通信技术研究有限公司 | 用于终端的访问控制方法和装置 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN105553928A (zh) | 2016-05-04 |
| CN105553928B (zh) | 2020-02-18 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2017020426A1 (fr) | Procédé, appareil et système de communication reposant sur une identification de caractéristiques biologiques | |
| TWI612792B (zh) | 帳戶登入的方法及裝置 | |
| WO2016183937A1 (fr) | Système et dispositif, procédé d'authentification d'identité et terminal utilisateur | |
| WO2020215568A1 (fr) | Procédé, appareil et système de changement de numéro de communication, dispositif informatique et support d'enregistrement | |
| CN113221128B (zh) | 账号和密码的存储方法及注册管理系统 | |
| CN106612259A (zh) | 身份识别、业务处理以及生物特征信息的处理方法和设备 | |
| EP3525181A1 (fr) | Procédé, appareil et système de vérification de validité d'identité | |
| WO2016003802A1 (fr) | Authentification d'identité de canal double | |
| CN106487758B (zh) | 一种数据安全签名方法、业务终端以及私钥备份服务器 | |
| US9697346B2 (en) | Method and apparatus for identifying and associating devices using visual recognition | |
| EP3832506A1 (fr) | Stockage sécurisé d'éléments associés à une empreinte digitale | |
| WO2020232854A1 (fr) | Procédé et appareil de déverrouillage de véhicule, et dispositif informatique et support de stockage | |
| CN105577619B (zh) | 一种客户端登录方法、客户端以及系统 | |
| CN105656871A (zh) | 安全通信方法及装置 | |
| CN105550205A (zh) | 一种联系信息处理方法及其设备 | |
| CN106385506A (zh) | 信息通知管理方法和装置 | |
| CN104933341A (zh) | 一种权限管理的方法及终端 | |
| WO2017084569A1 (fr) | Procédé d'acquisition de justificatif de connexion dans un terminal intelligent, terminal intelligent, et systèmes d'exploitation | |
| CN107437016B (zh) | 应用控制方法及相关产品 | |
| CN105162804A (zh) | 通讯信息的保护方法及装置 | |
| US9465818B2 (en) | Finger biometric sensor data synchronization via a cloud computing device and related methods | |
| CN108540591B (zh) | 通讯录管理方法、通讯录管理装置及电子设备 | |
| KR20150100602A (ko) | 데이터 저장 및 판독 방법, 장치, 및 기기 | |
| CN106161365B (zh) | 一种数据处理方法、装置及终端 | |
| CN106302451A (zh) | 资源获取的方法及装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15900196 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 15900196 Country of ref document: EP Kind code of ref document: A1 |