[go: up one dir, main page]

WO2017028390A1 - Identity authentication method, terminal and server - Google Patents

Identity authentication method, terminal and server Download PDF

Info

Publication number
WO2017028390A1
WO2017028390A1 PCT/CN2015/095592 CN2015095592W WO2017028390A1 WO 2017028390 A1 WO2017028390 A1 WO 2017028390A1 CN 2015095592 W CN2015095592 W CN 2015095592W WO 2017028390 A1 WO2017028390 A1 WO 2017028390A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
fingerprint
identity
verification
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2015/095592
Other languages
French (fr)
Chinese (zh)
Inventor
曹义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Publication of WO2017028390A1 publication Critical patent/WO2017028390A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present invention relates to the field of terminal technologies, and in particular, to an identity verification method, a terminal, and a server.
  • Password authentication means that after the user inputs the account information, the user also needs to provide a password for identity verification.
  • the terminal matches the password provided by the user with the preset password. If the matching is successful, the identity verification succeeds, otherwise the identity verification fails.
  • Fingerprint authentication is performed after the user inputs the account information, and the user also needs to provide fingerprint information for identity verification.
  • the terminal matches the fingerprint information provided by the user with the preset fingerprint information. If the matching is successful, the identity verification succeeds, otherwise the identity verification fails.
  • the present invention is based on the above problems, and proposes a new technical solution, which can improve the security and reliability of identity verification, and save production costs, thereby improving the user experience.
  • an identity verification method for a terminal, a package Include: generating an identity verification request according to the received identity verification instruction; sending the identity verification request to a server connected to the terminal, where the server controls the target terminal verification with the fingerprint verification function according to the identity verification request User fingerprint information received by the target terminal; and receiving a fingerprint information verification result from the server; determining whether to pass the identity verification according to the fingerprint information verification result.
  • the terminal by transmitting an authentication request generated according to an authentication instruction from a user to a server connected to the terminal, determining, by the server, a target terminal having a fingerprint authentication function according to the identity verification request, and notifying the identity verification request
  • the target terminal the user can input the user fingerprint information in the target terminal, and then the target terminal verifies the user fingerprint information.
  • the terminal determines whether to pass the verification according to the received fingerprint information verification result verified by the target terminal sent by the server. Authentication, the entire authentication process does not have a hard requirement on whether the terminal has the fingerprint verification function. Thus, the fingerprint verification is performed for the terminal without increasing the hardware cost of the terminal.
  • the terminal when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, the terminal can be used as the target terminal, and other terminals can indirectly use their fingerprint verification function for identity verification, which is not only improved compared with related technologies.
  • the security and reliability of authentication and the cost of production save the user experience.
  • the identity verification request includes identity information of the terminal, where the server determines, according to the identity information, the target terminal corresponding to the terminal; or the identity verification request includes The location information of the terminal, for the server to select the target terminal for the terminal within a predetermined distance range of the terminal according to the location information.
  • the identity request may include the identity information of the terminal (such as a user account).
  • the server may determine, according to the identity information of the terminal, that the terminal is fingerprinted or supported.
  • the target terminal for verification.
  • the identity request may further include location information of the terminal, so that the server may select the target terminal within a predetermined distance range of the terminal according to the received location information of the terminal.
  • the identity information and the location information of the terminal may also be included in the identity request.
  • the identity request includes but is not limited to the identity information and the location information, as long as the function of the solution can be implemented.
  • the attribute information of the terminal is applicable to this scheme.
  • a terminal comprising: a request generating unit that generates an identity verification request according to the received identity verification instruction; and a sending unit that sends the identity verification request a server connected to the terminal, wherein the server controls the target terminal having the fingerprint verification function to verify the user fingerprint information received by the target terminal according to the identity verification request; and the receiving unit receives the information from the server The fingerprint information verification result; the determining unit determines whether to pass the identity verification according to the fingerprint information verification result.
  • the terminal by transmitting an authentication request generated according to an authentication instruction from a user to a server connected to the terminal, determining, by the server, a target terminal having a fingerprint authentication function according to the identity verification request, and notifying the identity verification request
  • the target terminal the user can input the user fingerprint information in the target terminal, and then the target terminal verifies the user fingerprint information.
  • the terminal determines whether to pass the verification according to the received fingerprint information verification result verified by the target terminal sent by the server. Authentication, the entire authentication process does not have a hard requirement on whether the terminal has the fingerprint verification function. Thus, the fingerprint verification is performed for the terminal without increasing the hardware cost of the terminal.
  • the terminal when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, the terminal can be used as the target terminal, and other terminals can indirectly use their fingerprint verification function for identity verification, which is not only improved compared with related technologies.
  • the security and reliability of authentication and the cost of production save the user experience.
  • the identity verification request includes identity information of the terminal, where the server determines, according to the identity information, the target terminal corresponding to the terminal; or the identity verification request includes The location information of the terminal, for the server to select the target terminal for the terminal within a predetermined distance range of the terminal according to the location information.
  • the identity request may include the identity information of the terminal (such as a user account).
  • the server may determine, according to the identity information of the terminal, that the terminal is fingerprinted or supported.
  • the target terminal for verification.
  • the identity request may further include location information of the terminal, so that the server may select the target terminal within a predetermined distance range of the terminal according to the received location information of the terminal.
  • the identity information and the location information of the terminal may also be included in the identity request.
  • the identity request includes but is not limited to the identity information and the location information, as long as the function of the solution can be implemented.
  • the attribute information of the terminal is applicable to this scheme.
  • an authentication method for a server, comprising: receiving an identity verification request of a terminal connected to the server; and controlling fingerprint verification according to the identity verification request of the terminal.
  • the target terminal of the function verifies the user fingerprint received by the target terminal And receiving the fingerprint information verification result from the target terminal; and sending the fingerprint information verification result to the terminal, so that the terminal determines whether to pass the identity verification according to the fingerprint information verification result.
  • the target terminal having the fingerprint verification function is determined according to the received identity verification request from the terminal, and the target terminal is controlled to open the fingerprint verification function, and the user fingerprint information received by the target terminal is verified, and then The received fingerprint information verification result returned from the target terminal is sent to the terminal, so that the terminal determines whether to pass the identity verification according to the fingerprint information verification result, and the entire identity verification process does not have a hard requirement for the terminal to have the fingerprint verification function, and the server serves as the communication.
  • the intermediary controls the target terminal with the fingerprint verification function to perform the fingerprint verification process, thus implementing fingerprint verification for the terminal without increasing the hardware cost of the terminal.
  • the terminal when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, the terminal can be used as the target terminal, and other terminals can use the fingerprint verification function to perform identity verification indirectly through the server, compared with related technologies. It not only improves the security and reliability of authentication, but also saves production costs, thereby improving the user experience.
  • the server when an unexpected situation occurs in the target terminal (for example, downtime, insufficient power, etc.), the server will provide feedback information to the terminal according to the actual situation, for example, an unexpected prompt may be given, or the current optimal authentication may be selected for the terminal. The way and give hints for the user to choose, further improving the applicability of authentication.
  • the identity verification request includes the identity information of the terminal, and before the controlling the target terminal having the fingerprint verification function to verify the user fingerprint information received by the target terminal, the method further includes: And associating the identity information of the terminal with any terminal having a fingerprint verification function according to the received setting command, for setting the any terminal after receiving the identity verification request of the terminal For the target terminal.
  • the server acts as a communication intermediary and controller for the terminal to perform fingerprint verification indirectly through the target terminal, and firstly establishes an association relationship between the terminal and the target terminal.
  • the identity information of the terminal may be determined according to the received setting command.
  • the server may determine the set or according to the identity information of the terminal.
  • a target terminal capable of supporting fingerprint verification of a terminal.
  • the identity verification request includes location information of the terminal, and verifying, by the target terminal having the fingerprint verification function, that the target terminal receives the Before the fingerprint information, the method further includes: determining at least one other terminal within a predetermined distance range of the terminal; selecting, in the at least one other terminal, a terminal having the smallest distance from the terminal as the target terminal, or receiving according to the And a selection command to select the target terminal for the terminal in the at least one other terminal.
  • the identity verification request may further include location information of the terminal.
  • at least one other terminal within a predetermined distance range of the terminal may also be determined as the target terminal.
  • the server may be based on the received terminal.
  • the location information is selected within a predetermined distance of the terminal to select the target terminal.
  • the identity information and the location information of the terminal may also be included in the identity request.
  • the identity request includes but is not limited to the identity information and the location information, as long as the function of the solution can be implemented.
  • the attribute information of the terminal is applicable to this scheme.
  • the server may also prompt the at least one other terminal that meets the condition to the terminal, so that the user can select the target terminal according to actual needs, and the server selects the target terminal for the terminal in at least one other terminal when receiving the selection command, thereby improving the target terminal.
  • the flexibility and diversity of the target terminal selection method enhances the user experience.
  • the method before receiving the identity verification request of the terminal connected to the server, the method further includes: receiving initial fingerprint information of the terminal from any other terminal; and having, in the control, Before the target terminal of the fingerprint verification function verifies the user fingerprint information received by the target terminal, the method further includes: sending the initial fingerprint information of the terminal to the selected target terminal, for the target terminal to perform Fingerprint verification.
  • the initial fingerprint information of the user from any other terminal received before the identity verification is performed is stored, and the initial fingerprint information is sent to the control target terminal before the received user fingerprint information is verified.
  • the selected target terminal is used for the target terminal to match the user fingerprint information with the initial fingerprint information, that is, as long as the user who has entered the fingerprint information on other terminals having the fingerprint verification function can perform identity When verifying, select the terminal that has entered the fingerprint information as the target terminal.
  • a server comprising: a first receiving unit that receives an identity verification request of a terminal connected to the server; and a control verification unit that controls according to the identity verification request of the terminal
  • the target terminal having the fingerprint verification function verifies the user fingerprint information received by the target terminal; the second receiving unit receives the fingerprint information verification result from the target terminal; the first sending unit sends the fingerprint information verification result to The terminal is provided by the terminal according to the terminal
  • the fingerprint information verification result determines whether or not the authentication is performed.
  • the target terminal having the fingerprint verification function is determined according to the received identity verification request from the terminal, and the target terminal is controlled to open the fingerprint verification function, and the user fingerprint information received by the target terminal is verified, and then The received fingerprint information verification result returned from the target terminal is sent to the terminal, so that the terminal determines whether to pass the identity verification according to the fingerprint information verification result, and the entire identity verification process does not have a hard requirement for the terminal to have the fingerprint verification function, and the server serves as the communication.
  • the intermediary controls the target terminal with the fingerprint verification function to perform the fingerprint verification process, thus implementing fingerprint verification for the terminal without increasing the hardware cost of the terminal.
  • the terminal when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, the terminal can be used as the target terminal, and other terminals can use the fingerprint verification function to perform identity verification indirectly through the server, compared with related technologies. It not only improves the security and reliability of authentication, but also saves production costs, thereby improving the user experience.
  • the server when an unexpected situation occurs in the target terminal (for example, downtime, insufficient power, etc.), the server will provide feedback information to the terminal according to the actual situation, for example, an unexpected prompt may be given, or the current optimal authentication may be selected for the terminal.
  • an unexpected prompt may be given, or the current optimal authentication may be selected for the terminal.
  • the identity verification request includes identity information of the terminal
  • the server further includes: a setting unit, where the target terminal having the fingerprint verification function is controlled to verify that the target terminal receives Before the user fingerprint information, according to the received setting command, associating the identity information of the terminal with any terminal having a fingerprint verification function, for receiving the identity verification request of the terminal, Any one of the terminals is set as the target terminal.
  • the server acts as a communication intermediary and controller for the terminal to perform fingerprint verification indirectly through the target terminal, and firstly establishes an association relationship between the terminal and the target terminal.
  • the identity information of the terminal may be determined according to the received setting command.
  • the server may determine the set or according to the identity information of the terminal.
  • a target terminal capable of supporting fingerprint verification of a terminal.
  • the identity verification request includes location information of the terminal
  • the server further includes: a determining unit, where the target terminal having the fingerprint verification function is controlled to verify that the target terminal receives Determining at least one other terminal within a predetermined distance range of the terminal before the user fingerprint information; selecting a unit according to the received selection Commanding, in the at least one other terminal, selecting the target terminal for the terminal.
  • the identity verification request may further include location information of the terminal.
  • at least one other terminal within a predetermined distance range of the terminal may also be determined as the target terminal.
  • the server may be based on the received terminal.
  • the location information is selected within a predetermined distance of the terminal to select the target terminal.
  • the identity information and the location information of the terminal may also be included in the identity request.
  • the identity request includes but is not limited to the identity information and the location information, as long as the function of the solution can be implemented.
  • the attribute information of the terminal is applicable to this scheme.
  • the server may also prompt the at least one other terminal that meets the condition to the terminal, so that the user can select the target terminal according to actual needs, and the server selects the target terminal for the terminal in at least one other terminal when receiving the selection command, thereby improving the target terminal.
  • the flexibility and diversity of the target terminal selection method enhances the user experience.
  • the method further includes: receiving, by the third receiving unit, initial fingerprint information of the terminal from any other terminal before receiving the identity verification request of the terminal connected to the server; a second sending unit, before the controlling the target terminal having the fingerprint verification function to verify the user fingerprint information received by the target terminal, sending the initial fingerprint information of the terminal to the selected target terminal, For the target terminal to perform fingerprint verification.
  • the initial fingerprint information of the user from any other terminal received before the identity verification is performed is stored, and the initial fingerprint information is sent to the control target terminal before the received user fingerprint information is verified.
  • the selected target terminal is used for the target terminal to match the user fingerprint information with the initial fingerprint information, that is, as long as the user who has entered the fingerprint information on other terminals having the fingerprint verification function can perform identity When verifying, select the terminal that has entered the fingerprint information as the target terminal.
  • the fingerprint verification for the terminal is realized without increasing the hardware cost of the terminal, and compared with the related technology, the security and reliability of the identity verification are not only improved, and the production cost is saved, thereby improving The user experience.
  • FIG. 1 is a flow chart showing an identity verification method according to an embodiment of the present invention.
  • Figure 2 shows a block diagram of a terminal in accordance with one embodiment of the present invention
  • FIG. 3 shows a flow chart of an identity verification method according to another embodiment of the present invention.
  • Figure 4 shows a block diagram of a server in accordance with one embodiment of the present invention
  • Figure 5 shows a schematic diagram of an identity verification system in accordance with one embodiment of the present invention
  • FIG. 6 shows a flow chart of an identity verification method according to still another embodiment of the present invention.
  • FIG. 1 shows a flow chart of an identity verification method in accordance with one embodiment of the present invention.
  • an identity verification method is used for a terminal, including: Step 102, generating an identity verification request according to the received identity verification instruction; Step 104, sending the identity verification request to a server connected to the terminal, wherein the server controls, according to the identity verification request, a target terminal having a fingerprint verification function to verify user fingerprint information received by the target terminal; and step 106, and receiving fingerprint information verification from the server. As a result; step 108, determining whether to pass the identity verification according to the fingerprint information verification result.
  • the terminal by transmitting an authentication request generated according to an authentication instruction from a user to a server connected to the terminal, determining, by the server, a target terminal having a fingerprint authentication function according to the identity verification request, and notifying the identity verification request
  • the target terminal the user can input the user fingerprint information in the target terminal, and then the target terminal verifies the user fingerprint information.
  • the terminal determines whether to pass the verification according to the received fingerprint information verification result verified by the target terminal sent by the server. Authentication, the entire authentication process does not have a hard requirement on whether the terminal has the fingerprint verification function. Thus, the fingerprint verification is performed for the terminal without increasing the hardware cost of the terminal.
  • the terminal when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, the terminal can be used as the target terminal, and other terminals can indirectly make Using its fingerprint verification function for authentication, compared with related technologies, not only improves the security and reliability of authentication, but also saves production costs, thereby improving the user experience.
  • the identity verification request includes identity information of the terminal, where the server determines, according to the identity information, the target terminal corresponding to the terminal; or the identity verification request includes The location information of the terminal, for the server to select the target terminal for the terminal within a predetermined distance range of the terminal according to the location information.
  • the identity request may include the identity information of the terminal (such as a user account).
  • the server may determine, according to the identity information of the terminal, that the terminal is fingerprinted or supported.
  • the target terminal for verification.
  • the identity request may further include location information of the terminal, so that the server may select the target terminal within a predetermined distance range of the terminal according to the received location information of the terminal.
  • the identity information and the location information of the terminal may also be included in the identity request.
  • the identity request includes but is not limited to the identity information and the location information, as long as the function of the solution can be implemented.
  • the attribute information of the terminal is applicable to this scheme.
  • Figure 2 shows a block diagram of a terminal in accordance with one embodiment of the present invention.
  • the terminal 200 of an embodiment of the present invention includes: a request generating unit 202, generating an identity verification request according to the received identity verification instruction; and a sending unit 204, sending the identity verification request to the a server connected to the terminal 200, wherein the server controls the target terminal having the fingerprint verification function to verify the user fingerprint information received by the target terminal according to the identity verification request; and the receiving unit 206 receives the fingerprint information from the server
  • the verification result deterministic unit 208 determines whether to pass the identity verification according to the verification result of the fingerprint information.
  • the target terminal having the fingerprint authentication function is determined according to the identity verification request via the server, and the authentication request is requested Informing the target terminal
  • the user can input the user fingerprint information at the target terminal, and then the target terminal verifies the user fingerprint information.
  • the terminal 200 determines the fingerprint information verification result verified by the target terminal sent by the server. Whether it is authenticated, the entire authentication process is final Whether the terminal 200 has the fingerprint verification function has no hard requirement, and thus, the terminal 200 performs fingerprint verification without increasing the hardware cost of the terminal 200.
  • the terminal 200 can be used as the target terminal, and the other terminals 200 can indirectly use the fingerprint verification function for identity verification, and related technologies. Compared, it not only improves the security and reliability of authentication, but also saves production costs, thereby improving the user experience.
  • the identity verification request includes identity information of the terminal 200, where the server determines, according to the identity information, the target terminal corresponding to the terminal 200; or the identity verification.
  • the request includes location information of the terminal 200 for the server to select the target terminal for the terminal 200 within a predetermined distance range of the terminal 200 according to the location information.
  • the identity request may include identity information (such as a user account) of the terminal 200.
  • the server may determine, according to the identity information of the terminal 200, that the terminal is set or can support the terminal. 200 target terminal for fingerprint verification.
  • the identity request may further include location information of the terminal 200.
  • the server may select the target terminal within a predetermined distance range of the terminal 200 according to the received location information of the terminal 200.
  • the identity information and the location information of the terminal 200 may also be included in the identity request.
  • the identity request includes, but is not limited to, identity information and location information, as long as the solution can be implemented.
  • the attribute information of the functional terminal 200 is applicable to the present scheme.
  • FIG. 3 shows a flow chart of an identity verification method according to another embodiment of the present invention.
  • an identity verification method is used for a server, including: Step 302, receiving an identity verification request of a terminal connected to the server; Step 304, according to the terminal An authentication request, controlling a target terminal having a fingerprint verification function to verify user fingerprint information received by the target terminal; step 306, receiving a fingerprint information verification result from the target terminal; and step 308, transmitting the fingerprint information verification result to The terminal, for the terminal to determine whether to pass the identity verification according to the fingerprint information verification result.
  • the server acts as a communication intermediary, and controls the target terminal with the fingerprint verification function to perform the fingerprint verification process. Fingerprint verification for the terminal without increasing the hardware cost of the terminal.
  • the terminal when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, the terminal can be used as the target terminal, and other terminals can use the fingerprint verification function to perform identity verification indirectly through the server, compared with related technologies. It not only improves the security and reliability of authentication, but also saves production costs, thereby improving the user experience.
  • the server when an unexpected situation occurs in the target terminal (for example, downtime, insufficient power, etc.), the server will provide feedback information to the terminal according to the actual situation, for example, an unexpected prompt may be given, or the current optimal authentication may be selected for the terminal.
  • an unexpected prompt may be given, or the current optimal authentication may be selected for the terminal.
  • the identity verification request includes identity information of the terminal
  • the identity information of the terminal is Any terminal having a fingerprint verification function is associated for setting the any terminal as the target terminal upon receiving the identity verification request of the terminal.
  • the server acts as a communication intermediary and controller for the terminal to perform fingerprint verification indirectly through the target terminal, and firstly establishes an association relationship between the terminal and the target terminal.
  • the identity information of the terminal may be determined according to the received setting command.
  • the server may determine the set or according to the identity information of the terminal.
  • a target terminal capable of supporting fingerprint verification of a terminal.
  • the identity verification request includes location information of the terminal, and before the step 304, further comprising: determining at least one other terminal within a predetermined distance range of the terminal; Determining, as the target terminal, a terminal having the smallest distance from the terminal among the at least one other terminal, or selecting the target terminal for the terminal in the at least one other terminal according to the received selection command.
  • the identity verification request may further include location information of the terminal.
  • at least one other terminal within a predetermined distance range of the terminal may also be determined as the target terminal.
  • the server may be based on the received terminal.
  • the location information is selected within a predetermined distance of the terminal to select the target terminal.
  • the identity information and the location information of the terminal may also be included in the identity request.
  • the identity request includes but is not limited to the identity information and the location information, as long as the function of the solution can be implemented.
  • the attribute information of the terminal is applicable to this scheme.
  • the server may also prompt the at least one other terminal that meets the condition to the terminal, so that the user can select the target terminal according to actual needs, and the server selects the target terminal for the terminal in at least one other terminal when receiving the selection command, thereby improving the target terminal.
  • the flexibility and diversity of the target terminal selection method enhances the user experience.
  • the method further includes: receiving initial fingerprint information of the terminal from any other terminal; and before the step 304, further comprising: The initial fingerprint information is sent to the selected target terminal for the target terminal to perform fingerprint verification.
  • the initial fingerprint information of the user from any other terminal received before the identity verification is performed is stored, and the initial fingerprint information is sent to the control target terminal before the received user fingerprint information is verified.
  • the selected target terminal is used for the target terminal to match the user fingerprint information with the initial fingerprint information, that is, as long as the user who has entered the fingerprint information on other terminals having the fingerprint verification function can perform identity When verifying, select the terminal that has entered the fingerprint information as the target terminal.
  • Figure 4 shows a block diagram of a server in accordance with one embodiment of the present invention.
  • the server 400 of an embodiment of the present invention includes: a first receiving unit 402, which receives an identity verification request of a terminal connected to the server 400; and a control verification unit 404, according to the terminal
  • the first verification unit 406 receives the fingerprint information verification result received by the target terminal, and the first sending unit 408, The fingerprint information verification result is sent to the terminal, so that the terminal determines whether to pass the identity verification according to the fingerprint information verification result.
  • the target terminal having the fingerprint verification function is determined according to the received identity verification request from the terminal, and the target terminal is controlled to open the fingerprint verification function, and the user fingerprint information received by the target terminal is verified, and then The received fingerprint information verification result returned from the target terminal is sent to the terminal, so that the terminal determines whether to pass the identity verification according to the fingerprint information verification result, and the entire identity verification process does not have a hard requirement on whether the terminal has the fingerprint verification function, and is used by the server 400.
  • the communication intermediary controls the target terminal with the fingerprint verification function to perform the fingerprint verification process, thus implementing fingerprint verification for the terminal without increasing the hardware cost of the terminal.
  • the terminal when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, the terminal can be used as the target terminal, and other terminals can use the fingerprint verification function to perform identity verification indirectly through the server 400, compared with related technologies. It not only improves the security and reliability of authentication, but also saves production costs, thereby improving the user experience.
  • the server 400 may provide feedback information to the terminal according to actual conditions, for example, may give an unexpected prompt, or select a current optimal identity for the terminal.
  • the verification method and prompts are provided for the user to select, which further improves the applicability of the authentication.
  • the identity verification request includes identity information of the terminal
  • the server 400 further includes: a setting unit 410, where the target terminal that controls the fingerprint verification function is used to verify the target terminal Before receiving the user fingerprint information, according to the received setting command, associating the identity information of the terminal with any terminal having a fingerprint verification function, for receiving the identity verification request of the terminal And setting any one of the terminals as the target terminal.
  • the server 400 acts as a communication intermediary and controller for indirectly performing fingerprint verification by the target terminal, and firstly establishes an association relationship between the terminal and the target terminal.
  • the identity of the terminal may be determined according to the received setting command.
  • the information is associated with any terminal having a fingerprint verification function, wherein the identity information of the terminal may be included in the identity verification request, such that when the identity request is sent to the server, the server may determine the set according to the identity information of the terminal.
  • a target terminal capable of supporting fingerprint verification of the terminal.
  • the identity verification request includes location information of the terminal
  • the server 400 further includes: a determining unit 412, where the control has a fingerprint Determining at least one other terminal within a predetermined distance range of the terminal before the target terminal of the verification function verifies the user fingerprint information received by the target terminal; the selecting unit 414, in the at least one other according to the received selection command The target terminal is selected for the terminal in the terminal.
  • the identity verification request may further include location information of the terminal.
  • at least one other terminal within a predetermined distance range of the terminal may also be determined as the target terminal.
  • the server may be based on the received terminal.
  • the location information is selected within a predetermined distance of the terminal to select the target terminal.
  • the identity information and the location information of the terminal may also be included in the identity request.
  • the identity request includes but is not limited to the identity information and the location information, as long as the function of the solution can be implemented.
  • the attribute information of the terminal is applicable to this scheme.
  • the server 400 can also prompt the at least one other terminal that meets the condition to the terminal, so that the user can select the target terminal according to actual needs, and the server 400 selects the target terminal for the terminal in at least one other terminal when receiving the selection command.
  • the user experience is enhanced by increasing the flexibility and diversity of the target terminal selection method.
  • the method further includes: a third receiving unit 416, receiving initial fingerprint information of the terminal from any other terminal before receiving the identity verification request of the terminal connected to the server 400 And the second sending unit 418, before the controlling the target terminal having the fingerprint verification function to verify the user fingerprint information received by the target terminal, sending the initial fingerprint information of the terminal to the selected a target terminal for performing fingerprint verification on the target terminal.
  • the initial fingerprint information of the user from any other terminal received before the identity verification is performed is stored, and the initial fingerprint information is sent to the control target terminal before the received user fingerprint information is verified.
  • the selected target terminal is used for the target terminal to match the user fingerprint information with the initial fingerprint information, that is, as long as the user who has entered the fingerprint information on other terminals having the fingerprint verification function can perform identity When verifying, select the terminal that has entered the fingerprint information as the target terminal.
  • Figure 5 shows a schematic diagram of an identity verification system in accordance with one embodiment of the present invention.
  • the embodiment provides a fingerprint terminal (terminal) when the client (such as WeChat, Alipay, etc., or a certain software) is logged in to the non-fingerprint terminal (the terminal does not support the fingerprint authentication, that is, the terminal). Support fingerprint authentication, that is, the target terminal) login method for authentication.
  • the non-fingerprint terminal is connected to the fingerprint terminal through a remote server.
  • the fingerprint terminal includes: a fingerprint module, a storage module, a communication module, and a processor CPU;
  • the non-fingerprint terminal includes: a storage module, a communication module, and a processor CPU;
  • the communication connection is made through the server.
  • FIG. 6 shows a flow chart of an identity verification method according to still another embodiment of the present invention.
  • the flow of the identity verification method according to still another embodiment of the present invention includes:
  • step 602 the user starts the client on the non-fingerprint terminal.
  • step 604 the user inputs the client account (ie, identity information) in the non-fingerprint terminal.
  • Step 606 The client on the non-fingerprint terminal requests fingerprint verification (that is, generates an identity verification request according to the received identity verification command), and notifies the server of the account to be logged in on the device (ie, sends the identity verification request to the location) Said server connected to the terminal).
  • Step 608 The server sends a fingerprint verification request to the client on the fingerprint terminal corresponding to the account (that is, the server controls the target terminal with the fingerprint verification function to verify the user received by the target terminal according to the identity verification request of the terminal. Fingerprint information).
  • Step 610 The client on the fingerprint terminal returns a fingerprint verification result to the server (that is, the server receives the fingerprint information verification result from the target terminal).
  • Step 612 The server returns a fingerprint verification result to the client on the non-fingerprint terminal (ie, the terminal receives the fingerprint information verification result from the server).
  • Step 614 If the fingerprint verification is passed, the client on the non-fingerprint terminal logs in; otherwise, the account verification fails.
  • the fingerprint verification is performed for the terminal without increasing the hardware cost of the terminal.
  • the terminal can be used as the target terminal, and other terminals are It can indirectly use its fingerprint verification function for authentication. Compared with related technologies, it not only improves the security and reliability of authentication, but also saves production costs, thereby improving the user experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides an identity authentication method, a terminal and a server. The identity authentication method includes: generating an identity authentication request according to a received identity authentication instruction; transmitting the identity authentication request to a server connected with a terminal, so that the server can control, according to the identity authentication request, a target terminal with a fingerprint authentication function to authenticate user fingerprint information received by the target terminal; receiving a fingerprint information authentication result from the server; determining, according to the fingerprint information authentication result, whether the identity authentication passes. With the technical solution of the present invention, a fingerprint authentication can be performed for a terminal without increasing the hardware cost of a terminal, and compared with the related art, not only the safety and reliability of the identify authentication is improved, but the cost of production is reduced, so that the user experience is improved.

Description

身份验证方法、终端和服务器Authentication method, terminal and server

本申请要求于2015年8月18日提交中国专利局、申请号为201510508977.9、发明名称为“身份验证方法、终端和服务器”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。The present application claims priority to Chinese Patent Application No. 201510508977.9, entitled "Identification Method, Terminal and Server", filed on August 18, 2015, the entire contents of .

技术领域Technical field

本发明涉及终端技术领域,具体而言,涉及一种身份验证方法、一种终端和一种服务器。The present invention relates to the field of terminal technologies, and in particular, to an identity verification method, a terminal, and a server.

背景技术Background technique

目前,常用的客户身份验证方式有两种,一种是密码认证,另一种是指纹认证。At present, there are two commonly used methods for client authentication, one is password authentication and the other is fingerprint authentication.

密码认证是在用户输入账户信息后,还需要用户提供密码进行身份验证,终端将用户提供的密码与预设密码进行匹配,如果匹配成功,则身份验证成功,否则身份验证失败。Password authentication means that after the user inputs the account information, the user also needs to provide a password for identity verification. The terminal matches the password provided by the user with the preset password. If the matching is successful, the identity verification succeeds, otherwise the identity verification fails.

指纹认证是在用户输入账户信息后,还需要用户提供指纹信息进行身份验证,终端将用户提供的指纹信息与预设指纹信息进行匹配,如果匹配成功,则身份验证成功,否则身份验证失败。Fingerprint authentication is performed after the user inputs the account information, and the user also needs to provide fingerprint information for identity verification. The terminal matches the fingerprint information provided by the user with the preset fingerprint information. If the matching is successful, the identity verification succeeds, otherwise the identity verification fails.

然而,上述技术方案具有以下缺陷:However, the above technical solution has the following drawbacks:

1.对于密码认证,其虽然比较方便,但安全性较低,容易被黑客手段(例如输入法记录、用其它客户端的登录密码进行尝试等)恶意获取。1. For password authentication, although it is convenient, it is less secure and can be maliciously obtained by hacking means (such as input method recording, attempting with other client login passwords, etc.).

2.对于指纹认证:其虽然安全性较高,但相应地,需要增加硬件成本。如果用户有多台终端设备,每台设备都配置指纹硬件成本较高。2. For fingerprint authentication: Although it is highly secure, correspondingly, it is necessary to increase the hardware cost. If the user has multiple terminal devices, each device has a higher cost of configuring the fingerprint hardware.

因此,需要一种新的身份验证方法,可以提高身份验证的安全性和可靠性,并且节约生产成本,从而提升用户体验。Therefore, a new authentication method is needed to improve the security and reliability of authentication and save production costs, thereby improving the user experience.

发明内容Summary of the invention

本发明正是基于上述问题,提出了一种新的技术方案,可以提高身份验证的安全性和可靠性,并且节约生产成本,从而提升用户体验。The present invention is based on the above problems, and proposes a new technical solution, which can improve the security and reliability of identity verification, and save production costs, thereby improving the user experience.

有鉴于此,本发明的第一方面,提出了一种身份验证方法,用于终端,包 括:根据接收到的身份验证指令生成身份验证请求;将所述身份验证请求发送至与所述终端相连的服务器,以供所述服务器根据所述身份验证请求控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息;以及接收来自所述服务器的指纹信息验证结果;根据所述指纹信息验证结果,确定是否通过身份验证。In view of this, in a first aspect of the present invention, an identity verification method is provided for a terminal, a package Include: generating an identity verification request according to the received identity verification instruction; sending the identity verification request to a server connected to the terminal, where the server controls the target terminal verification with the fingerprint verification function according to the identity verification request User fingerprint information received by the target terminal; and receiving a fingerprint information verification result from the server; determining whether to pass the identity verification according to the fingerprint information verification result.

在该技术方案中,通过将根据来自用户的身份验证指令生成的身份验证请求发送至与终端相连接的服务器,经由服务器根据身份验证请求确定具有指纹认证功能的目标终端,并将身份验证请求告知目标终端,用户即可在目标终端输入用户指纹信息,然后目标终端来对用户指纹信息进行验证,最后,终端根据接收到的通过服务器发送来的由目标终端验证的指纹信息验证结果,确定是否通过身份验证,整个身份验证过程对终端是否具有指纹验证功能并无硬性要求,如此,实现了在不增加终端硬件成本的条件下为终端进行指纹验证。并且,当用户拥有多台终端时,只要其中一台终端支持指纹验证,即可将此终端作为目标终端,其它终端便可以间接使用其指纹验证功能进行身份验证,与相关技术相比,不仅提高了身份验证的安全性和可靠性,并且节约了生产成本,从而提升了用户体验。In the technical solution, by transmitting an authentication request generated according to an authentication instruction from a user to a server connected to the terminal, determining, by the server, a target terminal having a fingerprint authentication function according to the identity verification request, and notifying the identity verification request The target terminal, the user can input the user fingerprint information in the target terminal, and then the target terminal verifies the user fingerprint information. Finally, the terminal determines whether to pass the verification according to the received fingerprint information verification result verified by the target terminal sent by the server. Authentication, the entire authentication process does not have a hard requirement on whether the terminal has the fingerprint verification function. Thus, the fingerprint verification is performed for the terminal without increasing the hardware cost of the terminal. Moreover, when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, the terminal can be used as the target terminal, and other terminals can indirectly use their fingerprint verification function for identity verification, which is not only improved compared with related technologies. The security and reliability of authentication and the cost of production save the user experience.

在上述技术方案中,优选地,所述身份验证请求包括所述终端的身份信息,以供所述服务器根据所述身份信息确定所述终端对应的所述目标终端;或所述身份验证请求包括所述终端的位置信息,以供所述服务器根据所述位置信息在所述终端的预定距离范围内为所述终端选择所述目标终端。In the above technical solution, preferably, the identity verification request includes identity information of the terminal, where the server determines, according to the identity information, the target terminal corresponding to the terminal; or the identity verification request includes The location information of the terminal, for the server to select the target terminal for the terminal within a predetermined distance range of the terminal according to the location information.

在该技术方案中,身份请求中可以包含有终端的身份信息(比如用户帐号),在将身份请求发送至服务器时,服务器即可根据终端的身份信息确定已设置的或能够支持对终端进行指纹验证的目标终端。另外,身份请求中还可以包含终端的位置信息,如此,服务器即可根据接收到的终端的位置信息在终端的预定距离范围内来选定目标终端。需要说明的是,终端的身份信息和位置信息也可以同时包含在身份请求中,本领域的技术人员应该理解为,身份请求中包含但不限于身份信息和位置信息,只要能实现本方案的功能的终端的属性信息均适用于本方案。In the technical solution, the identity request may include the identity information of the terminal (such as a user account). When the identity request is sent to the server, the server may determine, according to the identity information of the terminal, that the terminal is fingerprinted or supported. The target terminal for verification. In addition, the identity request may further include location information of the terminal, so that the server may select the target terminal within a predetermined distance range of the terminal according to the received location information of the terminal. It should be noted that the identity information and the location information of the terminal may also be included in the identity request. Those skilled in the art should understand that the identity request includes but is not limited to the identity information and the location information, as long as the function of the solution can be implemented. The attribute information of the terminal is applicable to this scheme.

根据本发明的第二方面,提出了一种终端,包括:请求生成单元,根据接收到的身份验证指令生成身份验证请求;发送单元,将所述身份验证请求发送 至与所述终端相连的服务器,以供所述服务器根据所述身份验证请求控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息;以及接收单元,接收来自所述服务器的指纹信息验证结果;确定单元,根据所述指纹信息验证结果,确定是否通过身份验证。According to a second aspect of the present invention, a terminal is provided, comprising: a request generating unit that generates an identity verification request according to the received identity verification instruction; and a sending unit that sends the identity verification request a server connected to the terminal, wherein the server controls the target terminal having the fingerprint verification function to verify the user fingerprint information received by the target terminal according to the identity verification request; and the receiving unit receives the information from the server The fingerprint information verification result; the determining unit determines whether to pass the identity verification according to the fingerprint information verification result.

在该技术方案中,通过将根据来自用户的身份验证指令生成的身份验证请求发送至与终端相连接的服务器,经由服务器根据身份验证请求确定具有指纹认证功能的目标终端,并将身份验证请求告知目标终端,用户即可在目标终端输入用户指纹信息,然后目标终端来对用户指纹信息进行验证,最后,终端根据接收到的通过服务器发送来的由目标终端验证的指纹信息验证结果,确定是否通过身份验证,整个身份验证过程对终端是否具有指纹验证功能并无硬性要求,如此,实现了在不增加终端硬件成本的条件下为终端进行指纹验证。并且,当用户拥有多台终端时,只要其中一台终端支持指纹验证,即可将此终端作为目标终端,其它终端便可以间接使用其指纹验证功能进行身份验证,与相关技术相比,不仅提高了身份验证的安全性和可靠性,并且节约了生产成本,从而提升了用户体验。In the technical solution, by transmitting an authentication request generated according to an authentication instruction from a user to a server connected to the terminal, determining, by the server, a target terminal having a fingerprint authentication function according to the identity verification request, and notifying the identity verification request The target terminal, the user can input the user fingerprint information in the target terminal, and then the target terminal verifies the user fingerprint information. Finally, the terminal determines whether to pass the verification according to the received fingerprint information verification result verified by the target terminal sent by the server. Authentication, the entire authentication process does not have a hard requirement on whether the terminal has the fingerprint verification function. Thus, the fingerprint verification is performed for the terminal without increasing the hardware cost of the terminal. Moreover, when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, the terminal can be used as the target terminal, and other terminals can indirectly use their fingerprint verification function for identity verification, which is not only improved compared with related technologies. The security and reliability of authentication and the cost of production save the user experience.

在上述技术方案中,优选地,所述身份验证请求包括所述终端的身份信息,以供所述服务器根据所述身份信息确定所述终端对应的所述目标终端;或所述身份验证请求包括所述终端的位置信息,以供所述服务器根据所述位置信息在所述终端的预定距离范围内为所述终端选择所述目标终端。In the above technical solution, preferably, the identity verification request includes identity information of the terminal, where the server determines, according to the identity information, the target terminal corresponding to the terminal; or the identity verification request includes The location information of the terminal, for the server to select the target terminal for the terminal within a predetermined distance range of the terminal according to the location information.

在该技术方案中,身份请求中可以包含有终端的身份信息(比如用户帐号),在将身份请求发送至服务器时,服务器即可根据终端的身份信息确定已设置的或能够支持对终端进行指纹验证的目标终端。另外,身份请求中还可以包含终端的位置信息,如此,服务器即可根据接收到的终端的位置信息在终端的预定距离范围内来选定目标终端。需要说明的是,终端的身份信息和位置信息也可以同时包含在身份请求中,本领域的技术人员应该理解为,身份请求中包含但不限于身份信息和位置信息,只要能实现本方案的功能的终端的属性信息均适用于本方案。In the technical solution, the identity request may include the identity information of the terminal (such as a user account). When the identity request is sent to the server, the server may determine, according to the identity information of the terminal, that the terminal is fingerprinted or supported. The target terminal for verification. In addition, the identity request may further include location information of the terminal, so that the server may select the target terminal within a predetermined distance range of the terminal according to the received location information of the terminal. It should be noted that the identity information and the location information of the terminal may also be included in the identity request. Those skilled in the art should understand that the identity request includes but is not limited to the identity information and the location information, as long as the function of the solution can be implemented. The attribute information of the terminal is applicable to this scheme.

根据本发明的第三方面,提出了一种身份验证方法,用于服务器,包括:接收与所述服务器相连的终端的身份验证请求;根据所述终端的所述身份验证请求,控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹 信息;接收来自所述目标终端的指纹信息验证结果;将所述指纹信息验证结果发送至所述终端,以供所述终端根据所述指纹信息验证结果确定是否通过身份验证。According to a third aspect of the present invention, an authentication method is provided for a server, comprising: receiving an identity verification request of a terminal connected to the server; and controlling fingerprint verification according to the identity verification request of the terminal The target terminal of the function verifies the user fingerprint received by the target terminal And receiving the fingerprint information verification result from the target terminal; and sending the fingerprint information verification result to the terminal, so that the terminal determines whether to pass the identity verification according to the fingerprint information verification result.

在该技术方案中,通过根据接收到的来自终端的身份验证请求,确定具有指纹验证功能的目标终端,并控制目标终端开启指纹验证功能,对目标终端接收到的用户指纹信息进行验证,而后将接收到的来自目标终端返还的指纹信息验证结果发送至终端,以供终端根据指纹信息验证结果确定是否通过身份验证,整个身份验证过程对终端是否具有指纹验证功能并无硬性要求,由服务器作为通信中介,控制具有指纹验证功能的目标终端执行指纹验证过程,如此,实现了在不增加终端硬件成本的条件下为终端进行指纹验证。并且,当用户拥有多台终端时,只要其中一台终端支持指纹验证,即可将此终端作为目标终端,其它终端便可以通过服务器间接使用其指纹验证功能进行身份验证,与相关技术相比,不仅提高了身份验证的安全性和可靠性,并且节约了生产成本,从而提升了用户体验。另外,在目标终端出现意外情况(比如,停机,电量不足等)时,服务器会根据实际情况对终端做出反馈信息,比如,可以给出意外提示,或者为终端选择出当前最优的身份验证方式并给与提示,以供用户选择,进一步提高了身份验证的适用性。In the technical solution, the target terminal having the fingerprint verification function is determined according to the received identity verification request from the terminal, and the target terminal is controlled to open the fingerprint verification function, and the user fingerprint information received by the target terminal is verified, and then The received fingerprint information verification result returned from the target terminal is sent to the terminal, so that the terminal determines whether to pass the identity verification according to the fingerprint information verification result, and the entire identity verification process does not have a hard requirement for the terminal to have the fingerprint verification function, and the server serves as the communication. The intermediary controls the target terminal with the fingerprint verification function to perform the fingerprint verification process, thus implementing fingerprint verification for the terminal without increasing the hardware cost of the terminal. Moreover, when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, the terminal can be used as the target terminal, and other terminals can use the fingerprint verification function to perform identity verification indirectly through the server, compared with related technologies. It not only improves the security and reliability of authentication, but also saves production costs, thereby improving the user experience. In addition, when an unexpected situation occurs in the target terminal (for example, downtime, insufficient power, etc.), the server will provide feedback information to the terminal according to the actual situation, for example, an unexpected prompt may be given, or the current optimal authentication may be selected for the terminal. The way and give hints for the user to choose, further improving the applicability of authentication.

在上述技术方案中,优选地,所述身份验证请求包括所述终端的身份信息,以及在所述控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息之前,还包括:根据接收到的设置命令,将所述终端的所述身份信息与具有指纹验证功能的任一终端相关联,以供在接收到所述终端的所述身份验证请求,将所述任一终端设置为所述目标终端。In the above technical solution, preferably, the identity verification request includes the identity information of the terminal, and before the controlling the target terminal having the fingerprint verification function to verify the user fingerprint information received by the target terminal, the method further includes: And associating the identity information of the terminal with any terminal having a fingerprint verification function according to the received setting command, for setting the any terminal after receiving the identity verification request of the terminal For the target terminal.

在该技术方案中,服务器作为终端间接通过目标终端进行指纹验证的通信中介及控制器,首先要建立终端与目标终端的关联关系,具体地,可根据接收到的设置命令,将终端的身份信息与具有指纹验证功能的任一终端相关联,其中,终端的身份信息可以包含在身份验证请求中,如此,在将身份请求发送至服务器时,服务器即可根据终端的身份信息确定已设置的或能够支持对终端进行指纹验证的目标终端。In the technical solution, the server acts as a communication intermediary and controller for the terminal to perform fingerprint verification indirectly through the target terminal, and firstly establishes an association relationship between the terminal and the target terminal. Specifically, the identity information of the terminal may be determined according to the received setting command. Associated with any terminal having a fingerprint verification function, wherein the identity information of the terminal may be included in the identity verification request, so that when the identity request is sent to the server, the server may determine the set or according to the identity information of the terminal. A target terminal capable of supporting fingerprint verification of a terminal.

在上述技术方案中,优选地,所述身份验证请求包括所述终端的位置信息,以及在所述控制具有指纹验证功能的目标终端验证所述目标终端接收到的用 户指纹信息之前,还包括:确定所述终端的预定距离范围内的至少一个其他终端;在所述至少一个其他终端中选择与所述终端的距离最小的终端作为所述目标终端,或根据接收到的选择命令,在所述至少一个其他终端中为所述终端选择所述目标终端。In the above technical solution, preferably, the identity verification request includes location information of the terminal, and verifying, by the target terminal having the fingerprint verification function, that the target terminal receives the Before the fingerprint information, the method further includes: determining at least one other terminal within a predetermined distance range of the terminal; selecting, in the at least one other terminal, a terminal having the smallest distance from the terminal as the target terminal, or receiving according to the And a selection command to select the target terminal for the terminal in the at least one other terminal.

在该技术方案中,身份验证请求还可以包含终端的位置信息,此时,还可以确定在终端的预定距离范围内的至少一个其他终端作为目标终端,具体地,服务器即可根据接收到的终端的位置信息在终端的预定距离范围内来选定目标终端。需要说明的是,终端的身份信息和位置信息也可以同时包含在身份请求中,本领域的技术人员应该理解为,身份请求中包含但不限于身份信息和位置信息,只要能实现本方案的功能的终端的属性信息均适用于本方案。In this technical solution, the identity verification request may further include location information of the terminal. At this time, at least one other terminal within a predetermined distance range of the terminal may also be determined as the target terminal. Specifically, the server may be based on the received terminal. The location information is selected within a predetermined distance of the terminal to select the target terminal. It should be noted that the identity information and the location information of the terminal may also be included in the identity request. Those skilled in the art should understand that the identity request includes but is not limited to the identity information and the location information, as long as the function of the solution can be implemented. The attribute information of the terminal is applicable to this scheme.

另外,服务器还可以将符合条件的至少一个其他终端提示给终端,如此,用户即可根据实际需要选择目标终端,服务器在接收选择命令时,在至少一个其他终端中为终端选择目标终端,提高了目标终端选择方式的灵活性和多样性,从而提升了用户体验。In addition, the server may also prompt the at least one other terminal that meets the condition to the terminal, so that the user can select the target terminal according to actual needs, and the server selects the target terminal for the terminal in at least one other terminal when receiving the selection command, thereby improving the target terminal. The flexibility and diversity of the target terminal selection method enhances the user experience.

在上述技术方案中,优选地,在所述接收与所述服务器相连的终端的身份验证请求之前,还包括:接收来自任一其他终端的所述终端的初始指纹信息;以及在所述控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息之前,还包括:将所述终端的所述初始指纹信息发送至已选定的所述目标终端,以供所述目标终端进行指纹验证。In the above technical solution, preferably, before receiving the identity verification request of the terminal connected to the server, the method further includes: receiving initial fingerprint information of the terminal from any other terminal; and having, in the control, Before the target terminal of the fingerprint verification function verifies the user fingerprint information received by the target terminal, the method further includes: sending the initial fingerprint information of the terminal to the selected target terminal, for the target terminal to perform Fingerprint verification.

在该技术方案中,将在进行身份验证之前接收到的来自任一其他终端的用户的初始指纹信息存储起来,并在控制目标终端对接收到的用户指纹信息验证之前,将初始指纹信息发送至已选定的目标终端,以供目标终端将用户指纹信息与初始指纹信息进行匹配,也就是说,只要是曾经在其他具有指纹验证功能的终端上录入过指纹信息的用户,均可以在进行身份验证时,选择自己录入过指纹信息的终端作为目标终端。In this technical solution, the initial fingerprint information of the user from any other terminal received before the identity verification is performed is stored, and the initial fingerprint information is sent to the control target terminal before the received user fingerprint information is verified. The selected target terminal is used for the target terminal to match the user fingerprint information with the initial fingerprint information, that is, as long as the user who has entered the fingerprint information on other terminals having the fingerprint verification function can perform identity When verifying, select the terminal that has entered the fingerprint information as the target terminal.

根据本发明的第四方面,提出了一种服务器,包括:第一接收单元,接收与所述服务器相连的终端的身份验证请求;控制验证单元,根据所述终端的所述身份验证请求,控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息;第二接收单元,接收来自所述目标终端的指纹信息验证结果;第一发送单元,将所述指纹信息验证结果发送至所述终端,以供所述终端根据 所述指纹信息验证结果确定是否通过身份验证。According to a fourth aspect of the present invention, a server is provided, comprising: a first receiving unit that receives an identity verification request of a terminal connected to the server; and a control verification unit that controls according to the identity verification request of the terminal The target terminal having the fingerprint verification function verifies the user fingerprint information received by the target terminal; the second receiving unit receives the fingerprint information verification result from the target terminal; the first sending unit sends the fingerprint information verification result to The terminal is provided by the terminal according to the terminal The fingerprint information verification result determines whether or not the authentication is performed.

在该技术方案中,通过根据接收到的来自终端的身份验证请求,确定具有指纹验证功能的目标终端,并控制目标终端开启指纹验证功能,对目标终端接收到的用户指纹信息进行验证,而后将接收到的来自目标终端返还的指纹信息验证结果发送至终端,以供终端根据指纹信息验证结果确定是否通过身份验证,整个身份验证过程对终端是否具有指纹验证功能并无硬性要求,由服务器作为通信中介,控制具有指纹验证功能的目标终端执行指纹验证过程,如此,实现了在不增加终端硬件成本的条件下为终端进行指纹验证。并且,当用户拥有多台终端时,只要其中一台终端支持指纹验证,即可将此终端作为目标终端,其它终端便可以通过服务器间接使用其指纹验证功能进行身份验证,与相关技术相比,不仅提高了身份验证的安全性和可靠性,并且节约了生产成本,从而提升了用户体验。In the technical solution, the target terminal having the fingerprint verification function is determined according to the received identity verification request from the terminal, and the target terminal is controlled to open the fingerprint verification function, and the user fingerprint information received by the target terminal is verified, and then The received fingerprint information verification result returned from the target terminal is sent to the terminal, so that the terminal determines whether to pass the identity verification according to the fingerprint information verification result, and the entire identity verification process does not have a hard requirement for the terminal to have the fingerprint verification function, and the server serves as the communication. The intermediary controls the target terminal with the fingerprint verification function to perform the fingerprint verification process, thus implementing fingerprint verification for the terminal without increasing the hardware cost of the terminal. Moreover, when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, the terminal can be used as the target terminal, and other terminals can use the fingerprint verification function to perform identity verification indirectly through the server, compared with related technologies. It not only improves the security and reliability of authentication, but also saves production costs, thereby improving the user experience.

另外,在目标终端出现意外情况(比如,停机,电量不足等)时,服务器会根据实际情况对终端做出反馈信息,比如,可以给出意外提示,或者为终端选择出当前最优的身份验证方式并给与提示,以供用户选择,进一步提高了身份验证的适用性。In addition, when an unexpected situation occurs in the target terminal (for example, downtime, insufficient power, etc.), the server will provide feedback information to the terminal according to the actual situation, for example, an unexpected prompt may be given, or the current optimal authentication may be selected for the terminal. The way and give hints for the user to choose, further improving the applicability of authentication.

在上述技术方案中,优选地,所述身份验证请求包括所述终端的身份信息,以及所述服务器还包括:设置单元,在所述控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息之前,根据接收到的设置命令,将所述终端的所述身份信息与具有指纹验证功能的任一终端相关联,以供在接收到所述终端的所述身份验证请求,将所述任一终端设置为所述目标终端。In the above technical solution, preferably, the identity verification request includes identity information of the terminal, and the server further includes: a setting unit, where the target terminal having the fingerprint verification function is controlled to verify that the target terminal receives Before the user fingerprint information, according to the received setting command, associating the identity information of the terminal with any terminal having a fingerprint verification function, for receiving the identity verification request of the terminal, Any one of the terminals is set as the target terminal.

在该技术方案中,服务器作为终端间接通过目标终端进行指纹验证的通信中介及控制器,首先要建立终端与目标终端的关联关系,具体地,可根据接收到的设置命令,将终端的身份信息与具有指纹验证功能的任一终端相关联,其中,终端的身份信息可以包含在身份验证请求中,如此,在将身份请求发送至服务器时,服务器即可根据终端的身份信息确定已设置的或能够支持对终端进行指纹验证的目标终端。在上述技术方案中,优选地,所述身份验证请求包括所述终端的位置信息,以及所述服务器还包括:确定单元,在所述控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息之前,确定所述终端的预定距离范围内的至少一个其他终端;选择单元,根据接收到的选择 命令,在所述至少一个其他终端中为所述终端选择所述目标终端。In the technical solution, the server acts as a communication intermediary and controller for the terminal to perform fingerprint verification indirectly through the target terminal, and firstly establishes an association relationship between the terminal and the target terminal. Specifically, the identity information of the terminal may be determined according to the received setting command. Associated with any terminal having a fingerprint verification function, wherein the identity information of the terminal may be included in the identity verification request, so that when the identity request is sent to the server, the server may determine the set or according to the identity information of the terminal. A target terminal capable of supporting fingerprint verification of a terminal. In the above technical solution, preferably, the identity verification request includes location information of the terminal, and the server further includes: a determining unit, where the target terminal having the fingerprint verification function is controlled to verify that the target terminal receives Determining at least one other terminal within a predetermined distance range of the terminal before the user fingerprint information; selecting a unit according to the received selection Commanding, in the at least one other terminal, selecting the target terminal for the terminal.

在该技术方案中,身份验证请求还可以包含终端的位置信息,此时,还可以确定在终端的预定距离范围内的至少一个其他终端作为目标终端,具体地,服务器即可根据接收到的终端的位置信息在终端的预定距离范围内来选定目标终端。需要说明的是,终端的身份信息和位置信息也可以同时包含在身份请求中,本领域的技术人员应该理解为,身份请求中包含但不限于身份信息和位置信息,只要能实现本方案的功能的终端的属性信息均适用于本方案。另外,服务器还可以将符合条件的至少一个其他终端提示给终端,如此,用户即可根据实际需要选择目标终端,服务器在接收选择命令时,在至少一个其他终端中为终端选择目标终端,提高了目标终端选择方式的灵活性和多样性,从而提升了用户体验。In this technical solution, the identity verification request may further include location information of the terminal. At this time, at least one other terminal within a predetermined distance range of the terminal may also be determined as the target terminal. Specifically, the server may be based on the received terminal. The location information is selected within a predetermined distance of the terminal to select the target terminal. It should be noted that the identity information and the location information of the terminal may also be included in the identity request. Those skilled in the art should understand that the identity request includes but is not limited to the identity information and the location information, as long as the function of the solution can be implemented. The attribute information of the terminal is applicable to this scheme. In addition, the server may also prompt the at least one other terminal that meets the condition to the terminal, so that the user can select the target terminal according to actual needs, and the server selects the target terminal for the terminal in at least one other terminal when receiving the selection command, thereby improving the target terminal. The flexibility and diversity of the target terminal selection method enhances the user experience.

在上述技术方案中,优选地,还包括:第三接收单元,在所述接收与所述服务器相连的终端的身份验证请求之前,接收来自任一其他终端的所述终端的初始指纹信息;以及第二发送单元,在所述控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息之前,将所述终端的所述初始指纹信息发送至已选定的所述目标终端,以供所述目标终端进行指纹验证。In the above technical solution, preferably, the method further includes: receiving, by the third receiving unit, initial fingerprint information of the terminal from any other terminal before receiving the identity verification request of the terminal connected to the server; a second sending unit, before the controlling the target terminal having the fingerprint verification function to verify the user fingerprint information received by the target terminal, sending the initial fingerprint information of the terminal to the selected target terminal, For the target terminal to perform fingerprint verification.

在该技术方案中,将在进行身份验证之前接收到的来自任一其他终端的用户的初始指纹信息存储起来,并在控制目标终端对接收到的用户指纹信息验证之前,将初始指纹信息发送至已选定的目标终端,以供目标终端将用户指纹信息与初始指纹信息进行匹配,也就是说,只要是曾经在其他具有指纹验证功能的终端上录入过指纹信息的用户,均可以在进行身份验证时,选择自己录入过指纹信息的终端作为目标终端。In this technical solution, the initial fingerprint information of the user from any other terminal received before the identity verification is performed is stored, and the initial fingerprint information is sent to the control target terminal before the received user fingerprint information is verified. The selected target terminal is used for the target terminal to match the user fingerprint information with the initial fingerprint information, that is, as long as the user who has entered the fingerprint information on other terminals having the fingerprint verification function can perform identity When verifying, select the terminal that has entered the fingerprint information as the target terminal.

通过本发明的技术方案,实现了在不增加终端硬件成本的条件下为终端进行指纹验证,与相关技术相比,不仅提高了身份验证的安全性和可靠性,并且节约了生产成本,从而提升了用户体验。Through the technical solution of the present invention, the fingerprint verification for the terminal is realized without increasing the hardware cost of the terminal, and compared with the related technology, the security and reliability of the identity verification are not only improved, and the production cost is saved, thereby improving The user experience.

附图说明DRAWINGS

图1示出了根据本发明的一个实施例的身份验证方法的流程示意图;1 is a flow chart showing an identity verification method according to an embodiment of the present invention;

图2示出了根据本发明的一个实施例的终端的框图;Figure 2 shows a block diagram of a terminal in accordance with one embodiment of the present invention;

图3示出了根据本发明的另一个实施例的身份验证方法的流程示意 图;FIG. 3 shows a flow chart of an identity verification method according to another embodiment of the present invention. Figure

图4示出了根据本发明的一个实施例的服务器的框图;Figure 4 shows a block diagram of a server in accordance with one embodiment of the present invention;

图5示出了根据本发明的一个实施例的身份验证系统的示意图;Figure 5 shows a schematic diagram of an identity verification system in accordance with one embodiment of the present invention;

图6示出了根据本发明的又一个实施例的身份验证方法的流程示意图。FIG. 6 shows a flow chart of an identity verification method according to still another embodiment of the present invention.

具体实施方式detailed description

为了可以更清楚地理解本发明的上述目的、特征和优点,下面结合附图和具体实施方式对本发明进行进一步的详细描述。需要说明的是,在不冲突的情况下,本申请的实施例及实施例中的特征可以相互组合。The above described objects, features and advantages of the present invention will become more apparent from the detailed description of the appended claims. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict.

在下面的描述中阐述了很多具体细节以便于充分理解本发明,但是,本发明还可以采用其他不同于在此描述的其他方式来实施,因此,本发明的保护范围并不受下面公开的具体实施例的限制。In the following description, numerous specific details are set forth in order to provide a full understanding of the invention, but the invention may be practiced otherwise than as described herein. Limitations of the embodiments.

图1示出了根据本发明的一个实施例的身份验证方法的流程示意图。FIG. 1 shows a flow chart of an identity verification method in accordance with one embodiment of the present invention.

如图1所示,本发明的一个实施例的身份验证方法,用于终端,包括:步骤102,根据接收到的身份验证指令生成身份验证请求;步骤104,将所述身份验证请求发送至与所述终端相连的服务器,以供所述服务器根据所述身份验证请求控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息;步骤106以及接收来自所述服务器的指纹信息验证结果;步骤108,根据所述指纹信息验证结果,确定是否通过身份验证。As shown in FIG. 1 , an identity verification method according to an embodiment of the present invention is used for a terminal, including: Step 102, generating an identity verification request according to the received identity verification instruction; Step 104, sending the identity verification request to a server connected to the terminal, wherein the server controls, according to the identity verification request, a target terminal having a fingerprint verification function to verify user fingerprint information received by the target terminal; and step 106, and receiving fingerprint information verification from the server. As a result; step 108, determining whether to pass the identity verification according to the fingerprint information verification result.

在该技术方案中,通过将根据来自用户的身份验证指令生成的身份验证请求发送至与终端相连接的服务器,经由服务器根据身份验证请求确定具有指纹认证功能的目标终端,并将身份验证请求告知目标终端,用户即可在目标终端输入用户指纹信息,然后目标终端来对用户指纹信息进行验证,最后,终端根据接收到的通过服务器发送来的由目标终端验证的指纹信息验证结果,确定是否通过身份验证,整个身份验证过程对终端是否具有指纹验证功能并无硬性要求,如此,实现了在不增加终端硬件成本的条件下为终端进行指纹验证。并且,当用户拥有多台终端时,只要其中一台终端支持指纹验证,即可将此终端作为目标终端,其它终端便可以间接使 用其指纹验证功能进行身份验证,与相关技术相比,不仅提高了身份验证的安全性和可靠性,并且节约了生产成本,从而提升了用户体验。In the technical solution, by transmitting an authentication request generated according to an authentication instruction from a user to a server connected to the terminal, determining, by the server, a target terminal having a fingerprint authentication function according to the identity verification request, and notifying the identity verification request The target terminal, the user can input the user fingerprint information in the target terminal, and then the target terminal verifies the user fingerprint information. Finally, the terminal determines whether to pass the verification according to the received fingerprint information verification result verified by the target terminal sent by the server. Authentication, the entire authentication process does not have a hard requirement on whether the terminal has the fingerprint verification function. Thus, the fingerprint verification is performed for the terminal without increasing the hardware cost of the terminal. Moreover, when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, the terminal can be used as the target terminal, and other terminals can indirectly make Using its fingerprint verification function for authentication, compared with related technologies, not only improves the security and reliability of authentication, but also saves production costs, thereby improving the user experience.

在上述技术方案中,优选地,所述身份验证请求包括所述终端的身份信息,以供所述服务器根据所述身份信息确定所述终端对应的所述目标终端;或所述身份验证请求包括所述终端的位置信息,以供所述服务器根据所述位置信息在所述终端的预定距离范围内为所述终端选择所述目标终端。In the above technical solution, preferably, the identity verification request includes identity information of the terminal, where the server determines, according to the identity information, the target terminal corresponding to the terminal; or the identity verification request includes The location information of the terminal, for the server to select the target terminal for the terminal within a predetermined distance range of the terminal according to the location information.

在该技术方案中,身份请求中可以包含有终端的身份信息(比如用户帐号),在将身份请求发送至服务器时,服务器即可根据终端的身份信息确定已设置的或能够支持对终端进行指纹验证的目标终端。另外,身份请求中还可以包含终端的位置信息,如此,服务器即可根据接收到的终端的位置信息在终端的预定距离范围内来选定目标终端。需要说明的是,终端的身份信息和位置信息也可以同时包含在身份请求中,本领域的技术人员应该理解为,身份请求中包含但不限于身份信息和位置信息,只要能实现本方案的功能的终端的属性信息均适用于本方案。In the technical solution, the identity request may include the identity information of the terminal (such as a user account). When the identity request is sent to the server, the server may determine, according to the identity information of the terminal, that the terminal is fingerprinted or supported. The target terminal for verification. In addition, the identity request may further include location information of the terminal, so that the server may select the target terminal within a predetermined distance range of the terminal according to the received location information of the terminal. It should be noted that the identity information and the location information of the terminal may also be included in the identity request. Those skilled in the art should understand that the identity request includes but is not limited to the identity information and the location information, as long as the function of the solution can be implemented. The attribute information of the terminal is applicable to this scheme.

图2示出了根据本发明的一个实施例的终端的框图。Figure 2 shows a block diagram of a terminal in accordance with one embodiment of the present invention.

如图2所示,本发明的一个实施例的终端200,包括:请求生成单元202,根据接收到的身份验证指令生成身份验证请求;发送单元204,将所述身份验证请求发送至与所述终端200相连的服务器,以供所述服务器根据所述身份验证请求控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息;以及接收单元206,接收来自所述服务器的指纹信息验证结果;确定单元208,根据所述指纹信息验证结果,确定是否通过身份验证。As shown in FIG. 2, the terminal 200 of an embodiment of the present invention includes: a request generating unit 202, generating an identity verification request according to the received identity verification instruction; and a sending unit 204, sending the identity verification request to the a server connected to the terminal 200, wherein the server controls the target terminal having the fingerprint verification function to verify the user fingerprint information received by the target terminal according to the identity verification request; and the receiving unit 206 receives the fingerprint information from the server The verification result deterministic unit 208 determines whether to pass the identity verification according to the verification result of the fingerprint information.

在该技术方案中,通过将根据来自用户的身份验证指令生成的身份验证请求发送至与终端200相连接的服务器,经由服务器根据身份验证请求确定具有指纹认证功能的目标终端,并将身份验证请求告知目标终端,用户即可在目标终端输入用户指纹信息,然后目标终端来对用户指纹信息进行验证,最后,终端200根据接收到的通过服务器发送来的由目标终端验证的指纹信息验证结果,确定是否通过身份验证,整个身份验证过程对终 端200是否具有指纹验证功能并无硬性要求,如此,实现了在不增加终端200硬件成本的条件下为终端200进行指纹验证。并且,当用户拥有多台终端200时,只要其中一台终端200支持指纹验证,即可将此终端200作为目标终端,其它终端200便可以间接使用其指纹验证功能进行身份验证,与相关技术相比,不仅提高了身份验证的安全性和可靠性,并且节约了生产成本,从而提升了用户体验。In this technical solution, by transmitting an authentication request generated according to an authentication instruction from a user to a server connected to the terminal 200, the target terminal having the fingerprint authentication function is determined according to the identity verification request via the server, and the authentication request is requested Informing the target terminal, the user can input the user fingerprint information at the target terminal, and then the target terminal verifies the user fingerprint information. Finally, the terminal 200 determines the fingerprint information verification result verified by the target terminal sent by the server. Whether it is authenticated, the entire authentication process is final Whether the terminal 200 has the fingerprint verification function has no hard requirement, and thus, the terminal 200 performs fingerprint verification without increasing the hardware cost of the terminal 200. Moreover, when the user owns multiple terminals 200, as long as one of the terminals 200 supports fingerprint verification, the terminal 200 can be used as the target terminal, and the other terminals 200 can indirectly use the fingerprint verification function for identity verification, and related technologies. Compared, it not only improves the security and reliability of authentication, but also saves production costs, thereby improving the user experience.

在上述技术方案中,优选地,所述身份验证请求包括所述终端200的身份信息,以供所述服务器根据所述身份信息确定所述终端200对应的所述目标终端;或所述身份验证请求包括所述终端200的位置信息,以供所述服务器根据所述位置信息在所述终端200的预定距离范围内为所述终端200选择所述目标终端。In the above technical solution, preferably, the identity verification request includes identity information of the terminal 200, where the server determines, according to the identity information, the target terminal corresponding to the terminal 200; or the identity verification. The request includes location information of the terminal 200 for the server to select the target terminal for the terminal 200 within a predetermined distance range of the terminal 200 according to the location information.

在该技术方案中,身份请求中可以包含有终端200的身份信息(比如用户帐号),在将身份请求发送至服务器时,服务器即可根据终端200的身份信息确定已设置的或能够支持对终端200进行指纹验证的目标终端。另外,身份请求中还可以包含终端200的位置信息,如此,服务器即可根据接收到的终端200的位置信息在终端200的预定距离范围内来选定目标终端。需要说明的是,终端200的身份信息和位置信息也可以同时包含在身份请求中,本领域的技术人员应该理解为,身份请求中包含但不限于身份信息和位置信息,只要能实现本方案的功能的终端200的属性信息均适用于本方案。In the technical solution, the identity request may include identity information (such as a user account) of the terminal 200. When the identity request is sent to the server, the server may determine, according to the identity information of the terminal 200, that the terminal is set or can support the terminal. 200 target terminal for fingerprint verification. In addition, the identity request may further include location information of the terminal 200. Thus, the server may select the target terminal within a predetermined distance range of the terminal 200 according to the received location information of the terminal 200. It should be noted that the identity information and the location information of the terminal 200 may also be included in the identity request. Those skilled in the art should understand that the identity request includes, but is not limited to, identity information and location information, as long as the solution can be implemented. The attribute information of the functional terminal 200 is applicable to the present scheme.

图3示出了根据本发明的另一个实施例的身份验证方法的流程示意图。FIG. 3 shows a flow chart of an identity verification method according to another embodiment of the present invention.

如图3所示,本发明的另一个实施例的身份验证方法,用于服务器,包括:步骤302,接收与所述服务器相连的终端的身份验证请求;步骤304,根据所述终端的所述身份验证请求,控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息;步骤306,接收来自所述目标终端的指纹信息验证结果;步骤308将所述指纹信息验证结果发送至所述终端,以供所述终端根据所述指纹信息验证结果确定是否通过身份验证。As shown in FIG. 3, an identity verification method according to another embodiment of the present invention is used for a server, including: Step 302, receiving an identity verification request of a terminal connected to the server; Step 304, according to the terminal An authentication request, controlling a target terminal having a fingerprint verification function to verify user fingerprint information received by the target terminal; step 306, receiving a fingerprint information verification result from the target terminal; and step 308, transmitting the fingerprint information verification result to The terminal, for the terminal to determine whether to pass the identity verification according to the fingerprint information verification result.

在该技术方案中,通过根据接收到的来自终端的身份验证请求,确定 具有指纹验证功能的目标终端,并控制目标终端开启指纹验证功能,对目标终端接收到的用户指纹信息进行验证,而后将接收到的来自目标终端返还的指纹信息验证结果发送至终端,以供终端根据指纹信息验证结果确定是否通过身份验证,整个身份验证过程对终端是否具有指纹验证功能并无硬性要求,由服务器作为通信中介,控制具有指纹验证功能的目标终端执行指纹验证过程,如此,实现了在不增加终端硬件成本的条件下为终端进行指纹验证。并且,当用户拥有多台终端时,只要其中一台终端支持指纹验证,即可将此终端作为目标终端,其它终端便可以通过服务器间接使用其指纹验证功能进行身份验证,与相关技术相比,不仅提高了身份验证的安全性和可靠性,并且节约了生产成本,从而提升了用户体验。In the technical solution, by determining according to the received identity verification request from the terminal A target terminal having a fingerprint verification function, and controlling the target terminal to enable the fingerprint verification function, verifying the user fingerprint information received by the target terminal, and then transmitting the received fingerprint information verification result returned from the target terminal to the terminal for the terminal According to the verification result of the fingerprint information, it is determined whether the identity verification process has no hard requirement for the terminal to have the fingerprint verification function. The server acts as a communication intermediary, and controls the target terminal with the fingerprint verification function to perform the fingerprint verification process. Fingerprint verification for the terminal without increasing the hardware cost of the terminal. Moreover, when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, the terminal can be used as the target terminal, and other terminals can use the fingerprint verification function to perform identity verification indirectly through the server, compared with related technologies. It not only improves the security and reliability of authentication, but also saves production costs, thereby improving the user experience.

另外,在目标终端出现意外情况(比如,停机,电量不足等)时,服务器会根据实际情况对终端做出反馈信息,比如,可以给出意外提示,或者为终端选择出当前最优的身份验证方式并给与提示,以供用户选择,进一步提高了身份验证的适用性。In addition, when an unexpected situation occurs in the target terminal (for example, downtime, insufficient power, etc.), the server will provide feedback information to the terminal according to the actual situation, for example, an unexpected prompt may be given, or the current optimal authentication may be selected for the terminal. The way and give hints for the user to choose, further improving the applicability of authentication.

在上述技术方案中,优选地,所述身份验证请求包括所述终端的身份信息,以及在所述步骤304之前,还包括:根据接收到的设置命令,将所述终端的所述身份信息与具有指纹验证功能的任一终端相关联,以供在接收到所述终端的所述身份验证请求,将所述任一终端设置为所述目标终端。In the above technical solution, preferably, the identity verification request includes identity information of the terminal, and before the step 304, further comprising: according to the received setting command, the identity information of the terminal is Any terminal having a fingerprint verification function is associated for setting the any terminal as the target terminal upon receiving the identity verification request of the terminal.

在该技术方案中,服务器作为终端间接通过目标终端进行指纹验证的通信中介及控制器,首先要建立终端与目标终端的关联关系,具体地,可根据接收到的设置命令,将终端的身份信息与具有指纹验证功能的任一终端相关联,其中,终端的身份信息可以包含在身份验证请求中,如此,在将身份请求发送至服务器时,服务器即可根据终端的身份信息确定已设置的或能够支持对终端进行指纹验证的目标终端。In the technical solution, the server acts as a communication intermediary and controller for the terminal to perform fingerprint verification indirectly through the target terminal, and firstly establishes an association relationship between the terminal and the target terminal. Specifically, the identity information of the terminal may be determined according to the received setting command. Associated with any terminal having a fingerprint verification function, wherein the identity information of the terminal may be included in the identity verification request, so that when the identity request is sent to the server, the server may determine the set or according to the identity information of the terminal. A target terminal capable of supporting fingerprint verification of a terminal.

在上述技术方案中,优选地,所述身份验证请求包括所述终端的位置信息,以及在所述步骤304之前,还包括:确定所述终端的预定距离范围内的至少一个其他终端;在所述至少一个其他终端中选择与所述终端的距离最小的终端作为所述目标终端,或根据接收到的选择命令,在所述至少一个其他终端中为所述终端选择所述目标终端。 In the above technical solution, preferably, the identity verification request includes location information of the terminal, and before the step 304, further comprising: determining at least one other terminal within a predetermined distance range of the terminal; Determining, as the target terminal, a terminal having the smallest distance from the terminal among the at least one other terminal, or selecting the target terminal for the terminal in the at least one other terminal according to the received selection command.

在该技术方案中,身份验证请求还可以包含终端的位置信息,此时,还可以确定在终端的预定距离范围内的至少一个其他终端作为目标终端,具体地,服务器即可根据接收到的终端的位置信息在终端的预定距离范围内来选定目标终端。需要说明的是,终端的身份信息和位置信息也可以同时包含在身份请求中,本领域的技术人员应该理解为,身份请求中包含但不限于身份信息和位置信息,只要能实现本方案的功能的终端的属性信息均适用于本方案。In this technical solution, the identity verification request may further include location information of the terminal. At this time, at least one other terminal within a predetermined distance range of the terminal may also be determined as the target terminal. Specifically, the server may be based on the received terminal. The location information is selected within a predetermined distance of the terminal to select the target terminal. It should be noted that the identity information and the location information of the terminal may also be included in the identity request. Those skilled in the art should understand that the identity request includes but is not limited to the identity information and the location information, as long as the function of the solution can be implemented. The attribute information of the terminal is applicable to this scheme.

另外,服务器还可以将符合条件的至少一个其他终端提示给终端,如此,用户即可根据实际需要选择目标终端,服务器在接收选择命令时,在至少一个其他终端中为终端选择目标终端,提高了目标终端选择方式的灵活性和多样性,从而提升了用户体验。In addition, the server may also prompt the at least one other terminal that meets the condition to the terminal, so that the user can select the target terminal according to actual needs, and the server selects the target terminal for the terminal in at least one other terminal when receiving the selection command, thereby improving the target terminal. The flexibility and diversity of the target terminal selection method enhances the user experience.

在上述技术方案中,优选地,在所述步骤302之前,还包括:接收来自任一其他终端的所述终端的初始指纹信息;以及在所述步骤304之前,还包括:将所述终端的所述初始指纹信息发送至已选定的所述目标终端,以供所述目标终端进行指纹验证。In the foregoing technical solution, preferably, before the step 302, the method further includes: receiving initial fingerprint information of the terminal from any other terminal; and before the step 304, further comprising: The initial fingerprint information is sent to the selected target terminal for the target terminal to perform fingerprint verification.

在该技术方案中,将在进行身份验证之前接收到的来自任一其他终端的用户的初始指纹信息存储起来,并在控制目标终端对接收到的用户指纹信息验证之前,将初始指纹信息发送至已选定的目标终端,以供目标终端将用户指纹信息与初始指纹信息进行匹配,也就是说,只要是曾经在其他具有指纹验证功能的终端上录入过指纹信息的用户,均可以在进行身份验证时,选择自己录入过指纹信息的终端作为目标终端。In this technical solution, the initial fingerprint information of the user from any other terminal received before the identity verification is performed is stored, and the initial fingerprint information is sent to the control target terminal before the received user fingerprint information is verified. The selected target terminal is used for the target terminal to match the user fingerprint information with the initial fingerprint information, that is, as long as the user who has entered the fingerprint information on other terminals having the fingerprint verification function can perform identity When verifying, select the terminal that has entered the fingerprint information as the target terminal.

图4示出了根据本发明的一个实施例的服务器的框图。Figure 4 shows a block diagram of a server in accordance with one embodiment of the present invention.

如图4所述,本发明的一个实施例的服务器400,包括:第一接收单元402,接收与所述服务器400相连的终端的身份验证请求;控制验证单元404,根据所述终端的所述身份验证请求,控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息;第二接收单元406,接收来自所述目标终端的指纹信息验证结果;第一发送单元408,将所述指纹信息验证结果发送至所述终端,以供所述终端根据所述指纹信息验证结果确定是否通过身份验证。 As shown in FIG. 4, the server 400 of an embodiment of the present invention includes: a first receiving unit 402, which receives an identity verification request of a terminal connected to the server 400; and a control verification unit 404, according to the terminal The first verification unit 406 receives the fingerprint information verification result received by the target terminal, and the first sending unit 408, The fingerprint information verification result is sent to the terminal, so that the terminal determines whether to pass the identity verification according to the fingerprint information verification result.

在该技术方案中,通过根据接收到的来自终端的身份验证请求,确定具有指纹验证功能的目标终端,并控制目标终端开启指纹验证功能,对目标终端接收到的用户指纹信息进行验证,而后将接收到的来自目标终端返还的指纹信息验证结果发送至终端,以供终端根据指纹信息验证结果确定是否通过身份验证,整个身份验证过程对终端是否具有指纹验证功能并无硬性要求,由服务器400作为通信中介,控制具有指纹验证功能的目标终端执行指纹验证过程,如此,实现了在不增加终端硬件成本的条件下为终端进行指纹验证。并且,当用户拥有多台终端时,只要其中一台终端支持指纹验证,即可将此终端作为目标终端,其它终端便可以通过服务器400间接使用其指纹验证功能进行身份验证,与相关技术相比,不仅提高了身份验证的安全性和可靠性,并且节约了生产成本,从而提升了用户体验。In the technical solution, the target terminal having the fingerprint verification function is determined according to the received identity verification request from the terminal, and the target terminal is controlled to open the fingerprint verification function, and the user fingerprint information received by the target terminal is verified, and then The received fingerprint information verification result returned from the target terminal is sent to the terminal, so that the terminal determines whether to pass the identity verification according to the fingerprint information verification result, and the entire identity verification process does not have a hard requirement on whether the terminal has the fingerprint verification function, and is used by the server 400. The communication intermediary controls the target terminal with the fingerprint verification function to perform the fingerprint verification process, thus implementing fingerprint verification for the terminal without increasing the hardware cost of the terminal. Moreover, when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, the terminal can be used as the target terminal, and other terminals can use the fingerprint verification function to perform identity verification indirectly through the server 400, compared with related technologies. It not only improves the security and reliability of authentication, but also saves production costs, thereby improving the user experience.

另外,在目标终端出现意外情况(比如,停机,电量不足等)时,服务器400会根据实际情况对终端做出反馈信息,比如,可以给出意外提示,或者为终端选择出当前最优的身份验证方式并给与提示,以供用户选择,进一步提高了身份验证的适用性。In addition, when an unexpected situation occurs in the target terminal (for example, shutdown, insufficient power, etc.), the server 400 may provide feedback information to the terminal according to actual conditions, for example, may give an unexpected prompt, or select a current optimal identity for the terminal. The verification method and prompts are provided for the user to select, which further improves the applicability of the authentication.

在上述技术方案中,优选地,所述身份验证请求包括所述终端的身份信息,以及所述服务器400还包括:设置单元410,在所述控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息之前,根据接收到的设置命令,将所述终端的所述身份信息与具有指纹验证功能的任一终端相关联,以供在接收到所述终端的所述身份验证请求,将所述任一终端设置为所述目标终端。In the above technical solution, preferably, the identity verification request includes identity information of the terminal, and the server 400 further includes: a setting unit 410, where the target terminal that controls the fingerprint verification function is used to verify the target terminal Before receiving the user fingerprint information, according to the received setting command, associating the identity information of the terminal with any terminal having a fingerprint verification function, for receiving the identity verification request of the terminal And setting any one of the terminals as the target terminal.

在该技术方案中,服务器400作为终端间接通过目标终端进行指纹验证的通信中介及控制器,首先要建立终端与目标终端的关联关系,具体地,可根据接收到的设置命令,将终端的身份信息与具有指纹验证功能的任一终端相关联,其中,终端的身份信息可以包含在身份验证请求中,如此,在将身份请求发送至服务器时,服务器即可根据终端的身份信息确定已设置的或能够支持对终端进行指纹验证的目标终端。In this technical solution, the server 400 acts as a communication intermediary and controller for indirectly performing fingerprint verification by the target terminal, and firstly establishes an association relationship between the terminal and the target terminal. Specifically, the identity of the terminal may be determined according to the received setting command. The information is associated with any terminal having a fingerprint verification function, wherein the identity information of the terminal may be included in the identity verification request, such that when the identity request is sent to the server, the server may determine the set according to the identity information of the terminal. Or a target terminal capable of supporting fingerprint verification of the terminal.

在上述技术方案中,优选地,所述身份验证请求包括所述终端的位置信息,以及所述服务器400还包括:确定单元412,在所述控制具有指纹 验证功能的目标终端验证所述目标终端接收到的用户指纹信息之前,确定所述终端的预定距离范围内的至少一个其他终端;选择单元414,根据接收到的选择命令,在所述至少一个其他终端中为所述终端选择所述目标终端。In the above technical solution, preferably, the identity verification request includes location information of the terminal, and the server 400 further includes: a determining unit 412, where the control has a fingerprint Determining at least one other terminal within a predetermined distance range of the terminal before the target terminal of the verification function verifies the user fingerprint information received by the target terminal; the selecting unit 414, in the at least one other according to the received selection command The target terminal is selected for the terminal in the terminal.

在该技术方案中,身份验证请求还可以包含终端的位置信息,此时,还可以确定在终端的预定距离范围内的至少一个其他终端作为目标终端,具体地,服务器即可根据接收到的终端的位置信息在终端的预定距离范围内来选定目标终端。需要说明的是,终端的身份信息和位置信息也可以同时包含在身份请求中,本领域的技术人员应该理解为,身份请求中包含但不限于身份信息和位置信息,只要能实现本方案的功能的终端的属性信息均适用于本方案。In this technical solution, the identity verification request may further include location information of the terminal. At this time, at least one other terminal within a predetermined distance range of the terminal may also be determined as the target terminal. Specifically, the server may be based on the received terminal. The location information is selected within a predetermined distance of the terminal to select the target terminal. It should be noted that the identity information and the location information of the terminal may also be included in the identity request. Those skilled in the art should understand that the identity request includes but is not limited to the identity information and the location information, as long as the function of the solution can be implemented. The attribute information of the terminal is applicable to this scheme.

另外,服务器400还可以将符合条件的至少一个其他终端提示给终端,如此,用户即可根据实际需要选择目标终端,服务器400在接收选择命令时,在至少一个其他终端中为终端选择目标终端,提高了目标终端选择方式的灵活性和多样性,从而提升了用户体验。In addition, the server 400 can also prompt the at least one other terminal that meets the condition to the terminal, so that the user can select the target terminal according to actual needs, and the server 400 selects the target terminal for the terminal in at least one other terminal when receiving the selection command. The user experience is enhanced by increasing the flexibility and diversity of the target terminal selection method.

在上述技术方案中,优选地,还包括:第三接收单元416,在所述接收与所述服务器400相连的终端的身份验证请求之前,接收来自任一其他终端的所述终端的初始指纹信息;以及第二发送单元418,在所述控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息之前,将所述终端的所述初始指纹信息发送至已选定的所述目标终端,以供所述目标终端进行指纹验证。In the above technical solution, preferably, the method further includes: a third receiving unit 416, receiving initial fingerprint information of the terminal from any other terminal before receiving the identity verification request of the terminal connected to the server 400 And the second sending unit 418, before the controlling the target terminal having the fingerprint verification function to verify the user fingerprint information received by the target terminal, sending the initial fingerprint information of the terminal to the selected a target terminal for performing fingerprint verification on the target terminal.

在该技术方案中,将在进行身份验证之前接收到的来自任一其他终端的用户的初始指纹信息存储起来,并在控制目标终端对接收到的用户指纹信息验证之前,将初始指纹信息发送至已选定的目标终端,以供目标终端将用户指纹信息与初始指纹信息进行匹配,也就是说,只要是曾经在其他具有指纹验证功能的终端上录入过指纹信息的用户,均可以在进行身份验证时,选择自己录入过指纹信息的终端作为目标终端。In this technical solution, the initial fingerprint information of the user from any other terminal received before the identity verification is performed is stored, and the initial fingerprint information is sent to the control target terminal before the received user fingerprint information is verified. The selected target terminal is used for the target terminal to match the user fingerprint information with the initial fingerprint information, that is, as long as the user who has entered the fingerprint information on other terminals having the fingerprint verification function can perform identity When verifying, select the terminal that has entered the fingerprint information as the target terminal.

下面结合图5和图6具体说明本实施例的技术方案:The technical solution of this embodiment is specifically described below with reference to FIG. 5 and FIG. 6 :

图5示出了根据本发明的一个实施例的身份验证系统的示意图。 Figure 5 shows a schematic diagram of an identity verification system in accordance with one embodiment of the present invention.

本实施例提供了一种在登录非指纹终端(终端不支持指纹身份验证,即终端)上的客户端(比如微信,支付宝等,也可以是开启某个软件)时,通过其它指纹终端(终端支持指纹身份验证,即目标终端)进行鉴权的登录方法。非指纹终端与指纹终端通过远程服务器连接,如图5所示,指纹终端包括:指纹模块、存储模块、通信模块和处理器CPU;非指纹终端包括:存储模块、通信模块和处理器CPU;两者通过服务器进行通信连接。The embodiment provides a fingerprint terminal (terminal) when the client (such as WeChat, Alipay, etc., or a certain software) is logged in to the non-fingerprint terminal (the terminal does not support the fingerprint authentication, that is, the terminal). Support fingerprint authentication, that is, the target terminal) login method for authentication. The non-fingerprint terminal is connected to the fingerprint terminal through a remote server. As shown in FIG. 5, the fingerprint terminal includes: a fingerprint module, a storage module, a communication module, and a processor CPU; the non-fingerprint terminal includes: a storage module, a communication module, and a processor CPU; The communication connection is made through the server.

图6示出了根据本发明的又一个实施例的身份验证方法的流程示意图。FIG. 6 shows a flow chart of an identity verification method according to still another embodiment of the present invention.

如图6所示,根据本发明的又一个实施例的身份验证方法的流程包括:As shown in FIG. 6, the flow of the identity verification method according to still another embodiment of the present invention includes:

步骤602,用户在非指纹终端上启动客户端。In step 602, the user starts the client on the non-fingerprint terminal.

步骤604,用户在非指纹终端输入客户端账号(即身份信息)。In step 604, the user inputs the client account (ie, identity information) in the non-fingerprint terminal.

步骤606,非指纹终端上的客户端请求指纹验证(即根据接收到的身份验证指令生成身份验证请求),并告之服务器该设备上欲登录的账号(即将所述身份验证请求发送至与所述终端相连的服务器)。Step 606: The client on the non-fingerprint terminal requests fingerprint verification (that is, generates an identity verification request according to the received identity verification command), and notifies the server of the account to be logged in on the device (ie, sends the identity verification request to the location) Said server connected to the terminal).

步骤608,服务器向该账号对应的指纹终端上的客户端发送指纹验证请求(即服务器根据所述终端的所述身份验证请求,控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息)。Step 608: The server sends a fingerprint verification request to the client on the fingerprint terminal corresponding to the account (that is, the server controls the target terminal with the fingerprint verification function to verify the user received by the target terminal according to the identity verification request of the terminal. Fingerprint information).

步骤610,指纹终端上的客户端向服务器返回指纹验证结果(即服务器接收来自所述目标终端的指纹信息验证结果)。Step 610: The client on the fingerprint terminal returns a fingerprint verification result to the server (that is, the server receives the fingerprint information verification result from the target terminal).

步骤612,服务器向非指纹终端上的客户端返回指纹验证结果(即终端接收来自所述服务器的指纹信息验证结果)。Step 612: The server returns a fingerprint verification result to the client on the non-fingerprint terminal (ie, the terminal receives the fingerprint information verification result from the server).

步骤614,若指纹验证通过,非指纹终端上的客户端登录;否则,提示账号验证失败。Step 614: If the fingerprint verification is passed, the client on the non-fingerprint terminal logs in; otherwise, the account verification fails.

在本实施例中,当用户拥有多台终端时,只要其中一台终端上支持指纹验证,其它终端便可以间接使用其指纹验证功能,在不增加硬件成本的情况下获得指纹级别的安全性。In this embodiment, when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, other terminals can indirectly use their fingerprint verification function to obtain fingerprint level security without increasing hardware costs.

以上结合附图详细说明了本发明的技术方案,实现了在不增加终端硬件成本的条件下为终端进行指纹验证。并且,当用户拥有多台终端时,只要其中一台终端支持指纹验证,即可将此终端作为目标终端,其它终端便 可以间接使用其指纹验证功能进行身份验证,与相关技术相比,不仅提高了身份验证的安全性和可靠性,并且节约了生产成本,从而提升了用户体验。The technical solution of the present invention is described in detail above with reference to the accompanying drawings, and the fingerprint verification is performed for the terminal without increasing the hardware cost of the terminal. Moreover, when the user owns multiple terminals, as long as one of the terminals supports fingerprint verification, the terminal can be used as the target terminal, and other terminals are It can indirectly use its fingerprint verification function for authentication. Compared with related technologies, it not only improves the security and reliability of authentication, but also saves production costs, thereby improving the user experience.

以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。 The above description is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Claims (12)

一种身份验证方法,用于终端,其特征在于,包括:An authentication method for a terminal, comprising: 根据接收到的身份验证指令生成身份验证请求;Generating an authentication request according to the received authentication command; 将所述身份验证请求发送至与所述终端相连的服务器,以供所述服务器根据所述身份验证请求控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息;以及Sending the identity verification request to a server connected to the terminal, for the server to control, according to the identity verification request, a target terminal having a fingerprint verification function to verify user fingerprint information received by the target terminal; 接收来自所述服务器的指纹信息验证结果;Receiving a fingerprint information verification result from the server; 根据所述指纹信息验证结果,确定是否通过身份验证。And determining whether to pass the authentication according to the fingerprint information verification result. 根据权利要求1所述的身份验证方法,其特征在于,所述身份验证请求包括所述终端的身份信息,以供所述服务器根据所述身份信息确定所述终端对应的所述目标终端;或The identity verification method according to claim 1, wherein the identity verification request includes identity information of the terminal, so that the server determines the target terminal corresponding to the terminal according to the identity information; or 所述身份验证请求包括所述终端的位置信息,以供所述服务器根据所述位置信息在所述终端的预定距离范围内为所述终端选择所述目标终端。The identity verification request includes location information of the terminal, for the server to select the target terminal for the terminal within a predetermined distance range of the terminal according to the location information. 一种终端,其特征在于,包括:A terminal, comprising: 请求生成单元,根据接收到的身份验证指令生成身份验证请求;a request generating unit, generating an identity verification request according to the received identity verification instruction; 发送单元,将所述身份验证请求发送至与所述终端相连的服务器,以供所述服务器根据所述身份验证请求控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息;以及The sending unit sends the authentication request to the server connected to the terminal, so that the server controls the target terminal with the fingerprint verification function to verify the user fingerprint information received by the target terminal according to the identity verification request; as well as 接收单元,接收来自所述服务器的指纹信息验证结果;Receiving unit, receiving a fingerprint information verification result from the server; 确定单元,根据所述指纹信息验证结果,确定是否通过身份验证。The determining unit determines whether to pass the identity verification according to the fingerprint information verification result. 根据权利要求3所述的终端,其特征在于,所述身份验证请求包括所述终端的身份信息,以供所述服务器根据所述身份信息确定所述终端对应的所述目标终端;或The terminal according to claim 3, wherein the identity verification request includes identity information of the terminal, so that the server determines the target terminal corresponding to the terminal according to the identity information; or 所述身份验证请求包括所述终端的位置信息,以供所述服务器根据所述位置信息在所述终端的预定距离范围内为所述终端选择所述目标终端。The identity verification request includes location information of the terminal, for the server to select the target terminal for the terminal within a predetermined distance range of the terminal according to the location information. 一种身份验证方法,用于服务器,其特征在于,包括:An authentication method for a server, comprising: 接收与所述服务器相连的终端的身份验证请求;Receiving an authentication request of a terminal connected to the server; 根据所述终端的所述身份验证请求,控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息; Controlling, by the target terminal having the fingerprint verification function, the user fingerprint information received by the target terminal according to the identity verification request of the terminal; 接收来自所述目标终端的指纹信息验证结果;Receiving a fingerprint information verification result from the target terminal; 将所述指纹信息验证结果发送至所述终端,以供所述终端根据所述指纹信息验证结果确定是否通过身份验证。Sending the fingerprint information verification result to the terminal, so that the terminal determines whether to pass the identity verification according to the fingerprint information verification result. 根据权利要求5所述的身份验证方法,其特征在于,所述身份验证请求包括所述终端的身份信息,以及The identity verification method according to claim 5, wherein the identity verification request includes identity information of the terminal, and 在所述控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息之前,还包括:Before the target terminal having the fingerprint verification function is verified to verify the user fingerprint information received by the target terminal, the method further includes: 根据接收到的设置命令,将所述终端的所述身份信息与具有指纹验证功能的任一终端相关联,以供在接收到所述终端的所述身份验证请求,将所述任一终端设置为所述目标终端。And associating the identity information of the terminal with any terminal having a fingerprint verification function according to the received setting command, for setting the any terminal after receiving the identity verification request of the terminal For the target terminal. 根据权利要求5所述的身份验证方法,其特征在于,所述身份验证请求包括所述终端的位置信息,以及The identity verification method according to claim 5, wherein the identity verification request includes location information of the terminal, and 在所述控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息之前,还包括:Before the target terminal having the fingerprint verification function is verified to verify the user fingerprint information received by the target terminal, the method further includes: 确定所述终端的预定距离范围内的至少一个其他终端;Determining at least one other terminal within a predetermined distance range of the terminal; 在所述至少一个其他终端中选择与所述终端的距离最小的终端作为所述目标终端,或根据接收到的选择命令,在所述至少一个其他终端中为所述终端选择所述目标终端。Selecting, as the target terminal, a terminal having the smallest distance from the terminal among the at least one other terminal, or selecting the target terminal for the terminal in the at least one other terminal according to the received selection command. 根据权利要求5至7中任一项所述的身份验证方法,其特征在于,在所述接收与所述服务器相连的终端的身份验证请求之前,还包括:The identity verification method according to any one of claims 5 to 7, further comprising: before the receiving the identity verification request of the terminal connected to the server, 接收来自任一其他终端的所述终端的初始指纹信息;以及Receiving initial fingerprint information of the terminal from any other terminal; 在所述控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息之前,还包括:Before the target terminal having the fingerprint verification function is verified to verify the user fingerprint information received by the target terminal, the method further includes: 将所述终端的所述初始指纹信息发送至已选定的所述目标终端,以供所述目标终端进行指纹验证。Sending the initial fingerprint information of the terminal to the selected target terminal for the target terminal to perform fingerprint verification. 一种服务器,其特征在于,包括:A server, comprising: 第一接收单元,接收与所述服务器相连的终端的身份验证请求;a first receiving unit, configured to receive an identity verification request of a terminal connected to the server; 控制验证单元,根据所述终端的所述身份验证请求,控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息; Controlling, by the control unit, the target terminal having the fingerprint verification function to verify the user fingerprint information received by the target terminal according to the identity verification request of the terminal; 第二接收单元,接收来自所述目标终端的指纹信息验证结果;a second receiving unit, configured to receive a fingerprint information verification result from the target terminal; 第一发送单元,将所述指纹信息验证结果发送至所述终端,以供所述终端根据所述指纹信息验证结果确定是否通过身份验证。The first sending unit sends the fingerprint information verification result to the terminal, so that the terminal determines whether to pass the identity verification according to the fingerprint information verification result. 根据权利要求9所述的服务器,其特征在于,所述身份验证请求包括所述终端的身份信息,以及The server according to claim 9, wherein said identity verification request includes identity information of said terminal, and 所述服务器还包括:The server further includes: 设置单元,在所述控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息之前,根据接收到的设置命令,将所述终端的所述身份信息与具有指纹验证功能的任一终端相关联,以供在接收到所述终端的所述身份验证请求,将所述任一终端设置为所述目标终端。a setting unit, before the target terminal having the fingerprint verification function is verified to verify the user fingerprint information received by the target terminal, according to the received setting command, the identity information of the terminal and the fingerprint verification function are used A terminal is associated for setting the any terminal as the target terminal upon receiving the identity verification request of the terminal. 根据权利要求9所述的服务器,其特征在于,所述身份验证请求包括所述终端的位置信息,以及The server according to claim 9, wherein said identity verification request includes location information of said terminal, and 所述服务器还包括:The server further includes: 确定单元,在所述控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息之前,确定所述终端的预定距离范围内的至少一个其他终端;a determining unit, before the controlling the target terminal having the fingerprint verification function to verify the user fingerprint information received by the target terminal, determining at least one other terminal within a predetermined distance range of the terminal; 选择单元,根据接收到的选择命令,在所述至少一个其他终端中为所述终端选择所述目标终端。And the selecting unit selects the target terminal for the terminal in the at least one other terminal according to the received selection command. 根据权利要求9至11中任一项所述的服务器,其特征在于,还包括:The server according to any one of claims 9 to 11, further comprising: 第三接收单元,在所述接收与所述服务器相连的终端的身份验证请求之前,接收来自任一其他终端的所述终端的初始指纹信息;以及a third receiving unit, before receiving the identity verification request of the terminal connected to the server, receiving initial fingerprint information of the terminal from any other terminal; 第二发送单元,在所述控制具有指纹验证功能的目标终端验证所述目标终端接收到的用户指纹信息之前,将所述终端的所述初始指纹信息发送至已选定的所述目标终端,以供所述目标终端进行指纹验证。 a second sending unit, before the controlling the target terminal having the fingerprint verification function to verify the user fingerprint information received by the target terminal, sending the initial fingerprint information of the terminal to the selected target terminal, For the target terminal to perform fingerprint verification.
PCT/CN2015/095592 2015-08-18 2015-11-26 Identity authentication method, terminal and server Ceased WO2017028390A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510508977.9 2015-08-18
CN201510508977.9A CN105025039B (en) 2015-08-18 2015-08-18 Auth method, terminal and server

Publications (1)

Publication Number Publication Date
WO2017028390A1 true WO2017028390A1 (en) 2017-02-23

Family

ID=54414743

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/095592 Ceased WO2017028390A1 (en) 2015-08-18 2015-11-26 Identity authentication method, terminal and server

Country Status (2)

Country Link
CN (1) CN105025039B (en)
WO (1) WO2017028390A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022022479A1 (en) * 2020-07-30 2022-02-03 华为技术有限公司 Device control method and apparatus
CN114867017A (en) * 2022-03-22 2022-08-05 支付宝(杭州)信息技术有限公司 Identity authentication method, device, equipment and system

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563842A (en) * 2017-08-08 2018-01-09 上海斐讯数据通信技术有限公司 A kind of ticket-booking system and booking method based on fingerprint recognition
CN107862193A (en) * 2017-11-09 2018-03-30 四川研宝科技有限公司 A kind of data interaction system and method based on user's physiological characteristic
CN107770284A (en) * 2017-11-09 2018-03-06 四川研宝科技有限公司 A kind of data interaction system and method based on user's physiological characteristic and geographical position

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1420659A (en) * 2001-10-31 2003-05-28 雅马哈株式会社 Method and apparatus for authenticating and veritying user and computer over network
US20040135801A1 (en) * 2003-01-15 2004-07-15 Thompson Gregory K. Authentication device, system and methods
CN103186769A (en) * 2011-12-31 2013-07-03 大唐电信(天津)通信终端制造有限公司 Method and system for fingerprint verification, and fingerprint collector
CN104640112A (en) * 2013-11-15 2015-05-20 深圳市腾讯计算机系统有限公司 Authentication method, device and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060206723A1 (en) * 2004-12-07 2006-09-14 Gil Youn H Method and system for integrated authentication using biometrics
US20110083018A1 (en) * 2009-10-06 2011-04-07 Validity Sensors, Inc. Secure User Authentication
CN102306286A (en) * 2011-08-24 2012-01-04 宇龙计算机通信科技(深圳)有限公司 Identity recognition method, identity recognition system and identity recognition terminal
CN104182670B (en) * 2013-05-21 2017-12-22 百度在线网络技术(北京)有限公司 The method and Wearable being authenticated by Wearable
CN103634292B (en) * 2013-10-11 2017-05-24 金硕澳门离岸商业服务有限公司 Method and system for communication information transmission

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1420659A (en) * 2001-10-31 2003-05-28 雅马哈株式会社 Method and apparatus for authenticating and veritying user and computer over network
US20040135801A1 (en) * 2003-01-15 2004-07-15 Thompson Gregory K. Authentication device, system and methods
CN103186769A (en) * 2011-12-31 2013-07-03 大唐电信(天津)通信终端制造有限公司 Method and system for fingerprint verification, and fingerprint collector
CN104640112A (en) * 2013-11-15 2015-05-20 深圳市腾讯计算机系统有限公司 Authentication method, device and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022022479A1 (en) * 2020-07-30 2022-02-03 华为技术有限公司 Device control method and apparatus
CN114867017A (en) * 2022-03-22 2022-08-05 支付宝(杭州)信息技术有限公司 Identity authentication method, device, equipment and system

Also Published As

Publication number Publication date
CN105025039B (en) 2018-09-14
CN105025039A (en) 2015-11-04

Similar Documents

Publication Publication Date Title
US12011094B2 (en) Multi-factor authentication with increased security
EP3213487B1 (en) Step-up authentication for single sign-on
CN106462674B (en) Resource access control using authentication tokens
US8955076B1 (en) Controlling access to a protected resource using multiple user devices
CN111093197B (en) Authority authentication method, authority authentication system and computer readable storage medium
US20170279795A1 (en) Secure, automatic second factor user authentication using push services
US20090240947A1 (en) System and method for securely accessing mobile data
KR101451359B1 (en) User account recovery
US10873583B2 (en) Extensible framework for authentication
WO2017028390A1 (en) Identity authentication method, terminal and server
KR101516881B1 (en) User authentication method and apparatus
CN106161392A (en) A kind of auth method and equipment
US7581111B2 (en) System, method and apparatus for transparently granting access to a selected device using an automatically generated credential
CN105827571B (en) Multimodal biometric authentication method and device based on UAF protocol
US10050969B2 (en) Credential-free identification and authentication
CN107241329B (en) Account login processing method and device
US20180232516A1 (en) System of device authentication
US20160294822A1 (en) Proximity based authentication using bluetooth
CN102160354A (en) Server system and method for providing at least one service
US20150013003A1 (en) Verification application, method, electronic device and computer program
CN100583114C (en) System and method for remote security enablement
KR20250099091A (en) Cross authentication method and system between online service server and client
US10354243B2 (en) Authentication method and a server
JP6343928B2 (en) Portable terminal, authentication system, authentication method, and authentication program
CN109428869B (en) Phishing attack defense method and authorization server

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15901594

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15901594

Country of ref document: EP

Kind code of ref document: A1