CN105490987A - Network integration identity authentication method - Google Patents

Network integration identity authentication method Download PDF

Info

Publication number
CN105490987A
CN105490987A CN201410476616.6A CN201410476616A CN105490987A CN 105490987 A CN105490987 A CN 105490987A CN 201410476616 A CN201410476616 A CN 201410476616A CN 105490987 A CN105490987 A CN 105490987A
Authority
CN
China
Prior art keywords
user
identity
input
application
successful
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410476616.6A
Other languages
Chinese (zh)
Inventor
蒋斐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Wei Dun Network Technology Co Ltd
Original Assignee
Jiangsu Wei Dun Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Wei Dun Network Technology Co Ltd filed Critical Jiangsu Wei Dun Network Technology Co Ltd
Priority to CN201410476616.6A priority Critical patent/CN105490987A/en
Publication of CN105490987A publication Critical patent/CN105490987A/en
Pending legal-status Critical Current

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a network integration identity authentication method. The network integration identity authentication method is characterized by including the following steps that: a network application program adds four types of identity information (position, fingerprint, face and command) in a user account security, and adding the information into a corresponding identity database; a user accesses an application, the application gathers a user IP address or GPS information, and then it can be determined whether the user is at a preset position or not, e.g., the user is at home or at a workplace; if the user is at the preset position, an account command is input to authenticate identity, if authentication is not successful, access is denied, if authentication is successful, a fingerprint is scanned to authenticate identity after the account command is input, and if the authentication is successful, the login is successful; if the user is not at the preset position, the application determines whether the user is at a close position, e.g., the user is at a common area such as the same city or the same province; if the user is at the close position, the account command is input, and then the fingerprint is scanned to authenticate identity, if the user is not at the close position, the account command is input, and then face verification is performed, if the verification is successful, the login is successful, and if the verification is not successful, access is denied. The network integration identity authentication method can shield most of illegal login and ensure user information security in a manner that security classification is based on territory distance.

Description

A kind of network synthesis identity identifying method
Technical field
The present invention relates to a kind of network synthesis identity identifying method.
Background technology
Recent years often there is the big and small leakage of a state or party secret in the Internet, mobile phone more and more becomes the important communication tool of society hospitality, the means of being undertaken attacking by network also emerge in an endless stream, in the recent period, the esbablished corporations such as apple produce a lot of information leakage event, expose current authentication system safe not.
Therefore, prior art needs to be improved.
Summary of the invention
The present invention, in order to solve the deficiencies in the prior art, provides a kind of network synthesis identity identifying method, solves the problem that in prior art, network ID authentication system is safe not.
For solving the problems of the technologies described above, a kind of network synthesis identity identifying method that the embodiment of the present invention provides, adopts following technical scheme:
A kind of network synthesis identity identifying method, is characterized in that, comprise the steps:
S1: web application increases position, fingerprint, face, password four identity informations in user account safety, and add in corresponding identity database;
S2: user's access application, IP address or GPS information are collected in application, judge whether thus at desired location, such as family or job site;
S3: in this way, then input account number password authentication, do not pass through, then denied access, pass through, then scanning fingerprint certification again after input account number password, as passed through, then logs in successfully;
S4: as no, then application judges whether in close positions, as the conventional area such as city or same province;
S5: in this way, then input scanning fingerprint certification again after account number password, as no, then input after account number password finger print identifying face verification again, as passed through, then logging in successfully, as do not passed through, then and denied access.
Particularly, described method is a kind of take geographical position as the method that standard divides safe class.
Particularly, described application raises along with safe class, and authentication mode also increases thereupon.
Particularly, described geographical position judges also can adopt mobile network.
A kind of network synthesis identity identifying method provided by the invention, by the mode being safety status classification with region distance, can shield and mostly illegally to log in, ensure user information safety.
Accompanying drawing explanation
Fig. 1 is the step schematic diagram of a kind of network synthesis identity identifying method described in the embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the network synthesis identity identifying method that the embodiment of the present invention is supplied to is described in detail.
As shown in Figure 1, a kind of network synthesis identity identifying method that the embodiment of the present invention provides, is characterized in that, comprise the steps:
S1: web application increases position, fingerprint, face, password four identity informations in user account safety, and add in corresponding identity database;
S2: user's access application, IP address or GPS information are collected in application, judge whether thus at desired location, such as family or job site;
S3: in this way, then input account number password authentication, do not pass through, then denied access, pass through, then scanning fingerprint certification again after input account number password, as passed through, then logs in successfully;
S4: as no, then application judges whether in close positions, as the conventional area such as city or same province;
S5: in this way, then input scanning fingerprint certification again after account number password, as no, then input after account number password finger print identifying face verification again, as passed through, then logging in successfully, as do not passed through, then and denied access.
Particularly, described method is a kind of take geographical position as the method that standard divides safe class.
Particularly, described application raises along with safe class, and authentication mode also increases thereupon.
Particularly, described geographical position judges also can adopt mobile network.
A kind of network synthesis identity identifying method provided by the invention, by the mode being safety status classification with region distance, can shield and mostly illegally to log in, ensure user information safety.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with the protection range of claim.

Claims (4)

1. a network synthesis identity identifying method, is characterized in that, comprises the steps:
S1: web application increases position, fingerprint, face, password four identity informations in user account safety, and add in corresponding identity database;
S2: user's access application, IP address or GPS information are collected in application, judge whether thus at desired location, such as family or job site;
S3: in this way, then input account number password authentication, do not pass through, then denied access, pass through, then scanning fingerprint certification again after input account number password, as passed through, then logs in successfully;
S4: as no, then application judges whether in close positions, as the conventional area such as city or same province;
S5: in this way, then input scanning fingerprint certification again after account number password, as no, then input after account number password finger print identifying face verification again, as passed through, then logging in successfully, as do not passed through, then and denied access.
2. network synthesis identity identifying method according to claim 1, is characterized in that, described method is a kind of take geographical position as the method that standard divides safe class.
3. network synthesis identity identifying method according to claim 1, is characterized in that, described application raises along with safe class, and authentication mode also increases thereupon.
4. network synthesis identity identifying method according to claim 1, is characterized in that, described geographical position judges also can adopt mobile network.
CN201410476616.6A 2014-09-18 2014-09-18 Network integration identity authentication method Pending CN105490987A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410476616.6A CN105490987A (en) 2014-09-18 2014-09-18 Network integration identity authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410476616.6A CN105490987A (en) 2014-09-18 2014-09-18 Network integration identity authentication method

Publications (1)

Publication Number Publication Date
CN105490987A true CN105490987A (en) 2016-04-13

Family

ID=55677710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410476616.6A Pending CN105490987A (en) 2014-09-18 2014-09-18 Network integration identity authentication method

Country Status (1)

Country Link
CN (1) CN105490987A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959317A (en) * 2016-07-11 2016-09-21 深圳市金立通信设备有限公司 Security authentication method and terminal
CN106060034A (en) * 2016-05-27 2016-10-26 深圳市永兴元科技有限公司 Account login method and device
CN107580001A (en) * 2017-10-20 2018-01-12 珠海市魅族科技有限公司 Using login and authentication information method to set up, device, computer installation and storage medium
CN108021803A (en) * 2016-10-31 2018-05-11 黄策 The management method of protection account logon information is divided by space-time
CN109274683A (en) * 2018-10-30 2019-01-25 国网安徽省电力有限公司信息通信分公司 A kind of combined crosswise Verification System and its authentication method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1856782A (en) * 2003-09-25 2006-11-01 索尔玛泽株式会社 The method of safe certification service
CN101321068A (en) * 2008-07-23 2008-12-10 北京握奇数据系统有限公司 Method and apparatus for implementing dual-identity authentication
CN103383216A (en) * 2012-12-31 2013-11-06 于净 Bullet cabinet and identity identifying method for bullet cabinet user
WO2014104507A1 (en) * 2012-12-27 2014-07-03 주식회사 로웸 System and method for secure login, and apparatus for same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1856782A (en) * 2003-09-25 2006-11-01 索尔玛泽株式会社 The method of safe certification service
CN101321068A (en) * 2008-07-23 2008-12-10 北京握奇数据系统有限公司 Method and apparatus for implementing dual-identity authentication
WO2014104507A1 (en) * 2012-12-27 2014-07-03 주식회사 로웸 System and method for secure login, and apparatus for same
CN103383216A (en) * 2012-12-31 2013-11-06 于净 Bullet cabinet and identity identifying method for bullet cabinet user

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106060034A (en) * 2016-05-27 2016-10-26 深圳市永兴元科技有限公司 Account login method and device
CN105959317A (en) * 2016-07-11 2016-09-21 深圳市金立通信设备有限公司 Security authentication method and terminal
CN108021803A (en) * 2016-10-31 2018-05-11 黄策 The management method of protection account logon information is divided by space-time
CN107580001A (en) * 2017-10-20 2018-01-12 珠海市魅族科技有限公司 Using login and authentication information method to set up, device, computer installation and storage medium
CN107580001B (en) * 2017-10-20 2021-04-13 珠海市魅族科技有限公司 Application login and authentication information setting method and device, computer device and storage medium
CN109274683A (en) * 2018-10-30 2019-01-25 国网安徽省电力有限公司信息通信分公司 A kind of combined crosswise Verification System and its authentication method

Similar Documents

Publication Publication Date Title
US20180054460A1 (en) Techniques to provide network security through just-in-time provisioned accounts
CN105490987A (en) Network integration identity authentication method
CN104202338B (en) A kind of safety access method being applicable to enterprise-level Mobile solution
ATE454000T1 (en) AUTHENTICATION PROCEDURE
WO2005096701A3 (en) System and method for enabling authorization of a network device using attribute certificates
CN103795731A (en) User account login method
TW201405459A (en) Method, client, server and system of login verification
WO2007127485A3 (en) Providing guest users access to network resources through an enterprise network
CN106161348B (en) Single sign-on method, system and terminal
CN106778138A (en) The control method and device of software license limit
EP3374852A1 (en) Authorized areas of authentication
CN106488453A (en) A kind of method and system of portal certification
CN104519479A (en) Methods for terminal to lock net and unlock net
WO2012108661A3 (en) System and method for security authentication of a bi-directional subscriber on a communication network, and recording medium on which the method is recorded
CN103780584A (en) Cloud computing-based identity authentication fusion method
CN110677415A (en) Network information safety protection system
CN109672695A (en) A kind of double factor identity identifying method and device
CN103020505A (en) Information management system and information management method based on fingerprint identification
CN103428698B (en) Mobile interchange participant's identity strong authentication method
CN102413146A (en) Client authorized logon method based on dynamic codes
CN104270754B (en) A kind of Subscriber Identity Module method for authenticating and device
Sahd et al. Mobile technology risk management
CN104902480A (en) Smartphone WIFI grading management method
CN106203016B (en) A kind of terminal processing method and equipment
CN105656936A (en) Data encryption and storage method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160413

WD01 Invention patent application deemed withdrawn after publication