CN107967417A - Dynamic verification method and correlative computer system - Google Patents
Dynamic verification method and correlative computer system Download PDFInfo
- Publication number
- CN107967417A CN107967417A CN201610910099.8A CN201610910099A CN107967417A CN 107967417 A CN107967417 A CN 107967417A CN 201610910099 A CN201610910099 A CN 201610910099A CN 107967417 A CN107967417 A CN 107967417A
- Authority
- CN
- China
- Prior art keywords
- computer system
- user
- login
- accuracy
- dynamic verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Social Psychology (AREA)
- Health & Medical Sciences (AREA)
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
The present invention provides a kind of dynamic verification method for being used for a computer system, includes when a user logs in the computer system using multiple login methods, according to the quantity of the plurality of login method, determines a validation criteria of the quantity relative to the plurality of login method;And according to the validation criteria, determine whether the user can log in the computer system.
Description
Technical field
The present invention relates to a kind of dynamic verification method and correlative computer system, more particularly to one kind to be dynamically adapted verification mark
Standard is with compromise between security and the dynamic verification method and correlative computer system of convenience.
Background technology
With the progress and development of information technology, it is indispensable in work, life, amusement that computer apparatus has become people
Information products, in order to effectively avoid the information of computer system from being stolen, it is a variety of log in computer systems authentications
Method also produces therewith.For example, many computer systems use biometric information verification method, as identification of fingerprint, face recognition, vocal print are distinguished
Knowledge or iris identification etc., it is safe with the computerized information of this effectively protection user.However, using single verification method, if accidentally
The doubt of security of system will be caused by being cracked.In comparison, according to a variety of verification methods, though it can strengthen protecting computer system
System, improving information safety, but relatively, existing biometric information verification method suffers from hardware design or the user of product
The limitation of formula, user must can just pass through verification, increase answering for login in specific environment or the application method specified
Miscellaneous degree, influences ease of use.
Therefore, how effectively to safeguard the information security of computer system, while taking into account convenience when user uses just
As one of this area important topic.
The content of the invention
Therefore, the main object of the present invention is to provide a kind of dynamic verification method and correlative computer system, is used with being lifted
Person logs in the security of computer system, and balance is obtained between security and convenience.
The present invention provides a kind of dynamic verification method for being used for a computer system, includes when a user is stepped on using multiple
When recording method logs in the computer system, according to the quantity of the plurality of login method, the number relative to the plurality of login method is determined
One validation criteria of amount;And according to the validation criteria, determine whether the user can log in the computer system.
The present invention also provides a kind of computer system, includes a processor;One storage device, stores a program code, should
Program code indicates that the processor performs a dynamic verification method, which includes:When a user is using multiple
When login method logs in the computer system, according to the quantity of the plurality of login method, determine relative to the plurality of login method
One validation criteria of quantity;And according to the validation criteria, determine whether the user can log in the computer system.
Brief description of the drawings
Fig. 1 is the schematic diagram of a computer system of the embodiment of the present invention.
Fig. 2 is the schematic diagram of a dynamic authentication flow of the embodiment of the present invention.
Fig. 3 is the schematic diagram of default flow when Fig. 2 is applied to computer system.
One when Fig. 4 is applied to computer system for Fig. 2 operates the schematic diagram of flow.
Description of reference numerals:
10:Computer system 20:Dynamic authentication flow
30:Default flow 40:Operate flow
102:Processor 104:Storage device
202~208,302~310,402~416:Step
Embodiment
To enable the features described above of the present invention and advantage to become apparent, special embodiment below, and coordinate institute's attached drawing to make
Describe in detail as follows.
Demand of the invention according to user, when using the login method of a variety of biological informations, for example, identification of fingerprint,
Face recognition, sound-groove identification etc., wisdom and standard when dynamically adjusting login authentication, to lift facility when user uses
Property, and take into account the security of computer system.
Fig. 1 is refer to, Fig. 1 is the schematic diagram of a computer system 10 of the embodiment of the present invention.Computer system 10 is included at one
Manage 102 and one storage device 104 of device.104 program storage code of storage device, to indicate that processor 102 carries out related operating.
In order to protect the information security of computer system 10, different login methods can be used to ensure computer system 10 and its interior in user
The security of portion's data.Therefore, when user log in computer system 10 same stage (for example, same system, same program or
Same interface) when, a variety of login methods ability Successful login need to be passed through, for example, using identification of fingerprint and face recognition at the same time.So
And the environment position where the user does not meet system requirements, such as the light is dusky causes face recognition not sentence correctly
It is disconnected, or when finger excessively humidity causes fingerprint identification system not judge correctly, user usually can not be successfully by verification,
Influence the convenience used.Convenience when therefore, in order to lift use, and take into account the safety of 10 inside information of computer system
Property, a kind of dynamic verification method for computer system of present invention offer, the quantity of login method according to used in user,
Validation criteria when dynamic and in time adjustment login, to determine whether user can log in computer system, consequently, it is possible to make
User can log in computer system in a manner of safer and is convenient.
Fig. 2 is refer to, Fig. 2 is the schematic diagram of a dynamic authentication flow 20 of the embodiment of the present invention.Dynamic authentication flow 20
It can be compiled as program code and be stored in storage device 104, to indicate that processor 102 performs respective operations.Dynamic authentication
Flow 20 comprises the steps of:
Step 202:Start.
Step 204:When user logs in computer system 10 using multiple login methods, according to the number of multiple login methods
Amount, determines the validation criteria of the quantity relative to multiple login methods.
Step 206:According to validation criteria, determine whether user can log in computer system 10.
Step 208:Terminate.
According to dynamic authentication flow 20, when user logs in the same stage of computer system 10 using multiple methods, electricity
Brain system 10 uses the Number dynamics of different login methods to determine validation criteria according to user.Then, marked according to verification
Standard determines whether user can log in computer system 10.In other words, it can rely on and make according to dynamic authentication flow 20, computer system 10
User uses the quantity of different login methods, as determining that computer system 10 judges the verification mark whether user can log in
It is accurate.For example, when a kind of biometric information verification method (such as identification of fingerprint), which is used only, in user logs in computer system 10,
Since the protective of single verification method is relatively low, it is however generally that, computer system 10 requires user to use biometric information verification
The accuracy of method need to be up to more than 99% ability Successful login.Alternatively, when user uses two kinds of biometric information verification method (examples
Such as iris identification and sound-groove identification) when logging in computer system 10, due at the same time using the safety of two kinds of biometric information verification methods
Property is higher, and computer system 10 can require the accuracy of two kinds of biometric information verification methods used in user all to reach 90% i.e.
Can Successful login.Or using three kinds of biologic verification methods, (such as identification of fingerprint, face recognition and vocal print are distinguished as user
Know) log in computer system 10 when, then computer system 10 can only need to reach to the accuracy required by three kinds of biologic verification methods
85% can Successful login.In other words, when login method species increase used in user, computer system 10 can dynamic
The accuracy of validation criteria required by reduction.Consequently, it is possible to according to used in user login method quantity, computer system
10 dynamic adjustment validation criterias, the security of 10 inside information of computer system are ensured with this, moreover it is possible to lift the facility of user
Property.
Above-mentioned example only diagrammatically illustrates that the present invention is the number for the login method that computer system 10 is logged according to user
Amount, dynamically adjusts the accuracy that user logs in computer system 10.It is noted that one skilled in the art can root
According to different system requirements, it is suitably designed verification method that the user needed for computer system 10 uses, enables a variety of logins
The mode of method or the validation criteria of login method etc..For judging whether user enables a variety of login methods, for example,
When the same stage of continuous (time interval is less than preset time) the logon attempt computer system 10 of user, computer system 10 can
According in user herein continuous period, the action of multiple login methods is used by user, learns that user enables step on more
Recording method;Alternatively, computer system 10 shows whether prompt message inquiry user enables a variety of login methods.Or by
User voluntarily inputs hot key or a hot key combination, to enable a variety of login methods, and not limited to this.Wherein, preset time can
Decided in its sole discretion by user, computer system 10 is determined or randomly generated.For example, in one embodiment, when user wants to log in
During the operating system of computer system 10, user inputs hot key combination Ctrl+Alt+A to enable a variety of login sides when logging in
Method, then, the quantity of the login method according to used in user of computer system 10, determines the accuracy of method for verifying login.
Or the login method used selected by user is in addition to biometric information verification method, can also use password authentification or
Picture is verified, for example, if user is used as the password (for example, howareyou) during verification, therefore, electricity using english sentence
Brain system 10 can be according to the accuracy of validation criteria, to judge whether the password of user's input meets validation criteria, for example, working as
Former proper password howareyou is entered as howarryou by user, then can determine that the accuracy this time logged in is 89%.Such as
This one, the present invention can utilize user log in computer system 10 when multiple login methods quantity, dynamic and wisdom adjust
Whole user logs in the validation criteria of computer system 10.
The quantity of used multiple login methods when computer system 10 is logged in by user, and according to login method
Quantity, determine the verification accuracy relative to login method quantity.In one embodiment, computer system 10 need to make in user
Used time, validation criteria of the setting corresponding to the quantity of login method, that is to say, that computer system 10 first need to require user to set
The verification accuracy of login method and a minimum accuracy, wherein, if when the login method of time user be not up to it is minimum correct
During rate, computer system 10 can determine whether when time log in it is invalid, without because used in user login method quantity increase, and
Dynamic reduces the accuracy of validation criteria.Fig. 3 is refer to, Fig. 3 is one when dynamic authentication flow 20 is applied to computer system 10
The schematic diagram of default flow 30.The step of default flow 30 includes is as follows:
Step 302:Start
Step 304:Computer system 10 detects the quantity of the device for the biological information login method that user uses.
Step 306:Computer system 10 shows the interface for requiring user to set validation criteria.
Step 308:User sets and stores the accuracy corresponding to multiple login method quantity and minimum accuracy.
Step 310:Terminate.
According to default flow 30, computer system 10 first detects biological information login method used in user
Device quantity (for example, identification of fingerprint machine, face recognition video camera and recording identifier etc.), then, display requires user
Set the interface of validation criteria.In this embodiment, user's setting corresponds to the accuracy of different login method quantity such as
Under:
Table 1:The corresponding accuracy of different login method quantity
Login method quantity | Accuracy |
1 | 99% |
2 | 90% |
3 | 85% |
As shown in table 1, after user's setting and storage system setting, computer system 10 is according to different login method numbers
Amount, determines whether user can log in computer system 10 with different validation criterias.In addition, user separately set it is minimum just
True rate is 60%, to prevent non-user from logging in a variety of login methods malice, attempts to drop to increase the quantity of login method
The accuracy of the low requirement of computer system 10.For example, when user enables computer system 10, computer system 10 first detects electricity
The supported login method quantity of brain, for example, this system can support identification of fingerprint to log in, face recognition logs in and iris identification
Log in totally three kinds of login methods.Then, 10 display interface of computer system requires user's setting to correspond to multiple login method numbers
After the accuracy of amount and minimum accuracy, the step of storing the requirement of user and complete default.
After user completes default flow 30 in computer system 10, Fig. 4 is refer to, Fig. 4 is dynamic authentication flow
The schematic diagram of the 20 operating flow 40 when being applied to computer system 10.Operating flow 40 comprises the steps of:
Step 402:Start.
Step 404:User logs in system, program or the interface of the same stage of computer system 10.
Step 406:Collect login method and its accuracy used in user.
Step 408:Minimum accuracy according to set by default flow 30, confirms when more used in time user
Whether a login method all meets minimum accuracy.
Step 410:Correspond to the accuracy of different login method quantity according to set by default flow 30, confirm to work as
Whether multiple login methods all meet accuracy used in secondary user.
Step 412:If user is not when secondary used multiple login methods meet the accuracy of validation criteria, computer
System 10 reminds user to be logged in using other login methods.
Step 414:If user is when secondary used multiple login methods meet the accuracy of validation criteria, computer system
System 10 allows user to log in.
Step 416:Terminate.
When user's computer system 10 using the present invention, user completes default flow 30, and verification is marked
Accurate accuracy setting is as shown in table 1, and minimum accuracy is 60%, and then, user logs in electricity according to operating flow 40
Brain system 10.Specifically, when user's continuous (time interval is less than 30 seconds) logs in the same stage of computer system 10, if
User is logged in using fingerprinting method, and it is 96% that computer system 10, which records this accuracy, and confirms this login side
The accuracy of method is higher than minimum accuracy (96% set in advance>60%).Since the discrimination power 96% of this identification of fingerprint is small
In the accuracy of validation criteria, (according to a kind of used different login method, the accuracy that dynamic adjusts validation criteria is
99%), therefore, computer system 10 prompts user to be logged in using other kind of verification method.Then, user uses face recognition
Log in, and it is 92% that computer system 10, which records this accuracy, and at this time, the log-on message of user is as shown in table 2:
Table 2:The log-on message of user
Login method | Accuracy |
Identification of fingerprint | 96% |
Face recognition | 92% |
By the log-on message of user, it is pre- that computer system 10 first judges that the face recognition accuracy that user uses is higher than
The minimum accuracy (92% first set>60%), further according to the validation criteria set by user (according to using two kinds of differences
Login method, dynamic adjusts the accuracy of validation criteria as 90%), for judging two kinds of login methods used in user
Whether verification can be passed through.In this embodiment, the accuracy of identification of fingerprint and face recognition is all higher than desired accuracy 90%,
Therefore, computer system 10 allows user to log in.Or when user is continuously with three kinds of login methods (identification of fingerprint, faces
Identification and iris identification) computer system 10 is logged in, and when its accuracy is respectively 96%, 92% and 85%, computer system 10 can
Judge that the accuracy of this login method reaches minimum accuracy 60% according to validation criteria, also, three used in user
Kind login method all meets the accuracy 85% of validation criteria, and therefore, computer system 10 allows user to log in.Consequently, it is possible to
The quantity for the login method that computer system is used according to user, in due course and dynamically adjusts the correct of user's login method
Rate, with the convenience for ensuring the security of computer system inside information and taking into account user.
It is noted that previous embodiment is to illustrate the spirit of the present invention, one skilled in the art works as can
Make appropriate modification according to this, and not limited to this.For example, except validation criteria accuracy can by user's sets itself it
Outside, also it can be decided in its sole discretion or be randomly generated by computer system.Or validation criteria can be fixed according to the use habit of user
The different weight of the various login methods of justice, according to weight and the accuracy of login method as validation criteria.It is in addition, of the invention
The dynamic authentication of computer system is may be not only suitable for, as long as can be used for verifying the system or device that user logs in, is all applicable in
In the present invention.For example, available for household anti-theft system or personal Smartphone.It is consequently, it is possible to provided by the present invention
Dynamic verification method, by due course and dynamically adjusting validation criteria so that system is more humane when in use, and takes into account and be
The inside information of system or the security that protect purpose.
In conclusion the present invention is provided to the dynamic verification method of a computer system, with wisdom can not only adjust in due course
Validation criteria during whole login, lifts the security of computer system, can more take into account the convenience of user.
The foregoing is merely presently preferred embodiments of the present invention, all equivalent changes done according to scope of the present invention patent with
Modification, should all belong to the covering scope of the present invention.
Claims (9)
1. a kind of dynamic verification method for being used for a computer system, includes:
When a user logs in the computer system using multiple login methods, according to the quantity of the plurality of login method, determine
Relative to a validation criteria of the quantity of the plurality of login method;
According to the validation criteria, determine whether the user can log in the computer system.
2. dynamic verification method according to claim 1, it is characterised in that when the user is continuous and time interval is less than
In one preset time, when logging in the same stage of the computer system with different login methods, which judges the user
The computer system is logged in using the plurality of login method.
3. dynamic verification method according to claim 2, it is characterised in that the same stage for logging in the computer system refers to
The user logs in wherein the one of the same system of the computer system, same interface or same program using the plurality of login method
Kind.
4. dynamic verification method according to claim 2, it is characterised in that also show a prompting letter comprising the computer system
Breath, to prompt whether the user enables a variety of login methods.
5. dynamic verification method according to claim 2, it is characterised in that the user with a hot key or hot key combination come
Produce the instruction for enabling a variety of login methods.
6. dynamic verification method according to claim 1, it is characterised in that the validation criteria refers to that the computer system is verified
The accuracy of the plurality of login method.
7. dynamic verification method according to claim 6, it is characterised in that when the plurality of login used in the user
During the quantity increase of method, which reduces the accuracy of the plurality of login method requirement.
8. dynamic verification method according to claim 7, it is characterised in that when the quantity increase of the plurality of login method
When, the accuracy which requires the plurality of login method is higher than a minimum accuracy.
9. dynamic verification method according to claim 1, it is characterised in that the plurality of login method is identification of fingerprint, face
Portion's identification, sound-groove identification, iris identification, the relevant verification mode of biological information, cipher and picture identification are at least within
It is a kind of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610910099.8A CN107967417A (en) | 2016-10-19 | 2016-10-19 | Dynamic verification method and correlative computer system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610910099.8A CN107967417A (en) | 2016-10-19 | 2016-10-19 | Dynamic verification method and correlative computer system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107967417A true CN107967417A (en) | 2018-04-27 |
Family
ID=61996249
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610910099.8A Pending CN107967417A (en) | 2016-10-19 | 2016-10-19 | Dynamic verification method and correlative computer system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107967417A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112685704A (en) * | 2021-02-26 | 2021-04-20 | 吴伟运 | Verification method and terminal for combining multiple kinds of protection into one interface based on electronic equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101872413A (en) * | 2009-04-21 | 2010-10-27 | 宋光宇 | Fingerprint and face integrated identity authentication system |
CN103078863A (en) * | 2013-01-08 | 2013-05-01 | 青岛海信宽带多媒体技术有限公司 | Method, device and system for login authentication |
CN105589643A (en) * | 2015-12-18 | 2016-05-18 | 努比亚技术有限公司 | Mobile terminal unlocking method and mobile terminal |
CN105938526A (en) * | 2016-03-07 | 2016-09-14 | 李明 | Identity authentication method and system |
CN106022085A (en) * | 2016-05-19 | 2016-10-12 | 深圳市金立通信设备有限公司 | Terminal unlocking method and terminal |
-
2016
- 2016-10-19 CN CN201610910099.8A patent/CN107967417A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101872413A (en) * | 2009-04-21 | 2010-10-27 | 宋光宇 | Fingerprint and face integrated identity authentication system |
CN103078863A (en) * | 2013-01-08 | 2013-05-01 | 青岛海信宽带多媒体技术有限公司 | Method, device and system for login authentication |
CN105589643A (en) * | 2015-12-18 | 2016-05-18 | 努比亚技术有限公司 | Mobile terminal unlocking method and mobile terminal |
CN105938526A (en) * | 2016-03-07 | 2016-09-14 | 李明 | Identity authentication method and system |
CN106022085A (en) * | 2016-05-19 | 2016-10-12 | 深圳市金立通信设备有限公司 | Terminal unlocking method and terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112685704A (en) * | 2021-02-26 | 2021-04-20 | 吴伟运 | Verification method and terminal for combining multiple kinds of protection into one interface based on electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10114935B2 (en) | Technologies for login pattern based multi-factor authentication | |
US10635054B2 (en) | Authentication system and method thereof | |
CN104796857B (en) | Location-based security system for portable electronic device | |
US8407762B2 (en) | System for three level authentication of a user | |
WO2017067431A1 (en) | Permission control system and method, computer mouse, and computer system | |
JP4826277B2 (en) | User authentication method, system having user authentication function, apparatus having user authentication function, and computer software | |
US10282531B1 (en) | Quick-logon for computing device | |
US20080104410A1 (en) | Electronic clinical system having two-factor user authentication prior to controlled action and method of use | |
JP6399605B2 (en) | Authentication apparatus, authentication method, and program | |
EP3451216B1 (en) | Multi-functional identification recognition system capable of recognizing the identity of users | |
JP5823651B1 (en) | Authentication system, authentication method, and authentication program | |
JP3589579B2 (en) | Biometric authentication device and recording medium on which processing program is recorded | |
JP2007265219A (en) | Biometrics system | |
JP2012234235A (en) | Biometric authentication system and biometric authentication method | |
WO2016075545A1 (en) | Remote pin entry | |
CN107967417A (en) | Dynamic verification method and correlative computer system | |
AU2011227830B2 (en) | System and method for checking the authenticity of the identity of a person accessing data over a computer network | |
US11934498B2 (en) | Method and system of user identification | |
JP2009031986A (en) | Challenge & response type finger vein authentication system | |
JP2008047051A (en) | False registration prevention device, false registration prevention method, false registration prevention program, computer readable recording medium with false registration prevention program recorded and false registration prevention system | |
JP2011118561A (en) | Personal identification device and personal identification method | |
JP2007054263A (en) | Personal authentication device and method, entering and exiting room managing device and method | |
WO2021157686A1 (en) | Authentication device, authentication method, and recording medium | |
JP2014134986A (en) | Biological authentication method | |
Olzak | Keystroke dynamics: Low impact biometric verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180427 |