CN107967417A - Dynamic verification method and correlative computer system - Google Patents

Dynamic verification method and correlative computer system Download PDF

Info

Publication number
CN107967417A
CN107967417A CN201610910099.8A CN201610910099A CN107967417A CN 107967417 A CN107967417 A CN 107967417A CN 201610910099 A CN201610910099 A CN 201610910099A CN 107967417 A CN107967417 A CN 107967417A
Authority
CN
China
Prior art keywords
computer system
user
login
accuracy
dynamic verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610910099.8A
Other languages
Chinese (zh)
Inventor
廖彦盛
曹凌帆
廖述群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Acer Inc
Original Assignee
Acer Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Acer Inc filed Critical Acer Inc
Priority to CN201610910099.8A priority Critical patent/CN107967417A/en
Publication of CN107967417A publication Critical patent/CN107967417A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The present invention provides a kind of dynamic verification method for being used for a computer system, includes when a user logs in the computer system using multiple login methods, according to the quantity of the plurality of login method, determines a validation criteria of the quantity relative to the plurality of login method;And according to the validation criteria, determine whether the user can log in the computer system.

Description

Dynamic verification method and correlative computer system
Technical field
The present invention relates to a kind of dynamic verification method and correlative computer system, more particularly to one kind to be dynamically adapted verification mark Standard is with compromise between security and the dynamic verification method and correlative computer system of convenience.
Background technology
With the progress and development of information technology, it is indispensable in work, life, amusement that computer apparatus has become people Information products, in order to effectively avoid the information of computer system from being stolen, it is a variety of log in computer systems authentications Method also produces therewith.For example, many computer systems use biometric information verification method, as identification of fingerprint, face recognition, vocal print are distinguished Knowledge or iris identification etc., it is safe with the computerized information of this effectively protection user.However, using single verification method, if accidentally The doubt of security of system will be caused by being cracked.In comparison, according to a variety of verification methods, though it can strengthen protecting computer system System, improving information safety, but relatively, existing biometric information verification method suffers from hardware design or the user of product The limitation of formula, user must can just pass through verification, increase answering for login in specific environment or the application method specified Miscellaneous degree, influences ease of use.
Therefore, how effectively to safeguard the information security of computer system, while taking into account convenience when user uses just As one of this area important topic.
The content of the invention
Therefore, the main object of the present invention is to provide a kind of dynamic verification method and correlative computer system, is used with being lifted Person logs in the security of computer system, and balance is obtained between security and convenience.
The present invention provides a kind of dynamic verification method for being used for a computer system, includes when a user is stepped on using multiple When recording method logs in the computer system, according to the quantity of the plurality of login method, the number relative to the plurality of login method is determined One validation criteria of amount;And according to the validation criteria, determine whether the user can log in the computer system.
The present invention also provides a kind of computer system, includes a processor;One storage device, stores a program code, should Program code indicates that the processor performs a dynamic verification method, which includes:When a user is using multiple When login method logs in the computer system, according to the quantity of the plurality of login method, determine relative to the plurality of login method One validation criteria of quantity;And according to the validation criteria, determine whether the user can log in the computer system.
Brief description of the drawings
Fig. 1 is the schematic diagram of a computer system of the embodiment of the present invention.
Fig. 2 is the schematic diagram of a dynamic authentication flow of the embodiment of the present invention.
Fig. 3 is the schematic diagram of default flow when Fig. 2 is applied to computer system.
One when Fig. 4 is applied to computer system for Fig. 2 operates the schematic diagram of flow.
Description of reference numerals:
10:Computer system 20:Dynamic authentication flow
30:Default flow 40:Operate flow
102:Processor 104:Storage device
202~208,302~310,402~416:Step
Embodiment
To enable the features described above of the present invention and advantage to become apparent, special embodiment below, and coordinate institute's attached drawing to make Describe in detail as follows.
Demand of the invention according to user, when using the login method of a variety of biological informations, for example, identification of fingerprint, Face recognition, sound-groove identification etc., wisdom and standard when dynamically adjusting login authentication, to lift facility when user uses Property, and take into account the security of computer system.
Fig. 1 is refer to, Fig. 1 is the schematic diagram of a computer system 10 of the embodiment of the present invention.Computer system 10 is included at one Manage 102 and one storage device 104 of device.104 program storage code of storage device, to indicate that processor 102 carries out related operating. In order to protect the information security of computer system 10, different login methods can be used to ensure computer system 10 and its interior in user The security of portion's data.Therefore, when user log in computer system 10 same stage (for example, same system, same program or Same interface) when, a variety of login methods ability Successful login need to be passed through, for example, using identification of fingerprint and face recognition at the same time.So And the environment position where the user does not meet system requirements, such as the light is dusky causes face recognition not sentence correctly It is disconnected, or when finger excessively humidity causes fingerprint identification system not judge correctly, user usually can not be successfully by verification, Influence the convenience used.Convenience when therefore, in order to lift use, and take into account the safety of 10 inside information of computer system Property, a kind of dynamic verification method for computer system of present invention offer, the quantity of login method according to used in user, Validation criteria when dynamic and in time adjustment login, to determine whether user can log in computer system, consequently, it is possible to make User can log in computer system in a manner of safer and is convenient.
Fig. 2 is refer to, Fig. 2 is the schematic diagram of a dynamic authentication flow 20 of the embodiment of the present invention.Dynamic authentication flow 20 It can be compiled as program code and be stored in storage device 104, to indicate that processor 102 performs respective operations.Dynamic authentication Flow 20 comprises the steps of:
Step 202:Start.
Step 204:When user logs in computer system 10 using multiple login methods, according to the number of multiple login methods Amount, determines the validation criteria of the quantity relative to multiple login methods.
Step 206:According to validation criteria, determine whether user can log in computer system 10.
Step 208:Terminate.
According to dynamic authentication flow 20, when user logs in the same stage of computer system 10 using multiple methods, electricity Brain system 10 uses the Number dynamics of different login methods to determine validation criteria according to user.Then, marked according to verification Standard determines whether user can log in computer system 10.In other words, it can rely on and make according to dynamic authentication flow 20, computer system 10 User uses the quantity of different login methods, as determining that computer system 10 judges the verification mark whether user can log in It is accurate.For example, when a kind of biometric information verification method (such as identification of fingerprint), which is used only, in user logs in computer system 10, Since the protective of single verification method is relatively low, it is however generally that, computer system 10 requires user to use biometric information verification The accuracy of method need to be up to more than 99% ability Successful login.Alternatively, when user uses two kinds of biometric information verification method (examples Such as iris identification and sound-groove identification) when logging in computer system 10, due at the same time using the safety of two kinds of biometric information verification methods Property is higher, and computer system 10 can require the accuracy of two kinds of biometric information verification methods used in user all to reach 90% i.e. Can Successful login.Or using three kinds of biologic verification methods, (such as identification of fingerprint, face recognition and vocal print are distinguished as user Know) log in computer system 10 when, then computer system 10 can only need to reach to the accuracy required by three kinds of biologic verification methods 85% can Successful login.In other words, when login method species increase used in user, computer system 10 can dynamic The accuracy of validation criteria required by reduction.Consequently, it is possible to according to used in user login method quantity, computer system 10 dynamic adjustment validation criterias, the security of 10 inside information of computer system are ensured with this, moreover it is possible to lift the facility of user Property.
Above-mentioned example only diagrammatically illustrates that the present invention is the number for the login method that computer system 10 is logged according to user Amount, dynamically adjusts the accuracy that user logs in computer system 10.It is noted that one skilled in the art can root According to different system requirements, it is suitably designed verification method that the user needed for computer system 10 uses, enables a variety of logins The mode of method or the validation criteria of login method etc..For judging whether user enables a variety of login methods, for example, When the same stage of continuous (time interval is less than preset time) the logon attempt computer system 10 of user, computer system 10 can According in user herein continuous period, the action of multiple login methods is used by user, learns that user enables step on more Recording method;Alternatively, computer system 10 shows whether prompt message inquiry user enables a variety of login methods.Or by User voluntarily inputs hot key or a hot key combination, to enable a variety of login methods, and not limited to this.Wherein, preset time can Decided in its sole discretion by user, computer system 10 is determined or randomly generated.For example, in one embodiment, when user wants to log in During the operating system of computer system 10, user inputs hot key combination Ctrl+Alt+A to enable a variety of login sides when logging in Method, then, the quantity of the login method according to used in user of computer system 10, determines the accuracy of method for verifying login. Or the login method used selected by user is in addition to biometric information verification method, can also use password authentification or Picture is verified, for example, if user is used as the password (for example, howareyou) during verification, therefore, electricity using english sentence Brain system 10 can be according to the accuracy of validation criteria, to judge whether the password of user's input meets validation criteria, for example, working as Former proper password howareyou is entered as howarryou by user, then can determine that the accuracy this time logged in is 89%.Such as This one, the present invention can utilize user log in computer system 10 when multiple login methods quantity, dynamic and wisdom adjust Whole user logs in the validation criteria of computer system 10.
The quantity of used multiple login methods when computer system 10 is logged in by user, and according to login method Quantity, determine the verification accuracy relative to login method quantity.In one embodiment, computer system 10 need to make in user Used time, validation criteria of the setting corresponding to the quantity of login method, that is to say, that computer system 10 first need to require user to set The verification accuracy of login method and a minimum accuracy, wherein, if when the login method of time user be not up to it is minimum correct During rate, computer system 10 can determine whether when time log in it is invalid, without because used in user login method quantity increase, and Dynamic reduces the accuracy of validation criteria.Fig. 3 is refer to, Fig. 3 is one when dynamic authentication flow 20 is applied to computer system 10 The schematic diagram of default flow 30.The step of default flow 30 includes is as follows:
Step 302:Start
Step 304:Computer system 10 detects the quantity of the device for the biological information login method that user uses.
Step 306:Computer system 10 shows the interface for requiring user to set validation criteria.
Step 308:User sets and stores the accuracy corresponding to multiple login method quantity and minimum accuracy.
Step 310:Terminate.
According to default flow 30, computer system 10 first detects biological information login method used in user Device quantity (for example, identification of fingerprint machine, face recognition video camera and recording identifier etc.), then, display requires user Set the interface of validation criteria.In this embodiment, user's setting corresponds to the accuracy of different login method quantity such as Under:
Table 1:The corresponding accuracy of different login method quantity
Login method quantity Accuracy
1 99%
2 90%
3 85%
As shown in table 1, after user's setting and storage system setting, computer system 10 is according to different login method numbers Amount, determines whether user can log in computer system 10 with different validation criterias.In addition, user separately set it is minimum just True rate is 60%, to prevent non-user from logging in a variety of login methods malice, attempts to drop to increase the quantity of login method The accuracy of the low requirement of computer system 10.For example, when user enables computer system 10, computer system 10 first detects electricity The supported login method quantity of brain, for example, this system can support identification of fingerprint to log in, face recognition logs in and iris identification Log in totally three kinds of login methods.Then, 10 display interface of computer system requires user's setting to correspond to multiple login method numbers After the accuracy of amount and minimum accuracy, the step of storing the requirement of user and complete default.
After user completes default flow 30 in computer system 10, Fig. 4 is refer to, Fig. 4 is dynamic authentication flow The schematic diagram of the 20 operating flow 40 when being applied to computer system 10.Operating flow 40 comprises the steps of:
Step 402:Start.
Step 404:User logs in system, program or the interface of the same stage of computer system 10.
Step 406:Collect login method and its accuracy used in user.
Step 408:Minimum accuracy according to set by default flow 30, confirms when more used in time user Whether a login method all meets minimum accuracy.
Step 410:Correspond to the accuracy of different login method quantity according to set by default flow 30, confirm to work as Whether multiple login methods all meet accuracy used in secondary user.
Step 412:If user is not when secondary used multiple login methods meet the accuracy of validation criteria, computer System 10 reminds user to be logged in using other login methods.
Step 414:If user is when secondary used multiple login methods meet the accuracy of validation criteria, computer system System 10 allows user to log in.
Step 416:Terminate.
When user's computer system 10 using the present invention, user completes default flow 30, and verification is marked Accurate accuracy setting is as shown in table 1, and minimum accuracy is 60%, and then, user logs in electricity according to operating flow 40 Brain system 10.Specifically, when user's continuous (time interval is less than 30 seconds) logs in the same stage of computer system 10, if User is logged in using fingerprinting method, and it is 96% that computer system 10, which records this accuracy, and confirms this login side The accuracy of method is higher than minimum accuracy (96% set in advance>60%).Since the discrimination power 96% of this identification of fingerprint is small In the accuracy of validation criteria, (according to a kind of used different login method, the accuracy that dynamic adjusts validation criteria is 99%), therefore, computer system 10 prompts user to be logged in using other kind of verification method.Then, user uses face recognition Log in, and it is 92% that computer system 10, which records this accuracy, and at this time, the log-on message of user is as shown in table 2:
Table 2:The log-on message of user
Login method Accuracy
Identification of fingerprint 96%
Face recognition 92%
By the log-on message of user, it is pre- that computer system 10 first judges that the face recognition accuracy that user uses is higher than The minimum accuracy (92% first set>60%), further according to the validation criteria set by user (according to using two kinds of differences Login method, dynamic adjusts the accuracy of validation criteria as 90%), for judging two kinds of login methods used in user Whether verification can be passed through.In this embodiment, the accuracy of identification of fingerprint and face recognition is all higher than desired accuracy 90%, Therefore, computer system 10 allows user to log in.Or when user is continuously with three kinds of login methods (identification of fingerprint, faces Identification and iris identification) computer system 10 is logged in, and when its accuracy is respectively 96%, 92% and 85%, computer system 10 can Judge that the accuracy of this login method reaches minimum accuracy 60% according to validation criteria, also, three used in user Kind login method all meets the accuracy 85% of validation criteria, and therefore, computer system 10 allows user to log in.Consequently, it is possible to The quantity for the login method that computer system is used according to user, in due course and dynamically adjusts the correct of user's login method Rate, with the convenience for ensuring the security of computer system inside information and taking into account user.
It is noted that previous embodiment is to illustrate the spirit of the present invention, one skilled in the art works as can Make appropriate modification according to this, and not limited to this.For example, except validation criteria accuracy can by user's sets itself it Outside, also it can be decided in its sole discretion or be randomly generated by computer system.Or validation criteria can be fixed according to the use habit of user The different weight of the various login methods of justice, according to weight and the accuracy of login method as validation criteria.It is in addition, of the invention The dynamic authentication of computer system is may be not only suitable for, as long as can be used for verifying the system or device that user logs in, is all applicable in In the present invention.For example, available for household anti-theft system or personal Smartphone.It is consequently, it is possible to provided by the present invention Dynamic verification method, by due course and dynamically adjusting validation criteria so that system is more humane when in use, and takes into account and be The inside information of system or the security that protect purpose.
In conclusion the present invention is provided to the dynamic verification method of a computer system, with wisdom can not only adjust in due course Validation criteria during whole login, lifts the security of computer system, can more take into account the convenience of user.
The foregoing is merely presently preferred embodiments of the present invention, all equivalent changes done according to scope of the present invention patent with Modification, should all belong to the covering scope of the present invention.

Claims (9)

1. a kind of dynamic verification method for being used for a computer system, includes:
When a user logs in the computer system using multiple login methods, according to the quantity of the plurality of login method, determine Relative to a validation criteria of the quantity of the plurality of login method;
According to the validation criteria, determine whether the user can log in the computer system.
2. dynamic verification method according to claim 1, it is characterised in that when the user is continuous and time interval is less than In one preset time, when logging in the same stage of the computer system with different login methods, which judges the user The computer system is logged in using the plurality of login method.
3. dynamic verification method according to claim 2, it is characterised in that the same stage for logging in the computer system refers to The user logs in wherein the one of the same system of the computer system, same interface or same program using the plurality of login method Kind.
4. dynamic verification method according to claim 2, it is characterised in that also show a prompting letter comprising the computer system Breath, to prompt whether the user enables a variety of login methods.
5. dynamic verification method according to claim 2, it is characterised in that the user with a hot key or hot key combination come Produce the instruction for enabling a variety of login methods.
6. dynamic verification method according to claim 1, it is characterised in that the validation criteria refers to that the computer system is verified The accuracy of the plurality of login method.
7. dynamic verification method according to claim 6, it is characterised in that when the plurality of login used in the user During the quantity increase of method, which reduces the accuracy of the plurality of login method requirement.
8. dynamic verification method according to claim 7, it is characterised in that when the quantity increase of the plurality of login method When, the accuracy which requires the plurality of login method is higher than a minimum accuracy.
9. dynamic verification method according to claim 1, it is characterised in that the plurality of login method is identification of fingerprint, face Portion's identification, sound-groove identification, iris identification, the relevant verification mode of biological information, cipher and picture identification are at least within It is a kind of.
CN201610910099.8A 2016-10-19 2016-10-19 Dynamic verification method and correlative computer system Pending CN107967417A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610910099.8A CN107967417A (en) 2016-10-19 2016-10-19 Dynamic verification method and correlative computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610910099.8A CN107967417A (en) 2016-10-19 2016-10-19 Dynamic verification method and correlative computer system

Publications (1)

Publication Number Publication Date
CN107967417A true CN107967417A (en) 2018-04-27

Family

ID=61996249

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610910099.8A Pending CN107967417A (en) 2016-10-19 2016-10-19 Dynamic verification method and correlative computer system

Country Status (1)

Country Link
CN (1) CN107967417A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112685704A (en) * 2021-02-26 2021-04-20 吴伟运 Verification method and terminal for combining multiple kinds of protection into one interface based on electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101872413A (en) * 2009-04-21 2010-10-27 宋光宇 Fingerprint and face integrated identity authentication system
CN103078863A (en) * 2013-01-08 2013-05-01 青岛海信宽带多媒体技术有限公司 Method, device and system for login authentication
CN105589643A (en) * 2015-12-18 2016-05-18 努比亚技术有限公司 Mobile terminal unlocking method and mobile terminal
CN105938526A (en) * 2016-03-07 2016-09-14 李明 Identity authentication method and system
CN106022085A (en) * 2016-05-19 2016-10-12 深圳市金立通信设备有限公司 Terminal unlocking method and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101872413A (en) * 2009-04-21 2010-10-27 宋光宇 Fingerprint and face integrated identity authentication system
CN103078863A (en) * 2013-01-08 2013-05-01 青岛海信宽带多媒体技术有限公司 Method, device and system for login authentication
CN105589643A (en) * 2015-12-18 2016-05-18 努比亚技术有限公司 Mobile terminal unlocking method and mobile terminal
CN105938526A (en) * 2016-03-07 2016-09-14 李明 Identity authentication method and system
CN106022085A (en) * 2016-05-19 2016-10-12 深圳市金立通信设备有限公司 Terminal unlocking method and terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112685704A (en) * 2021-02-26 2021-04-20 吴伟运 Verification method and terminal for combining multiple kinds of protection into one interface based on electronic equipment

Similar Documents

Publication Publication Date Title
US10114935B2 (en) Technologies for login pattern based multi-factor authentication
US10635054B2 (en) Authentication system and method thereof
CN104796857B (en) Location-based security system for portable electronic device
US8407762B2 (en) System for three level authentication of a user
WO2017067431A1 (en) Permission control system and method, computer mouse, and computer system
JP4826277B2 (en) User authentication method, system having user authentication function, apparatus having user authentication function, and computer software
US10282531B1 (en) Quick-logon for computing device
US20080104410A1 (en) Electronic clinical system having two-factor user authentication prior to controlled action and method of use
JP6399605B2 (en) Authentication apparatus, authentication method, and program
EP3451216B1 (en) Multi-functional identification recognition system capable of recognizing the identity of users
JP5823651B1 (en) Authentication system, authentication method, and authentication program
JP3589579B2 (en) Biometric authentication device and recording medium on which processing program is recorded
JP2007265219A (en) Biometrics system
JP2012234235A (en) Biometric authentication system and biometric authentication method
WO2016075545A1 (en) Remote pin entry
CN107967417A (en) Dynamic verification method and correlative computer system
AU2011227830B2 (en) System and method for checking the authenticity of the identity of a person accessing data over a computer network
US11934498B2 (en) Method and system of user identification
JP2009031986A (en) Challenge & response type finger vein authentication system
JP2008047051A (en) False registration prevention device, false registration prevention method, false registration prevention program, computer readable recording medium with false registration prevention program recorded and false registration prevention system
JP2011118561A (en) Personal identification device and personal identification method
JP2007054263A (en) Personal authentication device and method, entering and exiting room managing device and method
WO2021157686A1 (en) Authentication device, authentication method, and recording medium
JP2014134986A (en) Biological authentication method
Olzak Keystroke dynamics: Low impact biometric verification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180427