CN109255222A - A method of matching and deployment strategy template are gone with multiple-factor authentication - Google Patents

A method of matching and deployment strategy template are gone with multiple-factor authentication Download PDF

Info

Publication number
CN109255222A
CN109255222A CN201810956198.9A CN201810956198A CN109255222A CN 109255222 A CN109255222 A CN 109255222A CN 201810956198 A CN201810956198 A CN 201810956198A CN 109255222 A CN109255222 A CN 109255222A
Authority
CN
China
Prior art keywords
user
factor
information
template
matching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810956198.9A
Other languages
Chinese (zh)
Inventor
陈辉
Original Assignee
Guangzhou Soyea Chang Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Soyea Chang Technology Co Ltd filed Critical Guangzhou Soyea Chang Technology Co Ltd
Priority to CN201810956198.9A priority Critical patent/CN109255222A/en
Publication of CN109255222A publication Critical patent/CN109255222A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of methods for going matching and deployment strategy template with multiple-factor authentication, include the following steps, factored sampling, the information parameter of user is authenticated using double factor or multiple-factor mode, it can also be acquired in conjunction with dynamic password, ensure safety and convenience, agility, user needs to provide minimum two kinds of user information and goes to determine user corresponding matched policy template and resource on the management server, digitlization and matching, minimum two kinds of the user information provided includes and is not limited to following information, user name and password, it can confirm the E-mail address of dynamic password, it can confirm the phone number of dynamic password.The present invention passes through the multiple-factors such as the biological characteristic of user's typing information, customer identification information and individual subscriber, automatic combination Different Strategies template, the demand of different templates passes through backstage quick comparison, efficiency improves, when user logs in, matching way is more, is not to be confirmed by the single factor, safety is higher.

Description

A method of matching and deployment strategy template are gone with multiple-factor authentication
Technical field
The present invention relates to identity identifying technology field more particularly to it is a kind of with multiple-factor authentication go match and dispose plan The slightly method of template.
Background technique
Carrying out rapid deployment to same type user by policy template is in current cloud calculation service using than wide Dispositions method, but policy template be usually user need customize selection or unified distribution, batch operation need administrator and User's keyboard or mouse manual operations, such as existing wechat login step are as follows: 1, netpage registration, 2, acquisition user's wechat ID, 3, user confirms that personal information is collected, 4, system judge with whether registering, 5, normal flow installation respective service program, if touched If requiring the demand of distribution different templates to several templates or different user to same user is to rely on and specify by hand, all need Selection is operated one by one, and shortcoming efficiency also lacks safety.
Summary of the invention
Technical problems based on background technology go matching and portion with multiple-factor authentication the invention proposes a kind of The method for affixing one's name to policy template.
A kind of method for going matching and deployment strategy template with multiple-factor authentication proposed by the present invention, including following step It is rapid:
S1: factored sampling: the information parameter of user is authenticated using double factor or multiple-factor mode, can also be close in conjunction with dynamic Code acquisition, it is ensured that safety and convenience, agility, user need to provide minimum two kinds of user information and go to determine that user is managing Corresponding matched policy template and resource on server;
S2: digitlization and matching: minimum two kinds of the user information of offer includes and is not limited to following information: 1, user Name and password, 2, can confirm the E-mail address of dynamic password, 3, can confirm the phone number of dynamic password, 4, certifiable micro- The corresponding customer identification information of instant messaging tools, 5, the biological characteristic of individual subscriber, such as the fingerprints, people such as letter, QQ, nail nail Face, sound, cheilogramma or iris feature etc.;
S3: authentication is identified and is adapted to: after acquiring and authenticating to each factor information of user, digital finger-print is formed, according to all Member, which table look-up, matches known digital finger-print, in order to determine compatible policy template in system;
S4: determine policy template: same user utilizes different combinations of factors, even if such as different user communication use The fingerprint of some finger of name in an account book and user, is identified as different ID in management server system, to facilitate same user to establish Different policy template;
S5: it login authentication: after installation client, shows the login service page, is logged in by multiple-factor, matching generates Client configuration file, server domain name or IP, port on probation and configuration strategy are shown or are sent under client in window Figure is carried, into process.
Preferably, user name and password in the multiple-factor acquisition in the S2, can confirm the E-mail address of dynamic password, can Confirm the corresponding customer identification informations of instant messaging tools such as phone number and certifiable wechat, QQ, the nail nail of dynamic password Memory is manually entered by user, the physical characteristics collecting of individual subscriber needs equipment to carry out cooperation typing into information bank.
Preferably, the equipment of the physical characteristics collecting of the individual subscriber include fingerprint capturer, three-dimensional face Acquisition Instrument, Sound collector and iris image acquiring device, and fingerprint capturer is used for typing fingerprint and cheilogramma, three-dimensional face Acquisition Instrument is used for Typing face characteristic, sound collector are used for typing sound characteristic, and iris image acquiring device is used for typing iris of both eyes feature.
Preferably, the combinations of factors scheme in the S4 is optionally combined for two in multiple factors to N number of factor, tactful mould The quantity of plate and the quantity of assembled scheme are adapted.
Having the beneficial effect that through typing user name and password in the present invention, can confirm the E-mail address of dynamic password, can Confirm dynamic password phone number, certifiable wechat, QQ, nail nail etc. the corresponding customer identification information of instant messaging tools and The multiple-factors such as the biological characteristic of individual subscriber combine different policy template automatically, and the demand of different templates is to pass through backstage It quickly compares, it is not to confirm that safety is more by the single factor that efficiency, which improves, and when user logs in, matching way is more It is high.
Detailed description of the invention
Fig. 1 is a kind of authentication matching stream for going matching with deployment strategy template with multiple-factor authentication proposed by the present invention Cheng Tu;
Fig. 2 is a kind of multiple-factor identity that matching and deployment strategy template are gone with multiple-factor authentication proposed by the present invention The double factor of certification determines template flow chart.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Referring to Fig.1, a method of going matching and deployment strategy template with multiple-factor authentication, comprising the following steps:
S1: factored sampling: the information parameter of user is authenticated using double factor or multiple-factor mode, can also be close in conjunction with dynamic Code acquisition, it is ensured that safety and convenience, agility, user need to provide minimum two kinds of user information and go to determine that user is managing Corresponding matched policy template and resource on server;
S2: digitlization and matching: minimum two kinds of the user information of offer includes and is not limited to following information: 1, user Name and password, 2, can confirm the E-mail address of dynamic password, 3, can confirm the phone number of dynamic password, 4, certifiable micro- The corresponding customer identification information of instant messaging tools, 5, the biological characteristic of individual subscriber, such as the fingerprints, people such as letter, QQ, nail nail Face, sound, cheilogramma or iris feature etc.;
S3: authentication is identified and is adapted to: after acquiring and authenticating to each factor information of user, digital finger-print is formed, according to all Member, which table look-up, matches known digital finger-print, in order to determine compatible policy template in system;
S4: determine policy template: same user utilizes different combinations of factors, even if such as different user communication use The fingerprint of some finger of name in an account book and user, is identified as different ID in management server system, to facilitate same user to establish Different policy template;
S5: it login authentication: after installation client, shows the login service page, is logged in by multiple-factor, matching generates Client configuration file, server domain name or IP, port on probation and configuration strategy are shown or are sent under client in window Figure is carried, into process.
In this method, user name and password in the multiple-factor acquisition in S2 can confirm the E-mail address of dynamic password, can be true It is equal to recognize the corresponding customer identification informations of instant messaging tools such as phone number and certifiable wechat, QQ, the nail nail of dynamic password It is manually entered memory by user, the physical characteristics collecting of individual subscriber needs equipment to carry out cooperation typing into information bank, uses The equipment of the physical characteristics collecting of family individual includes fingerprint capturer, three-dimensional face Acquisition Instrument, sound collector and iris image Collector, and fingerprint capturer is used for typing fingerprint and cheilogramma, three-dimensional face Acquisition Instrument is used for typing face characteristic, sound collection Device is used for typing sound characteristic, and iris image acquiring device is used for typing iris of both eyes feature, and the combinations of factors scheme in S4 is more Two in a factor are optionally combined to N number of factor, and the quantity of policy template and the quantity of assembled scheme are adapted.
It is a kind of to go matching and the double factor of the method for deployment strategy template to determine mould with multiple-factor authentication referring to Fig. 2 Plate process, comprising the following steps:
1, wechat user picks up and the verifying of mobile phone dynamic key, wechat user picked up through User ID adaptation, mobile phone winter Key authentication passes through digitlization and matching;
2, user is matched, successfully identifies that digital information is verified and is digital finger-print, there is corresponding ID in database, it is unsuccessful Or there is no directly terminate;
3, corresponding template in adaptation terminates double factor and determines process.
A kind of method for going matching and deployment strategy template with multiple-factor authentication is matched with wechat ID realization printenv Set register flow path, comprising the following steps:
1, netpage registration;
2, user's wechat ID is obtained;
3, user confirms that personal information is collected;
4, whether system judges with registering;
5, normal flow installs respective service program.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (4)

1. a kind of method for going matching and deployment strategy template with multiple-factor authentication, which comprises the following steps:
S1: factored sampling: the information parameter of user is authenticated using double factor or multiple-factor mode, can also be adopted in conjunction with dynamic password Collection, it is ensured that safety and convenience, agility, user need to provide minimum two kinds of user information and go to determine user in management service Corresponding matched policy template and resource on device;
S2: digitlization and matching: minimum two kinds of the user information of offer includes and is not limited to following information: 1, user name and Password, 2, can confirm the E-mail address of dynamic password, 3, can confirm the phone number of dynamic password, 4, certifiable wechat, QQ, The corresponding customer identification informations of instant messaging tools such as nail nail, 5, the biological characteristic of individual subscriber, such as fingerprint, face, sound, Cheilogramma or iris feature etc.;
S3: authentication identify simultaneously be adapted to: after acquiring and authenticating to each factor information of user, formed digital finger-print, according to the set of data into Row, which is tabled look-up, matches known digital finger-print, in order to determine compatible policy template in system;
S4: determine policy template: same user utilizes different combinations of factors, even if such as different user communication user name With the fingerprint of user some finger, different ID is identified as in management server system, it is different to facilitate same user to establish Policy template;
S5: it login authentication: after installation client, shows the login service page, is logged in by multiple-factor, match the visitor of generation Family end configuration file, server domain name or IP, port on probation and configuration strategy, show or send client downloads in window Figure, into process.
2. a kind of method for going matching and deployment strategy template with multiple-factor authentication according to claim 1, special Sign is, in the multiple-factor acquisition in the S2 user name and
Password can confirm the E-mail address of dynamic password, can confirm dynamic password phone number and certifiable wechat, QQ, The corresponding customer identification informations of instant messaging tools such as nail nail pass through user and are manually entered memory, the biological characteristic of individual subscriber Acquisition needs equipment to carry out cooperation typing into information bank.
3. a kind of method for going matching and deployment strategy template with multiple-factor authentication according to claim 2, special Sign is that the equipment of the physical characteristics collecting of the individual subscriber includes fingerprint capturer, three-dimensional face Acquisition Instrument, sound collection Device and iris image acquiring device, and fingerprint capturer is used for typing fingerprint and cheilogramma, three-dimensional face Acquisition Instrument is used for typing face Feature, sound collector are used for typing sound characteristic, and iris image acquiring device is used for typing iris of both eyes feature.
4. a kind of method for going matching and deployment strategy template with multiple-factor authentication according to claim 1, special Sign is that the combinations of factors scheme in the S4 is optionally combined for two in multiple factors to N number of factor, the quantity of policy template It is adapted with the quantity of assembled scheme.
CN201810956198.9A 2018-08-21 2018-08-21 A method of matching and deployment strategy template are gone with multiple-factor authentication Pending CN109255222A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810956198.9A CN109255222A (en) 2018-08-21 2018-08-21 A method of matching and deployment strategy template are gone with multiple-factor authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810956198.9A CN109255222A (en) 2018-08-21 2018-08-21 A method of matching and deployment strategy template are gone with multiple-factor authentication

Publications (1)

Publication Number Publication Date
CN109255222A true CN109255222A (en) 2019-01-22

Family

ID=65049573

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810956198.9A Pending CN109255222A (en) 2018-08-21 2018-08-21 A method of matching and deployment strategy template are gone with multiple-factor authentication

Country Status (1)

Country Link
CN (1) CN109255222A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109840494A (en) * 2019-01-28 2019-06-04 北京得意音通技术有限责任公司 Identity identifying method, device, computer program, storage medium and electronic equipment
CN110502886A (en) * 2019-08-16 2019-11-26 广州国音智能科技有限公司 Multifactor authentication method, apparatus, terminal and computer storage medium
CN112100611A (en) * 2020-08-14 2020-12-18 广州江南科友科技股份有限公司 Password generation method and device, storage medium and computer equipment
CN112738043A (en) * 2020-12-22 2021-04-30 北京八分量信息科技有限公司 Method, system and related product for carrying out legality authentication on user identity in big data system
US11005837B2 (en) * 2019-06-06 2021-05-11 Capital One Services, Llc Utilizing natural language processing to automatically perform multi-factor authentication

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102135800A (en) * 2011-03-25 2011-07-27 中兴通讯股份有限公司 Electronic equipment and function control method thereof
CN103227721A (en) * 2013-03-28 2013-07-31 金硕澳门离岸商业服务有限公司 System and method for starting application
CN103678981A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for realizing different interfaces for different users

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102135800A (en) * 2011-03-25 2011-07-27 中兴通讯股份有限公司 Electronic equipment and function control method thereof
CN103227721A (en) * 2013-03-28 2013-07-31 金硕澳门离岸商业服务有限公司 System and method for starting application
CN103678981A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for realizing different interfaces for different users

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109840494A (en) * 2019-01-28 2019-06-04 北京得意音通技术有限责任公司 Identity identifying method, device, computer program, storage medium and electronic equipment
US11005837B2 (en) * 2019-06-06 2021-05-11 Capital One Services, Llc Utilizing natural language processing to automatically perform multi-factor authentication
US11755830B2 (en) 2019-06-06 2023-09-12 Capital One Services, Llc Utilizing natural language processing to automatically perform multi-factor authentication
CN110502886A (en) * 2019-08-16 2019-11-26 广州国音智能科技有限公司 Multifactor authentication method, apparatus, terminal and computer storage medium
CN112100611A (en) * 2020-08-14 2020-12-18 广州江南科友科技股份有限公司 Password generation method and device, storage medium and computer equipment
CN112738043A (en) * 2020-12-22 2021-04-30 北京八分量信息科技有限公司 Method, system and related product for carrying out legality authentication on user identity in big data system
CN112738043B (en) * 2020-12-22 2023-06-27 北京八分量信息科技有限公司 Method, system and related products for legality authentication of user identity in big data system

Similar Documents

Publication Publication Date Title
CN109255222A (en) A method of matching and deployment strategy template are gone with multiple-factor authentication
CN109120597B (en) Identity verification and login method and device and computer equipment
WO2020236651A8 (en) Identity verification and management system
CN108961475B (en) Access control deployment method and access control deployment server
US7773779B2 (en) Biometric systems
CN104935440B (en) The long-range authentication method and authenticating device for setting up finance account
CN107800725A (en) A kind of digital certificate remote online managing device and method
JP2005129032A5 (en)
CN105117633B (en) Recognition of face Windows system logins verify system
CN101174948A (en) Network login system and method with face authentication
CN103036680A (en) Realm name certification system and method based on biological feature recognition
CN105164689A (en) User authentication
CN107256387A (en) Fingerprint verification method, system and computer-readable recording medium
CN104378211A (en) Identity authentication method and device
JP2003256376A (en) Biological authentication method with guarantee of security and device for offering authentication service
WO2008157095A1 (en) Multiple user authentications on a communications device
CN109547503A (en) Biological feather recognition method
KR20070038308A (en) Cable-wireless device having multiple biometrical information and biometrical system and method using the same
CN109587123A (en) Double factor verification method and certificate server, biometric authentication service device
CN103841107A (en) Method and device for identity authentication of security gateway administrator
CN107615299B (en) For assessing the method and system of fingerprint template
CN105262747A (en) Polymorphic terminal identity verification system and method based on biological characteristic recognition
KR20190079746A (en) Method, server and mobile device for token-based attendance management using pattern code
CN103544014A (en) B/S based real estate registration management system fingerprint entry and authentication verification method
CN104392321B (en) A kind of biological authentification system of power scheduling graphic operation ticket, power scheduling operation ticket system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220329

Address after: 510000 Room 401, No. 6, Beijing South Road, Yuexiu District, Guangzhou, Guangdong

Applicant after: Chen Hui

Address before: 510000 509, building 1, No. 202, Wanbo Second Road, Nancun Town, Panyu District, Guangzhou City, Guangdong Province

Applicant before: GUANGZHOU SHUYUANCHANGLIAN SCIENCE AND TECHNOLOGY Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190122