CN109255222A - A method of matching and deployment strategy template are gone with multiple-factor authentication - Google Patents
A method of matching and deployment strategy template are gone with multiple-factor authentication Download PDFInfo
- Publication number
- CN109255222A CN109255222A CN201810956198.9A CN201810956198A CN109255222A CN 109255222 A CN109255222 A CN 109255222A CN 201810956198 A CN201810956198 A CN 201810956198A CN 109255222 A CN109255222 A CN 109255222A
- Authority
- CN
- China
- Prior art keywords
- user
- factor
- information
- template
- matching
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of methods for going matching and deployment strategy template with multiple-factor authentication, include the following steps, factored sampling, the information parameter of user is authenticated using double factor or multiple-factor mode, it can also be acquired in conjunction with dynamic password, ensure safety and convenience, agility, user needs to provide minimum two kinds of user information and goes to determine user corresponding matched policy template and resource on the management server, digitlization and matching, minimum two kinds of the user information provided includes and is not limited to following information, user name and password, it can confirm the E-mail address of dynamic password, it can confirm the phone number of dynamic password.The present invention passes through the multiple-factors such as the biological characteristic of user's typing information, customer identification information and individual subscriber, automatic combination Different Strategies template, the demand of different templates passes through backstage quick comparison, efficiency improves, when user logs in, matching way is more, is not to be confirmed by the single factor, safety is higher.
Description
Technical field
The present invention relates to identity identifying technology field more particularly to it is a kind of with multiple-factor authentication go match and dispose plan
The slightly method of template.
Background technique
Carrying out rapid deployment to same type user by policy template is in current cloud calculation service using than wide
Dispositions method, but policy template be usually user need customize selection or unified distribution, batch operation need administrator and
User's keyboard or mouse manual operations, such as existing wechat login step are as follows: 1, netpage registration, 2, acquisition user's wechat ID,
3, user confirms that personal information is collected, 4, system judge with whether registering, 5, normal flow installation respective service program, if touched
If requiring the demand of distribution different templates to several templates or different user to same user is to rely on and specify by hand, all need
Selection is operated one by one, and shortcoming efficiency also lacks safety.
Summary of the invention
Technical problems based on background technology go matching and portion with multiple-factor authentication the invention proposes a kind of
The method for affixing one's name to policy template.
A kind of method for going matching and deployment strategy template with multiple-factor authentication proposed by the present invention, including following step
It is rapid:
S1: factored sampling: the information parameter of user is authenticated using double factor or multiple-factor mode, can also be close in conjunction with dynamic
Code acquisition, it is ensured that safety and convenience, agility, user need to provide minimum two kinds of user information and go to determine that user is managing
Corresponding matched policy template and resource on server;
S2: digitlization and matching: minimum two kinds of the user information of offer includes and is not limited to following information: 1, user
Name and password, 2, can confirm the E-mail address of dynamic password, 3, can confirm the phone number of dynamic password, 4, certifiable micro-
The corresponding customer identification information of instant messaging tools, 5, the biological characteristic of individual subscriber, such as the fingerprints, people such as letter, QQ, nail nail
Face, sound, cheilogramma or iris feature etc.;
S3: authentication is identified and is adapted to: after acquiring and authenticating to each factor information of user, digital finger-print is formed, according to all
Member, which table look-up, matches known digital finger-print, in order to determine compatible policy template in system;
S4: determine policy template: same user utilizes different combinations of factors, even if such as different user communication use
The fingerprint of some finger of name in an account book and user, is identified as different ID in management server system, to facilitate same user to establish
Different policy template;
S5: it login authentication: after installation client, shows the login service page, is logged in by multiple-factor, matching generates
Client configuration file, server domain name or IP, port on probation and configuration strategy are shown or are sent under client in window
Figure is carried, into process.
Preferably, user name and password in the multiple-factor acquisition in the S2, can confirm the E-mail address of dynamic password, can
Confirm the corresponding customer identification informations of instant messaging tools such as phone number and certifiable wechat, QQ, the nail nail of dynamic password
Memory is manually entered by user, the physical characteristics collecting of individual subscriber needs equipment to carry out cooperation typing into information bank.
Preferably, the equipment of the physical characteristics collecting of the individual subscriber include fingerprint capturer, three-dimensional face Acquisition Instrument,
Sound collector and iris image acquiring device, and fingerprint capturer is used for typing fingerprint and cheilogramma, three-dimensional face Acquisition Instrument is used for
Typing face characteristic, sound collector are used for typing sound characteristic, and iris image acquiring device is used for typing iris of both eyes feature.
Preferably, the combinations of factors scheme in the S4 is optionally combined for two in multiple factors to N number of factor, tactful mould
The quantity of plate and the quantity of assembled scheme are adapted.
Having the beneficial effect that through typing user name and password in the present invention, can confirm the E-mail address of dynamic password, can
Confirm dynamic password phone number, certifiable wechat, QQ, nail nail etc. the corresponding customer identification information of instant messaging tools and
The multiple-factors such as the biological characteristic of individual subscriber combine different policy template automatically, and the demand of different templates is to pass through backstage
It quickly compares, it is not to confirm that safety is more by the single factor that efficiency, which improves, and when user logs in, matching way is more
It is high.
Detailed description of the invention
Fig. 1 is a kind of authentication matching stream for going matching with deployment strategy template with multiple-factor authentication proposed by the present invention
Cheng Tu;
Fig. 2 is a kind of multiple-factor identity that matching and deployment strategy template are gone with multiple-factor authentication proposed by the present invention
The double factor of certification determines template flow chart.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Referring to Fig.1, a method of going matching and deployment strategy template with multiple-factor authentication, comprising the following steps:
S1: factored sampling: the information parameter of user is authenticated using double factor or multiple-factor mode, can also be close in conjunction with dynamic
Code acquisition, it is ensured that safety and convenience, agility, user need to provide minimum two kinds of user information and go to determine that user is managing
Corresponding matched policy template and resource on server;
S2: digitlization and matching: minimum two kinds of the user information of offer includes and is not limited to following information: 1, user
Name and password, 2, can confirm the E-mail address of dynamic password, 3, can confirm the phone number of dynamic password, 4, certifiable micro-
The corresponding customer identification information of instant messaging tools, 5, the biological characteristic of individual subscriber, such as the fingerprints, people such as letter, QQ, nail nail
Face, sound, cheilogramma or iris feature etc.;
S3: authentication is identified and is adapted to: after acquiring and authenticating to each factor information of user, digital finger-print is formed, according to all
Member, which table look-up, matches known digital finger-print, in order to determine compatible policy template in system;
S4: determine policy template: same user utilizes different combinations of factors, even if such as different user communication use
The fingerprint of some finger of name in an account book and user, is identified as different ID in management server system, to facilitate same user to establish
Different policy template;
S5: it login authentication: after installation client, shows the login service page, is logged in by multiple-factor, matching generates
Client configuration file, server domain name or IP, port on probation and configuration strategy are shown or are sent under client in window
Figure is carried, into process.
In this method, user name and password in the multiple-factor acquisition in S2 can confirm the E-mail address of dynamic password, can be true
It is equal to recognize the corresponding customer identification informations of instant messaging tools such as phone number and certifiable wechat, QQ, the nail nail of dynamic password
It is manually entered memory by user, the physical characteristics collecting of individual subscriber needs equipment to carry out cooperation typing into information bank, uses
The equipment of the physical characteristics collecting of family individual includes fingerprint capturer, three-dimensional face Acquisition Instrument, sound collector and iris image
Collector, and fingerprint capturer is used for typing fingerprint and cheilogramma, three-dimensional face Acquisition Instrument is used for typing face characteristic, sound collection
Device is used for typing sound characteristic, and iris image acquiring device is used for typing iris of both eyes feature, and the combinations of factors scheme in S4 is more
Two in a factor are optionally combined to N number of factor, and the quantity of policy template and the quantity of assembled scheme are adapted.
It is a kind of to go matching and the double factor of the method for deployment strategy template to determine mould with multiple-factor authentication referring to Fig. 2
Plate process, comprising the following steps:
1, wechat user picks up and the verifying of mobile phone dynamic key, wechat user picked up through User ID adaptation, mobile phone winter
Key authentication passes through digitlization and matching;
2, user is matched, successfully identifies that digital information is verified and is digital finger-print, there is corresponding ID in database, it is unsuccessful
Or there is no directly terminate;
3, corresponding template in adaptation terminates double factor and determines process.
A kind of method for going matching and deployment strategy template with multiple-factor authentication is matched with wechat ID realization printenv
Set register flow path, comprising the following steps:
1, netpage registration;
2, user's wechat ID is obtained;
3, user confirms that personal information is collected;
4, whether system judges with registering;
5, normal flow installs respective service program.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (4)
1. a kind of method for going matching and deployment strategy template with multiple-factor authentication, which comprises the following steps:
S1: factored sampling: the information parameter of user is authenticated using double factor or multiple-factor mode, can also be adopted in conjunction with dynamic password
Collection, it is ensured that safety and convenience, agility, user need to provide minimum two kinds of user information and go to determine user in management service
Corresponding matched policy template and resource on device;
S2: digitlization and matching: minimum two kinds of the user information of offer includes and is not limited to following information: 1, user name and
Password, 2, can confirm the E-mail address of dynamic password, 3, can confirm the phone number of dynamic password, 4, certifiable wechat, QQ,
The corresponding customer identification informations of instant messaging tools such as nail nail, 5, the biological characteristic of individual subscriber, such as fingerprint, face, sound,
Cheilogramma or iris feature etc.;
S3: authentication identify simultaneously be adapted to: after acquiring and authenticating to each factor information of user, formed digital finger-print, according to the set of data into
Row, which is tabled look-up, matches known digital finger-print, in order to determine compatible policy template in system;
S4: determine policy template: same user utilizes different combinations of factors, even if such as different user communication user name
With the fingerprint of user some finger, different ID is identified as in management server system, it is different to facilitate same user to establish
Policy template;
S5: it login authentication: after installation client, shows the login service page, is logged in by multiple-factor, match the visitor of generation
Family end configuration file, server domain name or IP, port on probation and configuration strategy, show or send client downloads in window
Figure, into process.
2. a kind of method for going matching and deployment strategy template with multiple-factor authentication according to claim 1, special
Sign is, in the multiple-factor acquisition in the S2 user name and
Password can confirm the E-mail address of dynamic password, can confirm dynamic password phone number and certifiable wechat, QQ,
The corresponding customer identification informations of instant messaging tools such as nail nail pass through user and are manually entered memory, the biological characteristic of individual subscriber
Acquisition needs equipment to carry out cooperation typing into information bank.
3. a kind of method for going matching and deployment strategy template with multiple-factor authentication according to claim 2, special
Sign is that the equipment of the physical characteristics collecting of the individual subscriber includes fingerprint capturer, three-dimensional face Acquisition Instrument, sound collection
Device and iris image acquiring device, and fingerprint capturer is used for typing fingerprint and cheilogramma, three-dimensional face Acquisition Instrument is used for typing face
Feature, sound collector are used for typing sound characteristic, and iris image acquiring device is used for typing iris of both eyes feature.
4. a kind of method for going matching and deployment strategy template with multiple-factor authentication according to claim 1, special
Sign is that the combinations of factors scheme in the S4 is optionally combined for two in multiple factors to N number of factor, the quantity of policy template
It is adapted with the quantity of assembled scheme.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810956198.9A CN109255222A (en) | 2018-08-21 | 2018-08-21 | A method of matching and deployment strategy template are gone with multiple-factor authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810956198.9A CN109255222A (en) | 2018-08-21 | 2018-08-21 | A method of matching and deployment strategy template are gone with multiple-factor authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109255222A true CN109255222A (en) | 2019-01-22 |
Family
ID=65049573
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810956198.9A Pending CN109255222A (en) | 2018-08-21 | 2018-08-21 | A method of matching and deployment strategy template are gone with multiple-factor authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109255222A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109840494A (en) * | 2019-01-28 | 2019-06-04 | 北京得意音通技术有限责任公司 | Identity identifying method, device, computer program, storage medium and electronic equipment |
CN110502886A (en) * | 2019-08-16 | 2019-11-26 | 广州国音智能科技有限公司 | Multifactor authentication method, apparatus, terminal and computer storage medium |
CN112100611A (en) * | 2020-08-14 | 2020-12-18 | 广州江南科友科技股份有限公司 | Password generation method and device, storage medium and computer equipment |
CN112738043A (en) * | 2020-12-22 | 2021-04-30 | 北京八分量信息科技有限公司 | Method, system and related product for carrying out legality authentication on user identity in big data system |
US11005837B2 (en) * | 2019-06-06 | 2021-05-11 | Capital One Services, Llc | Utilizing natural language processing to automatically perform multi-factor authentication |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102135800A (en) * | 2011-03-25 | 2011-07-27 | 中兴通讯股份有限公司 | Electronic equipment and function control method thereof |
CN103227721A (en) * | 2013-03-28 | 2013-07-31 | 金硕澳门离岸商业服务有限公司 | System and method for starting application |
CN103678981A (en) * | 2013-12-06 | 2014-03-26 | 北京奇虎科技有限公司 | Method and device for realizing different interfaces for different users |
-
2018
- 2018-08-21 CN CN201810956198.9A patent/CN109255222A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102135800A (en) * | 2011-03-25 | 2011-07-27 | 中兴通讯股份有限公司 | Electronic equipment and function control method thereof |
CN103227721A (en) * | 2013-03-28 | 2013-07-31 | 金硕澳门离岸商业服务有限公司 | System and method for starting application |
CN103678981A (en) * | 2013-12-06 | 2014-03-26 | 北京奇虎科技有限公司 | Method and device for realizing different interfaces for different users |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109840494A (en) * | 2019-01-28 | 2019-06-04 | 北京得意音通技术有限责任公司 | Identity identifying method, device, computer program, storage medium and electronic equipment |
US11005837B2 (en) * | 2019-06-06 | 2021-05-11 | Capital One Services, Llc | Utilizing natural language processing to automatically perform multi-factor authentication |
US11755830B2 (en) | 2019-06-06 | 2023-09-12 | Capital One Services, Llc | Utilizing natural language processing to automatically perform multi-factor authentication |
CN110502886A (en) * | 2019-08-16 | 2019-11-26 | 广州国音智能科技有限公司 | Multifactor authentication method, apparatus, terminal and computer storage medium |
CN112100611A (en) * | 2020-08-14 | 2020-12-18 | 广州江南科友科技股份有限公司 | Password generation method and device, storage medium and computer equipment |
CN112738043A (en) * | 2020-12-22 | 2021-04-30 | 北京八分量信息科技有限公司 | Method, system and related product for carrying out legality authentication on user identity in big data system |
CN112738043B (en) * | 2020-12-22 | 2023-06-27 | 北京八分量信息科技有限公司 | Method, system and related products for legality authentication of user identity in big data system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109255222A (en) | A method of matching and deployment strategy template are gone with multiple-factor authentication | |
CN109120597B (en) | Identity verification and login method and device and computer equipment | |
WO2020236651A8 (en) | Identity verification and management system | |
CN108961475B (en) | Access control deployment method and access control deployment server | |
US7773779B2 (en) | Biometric systems | |
CN104935440B (en) | The long-range authentication method and authenticating device for setting up finance account | |
CN107800725A (en) | A kind of digital certificate remote online managing device and method | |
JP2005129032A5 (en) | ||
CN105117633B (en) | Recognition of face Windows system logins verify system | |
CN101174948A (en) | Network login system and method with face authentication | |
CN103036680A (en) | Realm name certification system and method based on biological feature recognition | |
CN105164689A (en) | User authentication | |
CN107256387A (en) | Fingerprint verification method, system and computer-readable recording medium | |
CN104378211A (en) | Identity authentication method and device | |
JP2003256376A (en) | Biological authentication method with guarantee of security and device for offering authentication service | |
WO2008157095A1 (en) | Multiple user authentications on a communications device | |
CN109547503A (en) | Biological feather recognition method | |
KR20070038308A (en) | Cable-wireless device having multiple biometrical information and biometrical system and method using the same | |
CN109587123A (en) | Double factor verification method and certificate server, biometric authentication service device | |
CN103841107A (en) | Method and device for identity authentication of security gateway administrator | |
CN107615299B (en) | For assessing the method and system of fingerprint template | |
CN105262747A (en) | Polymorphic terminal identity verification system and method based on biological characteristic recognition | |
KR20190079746A (en) | Method, server and mobile device for token-based attendance management using pattern code | |
CN103544014A (en) | B/S based real estate registration management system fingerprint entry and authentication verification method | |
CN104392321B (en) | A kind of biological authentification system of power scheduling graphic operation ticket, power scheduling operation ticket system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220329 Address after: 510000 Room 401, No. 6, Beijing South Road, Yuexiu District, Guangzhou, Guangdong Applicant after: Chen Hui Address before: 510000 509, building 1, No. 202, Wanbo Second Road, Nancun Town, Panyu District, Guangzhou City, Guangdong Province Applicant before: GUANGZHOU SHUYUANCHANGLIAN SCIENCE AND TECHNOLOGY Co.,Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190122 |