CN109933966A - Continuous authentication method and system based on biological characteristics - Google Patents
Continuous authentication method and system based on biological characteristics Download PDFInfo
- Publication number
- CN109933966A CN109933966A CN201910189552.4A CN201910189552A CN109933966A CN 109933966 A CN109933966 A CN 109933966A CN 201910189552 A CN201910189552 A CN 201910189552A CN 109933966 A CN109933966 A CN 109933966A
- Authority
- CN
- China
- Prior art keywords
- user
- finger print
- information
- print information
- facial
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
The invention discloses a continuous authentication method and a system based on biological characteristics. The method comprises the following steps: A. collecting fingerprint information of a user through a fingerprint collector on a mouse every other first preset time; B. when the fingerprint information of the user is not collected, collecting the face information of the user through a face collector at intervals of second preset time; C. and locking the computer when the collected fingerprint information is invalid fingerprint information or no collected face information or the collected face information is invalid face information. The continuous authentication is carried out through a comprehensive authentication mode combining fingerprint authentication as a main mode and fingerprint authentication and face authentication, and the computer is locked after the authentication fails, so that the security can be realized, and the user privacy and the data security can be protected.
Description
Technical field
The present invention relates to identity identifying technology field more particularly to a kind of lasting authentication methods based on biological characteristic
And its system.
Background technique
In the prior art, current certificate scheme mostly uses greatly an authentication mode, no longer to user after authentication authorization and accounting success
Identity is verified, and can bring safety problem in this way: if user midway is of short duration, computer may be used by others' when leaving,
To the secret that is stolen.In the relatively high occasion of some confidentiality requirements, such as MISSILE LAUNCHING center, computer peace is protected at any time
It is complete particularly important, there can be security risk.Meanwhile existing authentication techniques generally require user's active certification, in use process
In it is more inconvenient.Continue convenient and fast safeguard protection to provide for user using computer.
Therefore, the existing technology needs to be improved and developed.
Summary of the invention
The technical problem to be solved in the present invention is that in view of the above drawbacks of the prior art, providing a kind of special based on biology
The lasting authentication method and its system of sign, it is intended to solve to cause computer security low using an authentication mode in the prior art
The problem of.
The technical proposal for solving the technical problem of the invention is as follows:
A kind of lasting authentication method based on biological characteristic, wherein include the following steps:
A, every the first preset time, the finger print information of user is acquired by the fingerprint capturer on mouse;
B, it when not collecting the finger print information of user, every the second preset time, is acquired and is used by facial collector
Family facial information;
C, when the finger print information of acquisition is invalid finger print information or the facial information for not collecting facial information or acquisition
When for invalid facial information, computer is locked.
The lasting authentication method based on biological characteristic, wherein the step B is specifically included:
B1, when the finger print information of acquisition be effective finger print information when, judge whether computer is in the lock state;
B2, when computer lock timing, unlock and continue acquire user finger print information, when computer does not lock
When, judge whether the finger print information of user changes;
B3, when user finger print information variation when, switch to new user and continue acquire user finger print information.
The lasting authentication method based on biological characteristic, wherein the step C is specifically included:
C1, when the facial information of acquisition be effective finger print information when, judge whether the facial information of user changes;
C2, when the facial information of user does not change, continue the facial information for acquiring user, and continue to acquire user
Finger print information;
C3, when user facial information variation when, switch to new user and continue acquire user facial information, and continue
Acquire the finger print information of user;
C4, when the finger print information of acquisition be effective finger print information when, stop acquisition user facial information and continue to acquire
The finger print information of user.
The lasting authentication method based on biological characteristic, wherein it is further comprised the steps of:
D, when computer lock timing, the finger print information of user is acquired, when the finger print information of user is invalid finger print information,
Starting alarm device sounds an alarm.
The lasting authentication method based on biological characteristic, wherein further comprised the steps of: before the step A
S, the finger print information of user is acquired by fingerprint capturer and saves as effective finger print information, pass through facial collector
It acquires the facial information of user and saves as effective facial information.
A kind of lasting Verification System based on biological characteristic, wherein include: processor, and be connected to the processor
Memory,
The memory is stored with the lasting authentication procedure based on biological characteristic, the lasting certification based on biological characteristic
Program performs the steps of when being executed by the processor
A, every the first preset time, the finger print information of user is acquired by the fingerprint capturer on mouse;
B, it when not collecting the finger print information of user, every the second preset time, is acquired and is used by facial collector
Family facial information;
C, when the finger print information of acquisition is invalid finger print information or the facial information for not collecting facial information or acquisition
When for invalid facial information, computer is locked.
The lasting Verification System based on biological characteristic, wherein the lasting authentication procedure based on biological characteristic
When being executed by the processor, also perform the steps of
B1, when the finger print information of acquisition be effective finger print information when, judge whether computer is in the lock state;
B2, when computer lock timing, unlock and continue acquire user finger print information, when computer does not lock
When, judge whether the finger print information of user changes;
B3, when user finger print information variation when, switch to new user and continue acquire user finger print information.
The lasting Verification System based on biological characteristic, wherein the lasting authentication procedure based on biological characteristic
When being executed by the processor, also perform the steps of
C1, when the facial information of acquisition be effective finger print information when, judge whether the facial information of user changes;
C2, when the facial information of user does not change, continue the facial information for acquiring user, and continue to acquire user
Finger print information;
C3, when user facial information variation when, switch to new user and continue acquire user facial information, and continue
Acquire the finger print information of user;
C4, when the finger print information of acquisition be effective finger print information when, stop acquisition user facial information and continue to acquire
The finger print information of user.
The lasting Verification System based on biological characteristic, wherein the lasting authentication procedure based on biological characteristic
When being executed by the processor, also perform the steps of
D, when computer lock timing, the finger print information of user is acquired, when the finger print information of user is effective finger print information,
It unlocks.
The lasting Verification System based on biological characteristic, wherein the lasting authentication procedure based on biological characteristic
When being executed by the processor, also perform the steps of
S, the finger print information of user is acquired by fingerprint capturer and saves as effective finger print information, pass through facial collector
It acquires the facial information of user and saves as effective facial information.
The utility model has the advantages that 1. present invention realize based on finger print identifying, the synthesis that finger print identifying and face authenticating combine is recognized
Card mode carries out continuing certification, improves and relies only on not being available under safety is insufficient and dark condition for face authenticating
Problem.2. the present invention combines fingerprint capturer to carry out finger print identifying with common mouse, and when not operating mouse
Face authenticating is called, may be implemented to complete lasting certification while operating computer, be not required to user and deliberately carry out authentication operation,
Guarantee operation without perception.3. the present invention realizes the locking after authentification failure to computer, safety may be implemented, protection is used
Family privacy and data safety.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of computer in the present invention.
Fig. 2 is the first pass figure of the lasting authentication method in the present invention based on biological characteristic.
Fig. 3 is the second flow chart of the lasting authentication method in the present invention based on biological characteristic.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer and more explicit, right as follows in conjunction with drawings and embodiments
The present invention is further described.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and do not have to
It is of the invention in limiting.
The present invention realizes the lasting authentication method based on biological characteristic by following computer, as shown in Figure 1, computer packet
Include: host (not shown), the display being connect with host and mouse, setting facial collector 20 over the display and
Fingerprint capturer 10 on mouse is set.Since the utilization rate of mouse is higher, in general, user is when using calculator, mostly
It is held by mouse in the number time, except of course that when both hands are typewrited.That is, when fingerprint capturer 10 does not acquire
Fingerprint or when collecting the fingerprint of other people, it is possible to divulge a secret.Certainly, it when both hands are typewrited, is adopted by face
Storage 20 distinguishes user, and facial collector 20 also can be set in other positions, as long as convenient for the facial information of acquisition user
, for example, using camera in the present invention.
As shown in Figures 2 and 3, the lasting authentication method based on biological characteristic that the present invention provides a kind of, including walk as follows
It is rapid:
Step S10, the finger print information of user is acquired by fingerprint capturer 10 and saves as effective finger print information, pass through face
Portion's collector 20 acquires the facial information of user and saves as effective facial information.
Before the use it needs to be determined that the user of this computer can be used, certainly, user can be several.Then,
The finger print information and facial information of each user of typing saves and completes to register.The finger print information and facial information group of each user
At the biological characteristic group of user, can also be verified using other biological characteristics of user.Here finger print information, usually
The fingerprint of user's right hand, more specifically, fingerprint capturer 10 is located at the left side of mouse, for acquiring the hand thumb of user.When
So, other positions can also be set, the fingerprint of corresponding finger is acquired.
When acquiring finger print information, fingerprint capturer 10 is used to carry out the acquisition and typing of fingerprint, has been clicked in main interface
" saving fingerprint " can carry out the preservation of finger print information, " clicking to match " be clicked, by existing input finger print information and fingerprint base
Middle fingerprint is compared, and returns to matching result.
Step S100, every the first preset time, the finger print information of user is acquired by the fingerprint capturer 10 on mouse.
After user starts computer, password login can be used or fingerprint authentication logs in.Specifically, by fingerprint authentication
Program embedded system, so that user can be used fingerprint authentication and log in, to greatly improve user experience.Meanwhile system
Retain the original password login mode of Windows, user is allowed to pass through password login to computer.Log into thr computer into
When row fingerprint authentication, may determine that it is which user by the fingerprint that fingerprint capturer 10 acquires, therefore, the use can be recalled
The biological characteristic group at family, i.e. finger print information and facial information, so as to lasting certification.
After user's log into thr computer, in using computer procedures, by fingerprint capturer 10 every the first preset time
The finger print information of a user is acquired, i.e. it not is that only verifying is primary that fingerprint collecting, which is to continue to carry out,.In the finger of verifying user
When line information, due to when logging in, that is, the biological characteristic group of the user having been recalled, first in the user during subsequent authentication
Biological characteristic group in matching, without being matched in fingerprint base, convenient for improve matching efficiency.
Step S200, when not collecting the finger print information of user, every the second preset time, pass through facial collector
20 acquisition user's face information.
For user during using computer, the right hand may be detached from mouse, such as in both hands typewriting, this when standby
Family is still using computer, cannot lock computer.The hand of user is detached from mouse, and fingerprint capturer 10 does not collect user
Finger print information, then start the facial information that facial collector 20 acquires user.Certainly, user is when using computer, can be with
Third preset time is set, when the finger print information of acquisition is effective fingerprint and continues third preset time, starts face acquisition
The facial information of the acquisition user of device 20.Prevent the person of stealing secret information from copying finger print information, so that fingerprint capturer 10 takes for the finger of acquisition
Line is effective fingerprint.It is larger that facial information copys difficulty, and is easy to be found, therefore, further true by facial collector 20
Recognize the user using computer.
The step S200 is specifically included:
Step S210, when the finger print information of acquisition is effective finger print information, judge whether computer is in the lock state.
User has the case where leaving computer and reusing in using computer procedures, and (certainly, user leaves meter
After calculation machine, needed for secrecy, computer locks automatically), alternatively, user is before using computer, computer is had been started up
And logged in by other users, but computer is now into lock state.In the present invention, though computer into lock state,
Still when the finger print information of continuous collecting user, only computer are closed, just stop the finger print information of acquisition user.
Step S220, when computer lock timing, the finger print information of user is unlocked and continues to acquire, when computer does not have
When locking, judge whether the finger print information of user changes.
If user leaves after having used computer, computer enters lock state, has other people to use meter again later
It when calculation machine, also needs to log in and unlock, certainly, user can be unlocked by password, can also pass through fingerprint capturer
10 unlocks.After user's hand-held mouse, fingerprint capturer 10 acquires the finger print information of user, if the fingerprint of acquisition is effective fingerprint
Information, computer is in the lock state at this time certainly, then computer unlocks.
If the finger print information of acquisition is effective finger print information, and computer is not on lock state, then needs to judge
Whether the finger print information of user changes, because when user uses computer, it may be possible to and multiple users are used alternatingly, although he
Finger print information be all effective finger print information, but due to matching finger print information when, carry out first a user biology spy
Sign group is matched, once user is replaced, then the biological characteristic group of original subscriber and new user are different, then acquires fingerprint or face
When portion's information, need to further it matched in fingerprint base or facial library.
Step S230, it when the variation of the finger print information of user, switches to new user and continues to acquire the finger print information of user.
In order to ensure matching efficiency, if the finger print information of user changes, that is, the user's replacement occurred, then by protozoa spy
Sign group replaces with the neoformation feature group of new user, namely is switched to new user, in fingerprint collecting process next time, calls new
Biological characteristic group.
Step S300, when the finger print information of acquisition is invalid finger print information or the face for not collecting facial information or acquisition
When portion's information is invalid facial information, computer is locked.
When the finger print information of acquisition is invalid finger print information, i.e. the user does not have permission to use computer, it may be possible to steal
Close person, computer can lock automatically.
When not collecting facial information, illustrate that user has left computer, then computer locks automatically, prevents other
There is no the people (including the person of stealing secret information) of permission then to use.
When the facial information of acquisition is invalid facial information, equally, which does not have permission to use computer, it is possible to
It is the person of stealing secret information, computer can lock automatically.
The step S300 is specifically included:
Step S310, when the facial information of acquisition is effective finger print information, judge whether the facial information of user changes.
Step S320, when the facial information of user does not change, continue the facial information for acquiring user, and continue to acquire
The finger print information of user.
Step S330, it when the variation of the facial information of user, switches to new user and continues to acquire the facial information of user,
And continue to acquire the finger print information of user.
As finger print information, when acquiring facial information, it is also possible to the case where user's replacement occur, it is therefore desirable to sentence
Whether the facial information of disconnected user changes.
If the facial information of user does not change, that is, it is still the same user, then continues the face letter for acquiring user
Breath.If the facial information of user changes, that is, there is user's replacement, then switch to new user and continues to acquire user's
Facial information, then user when matching facial information, can call neoformation feature group to be matched first, if mismatch
It is further matched in facial library again.
Since the facial information acquisition difficulty and difficulty of matching of user are larger, and the acquisition difficulty of finger print information and matching are difficult
Degree is smaller, and the hand of user is detached from mouse, can turn again to using mouse.Continue acquire user facial information while also after
The finger print information of continuous acquisition user.
Step S340, when the finger print information of acquisition be effective finger print information when, stop acquisition user facial information and after
The finger print information of continuous acquisition user.
When the finger print information of acquisition is effective finger print information, show that the hand of user returns on mouse again, then it can be with
Stop the facial information of acquisition user, and continue the acquisition of finger print information, realizes lasting certification.
Step S400, when computer lock timing, the finger print information of user is acquired, when the finger print information of user is invalid fingerprint
When information, starting alarm device is sounded an alarm.
Computer further include: the alarm being connect with host.If the person of stealing secret information matches not in finger print information or facial information
After successfully leading to computer locking, continue to attempt to steal secret information, such as, continue to hold mouse being operated, due to computer
Finger print information is still acquired in locking, certainly at this point, the finger print information for the person of stealing secret information remains as invalid finger print information, then starts police
Report device sounds an alarm or shuts down computer.
It is worth noting that the computer locking in the application operates, it also could alternatively be computer and nullify operation.This hair
Fingerprint matching and facial match in bright sets matching threshold, when characteristic point changing value is less than by the way of Feature Points Matching
When matching threshold, it is believed that successful match;When characteristic point changing value is greater than matching threshold, it is believed that it fails to match.
Compared with existing best technique, the present invention has the advantages that
1. the present invention realizes based on finger print identifying, finger print identifying and face authenticating in conjunction with inclusive authentication mode come into
The lasting certification of row, the problem of improving the safety deficiency for relying only on face authenticating and be not available under dark condition.
2. the present invention combines fingerprint capturer to carry out finger print identifying with common mouse, and is not operating mouse
When call face authenticating, may be implemented to complete lasting certification while operating computer, be not required to user and deliberately carry out certification behaviour
Make, guarantee operation without perception.
3. the present invention realizes the locking after authentification failure to computer, may be implemented safety, protection privacy of user and
Data safety.
The lasting Verification System based on biological characteristic that the present invention also provides a kind of, comprising: processor, and with the place
The memory of device connection is managed,
The memory is stored with the lasting authentication procedure based on biological characteristic, the lasting certification based on biological characteristic
Program performs the steps of when being executed by the processor
Step S100, every the first preset time, the finger print information of user is acquired by the fingerprint capturer 10 on mouse;
Step S200, when not collecting the finger print information of user, every the second preset time, pass through facial collector
20 acquisition user's face information;
Step S300, when the finger print information of acquisition is invalid finger print information or the face for not collecting facial information or acquisition
When portion's information is invalid facial information, computer is locked, as detailed above.
When the lasting authentication procedure based on biological characteristic is executed by the processor, also perform the steps of
Step S210, when the finger print information of acquisition is effective finger print information, judge whether computer is in the lock state;
Step S220, when computer lock timing, the finger print information of user is unlocked and continues to acquire, when computer does not have
When locking, judge whether the finger print information of user changes;
Step S230, it when the variation of the finger print information of user, switches to new user and continues to acquire the finger print information of user,
As detailed above.
When the lasting authentication procedure based on biological characteristic is executed by the processor, also perform the steps of
Step S310, when the facial information of acquisition is effective finger print information, judge whether the facial information of user changes;
Step S320, when the facial information of user does not change, continue the facial information for acquiring user, and continue to acquire
The finger print information of user;
Step S330, it when the variation of the facial information of user, switches to new user and continues to acquire the facial information of user,
And continue to acquire the finger print information of user;
Step S340, when the finger print information of acquisition be effective finger print information when, stop acquisition user facial information and after
The finger print information of continuous acquisition user, as detailed above.
When the lasting authentication procedure based on biological characteristic is executed by the processor, also perform the steps of
Step S400, when computer lock timing, the finger print information of user is acquired, when the finger print information of user is invalid fingerprint
When information, starting alarm device is sounded an alarm, as detailed above.
When the lasting authentication procedure based on biological characteristic is executed by the processor, also perform the steps of
Step S10, the finger print information of user is acquired by fingerprint capturer 10 and saves as effective finger print information, pass through face
Portion's collector 20 acquires the facial information of user and saves as effective facial information, as detailed above.
In conclusion a kind of lasting authentication method and its system based on biological characteristic provided by the present invention.The side
Method includes the following steps: A, every the first preset time, and the finger print information of user is acquired by the fingerprint capturer on mouse;B,
When not collecting the finger print information of user, every the second preset time, user's face information is acquired by facial collector;
It C, is invalid face when the finger print information of acquisition is invalid finger print information or does not collect the facial information of facial information or acquisition
When portion's information, computer is locked.By based on finger print identifying, finger print identifying and face authenticating in conjunction with inclusive authentication mode come
It carries out continuing certification, and safety may be implemented to the locking of computer after authentification failure, protect privacy of user and data peace
Entirely.
It should be understood that the application of the present invention is not limited to the above for those of ordinary skills can
With improvement or transformation based on the above description, all these modifications and variations all should belong to the guarantor of appended claims of the present invention
Protect range.
Claims (10)
1. a kind of lasting authentication method based on biological characteristic, which comprises the steps of:
A, every the first preset time, the finger print information of user is acquired by the fingerprint capturer on mouse;
B, when not collecting the finger print information of user, every the second preset time, user face is acquired by facial collector
Portion's information;
It C, is nothing when the finger print information of acquisition is invalid finger print information or does not collect the facial information of facial information or acquisition
When imitating facial information, computer is locked.
2. the lasting authentication method according to claim 1 based on biological characteristic, which is characterized in that the step B is specific
Include:
B1, when the finger print information of acquisition be effective finger print information when, judge whether computer is in the lock state;
B2, when computer lock timing, unlock and continue acquire user finger print information sentence when computer does not lock
Whether the finger print information of disconnected user changes;
B3, when user finger print information variation when, switch to new user and continue acquire user finger print information.
3. the lasting authentication method according to claim 1 based on biological characteristic, which is characterized in that the step C is specific
Include:
C1, when the facial information of acquisition be effective finger print information when, judge whether the facial information of user changes;
C2, when the facial information of user does not change, continue acquire user facial information, and continue acquire user fingerprint
Information;
C3, when the variation of the facial information of user, switch to new user and continue to acquire the facial information of user, and continue to acquire
The finger print information of user;
C4, when the finger print information of acquisition be effective finger print information when, stop acquisition user facial information and continue acquire user
Finger print information.
4. the lasting authentication method according to claim 1 based on biological characteristic, which is characterized in that it further includes walking as follows
It is rapid:
D, when computer lock timing, the finger print information of user is acquired, when the finger print information of user is invalid finger print information, starting
Alarm device sounds an alarm.
5. the lasting authentication method according to claim 1 based on biological characteristic, which is characterized in that before the step A
It further comprises the steps of:
S, the finger print information of user is acquired by fingerprint capturer and saves as effective finger print information, acquired by facial collector
The facial information of user simultaneously saves as effective facial information.
6. a kind of lasting Verification System based on biological characteristic characterized by comprising processor, and with the processor
The memory of connection,
The memory is stored with the lasting authentication procedure based on biological characteristic, the lasting authentication procedure based on biological characteristic
It is performed the steps of when being executed by the processor
A, every the first preset time, the finger print information of user is acquired by the fingerprint capturer on mouse;
B, when not collecting the finger print information of user, every the second preset time, user face is acquired by facial collector
Portion's information;
It C, is nothing when the finger print information of acquisition is invalid finger print information or does not collect the facial information of facial information or acquisition
When imitating facial information, computer is locked.
7. the lasting Verification System according to claim 6 based on biological characteristic, which is characterized in that described special based on biology
When the lasting authentication procedure of sign is executed by the processor, also perform the steps of
B1, when the finger print information of acquisition be effective finger print information when, judge whether computer is in the lock state;
B2, when computer lock timing, unlock and continue acquire user finger print information sentence when computer does not lock
Whether the finger print information of disconnected user changes;
B3, when user finger print information variation when, switch to new user and continue acquire user finger print information.
8. the lasting Verification System according to claim 6 based on biological characteristic, which is characterized in that described special based on biology
When the lasting authentication procedure of sign is executed by the processor, also perform the steps of
C1, when the facial information of acquisition be effective finger print information when, judge whether the facial information of user changes;
C2, when the facial information of user does not change, continue acquire user facial information, and continue acquire user fingerprint
Information;
C3, when the variation of the facial information of user, switch to new user and continue to acquire the facial information of user, and continue to acquire
The finger print information of user;
C4, when the finger print information of acquisition be effective finger print information when, stop acquisition user facial information and continue acquire user
Finger print information.
9. the lasting Verification System according to claim 6 based on biological characteristic, which is characterized in that described special based on biology
When the lasting authentication procedure of sign is executed by the processor, also perform the steps of
D, when computer lock timing, the finger print information of user is acquired, when the finger print information of user is effective finger print information, is released
Locking.
10. the lasting Verification System according to claim 6 based on biological characteristic, which is characterized in that described based on biology
When the lasting authentication procedure of feature is executed by the processor, also perform the steps of
S, the finger print information of user is acquired by fingerprint capturer and saves as effective finger print information, acquired by facial collector
The facial information of user simultaneously saves as effective facial information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910189552.4A CN109933966A (en) | 2019-03-13 | 2019-03-13 | Continuous authentication method and system based on biological characteristics |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910189552.4A CN109933966A (en) | 2019-03-13 | 2019-03-13 | Continuous authentication method and system based on biological characteristics |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109933966A true CN109933966A (en) | 2019-06-25 |
Family
ID=66986909
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910189552.4A Pending CN109933966A (en) | 2019-03-13 | 2019-03-13 | Continuous authentication method and system based on biological characteristics |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109933966A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110472392A (en) * | 2019-07-09 | 2019-11-19 | 陈威 | Fingerprint recognition monitoring method and device |
CN111414601A (en) * | 2020-03-27 | 2020-07-14 | 中国人民解放军国防科技大学 | Continuous identity authentication method, system and medium for kylin mobile operating system |
CN112307452A (en) * | 2019-08-01 | 2021-02-02 | 银河水滴科技(北京)有限公司 | Application program operation control method and device and computer readable storage medium |
CN113079017A (en) * | 2021-03-23 | 2021-07-06 | 杭州天谷信息科技有限公司 | Fingerprint real-name authentication method and system for electronic signature |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108520173A (en) * | 2018-01-31 | 2018-09-11 | 深圳市卓帆技术有限公司 | A method of it loses face and logs in examination system |
CN108537025A (en) * | 2018-03-29 | 2018-09-14 | 广东欧珀移动通信有限公司 | Method for secret protection and device, computer readable storage medium, terminal |
CN207924763U (en) * | 2018-05-29 | 2018-09-28 | 海南汉普管家信息科技有限公司 | A kind of intellectual property Training Management Information System |
WO2018190812A1 (en) * | 2017-04-11 | 2018-10-18 | Hewlett-Packard Development Company, L.P. | User authentication |
CN109145562A (en) * | 2018-09-25 | 2019-01-04 | 浙江智贝信息科技有限公司 | A kind of lasting authenticating identity method and its equipment by finger print mouse |
-
2019
- 2019-03-13 CN CN201910189552.4A patent/CN109933966A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018190812A1 (en) * | 2017-04-11 | 2018-10-18 | Hewlett-Packard Development Company, L.P. | User authentication |
CN108520173A (en) * | 2018-01-31 | 2018-09-11 | 深圳市卓帆技术有限公司 | A method of it loses face and logs in examination system |
CN108537025A (en) * | 2018-03-29 | 2018-09-14 | 广东欧珀移动通信有限公司 | Method for secret protection and device, computer readable storage medium, terminal |
CN207924763U (en) * | 2018-05-29 | 2018-09-28 | 海南汉普管家信息科技有限公司 | A kind of intellectual property Training Management Information System |
CN109145562A (en) * | 2018-09-25 | 2019-01-04 | 浙江智贝信息科技有限公司 | A kind of lasting authenticating identity method and its equipment by finger print mouse |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110472392A (en) * | 2019-07-09 | 2019-11-19 | 陈威 | Fingerprint recognition monitoring method and device |
CN112307452A (en) * | 2019-08-01 | 2021-02-02 | 银河水滴科技(北京)有限公司 | Application program operation control method and device and computer readable storage medium |
CN111414601A (en) * | 2020-03-27 | 2020-07-14 | 中国人民解放军国防科技大学 | Continuous identity authentication method, system and medium for kylin mobile operating system |
CN111414601B (en) * | 2020-03-27 | 2023-10-03 | 中国人民解放军国防科技大学 | Continuous identity authentication method, system and medium for kylin mobile operation system |
CN113079017A (en) * | 2021-03-23 | 2021-07-06 | 杭州天谷信息科技有限公司 | Fingerprint real-name authentication method and system for electronic signature |
CN113079017B (en) * | 2021-03-23 | 2023-09-05 | 杭州天谷信息科技有限公司 | Fingerprint real-name authentication method and system for electronic signature |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109933966A (en) | Continuous authentication method and system based on biological characteristics | |
CN101174948A (en) | Network login system and method with face authentication | |
CN105429761B (en) | A kind of key generation method and device | |
US20100138667A1 (en) | Authentication using stored biometric data | |
CN103646201A (en) | Verification method achieved by combining human faces with identities | |
WO2016188230A1 (en) | Unlocking method and device | |
CN105893823A (en) | Security protection method and device, and intelligent terminal | |
CA2686801C (en) | Authetication using stored biometric data | |
CN108038363A (en) | Improve the method and device of Terminal security | |
Radha et al. | An evaluation of fingerprint security using noninvertible biohash | |
JP2001344212A (en) | Method for limiting application of computer file by biometrics information, method for logging in to computer system, and recording medium | |
CN105653918B (en) | Method for safely carrying out, safe operating device and terminal | |
CN111222172A (en) | Electronic signature method and system for mobile terminal based on face real-name authentication protection | |
CN105678149B (en) | A kind of unlocking method and terminal | |
Papaioannou et al. | User authentication and authorization for next generation mobile passenger ID devices for land and sea border control | |
CN107918730A (en) | A kind of application program login method based on iris recognition identification certification | |
CN113536260A (en) | Method and device for improving identity authentication security level based on biological characteristics | |
Chao et al. | Biometric-based personal identity-authentication system and security analysis | |
WO2019245437A1 (en) | Method and electronic device for authenticating a user | |
CN108959894A (en) | A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting | |
CN110321687A (en) | A kind of personal identification method | |
CN109784022A (en) | System authentication method and device based on bio-identification under a kind of Linux | |
Edwards et al. | FFDA: A novel four-factor distributed authentication mechanism | |
CN110391909A (en) | Terminal unlock method and system based on living things feature recognition | |
KR20190061606A (en) | Method and system for protecting personal information infringement using division of authentication process and biometrics authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190625 |
|
RJ01 | Rejection of invention patent application after publication |