CN109933966A - Continuous authentication method and system based on biological characteristics - Google Patents

Continuous authentication method and system based on biological characteristics Download PDF

Info

Publication number
CN109933966A
CN109933966A CN201910189552.4A CN201910189552A CN109933966A CN 109933966 A CN109933966 A CN 109933966A CN 201910189552 A CN201910189552 A CN 201910189552A CN 109933966 A CN109933966 A CN 109933966A
Authority
CN
China
Prior art keywords
user
finger print
information
print information
facial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910189552.4A
Other languages
Chinese (zh)
Inventor
冯超
李润浩
徐学政
李佳欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN201910189552.4A priority Critical patent/CN109933966A/en
Publication of CN109933966A publication Critical patent/CN109933966A/en
Pending legal-status Critical Current

Links

Landscapes

  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention discloses a continuous authentication method and a system based on biological characteristics. The method comprises the following steps: A. collecting fingerprint information of a user through a fingerprint collector on a mouse every other first preset time; B. when the fingerprint information of the user is not collected, collecting the face information of the user through a face collector at intervals of second preset time; C. and locking the computer when the collected fingerprint information is invalid fingerprint information or no collected face information or the collected face information is invalid face information. The continuous authentication is carried out through a comprehensive authentication mode combining fingerprint authentication as a main mode and fingerprint authentication and face authentication, and the computer is locked after the authentication fails, so that the security can be realized, and the user privacy and the data security can be protected.

Description

A kind of lasting authentication method and its system based on biological characteristic
Technical field
The present invention relates to identity identifying technology field more particularly to a kind of lasting authentication methods based on biological characteristic And its system.
Background technique
In the prior art, current certificate scheme mostly uses greatly an authentication mode, no longer to user after authentication authorization and accounting success Identity is verified, and can bring safety problem in this way: if user midway is of short duration, computer may be used by others' when leaving, To the secret that is stolen.In the relatively high occasion of some confidentiality requirements, such as MISSILE LAUNCHING center, computer peace is protected at any time It is complete particularly important, there can be security risk.Meanwhile existing authentication techniques generally require user's active certification, in use process In it is more inconvenient.Continue convenient and fast safeguard protection to provide for user using computer.
Therefore, the existing technology needs to be improved and developed.
Summary of the invention
The technical problem to be solved in the present invention is that in view of the above drawbacks of the prior art, providing a kind of special based on biology The lasting authentication method and its system of sign, it is intended to solve to cause computer security low using an authentication mode in the prior art The problem of.
The technical proposal for solving the technical problem of the invention is as follows:
A kind of lasting authentication method based on biological characteristic, wherein include the following steps:
A, every the first preset time, the finger print information of user is acquired by the fingerprint capturer on mouse;
B, it when not collecting the finger print information of user, every the second preset time, is acquired and is used by facial collector Family facial information;
C, when the finger print information of acquisition is invalid finger print information or the facial information for not collecting facial information or acquisition When for invalid facial information, computer is locked.
The lasting authentication method based on biological characteristic, wherein the step B is specifically included:
B1, when the finger print information of acquisition be effective finger print information when, judge whether computer is in the lock state;
B2, when computer lock timing, unlock and continue acquire user finger print information, when computer does not lock When, judge whether the finger print information of user changes;
B3, when user finger print information variation when, switch to new user and continue acquire user finger print information.
The lasting authentication method based on biological characteristic, wherein the step C is specifically included:
C1, when the facial information of acquisition be effective finger print information when, judge whether the facial information of user changes;
C2, when the facial information of user does not change, continue the facial information for acquiring user, and continue to acquire user Finger print information;
C3, when user facial information variation when, switch to new user and continue acquire user facial information, and continue Acquire the finger print information of user;
C4, when the finger print information of acquisition be effective finger print information when, stop acquisition user facial information and continue to acquire The finger print information of user.
The lasting authentication method based on biological characteristic, wherein it is further comprised the steps of:
D, when computer lock timing, the finger print information of user is acquired, when the finger print information of user is invalid finger print information, Starting alarm device sounds an alarm.
The lasting authentication method based on biological characteristic, wherein further comprised the steps of: before the step A
S, the finger print information of user is acquired by fingerprint capturer and saves as effective finger print information, pass through facial collector It acquires the facial information of user and saves as effective facial information.
A kind of lasting Verification System based on biological characteristic, wherein include: processor, and be connected to the processor Memory,
The memory is stored with the lasting authentication procedure based on biological characteristic, the lasting certification based on biological characteristic Program performs the steps of when being executed by the processor
A, every the first preset time, the finger print information of user is acquired by the fingerprint capturer on mouse;
B, it when not collecting the finger print information of user, every the second preset time, is acquired and is used by facial collector Family facial information;
C, when the finger print information of acquisition is invalid finger print information or the facial information for not collecting facial information or acquisition When for invalid facial information, computer is locked.
The lasting Verification System based on biological characteristic, wherein the lasting authentication procedure based on biological characteristic When being executed by the processor, also perform the steps of
B1, when the finger print information of acquisition be effective finger print information when, judge whether computer is in the lock state;
B2, when computer lock timing, unlock and continue acquire user finger print information, when computer does not lock When, judge whether the finger print information of user changes;
B3, when user finger print information variation when, switch to new user and continue acquire user finger print information.
The lasting Verification System based on biological characteristic, wherein the lasting authentication procedure based on biological characteristic When being executed by the processor, also perform the steps of
C1, when the facial information of acquisition be effective finger print information when, judge whether the facial information of user changes;
C2, when the facial information of user does not change, continue the facial information for acquiring user, and continue to acquire user Finger print information;
C3, when user facial information variation when, switch to new user and continue acquire user facial information, and continue Acquire the finger print information of user;
C4, when the finger print information of acquisition be effective finger print information when, stop acquisition user facial information and continue to acquire The finger print information of user.
The lasting Verification System based on biological characteristic, wherein the lasting authentication procedure based on biological characteristic When being executed by the processor, also perform the steps of
D, when computer lock timing, the finger print information of user is acquired, when the finger print information of user is effective finger print information, It unlocks.
The lasting Verification System based on biological characteristic, wherein the lasting authentication procedure based on biological characteristic When being executed by the processor, also perform the steps of
S, the finger print information of user is acquired by fingerprint capturer and saves as effective finger print information, pass through facial collector It acquires the facial information of user and saves as effective facial information.
The utility model has the advantages that 1. present invention realize based on finger print identifying, the synthesis that finger print identifying and face authenticating combine is recognized Card mode carries out continuing certification, improves and relies only on not being available under safety is insufficient and dark condition for face authenticating Problem.2. the present invention combines fingerprint capturer to carry out finger print identifying with common mouse, and when not operating mouse Face authenticating is called, may be implemented to complete lasting certification while operating computer, be not required to user and deliberately carry out authentication operation, Guarantee operation without perception.3. the present invention realizes the locking after authentification failure to computer, safety may be implemented, protection is used Family privacy and data safety.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of computer in the present invention.
Fig. 2 is the first pass figure of the lasting authentication method in the present invention based on biological characteristic.
Fig. 3 is the second flow chart of the lasting authentication method in the present invention based on biological characteristic.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer and more explicit, right as follows in conjunction with drawings and embodiments The present invention is further described.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and do not have to It is of the invention in limiting.
The present invention realizes the lasting authentication method based on biological characteristic by following computer, as shown in Figure 1, computer packet Include: host (not shown), the display being connect with host and mouse, setting facial collector 20 over the display and Fingerprint capturer 10 on mouse is set.Since the utilization rate of mouse is higher, in general, user is when using calculator, mostly It is held by mouse in the number time, except of course that when both hands are typewrited.That is, when fingerprint capturer 10 does not acquire Fingerprint or when collecting the fingerprint of other people, it is possible to divulge a secret.Certainly, it when both hands are typewrited, is adopted by face Storage 20 distinguishes user, and facial collector 20 also can be set in other positions, as long as convenient for the facial information of acquisition user , for example, using camera in the present invention.
As shown in Figures 2 and 3, the lasting authentication method based on biological characteristic that the present invention provides a kind of, including walk as follows It is rapid:
Step S10, the finger print information of user is acquired by fingerprint capturer 10 and saves as effective finger print information, pass through face Portion's collector 20 acquires the facial information of user and saves as effective facial information.
Before the use it needs to be determined that the user of this computer can be used, certainly, user can be several.Then, The finger print information and facial information of each user of typing saves and completes to register.The finger print information and facial information group of each user At the biological characteristic group of user, can also be verified using other biological characteristics of user.Here finger print information, usually The fingerprint of user's right hand, more specifically, fingerprint capturer 10 is located at the left side of mouse, for acquiring the hand thumb of user.When So, other positions can also be set, the fingerprint of corresponding finger is acquired.
When acquiring finger print information, fingerprint capturer 10 is used to carry out the acquisition and typing of fingerprint, has been clicked in main interface " saving fingerprint " can carry out the preservation of finger print information, " clicking to match " be clicked, by existing input finger print information and fingerprint base Middle fingerprint is compared, and returns to matching result.
Step S100, every the first preset time, the finger print information of user is acquired by the fingerprint capturer 10 on mouse.
After user starts computer, password login can be used or fingerprint authentication logs in.Specifically, by fingerprint authentication Program embedded system, so that user can be used fingerprint authentication and log in, to greatly improve user experience.Meanwhile system Retain the original password login mode of Windows, user is allowed to pass through password login to computer.Log into thr computer into When row fingerprint authentication, may determine that it is which user by the fingerprint that fingerprint capturer 10 acquires, therefore, the use can be recalled The biological characteristic group at family, i.e. finger print information and facial information, so as to lasting certification.
After user's log into thr computer, in using computer procedures, by fingerprint capturer 10 every the first preset time The finger print information of a user is acquired, i.e. it not is that only verifying is primary that fingerprint collecting, which is to continue to carry out,.In the finger of verifying user When line information, due to when logging in, that is, the biological characteristic group of the user having been recalled, first in the user during subsequent authentication Biological characteristic group in matching, without being matched in fingerprint base, convenient for improve matching efficiency.
Step S200, when not collecting the finger print information of user, every the second preset time, pass through facial collector 20 acquisition user's face information.
For user during using computer, the right hand may be detached from mouse, such as in both hands typewriting, this when standby Family is still using computer, cannot lock computer.The hand of user is detached from mouse, and fingerprint capturer 10 does not collect user Finger print information, then start the facial information that facial collector 20 acquires user.Certainly, user is when using computer, can be with Third preset time is set, when the finger print information of acquisition is effective fingerprint and continues third preset time, starts face acquisition The facial information of the acquisition user of device 20.Prevent the person of stealing secret information from copying finger print information, so that fingerprint capturer 10 takes for the finger of acquisition Line is effective fingerprint.It is larger that facial information copys difficulty, and is easy to be found, therefore, further true by facial collector 20 Recognize the user using computer.
The step S200 is specifically included:
Step S210, when the finger print information of acquisition is effective finger print information, judge whether computer is in the lock state.
User has the case where leaving computer and reusing in using computer procedures, and (certainly, user leaves meter After calculation machine, needed for secrecy, computer locks automatically), alternatively, user is before using computer, computer is had been started up And logged in by other users, but computer is now into lock state.In the present invention, though computer into lock state, Still when the finger print information of continuous collecting user, only computer are closed, just stop the finger print information of acquisition user.
Step S220, when computer lock timing, the finger print information of user is unlocked and continues to acquire, when computer does not have When locking, judge whether the finger print information of user changes.
If user leaves after having used computer, computer enters lock state, has other people to use meter again later It when calculation machine, also needs to log in and unlock, certainly, user can be unlocked by password, can also pass through fingerprint capturer 10 unlocks.After user's hand-held mouse, fingerprint capturer 10 acquires the finger print information of user, if the fingerprint of acquisition is effective fingerprint Information, computer is in the lock state at this time certainly, then computer unlocks.
If the finger print information of acquisition is effective finger print information, and computer is not on lock state, then needs to judge Whether the finger print information of user changes, because when user uses computer, it may be possible to and multiple users are used alternatingly, although he Finger print information be all effective finger print information, but due to matching finger print information when, carry out first a user biology spy Sign group is matched, once user is replaced, then the biological characteristic group of original subscriber and new user are different, then acquires fingerprint or face When portion's information, need to further it matched in fingerprint base or facial library.
Step S230, it when the variation of the finger print information of user, switches to new user and continues to acquire the finger print information of user.
In order to ensure matching efficiency, if the finger print information of user changes, that is, the user's replacement occurred, then by protozoa spy Sign group replaces with the neoformation feature group of new user, namely is switched to new user, in fingerprint collecting process next time, calls new Biological characteristic group.
Step S300, when the finger print information of acquisition is invalid finger print information or the face for not collecting facial information or acquisition When portion's information is invalid facial information, computer is locked.
When the finger print information of acquisition is invalid finger print information, i.e. the user does not have permission to use computer, it may be possible to steal Close person, computer can lock automatically.
When not collecting facial information, illustrate that user has left computer, then computer locks automatically, prevents other There is no the people (including the person of stealing secret information) of permission then to use.
When the facial information of acquisition is invalid facial information, equally, which does not have permission to use computer, it is possible to It is the person of stealing secret information, computer can lock automatically.
The step S300 is specifically included:
Step S310, when the facial information of acquisition is effective finger print information, judge whether the facial information of user changes.
Step S320, when the facial information of user does not change, continue the facial information for acquiring user, and continue to acquire The finger print information of user.
Step S330, it when the variation of the facial information of user, switches to new user and continues to acquire the facial information of user, And continue to acquire the finger print information of user.
As finger print information, when acquiring facial information, it is also possible to the case where user's replacement occur, it is therefore desirable to sentence Whether the facial information of disconnected user changes.
If the facial information of user does not change, that is, it is still the same user, then continues the face letter for acquiring user Breath.If the facial information of user changes, that is, there is user's replacement, then switch to new user and continues to acquire user's Facial information, then user when matching facial information, can call neoformation feature group to be matched first, if mismatch It is further matched in facial library again.
Since the facial information acquisition difficulty and difficulty of matching of user are larger, and the acquisition difficulty of finger print information and matching are difficult Degree is smaller, and the hand of user is detached from mouse, can turn again to using mouse.Continue acquire user facial information while also after The finger print information of continuous acquisition user.
Step S340, when the finger print information of acquisition be effective finger print information when, stop acquisition user facial information and after The finger print information of continuous acquisition user.
When the finger print information of acquisition is effective finger print information, show that the hand of user returns on mouse again, then it can be with Stop the facial information of acquisition user, and continue the acquisition of finger print information, realizes lasting certification.
Step S400, when computer lock timing, the finger print information of user is acquired, when the finger print information of user is invalid fingerprint When information, starting alarm device is sounded an alarm.
Computer further include: the alarm being connect with host.If the person of stealing secret information matches not in finger print information or facial information After successfully leading to computer locking, continue to attempt to steal secret information, such as, continue to hold mouse being operated, due to computer Finger print information is still acquired in locking, certainly at this point, the finger print information for the person of stealing secret information remains as invalid finger print information, then starts police Report device sounds an alarm or shuts down computer.
It is worth noting that the computer locking in the application operates, it also could alternatively be computer and nullify operation.This hair Fingerprint matching and facial match in bright sets matching threshold, when characteristic point changing value is less than by the way of Feature Points Matching When matching threshold, it is believed that successful match;When characteristic point changing value is greater than matching threshold, it is believed that it fails to match.
Compared with existing best technique, the present invention has the advantages that
1. the present invention realizes based on finger print identifying, finger print identifying and face authenticating in conjunction with inclusive authentication mode come into The lasting certification of row, the problem of improving the safety deficiency for relying only on face authenticating and be not available under dark condition.
2. the present invention combines fingerprint capturer to carry out finger print identifying with common mouse, and is not operating mouse When call face authenticating, may be implemented to complete lasting certification while operating computer, be not required to user and deliberately carry out certification behaviour Make, guarantee operation without perception.
3. the present invention realizes the locking after authentification failure to computer, may be implemented safety, protection privacy of user and Data safety.
The lasting Verification System based on biological characteristic that the present invention also provides a kind of, comprising: processor, and with the place The memory of device connection is managed,
The memory is stored with the lasting authentication procedure based on biological characteristic, the lasting certification based on biological characteristic Program performs the steps of when being executed by the processor
Step S100, every the first preset time, the finger print information of user is acquired by the fingerprint capturer 10 on mouse;
Step S200, when not collecting the finger print information of user, every the second preset time, pass through facial collector 20 acquisition user's face information;
Step S300, when the finger print information of acquisition is invalid finger print information or the face for not collecting facial information or acquisition When portion's information is invalid facial information, computer is locked, as detailed above.
When the lasting authentication procedure based on biological characteristic is executed by the processor, also perform the steps of
Step S210, when the finger print information of acquisition is effective finger print information, judge whether computer is in the lock state;
Step S220, when computer lock timing, the finger print information of user is unlocked and continues to acquire, when computer does not have When locking, judge whether the finger print information of user changes;
Step S230, it when the variation of the finger print information of user, switches to new user and continues to acquire the finger print information of user, As detailed above.
When the lasting authentication procedure based on biological characteristic is executed by the processor, also perform the steps of
Step S310, when the facial information of acquisition is effective finger print information, judge whether the facial information of user changes;
Step S320, when the facial information of user does not change, continue the facial information for acquiring user, and continue to acquire The finger print information of user;
Step S330, it when the variation of the facial information of user, switches to new user and continues to acquire the facial information of user, And continue to acquire the finger print information of user;
Step S340, when the finger print information of acquisition be effective finger print information when, stop acquisition user facial information and after The finger print information of continuous acquisition user, as detailed above.
When the lasting authentication procedure based on biological characteristic is executed by the processor, also perform the steps of
Step S400, when computer lock timing, the finger print information of user is acquired, when the finger print information of user is invalid fingerprint When information, starting alarm device is sounded an alarm, as detailed above.
When the lasting authentication procedure based on biological characteristic is executed by the processor, also perform the steps of
Step S10, the finger print information of user is acquired by fingerprint capturer 10 and saves as effective finger print information, pass through face Portion's collector 20 acquires the facial information of user and saves as effective facial information, as detailed above.
In conclusion a kind of lasting authentication method and its system based on biological characteristic provided by the present invention.The side Method includes the following steps: A, every the first preset time, and the finger print information of user is acquired by the fingerprint capturer on mouse;B, When not collecting the finger print information of user, every the second preset time, user's face information is acquired by facial collector; It C, is invalid face when the finger print information of acquisition is invalid finger print information or does not collect the facial information of facial information or acquisition When portion's information, computer is locked.By based on finger print identifying, finger print identifying and face authenticating in conjunction with inclusive authentication mode come It carries out continuing certification, and safety may be implemented to the locking of computer after authentification failure, protect privacy of user and data peace Entirely.
It should be understood that the application of the present invention is not limited to the above for those of ordinary skills can With improvement or transformation based on the above description, all these modifications and variations all should belong to the guarantor of appended claims of the present invention Protect range.

Claims (10)

1. a kind of lasting authentication method based on biological characteristic, which comprises the steps of:
A, every the first preset time, the finger print information of user is acquired by the fingerprint capturer on mouse;
B, when not collecting the finger print information of user, every the second preset time, user face is acquired by facial collector Portion's information;
It C, is nothing when the finger print information of acquisition is invalid finger print information or does not collect the facial information of facial information or acquisition When imitating facial information, computer is locked.
2. the lasting authentication method according to claim 1 based on biological characteristic, which is characterized in that the step B is specific Include:
B1, when the finger print information of acquisition be effective finger print information when, judge whether computer is in the lock state;
B2, when computer lock timing, unlock and continue acquire user finger print information sentence when computer does not lock Whether the finger print information of disconnected user changes;
B3, when user finger print information variation when, switch to new user and continue acquire user finger print information.
3. the lasting authentication method according to claim 1 based on biological characteristic, which is characterized in that the step C is specific Include:
C1, when the facial information of acquisition be effective finger print information when, judge whether the facial information of user changes;
C2, when the facial information of user does not change, continue acquire user facial information, and continue acquire user fingerprint Information;
C3, when the variation of the facial information of user, switch to new user and continue to acquire the facial information of user, and continue to acquire The finger print information of user;
C4, when the finger print information of acquisition be effective finger print information when, stop acquisition user facial information and continue acquire user Finger print information.
4. the lasting authentication method according to claim 1 based on biological characteristic, which is characterized in that it further includes walking as follows It is rapid:
D, when computer lock timing, the finger print information of user is acquired, when the finger print information of user is invalid finger print information, starting Alarm device sounds an alarm.
5. the lasting authentication method according to claim 1 based on biological characteristic, which is characterized in that before the step A It further comprises the steps of:
S, the finger print information of user is acquired by fingerprint capturer and saves as effective finger print information, acquired by facial collector The facial information of user simultaneously saves as effective facial information.
6. a kind of lasting Verification System based on biological characteristic characterized by comprising processor, and with the processor The memory of connection,
The memory is stored with the lasting authentication procedure based on biological characteristic, the lasting authentication procedure based on biological characteristic It is performed the steps of when being executed by the processor
A, every the first preset time, the finger print information of user is acquired by the fingerprint capturer on mouse;
B, when not collecting the finger print information of user, every the second preset time, user face is acquired by facial collector Portion's information;
It C, is nothing when the finger print information of acquisition is invalid finger print information or does not collect the facial information of facial information or acquisition When imitating facial information, computer is locked.
7. the lasting Verification System according to claim 6 based on biological characteristic, which is characterized in that described special based on biology When the lasting authentication procedure of sign is executed by the processor, also perform the steps of
B1, when the finger print information of acquisition be effective finger print information when, judge whether computer is in the lock state;
B2, when computer lock timing, unlock and continue acquire user finger print information sentence when computer does not lock Whether the finger print information of disconnected user changes;
B3, when user finger print information variation when, switch to new user and continue acquire user finger print information.
8. the lasting Verification System according to claim 6 based on biological characteristic, which is characterized in that described special based on biology When the lasting authentication procedure of sign is executed by the processor, also perform the steps of
C1, when the facial information of acquisition be effective finger print information when, judge whether the facial information of user changes;
C2, when the facial information of user does not change, continue acquire user facial information, and continue acquire user fingerprint Information;
C3, when the variation of the facial information of user, switch to new user and continue to acquire the facial information of user, and continue to acquire The finger print information of user;
C4, when the finger print information of acquisition be effective finger print information when, stop acquisition user facial information and continue acquire user Finger print information.
9. the lasting Verification System according to claim 6 based on biological characteristic, which is characterized in that described special based on biology When the lasting authentication procedure of sign is executed by the processor, also perform the steps of
D, when computer lock timing, the finger print information of user is acquired, when the finger print information of user is effective finger print information, is released Locking.
10. the lasting Verification System according to claim 6 based on biological characteristic, which is characterized in that described based on biology When the lasting authentication procedure of feature is executed by the processor, also perform the steps of
S, the finger print information of user is acquired by fingerprint capturer and saves as effective finger print information, acquired by facial collector The facial information of user simultaneously saves as effective facial information.
CN201910189552.4A 2019-03-13 2019-03-13 Continuous authentication method and system based on biological characteristics Pending CN109933966A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910189552.4A CN109933966A (en) 2019-03-13 2019-03-13 Continuous authentication method and system based on biological characteristics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910189552.4A CN109933966A (en) 2019-03-13 2019-03-13 Continuous authentication method and system based on biological characteristics

Publications (1)

Publication Number Publication Date
CN109933966A true CN109933966A (en) 2019-06-25

Family

ID=66986909

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910189552.4A Pending CN109933966A (en) 2019-03-13 2019-03-13 Continuous authentication method and system based on biological characteristics

Country Status (1)

Country Link
CN (1) CN109933966A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110472392A (en) * 2019-07-09 2019-11-19 陈威 Fingerprint recognition monitoring method and device
CN111414601A (en) * 2020-03-27 2020-07-14 中国人民解放军国防科技大学 Continuous identity authentication method, system and medium for kylin mobile operating system
CN112307452A (en) * 2019-08-01 2021-02-02 银河水滴科技(北京)有限公司 Application program operation control method and device and computer readable storage medium
CN113079017A (en) * 2021-03-23 2021-07-06 杭州天谷信息科技有限公司 Fingerprint real-name authentication method and system for electronic signature

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108520173A (en) * 2018-01-31 2018-09-11 深圳市卓帆技术有限公司 A method of it loses face and logs in examination system
CN108537025A (en) * 2018-03-29 2018-09-14 广东欧珀移动通信有限公司 Method for secret protection and device, computer readable storage medium, terminal
CN207924763U (en) * 2018-05-29 2018-09-28 海南汉普管家信息科技有限公司 A kind of intellectual property Training Management Information System
WO2018190812A1 (en) * 2017-04-11 2018-10-18 Hewlett-Packard Development Company, L.P. User authentication
CN109145562A (en) * 2018-09-25 2019-01-04 浙江智贝信息科技有限公司 A kind of lasting authenticating identity method and its equipment by finger print mouse

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018190812A1 (en) * 2017-04-11 2018-10-18 Hewlett-Packard Development Company, L.P. User authentication
CN108520173A (en) * 2018-01-31 2018-09-11 深圳市卓帆技术有限公司 A method of it loses face and logs in examination system
CN108537025A (en) * 2018-03-29 2018-09-14 广东欧珀移动通信有限公司 Method for secret protection and device, computer readable storage medium, terminal
CN207924763U (en) * 2018-05-29 2018-09-28 海南汉普管家信息科技有限公司 A kind of intellectual property Training Management Information System
CN109145562A (en) * 2018-09-25 2019-01-04 浙江智贝信息科技有限公司 A kind of lasting authenticating identity method and its equipment by finger print mouse

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110472392A (en) * 2019-07-09 2019-11-19 陈威 Fingerprint recognition monitoring method and device
CN112307452A (en) * 2019-08-01 2021-02-02 银河水滴科技(北京)有限公司 Application program operation control method and device and computer readable storage medium
CN111414601A (en) * 2020-03-27 2020-07-14 中国人民解放军国防科技大学 Continuous identity authentication method, system and medium for kylin mobile operating system
CN111414601B (en) * 2020-03-27 2023-10-03 中国人民解放军国防科技大学 Continuous identity authentication method, system and medium for kylin mobile operation system
CN113079017A (en) * 2021-03-23 2021-07-06 杭州天谷信息科技有限公司 Fingerprint real-name authentication method and system for electronic signature
CN113079017B (en) * 2021-03-23 2023-09-05 杭州天谷信息科技有限公司 Fingerprint real-name authentication method and system for electronic signature

Similar Documents

Publication Publication Date Title
CN109933966A (en) Continuous authentication method and system based on biological characteristics
CN101174948A (en) Network login system and method with face authentication
CN105429761B (en) A kind of key generation method and device
US20100138667A1 (en) Authentication using stored biometric data
CN103646201A (en) Verification method achieved by combining human faces with identities
WO2016188230A1 (en) Unlocking method and device
CN105893823A (en) Security protection method and device, and intelligent terminal
CA2686801C (en) Authetication using stored biometric data
CN108038363A (en) Improve the method and device of Terminal security
Radha et al. An evaluation of fingerprint security using noninvertible biohash
JP2001344212A (en) Method for limiting application of computer file by biometrics information, method for logging in to computer system, and recording medium
CN105653918B (en) Method for safely carrying out, safe operating device and terminal
CN111222172A (en) Electronic signature method and system for mobile terminal based on face real-name authentication protection
CN105678149B (en) A kind of unlocking method and terminal
Papaioannou et al. User authentication and authorization for next generation mobile passenger ID devices for land and sea border control
CN107918730A (en) A kind of application program login method based on iris recognition identification certification
CN113536260A (en) Method and device for improving identity authentication security level based on biological characteristics
Chao et al. Biometric-based personal identity-authentication system and security analysis
WO2019245437A1 (en) Method and electronic device for authenticating a user
CN108959894A (en) A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting
CN110321687A (en) A kind of personal identification method
CN109784022A (en) System authentication method and device based on bio-identification under a kind of Linux
Edwards et al. FFDA: A novel four-factor distributed authentication mechanism
CN110391909A (en) Terminal unlock method and system based on living things feature recognition
KR20190061606A (en) Method and system for protecting personal information infringement using division of authentication process and biometrics authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190625

RJ01 Rejection of invention patent application after publication