CN105490987A - Network integration identity authentication method - Google Patents
Network integration identity authentication method Download PDFInfo
- Publication number
- CN105490987A CN105490987A CN201410476616.6A CN201410476616A CN105490987A CN 105490987 A CN105490987 A CN 105490987A CN 201410476616 A CN201410476616 A CN 201410476616A CN 105490987 A CN105490987 A CN 105490987A
- Authority
- CN
- China
- Prior art keywords
- user
- identity
- input
- application
- successful
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a network integration identity authentication method. The network integration identity authentication method is characterized by including the following steps that: a network application program adds four types of identity information (position, fingerprint, face and command) in a user account security, and adding the information into a corresponding identity database; a user accesses an application, the application gathers a user IP address or GPS information, and then it can be determined whether the user is at a preset position or not, e.g., the user is at home or at a workplace; if the user is at the preset position, an account command is input to authenticate identity, if authentication is not successful, access is denied, if authentication is successful, a fingerprint is scanned to authenticate identity after the account command is input, and if the authentication is successful, the login is successful; if the user is not at the preset position, the application determines whether the user is at a close position, e.g., the user is at a common area such as the same city or the same province; if the user is at the close position, the account command is input, and then the fingerprint is scanned to authenticate identity, if the user is not at the close position, the account command is input, and then face verification is performed, if the verification is successful, the login is successful, and if the verification is not successful, access is denied. The network integration identity authentication method can shield most of illegal login and ensure user information security in a manner that security classification is based on territory distance.
Description
Technical field
The present invention relates to a kind of network synthesis identity identifying method.
Background technology
Recent years often there is the big and small leakage of a state or party secret in the Internet, mobile phone more and more becomes the important communication tool of society hospitality, the means of being undertaken attacking by network also emerge in an endless stream, in the recent period, the esbablished corporations such as apple produce a lot of information leakage event, expose current authentication system safe not.
Therefore, prior art needs to be improved.
Summary of the invention
The present invention, in order to solve the deficiencies in the prior art, provides a kind of network synthesis identity identifying method, solves the problem that in prior art, network ID authentication system is safe not.
For solving the problems of the technologies described above, a kind of network synthesis identity identifying method that the embodiment of the present invention provides, adopts following technical scheme:
A kind of network synthesis identity identifying method, is characterized in that, comprise the steps:
S1: web application increases position, fingerprint, face, password four identity informations in user account safety, and add in corresponding identity database;
S2: user's access application, IP address or GPS information are collected in application, judge whether thus at desired location, such as family or job site;
S3: in this way, then input account number password authentication, do not pass through, then denied access, pass through, then scanning fingerprint certification again after input account number password, as passed through, then logs in successfully;
S4: as no, then application judges whether in close positions, as the conventional area such as city or same province;
S5: in this way, then input scanning fingerprint certification again after account number password, as no, then input after account number password finger print identifying face verification again, as passed through, then logging in successfully, as do not passed through, then and denied access.
Particularly, described method is a kind of take geographical position as the method that standard divides safe class.
Particularly, described application raises along with safe class, and authentication mode also increases thereupon.
Particularly, described geographical position judges also can adopt mobile network.
A kind of network synthesis identity identifying method provided by the invention, by the mode being safety status classification with region distance, can shield and mostly illegally to log in, ensure user information safety.
Accompanying drawing explanation
Fig. 1 is the step schematic diagram of a kind of network synthesis identity identifying method described in the embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the network synthesis identity identifying method that the embodiment of the present invention is supplied to is described in detail.
As shown in Figure 1, a kind of network synthesis identity identifying method that the embodiment of the present invention provides, is characterized in that, comprise the steps:
S1: web application increases position, fingerprint, face, password four identity informations in user account safety, and add in corresponding identity database;
S2: user's access application, IP address or GPS information are collected in application, judge whether thus at desired location, such as family or job site;
S3: in this way, then input account number password authentication, do not pass through, then denied access, pass through, then scanning fingerprint certification again after input account number password, as passed through, then logs in successfully;
S4: as no, then application judges whether in close positions, as the conventional area such as city or same province;
S5: in this way, then input scanning fingerprint certification again after account number password, as no, then input after account number password finger print identifying face verification again, as passed through, then logging in successfully, as do not passed through, then and denied access.
Particularly, described method is a kind of take geographical position as the method that standard divides safe class.
Particularly, described application raises along with safe class, and authentication mode also increases thereupon.
Particularly, described geographical position judges also can adopt mobile network.
A kind of network synthesis identity identifying method provided by the invention, by the mode being safety status classification with region distance, can shield and mostly illegally to log in, ensure user information safety.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with the protection range of claim.
Claims (4)
1. a network synthesis identity identifying method, is characterized in that, comprises the steps:
S1: web application increases position, fingerprint, face, password four identity informations in user account safety, and add in corresponding identity database;
S2: user's access application, IP address or GPS information are collected in application, judge whether thus at desired location, such as family or job site;
S3: in this way, then input account number password authentication, do not pass through, then denied access, pass through, then scanning fingerprint certification again after input account number password, as passed through, then logs in successfully;
S4: as no, then application judges whether in close positions, as the conventional area such as city or same province;
S5: in this way, then input scanning fingerprint certification again after account number password, as no, then input after account number password finger print identifying face verification again, as passed through, then logging in successfully, as do not passed through, then and denied access.
2. network synthesis identity identifying method according to claim 1, is characterized in that, described method is a kind of take geographical position as the method that standard divides safe class.
3. network synthesis identity identifying method according to claim 1, is characterized in that, described application raises along with safe class, and authentication mode also increases thereupon.
4. network synthesis identity identifying method according to claim 1, is characterized in that, described geographical position judges also can adopt mobile network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410476616.6A CN105490987A (en) | 2014-09-18 | 2014-09-18 | Network integration identity authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410476616.6A CN105490987A (en) | 2014-09-18 | 2014-09-18 | Network integration identity authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105490987A true CN105490987A (en) | 2016-04-13 |
Family
ID=55677710
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410476616.6A Pending CN105490987A (en) | 2014-09-18 | 2014-09-18 | Network integration identity authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105490987A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105959317A (en) * | 2016-07-11 | 2016-09-21 | 深圳市金立通信设备有限公司 | Security authentication method and terminal |
CN106060034A (en) * | 2016-05-27 | 2016-10-26 | 深圳市永兴元科技有限公司 | Account login method and device |
CN107580001A (en) * | 2017-10-20 | 2018-01-12 | 珠海市魅族科技有限公司 | Using login and authentication information method to set up, device, computer installation and storage medium |
CN108021803A (en) * | 2016-10-31 | 2018-05-11 | 黄策 | The management method of protection account logon information is divided by space-time |
CN109274683A (en) * | 2018-10-30 | 2019-01-25 | 国网安徽省电力有限公司信息通信分公司 | A kind of combined crosswise Verification System and its authentication method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1856782A (en) * | 2003-09-25 | 2006-11-01 | 索尔玛泽株式会社 | The method of safe certification service |
CN101321068A (en) * | 2008-07-23 | 2008-12-10 | 北京握奇数据系统有限公司 | Method and apparatus for implementing dual-identity authentication |
CN103383216A (en) * | 2012-12-31 | 2013-11-06 | 于净 | Bullet cabinet and identity identifying method for bullet cabinet user |
WO2014104507A1 (en) * | 2012-12-27 | 2014-07-03 | 주식회사 로웸 | System and method for secure login, and apparatus for same |
-
2014
- 2014-09-18 CN CN201410476616.6A patent/CN105490987A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1856782A (en) * | 2003-09-25 | 2006-11-01 | 索尔玛泽株式会社 | The method of safe certification service |
CN101321068A (en) * | 2008-07-23 | 2008-12-10 | 北京握奇数据系统有限公司 | Method and apparatus for implementing dual-identity authentication |
WO2014104507A1 (en) * | 2012-12-27 | 2014-07-03 | 주식회사 로웸 | System and method for secure login, and apparatus for same |
CN103383216A (en) * | 2012-12-31 | 2013-11-06 | 于净 | Bullet cabinet and identity identifying method for bullet cabinet user |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106060034A (en) * | 2016-05-27 | 2016-10-26 | 深圳市永兴元科技有限公司 | Account login method and device |
CN105959317A (en) * | 2016-07-11 | 2016-09-21 | 深圳市金立通信设备有限公司 | Security authentication method and terminal |
CN108021803A (en) * | 2016-10-31 | 2018-05-11 | 黄策 | The management method of protection account logon information is divided by space-time |
CN107580001A (en) * | 2017-10-20 | 2018-01-12 | 珠海市魅族科技有限公司 | Using login and authentication information method to set up, device, computer installation and storage medium |
CN107580001B (en) * | 2017-10-20 | 2021-04-13 | 珠海市魅族科技有限公司 | Application login and authentication information setting method and device, computer device and storage medium |
CN109274683A (en) * | 2018-10-30 | 2019-01-25 | 国网安徽省电力有限公司信息通信分公司 | A kind of combined crosswise Verification System and its authentication method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20180054460A1 (en) | Techniques to provide network security through just-in-time provisioned accounts | |
CN105490987A (en) | Network integration identity authentication method | |
CN104202338B (en) | A kind of safety access method being applicable to enterprise-level Mobile solution | |
ATE454000T1 (en) | AUTHENTICATION PROCEDURE | |
WO2005096701A3 (en) | System and method for enabling authorization of a network device using attribute certificates | |
CN103795731A (en) | User account login method | |
WO2007127485A3 (en) | Providing guest users access to network resources through an enterprise network | |
CN104270754B (en) | A kind of Subscriber Identity Module method for authenticating and device | |
CN106161348B (en) | Single sign-on method, system and terminal | |
CN106778138A (en) | The control method and device of software license limit | |
CN103268447B (en) | A kind of anti-fishing method and system | |
EP3374852A1 (en) | Authorized areas of authentication | |
CN106488453A (en) | A kind of method and system of portal certification | |
CN104519479A (en) | Methods for terminal to lock net and unlock net | |
WO2012108661A3 (en) | System and method for security authentication of a bi-directional subscriber on a communication network, and recording medium on which the method is recorded | |
CN103780584A (en) | Cloud computing-based identity authentication fusion method | |
CN110677415A (en) | Network information safety protection system | |
CN109672695A (en) | A kind of double factor identity identifying method and device | |
CN106203009A (en) | A kind of terminal unit processing method and processing device | |
CN103428698B (en) | Mobile interchange participant's identity strong authentication method | |
CN102413146A (en) | Client authorized logon method based on dynamic codes | |
Sahd et al. | Mobile technology risk management | |
CN106982214A (en) | A kind of cloud desktop security of use NFC technique logs in ID card and cloud desktop security login method | |
CN105656936A (en) | Data encryption and storage method | |
CN104143062A (en) | Bluetooth technology based computer system security authentication and protection method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160413 |
|
WD01 | Invention patent application deemed withdrawn after publication |