CN105978891A - Identify authentication method and system during improved wireless communication process - Google Patents

Identify authentication method and system during improved wireless communication process Download PDF

Info

Publication number
CN105978891A
CN105978891A CN201610467615.4A CN201610467615A CN105978891A CN 105978891 A CN105978891 A CN 105978891A CN 201610467615 A CN201610467615 A CN 201610467615A CN 105978891 A CN105978891 A CN 105978891A
Authority
CN
China
Prior art keywords
information
server
user
mobile terminal
pressing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610467615.4A
Other languages
Chinese (zh)
Other versions
CN105978891B (en
Inventor
张林海
苏维璐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu blue brothers Network Technology Co.,Ltd.
Original Assignee
Ningbo Joy Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Joy Communication Technology Co Ltd filed Critical Ningbo Joy Communication Technology Co Ltd
Priority to CN201610467615.4A priority Critical patent/CN105978891B/en
Publication of CN105978891A publication Critical patent/CN105978891A/en
Application granted granted Critical
Publication of CN105978891B publication Critical patent/CN105978891B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0861Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals

Abstract

The invention discloses an identity authentication method during an improved wireless communication process. The method comprises the steps of pre-storing historical transaction information and operation information of a user in a server; according to a corresponding relation table, setting a weight corresponding to each piece of frequently used address information; acquiring the transaction request information of the user sent by a mobile terminal, acquiring user network information from the transaction request information of the user, and judging whether the user is located at a frequently used address according to the user network information and the frequently used address information by using the server; if yes, going to the step 3, and otherwise, going to the step 2; S2, sending user authentication request information to the mobile terminal by the server, recognizing fingerprint information and press information of the user by the mobile terminal, and when both the fingerprint information and press information are authenticated, sending the authentication result information to the server, and going to the step S5; S5, determining that the identity is authenticated and ending the processes of the method by using the server; and S6, determining that the identity is not authenticated and ending the processes of the method by using the server.

Description

Auth method and system in a kind of modified model wireless communication procedure
Technical field
The present invention relates to wireless communication technology field, particularly to auth method and system in a kind of modified model wireless communication procedure.
Background technology
On-line payment refers to that, when the seller and the buyer are traded by the e-commerce website on the Internet, bank provides a kind of business of online capital settlement service for it.It for enterprises and individuals provide one safely, quickly, convenient E-business applications environment and online capital settlement instrument.On-line payment not only helps enterprise to achieve quickly collecting of sales payment, shortens the gathering cycle, the most also provides consumption online payment and settlement mode for individual Web bank client, makes client be truly realized home-confined, shopping online.
When carrying out on-line payment, the authentication of user is the emphasis being related to payment safety.In prior art, combine bio-identification often through password and carry out authentication, but password also exists stolen defect, and biological characteristic is owing to having uniqueness, and cannot be carried out change, therefore there is also the defect being illegally used.
Summary of the invention
In view of this, auth method and system during the present invention proposes a kind of modified model wireless communication procedure.
Auth method in a kind of modified model wireless communication procedure, it comprises the steps:
The historical transactional information of S1, in the server prestored user and operation information;Frequent address information is set in the server, frequent address information and the historical transactional information of user and the mapping table of operation information are set;According to mapping table, the weights that each frequent address information is corresponding are set;Server obtains the transaction request information of the user that mobile terminal sends, and obtains user network information, judge whether user is in conventional address according to user network information and conventional address information from customer transaction solicited message;The most then continue to judge that a weights that often address information is corresponding whether more than preset security threshold value, the most then jumps to step S3, otherwise jumps to step S2;
S2, server send user authentication request message to mobile terminal, and finger print information and the pressing information of user are identified by mobile terminal, finger print information and pressing information all by checking time, the result information is sent to server and jumps to step S5;When being verified when only finger print information, the result information is sent to server and jumps to step S3;When only pressing information is by checking, the result information is sent to server and jumps to step S4;When finger print information and pressing information are the most not verified, the result information are sent to server and jump to step S6;
S3, server send password authentification solicited message to mobile terminal, and mobile terminal receives the password of user's input and verifies, when being verified, password authentification object information is sent to server and jumps to step S5;When checking is not passed through, password authentification object information is sent to server and jumps to step S6;
S4, server send short-message verification information and password authentification solicited message to mobile terminal, the password of mobile terminal user's input to receiving and short-message verification information verifying, when both of which is verified, password user inputted and the result information of short-message verification information are sent to server and jump to step S5;Otherwise, password user inputted and the result information of short-message verification information are sent to server and jump to step S6;
S5, server judge that authentication is passed through, and terminate this method flow process after completing transaction;
S6, server judge that authentication is not passed through, and record this result information in the server and terminate this method flow process.
In modified model wireless communication procedure of the present invention in auth method, described pressing information includes:
User fingerprints information being divided into multiple area pressed, and presets the pressing activation threshold value of multiple area presseds and press order information, the pressing activation threshold value of each area pressed all differs;And area pressed information and pressing activation threshold value information are pre-stored on mobile terminal;
User time enterprising row presses in mobile terminal, first determines whether that whether the press pressure value of each area pressed is more than activation threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge to press order information the most correct, when pressing order information and being correct, it is judged that pressing information is by checking.
In modified model wireless communication procedure of the present invention in auth method, judge that whether the press pressure value of each area pressed is more than activation threshold value by mobile terminal pressure inductor.
In modified model wireless communication procedure of the present invention in auth method, described step S6 also includes that server judges that authentication is not passed through, and points out to mobile terminal and does not passes through information and freeze mobile terminal preset exchange hour and terminate this method flow process.
The present invention also provides for authentication system in a kind of modified model wireless communication procedure, and it includes such as lower unit:
Address judging unit, for historical transactional information and the operation information of prestored user in the server;Frequent address information is set in the server, frequent address information and the historical transactional information of user and the mapping table of operation information are set;According to mapping table, the weights that each frequent address information is corresponding are set;Server obtains the transaction request information of the user that mobile terminal sends, and obtains user network information, judge whether user is in conventional address according to user network information and conventional address information from customer transaction solicited message;The most then continue to judge that a weights that often address information is corresponding whether more than preset security threshold value, the most then jumps to individual event authentication unit, otherwise jumps to first authentication unit;
First authentication unit, for sending user authentication request message by server to mobile terminal, finger print information and the pressing information of user are identified by mobile terminal, finger print information and pressing information all by checking time, the result information is sent to server and jump to conclude the business performance element;When being verified when only finger print information, the result information is sent to server and jumps to individual event authentication unit;When only pressing information is by checking, the result information is sent to server and jumps to bi-directional verification unit;When finger print information and pressing information are the most not verified, the result information are sent to server and jump to terminate unit;
Individual event authentication unit, for sending password authentification solicited message by server to mobile terminal, mobile terminal receives the password of user's input and verifies, when being verified, password authentification object information is sent to server and jumps to performance element of concluding the business;When checking is not passed through, password authentification object information is sent to server and jumps to terminate unit;
Bi-directional verification unit, for sending short-message verification information and password authentification solicited message to mobile terminal by server, the password of mobile terminal user's input to receiving and short-message verification information verifying, when both of which is verified, password user inputted and the result information of short-message verification information are sent to server and jump to performance element of concluding the business;Otherwise, password user inputted and the result information of short-message verification information are sent to server and jump to terminate unit;
Transaction performance element, for judging that authentication is passed through by server, and terminates native system function after completing transaction;
Terminate unit, for judging that authentication is not passed through at server, record this result information in the server and terminate native system function.
In modified model wireless communication procedure of the present invention in authentication system, described pressing information includes:
User fingerprints information being divided into multiple area pressed, and presets the pressing activation threshold value of multiple area presseds and press order information, the pressing activation threshold value of each area pressed all differs;And area pressed information and pressing activation threshold value information are pre-stored on mobile terminal;
User time enterprising row presses in mobile terminal, first determines whether that whether the press pressure value of each area pressed is more than activation threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge to press order information the most correct, when pressing order information and being correct, it is judged that pressing information is by checking.
In modified model wireless communication procedure of the present invention in authentication system, judge that whether the press pressure value of each area pressed is more than activation threshold value by mobile terminal pressure inductor.
In modified model wireless communication procedure of the present invention in authentication system, described termination unit also includes that server judges that authentication is not passed through, and points out to mobile terminal and does not passes through information and freeze mobile terminal preset exchange hour and terminate native system function.
Implement auth method and system in the modified model wireless communication procedure that the present invention provides and compared with prior art have the advantages that by distinguishing various scenes, use different authentication policys, the authentication of different safety class can be carried out while satisfied checking convenience;Additionally, by user fingerprints information being divided into multiple area pressed, and preset the pressing activation threshold value of multiple area presseds and press order information, and area pressed information and pressing activation threshold value information are pre-stored on mobile terminal;User time enterprising row presses in mobile terminal, first determines whether that whether the press pressure value of each area pressed is more than activation threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge to press order information the most correct, when pressing order information and being correct, it is judged that pressing information is by checking so that other people cannot get a glimpse of the proof procedure of user, and safe coefficient is high.
Additionally, the present invention is by arranging historical transactional information and the mapping table of operation information of frequent address information and user;According to mapping table, the weights that each frequent address information is corresponding are set;Server obtains the transaction request information of the user that mobile terminal sends, and obtains user network information, judge whether user is in conventional address according to user network information and conventional address information from customer transaction solicited message;The most then continue to judge that whether a weights that often address information is corresponding is more than preset security threshold value.Historical transactional information and the operation information of the frequent address information of user with user are combined, by the preliminary action trail figure describing user, increase the safety of authentication in communication, overcome the unicity of regular identity checking.
Accompanying drawing explanation
Fig. 1 be the embodiment of the present invention modified model wireless communication procedure in the structured flowchart of authentication system.
Detailed description of the invention
Auth method in a kind of modified model wireless communication procedure, it comprises the steps:
The historical transactional information of S1, in the server prestored user and operation information;Frequent address information is set in the server, frequent address information and the historical transactional information of user and the mapping table of operation information are set;According to mapping table, the weights that each frequent address information is corresponding are set;Server obtains the transaction request information of the user that mobile terminal sends, and obtains user network information, judge whether user is in conventional address according to user network information and conventional address information from customer transaction solicited message;The most then continue to judge that a weights that often address information is corresponding whether more than preset security threshold value, the most then jumps to step S3, otherwise jumps to step S2;
S2, server send user authentication request message to mobile terminal, and finger print information and the pressing information of user are identified by mobile terminal, finger print information and pressing information all by checking time, the result information is sent to server and jumps to step S5;When being verified when only finger print information, the result information is sent to server and jumps to step S3;When only pressing information is by checking, the result information is sent to server and jumps to step S4;When finger print information and pressing information are the most not verified, the result information are sent to server and jump to step S6;
S3, server send password authentification solicited message to mobile terminal, and mobile terminal receives the password of user's input and verifies, when being verified, password authentification object information is sent to server and jumps to step S5;When checking is not passed through, password authentification object information is sent to server and jumps to step S6;
S4, server send short-message verification information and password authentification solicited message to mobile terminal, the password of mobile terminal user's input to receiving and short-message verification information verifying, when both of which is verified, password user inputted and the result information of short-message verification information are sent to server and jump to step S5;Otherwise, password user inputted and the result information of short-message verification information are sent to server and jump to step S6;
S5, server judge that authentication is passed through, and terminate this method flow process after completing transaction;
S6, server judge that authentication is not passed through, and record this result information in the server and terminate this method flow process.
In modified model wireless communication procedure of the present invention in auth method, described pressing information includes:
User fingerprints information being divided into multiple area pressed, and presets the pressing activation threshold value of multiple area presseds and press order information, the pressing activation threshold value of each area pressed all differs;And area pressed information and pressing activation threshold value information are pre-stored on mobile terminal;
User time enterprising row presses in mobile terminal, first determines whether that whether the press pressure value of each area pressed is more than activation threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge to press order information the most correct, when pressing order information and being correct, it is judged that pressing information is by checking.
In modified model wireless communication procedure of the present invention in auth method, judge that whether the press pressure value of each area pressed is more than activation threshold value by mobile terminal pressure inductor.Alternatively, the pressure inductor identical with iphone6s can be used to judge.
In modified model wireless communication procedure of the present invention in auth method, described step S6 also includes that server judges that authentication is not passed through, and points out to mobile terminal and does not passes through information and freeze mobile terminal preset exchange hour and terminate this method flow process.
As it is shown in figure 1, the present invention also provides for authentication system in a kind of modified model wireless communication procedure, it includes such as lower unit:
Address judging unit, for historical transactional information and the operation information of prestored user in the server;Frequent address information is set in the server, frequent address information and the historical transactional information of user and the mapping table of operation information are set;According to mapping table, the weights that each frequent address information is corresponding are set;Server obtains the transaction request information of the user that mobile terminal sends, and obtains user network information, judge whether user is in conventional address according to user network information and conventional address information from customer transaction solicited message;The most then continue to judge that a weights that often address information is corresponding whether more than preset security threshold value, the most then jumps to individual event authentication unit, otherwise jumps to first authentication unit;
First authentication unit, for sending user authentication request message by server to mobile terminal, finger print information and the pressing information of user are identified by mobile terminal, finger print information and pressing information all by checking time, the result information is sent to server and jump to conclude the business performance element;When being verified when only finger print information, the result information is sent to server and jumps to individual event authentication unit;When only pressing information is by checking, the result information is sent to server and jumps to bi-directional verification unit;When finger print information and pressing information are the most not verified, the result information are sent to server and jump to terminate unit;
Individual event authentication unit, for sending password authentification solicited message by server to mobile terminal, mobile terminal receives the password of user's input and verifies, when being verified, password authentification object information is sent to server and jumps to performance element of concluding the business;When checking is not passed through, password authentification object information is sent to server and jumps to terminate unit;
Bi-directional verification unit, for sending short-message verification information and password authentification solicited message to mobile terminal by server, the password of mobile terminal user's input to receiving and short-message verification information verifying, when both of which is verified, password user inputted and the result information of short-message verification information are sent to server and jump to performance element of concluding the business;Otherwise, password user inputted and the result information of short-message verification information are sent to server and jump to terminate unit;
Transaction performance element, for judging that authentication is passed through by server, and terminates native system function after completing transaction;
Terminate unit, for when server judges that authentication is not passed through, recording this result information in the server and terminate native system function.
In modified model wireless communication procedure of the present invention in authentication system, described pressing information includes:
User fingerprints information being divided into multiple area pressed, and presets the pressing activation threshold value of multiple area presseds and press order information, the pressing activation threshold value of each area pressed all differs;And area pressed information and pressing activation threshold value information are pre-stored on mobile terminal;
User time enterprising row presses in mobile terminal, first determines whether that whether the press pressure value of each area pressed is more than activation threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge to press order information the most correct, when pressing order information and being correct, it is judged that pressing information is by checking.
In modified model wireless communication procedure of the present invention in authentication system, judge that whether the press pressure value of each area pressed is more than activation threshold value by mobile terminal pressure inductor.
In modified model wireless communication procedure of the present invention in authentication system, described termination unit also includes that server judges that authentication is not passed through, and points out to mobile terminal and does not passes through information and freeze mobile terminal preset exchange hour and terminate native system function.
Implement auth method and system in the modified model wireless communication procedure that the present invention provides and compared with prior art have the advantages that by distinguishing various scenes, use different authentication policys, the authentication of different safety class can be carried out while satisfied checking convenience;Additionally, by user fingerprints information being divided into multiple area pressed, and preset the pressing activation threshold value of multiple area presseds and press order information, and area pressed information and pressing activation threshold value information are pre-stored on mobile terminal;User time enterprising row presses in mobile terminal, first determines whether that whether the press pressure value of each area pressed is more than activation threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge to press order information the most correct, when pressing order information and being correct, it is judged that pressing information is by checking so that other people cannot get a glimpse of the proof procedure of user, and safe coefficient is high.
Additionally, the present invention is by arranging historical transactional information and the mapping table of operation information of frequent address information and user;According to mapping table, the weights that each frequent address information is corresponding are set;Server obtains the transaction request information of the user that mobile terminal sends, and obtains user network information, judge whether user is in conventional address according to user network information and conventional address information from customer transaction solicited message;The most then continue to judge that whether a weights that often address information is corresponding is more than preset security threshold value.Historical transactional information and the operation information of the frequent address information of user with user are combined, by the preliminary action trail figure describing user, increase the safety of authentication in communication, overcome the unicity of regular identity checking.
It is understood that for the person of ordinary skill of the art, can conceive according to the technology of the present invention and make other various corresponding changes and deformation, and all these change all should belong to the protection domain of the claims in the present invention with deformation.

Claims (8)

1. auth method in a modified model wireless communication procedure, it is characterised in that it comprises the steps:
The historical transactional information of S1, in the server prestored user and operation information;Frequent address information is set in the server, frequent address information and the historical transactional information of user and the mapping table of operation information are set;According to mapping table, the weights that each frequent address information is corresponding are set;Server obtains the transaction request information of the user that mobile terminal sends, and obtains user network information, judge whether user is in conventional address according to user network information and conventional address information from customer transaction solicited message;The most then continue to judge that a weights that often address information is corresponding whether more than preset security threshold value, the most then jumps to step S3, otherwise jumps to step S2;
S2, server send user authentication request message to mobile terminal, and finger print information and the pressing information of user are identified by mobile terminal, finger print information and pressing information all by checking time, the result information is sent to server and jumps to step S5;When being verified when only finger print information, the result information is sent to server and jumps to step S3;When only pressing information is by checking, the result information is sent to server and jumps to step S4;When finger print information and pressing information are the most not verified, the result information are sent to server and jump to step S6;
S3, server send password authentification solicited message to mobile terminal, and mobile terminal receives the password of user's input and verifies, when being verified, password authentification object information is sent to server and jumps to step S5;When checking is not passed through, password authentification object information is sent to server and jumps to step S6;
S4, server send short-message verification information and password authentification solicited message to mobile terminal, the password of mobile terminal user's input to receiving and short-message verification information verifying, when both of which is verified, password user inputted and the result information of short-message verification information are sent to server and jump to step S5;Otherwise, password user inputted and the result information of short-message verification information are sent to server and jump to step S6;
S5, server judge that authentication is passed through, and terminate this method flow process after completing transaction;
S6, server judge that authentication is not passed through, and record this result information in the server and terminate this method flow process.
2. auth method in modified model wireless communication procedure as claimed in claim 1, it is characterised in that described pressing information includes:
User fingerprints information being divided into multiple area pressed, and presets the pressing activation threshold value of multiple area presseds and press order information, the pressing activation threshold value of each area pressed all differs;And area pressed information and pressing activation threshold value information are pre-stored on mobile terminal;
User time enterprising row presses in mobile terminal, first determines whether that whether the press pressure value of each area pressed is more than activation threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge to press order information the most correct, when pressing order information and being correct, it is judged that pressing information is by checking.
3. auth method in modified model wireless communication procedure as claimed in claim 2, it is characterised in that judge that whether the press pressure value of each area pressed is more than activation threshold value by mobile terminal pressure inductor.
4. auth method in the modified model wireless communication procedure as described in any one of claims 1 to 3, it is characterized in that, described step S6 also includes that server judges that authentication is not passed through, and points out to mobile terminal and does not passes through information and freeze mobile terminal preset exchange hour and terminate this method flow process.
5. authentication system in a modified model wireless communication procedure, it is characterised in that it includes such as lower unit:
Address judging unit, for historical transactional information and the operation information of prestored user in the server;Frequent address information is set in the server, frequent address information and the historical transactional information of user and the mapping table of operation information are set;According to mapping table, the weights that each frequent address information is corresponding are set;Server obtains the transaction request information of the user that mobile terminal sends, and obtains user network information, judge whether user is in conventional address according to user network information and conventional address information from customer transaction solicited message;The most then continue to judge that a weights that often address information is corresponding whether more than preset security threshold value, the most then jumps to individual event authentication unit, otherwise jumps to first authentication unit;
First authentication unit, for sending user authentication request message by server to mobile terminal, finger print information and the pressing information of user are identified by mobile terminal, finger print information and pressing information all by checking time, the result information is sent to server and jump to conclude the business performance element;When being verified when only finger print information, the result information is sent to server and jumps to individual event authentication unit;When only pressing information is by checking, the result information is sent to server and jumps to bi-directional verification unit;When finger print information and pressing information are the most not verified, the result information are sent to server and jump to terminate unit;
Individual event authentication unit, for sending password authentification solicited message by server to mobile terminal, mobile terminal receives the password of user's input and verifies, when being verified, password authentification object information is sent to server and jumps to performance element of concluding the business;When checking is not passed through, password authentification object information is sent to server and jumps to terminate unit;
Bi-directional verification unit, for sending short-message verification information and password authentification solicited message to mobile terminal by server, the password of mobile terminal user's input to receiving and short-message verification information verifying, when both of which is verified, password user inputted and the result information of short-message verification information are sent to server and jump to performance element of concluding the business;Otherwise, password user inputted and the result information of short-message verification information are sent to server and jump to terminate unit;
Transaction performance element, for judging that authentication is passed through by server, and terminates native system function after completing transaction;
Terminate unit, for when server judges that authentication is not passed through, recording this result information in the server and terminate native system function.
6. authentication system in modified model wireless communication procedure as claimed in claim 5, it is characterised in that described pressing information includes:
User fingerprints information being divided into multiple area pressed, and presets the pressing activation threshold value of multiple area presseds and press order information, the pressing activation threshold value of each area pressed all differs;And area pressed information and pressing activation threshold value information are pre-stored on mobile terminal;
User time enterprising row presses in mobile terminal, first determines whether that whether the press pressure value of each area pressed is more than activation threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge to press order information the most correct, when pressing order information and being correct, it is judged that pressing information is by checking.
7. authentication system in modified model wireless communication procedure as claimed in claim 6, it is characterised in that judge that whether the press pressure value of each area pressed is more than activation threshold value by mobile terminal pressure inductor.
8. authentication system in the modified model wireless communication procedure as described in any one of claim 5 to 7, it is characterized in that, described termination unit also includes that server judges that authentication is not passed through, and points out to mobile terminal and does not passes through information and freeze mobile terminal preset exchange hour and terminate native system function.
CN201610467615.4A 2016-06-24 2016-06-24 Auth method and system in a kind of modified wireless communication procedure Active CN105978891B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610467615.4A CN105978891B (en) 2016-06-24 2016-06-24 Auth method and system in a kind of modified wireless communication procedure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610467615.4A CN105978891B (en) 2016-06-24 2016-06-24 Auth method and system in a kind of modified wireless communication procedure

Publications (2)

Publication Number Publication Date
CN105978891A true CN105978891A (en) 2016-09-28
CN105978891B CN105978891B (en) 2019-08-30

Family

ID=57019770

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610467615.4A Active CN105978891B (en) 2016-06-24 2016-06-24 Auth method and system in a kind of modified wireless communication procedure

Country Status (1)

Country Link
CN (1) CN105978891B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107293072A (en) * 2017-07-09 2017-10-24 杭州力谱科技有限公司 A kind of ATM automatic teller machines
CN107818251A (en) * 2017-09-27 2018-03-20 维沃移动通信有限公司 A kind of face identification method and mobile terminal
CN109829821A (en) * 2019-01-16 2019-05-31 海南新软软件有限公司 A kind of abnormal processing method of digital asset address transfer, apparatus and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102325062A (en) * 2011-09-20 2012-01-18 北京神州绿盟信息安全科技股份有限公司 Abnormal login detecting method and device
CN104933351A (en) * 2015-05-26 2015-09-23 小米科技有限责任公司 Information security processing method and information security processing device
CN105069626A (en) * 2015-07-23 2015-11-18 北京京东尚科信息技术有限公司 Detection method and detection system for shopping abnormity
CN105404875A (en) * 2015-11-30 2016-03-16 南昌欧菲生物识别技术有限公司 Fingerprint recognition apparatus, fingerprint recognition method and terminal device for same
US20160164870A1 (en) * 2014-02-07 2016-06-09 Bank Of America Corporation User authentication based on fob/indicia scan

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102325062A (en) * 2011-09-20 2012-01-18 北京神州绿盟信息安全科技股份有限公司 Abnormal login detecting method and device
US20160164870A1 (en) * 2014-02-07 2016-06-09 Bank Of America Corporation User authentication based on fob/indicia scan
CN104933351A (en) * 2015-05-26 2015-09-23 小米科技有限责任公司 Information security processing method and information security processing device
CN105069626A (en) * 2015-07-23 2015-11-18 北京京东尚科信息技术有限公司 Detection method and detection system for shopping abnormity
CN105404875A (en) * 2015-11-30 2016-03-16 南昌欧菲生物识别技术有限公司 Fingerprint recognition apparatus, fingerprint recognition method and terminal device for same

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107293072A (en) * 2017-07-09 2017-10-24 杭州力谱科技有限公司 A kind of ATM automatic teller machines
CN107818251A (en) * 2017-09-27 2018-03-20 维沃移动通信有限公司 A kind of face identification method and mobile terminal
CN109829821A (en) * 2019-01-16 2019-05-31 海南新软软件有限公司 A kind of abnormal processing method of digital asset address transfer, apparatus and system

Also Published As

Publication number Publication date
CN105978891B (en) 2019-08-30

Similar Documents

Publication Publication Date Title
US10785212B2 (en) Automated access data provisioning
US9256869B2 (en) Authentication and verification services for third party vendors using mobile devices
CA2531487C (en) Managing activation of cardholders in a secure authentication program
US8683571B2 (en) System and method for authentication of users in a secure computer system
US8527417B2 (en) Methods and systems for authenticating an identity of a payer in a financial transaction
US20150294313A1 (en) Systems, apparatus and methods for improved authentication
AU2020200734B2 (en) Systems and methods for monitoring computer authentication procedures
WO2017140190A1 (en) Method and device for authenticating user identity based on transaction data
US20030046237A1 (en) Method and system for enabling the issuance of biometrically secured online credit or other online payment transactions without tokens
US9092778B2 (en) Bank account protection method utilizing a variable assigning request string generator and receiver algorithm
CN105978891A (en) Identify authentication method and system during improved wireless communication process
WO2017204942A1 (en) System and method for processing a transaction with secured authentication
WO2014055279A1 (en) Authentication system
US20100175120A1 (en) Multi-layer data mapping authentication system
CN106211153A (en) Auth method and system in a kind of wireless communication procedure based on big data
US20150206147A1 (en) Dynamic Security Code
WO2019047880A1 (en) Real person authentication method and apparatus
WO2015138976A2 (en) Dynamic security code
CN106209787A (en) Auth method and system in a kind of wireless communication procedure
Dostálek et al. Omnifactor authentication
CN112837147A (en) Business application handling implementation method and device and computer equipment
CN105719130B (en) Payment verification method, device and system
WO2008007939A1 (en) Convenient online payment system
US10003464B1 (en) Biometric identification system and associated methods
US11188904B2 (en) Methods, system and computer program products for wireless device based authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210924

Address after: 610000 No. 7, floor 16, building 1, No. 666, Jitai Road, Chengdu hi tech Zone, China (Sichuan) pilot Free Trade Zone, Chengdu, Sichuan

Patentee after: Chengdu blue brothers Network Technology Co.,Ltd.

Address before: 315000 room 161, Chuangye building, No. 66, academician Road, high tech Zone, Ningbo, Zhejiang

Patentee before: NINGBO YOULE COMMUNICATIONS TECHNOLOGY Co.,Ltd.