CN106339610A - Method and device for authenticating end user - Google Patents

Method and device for authenticating end user Download PDF

Info

Publication number
CN106339610A
CN106339610A CN201510401516.1A CN201510401516A CN106339610A CN 106339610 A CN106339610 A CN 106339610A CN 201510401516 A CN201510401516 A CN 201510401516A CN 106339610 A CN106339610 A CN 106339610A
Authority
CN
China
Prior art keywords
user
feature
biological
behavior
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510401516.1A
Other languages
Chinese (zh)
Inventor
钟焰涛
傅文治
蒋罗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510401516.1A priority Critical patent/CN106339610A/en
Publication of CN106339610A publication Critical patent/CN106339610A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The invention discloses a method and device for authenticating end user. The method comprises following steps: user behavior feature authentication is executed after a terminal system is entered; user biological feature authentication is executed when the user behavior feature authentication is failed; the terminal system is made to enter a safety state if the user biological feature authentication is failed; the terminal system is made to enter a use state if the user biological feature authentication is successful. According to the method and device of the invention, through twice user identification, it is can be distinguished that whether the terminal is used by the user, other users or illegal users, and different users have different use permissions according to different cases so that the information safety of terminal system is effectively enhanced.

Description

A kind of terminal user authentication method and apparatus
Technical field
The present invention relates to communication technical field, more particularly, to a kind of terminal user authentication method and apparatus.
Background technology
At present, in terminal, existing multiple technologies are capable of the certification of user, comprising: input password, handss Gesture identification, living things feature recognition etc..Disabled user's registration terminal system can effectively be prevented using these technology System, obtains the information of storage in terminal system.
But, existing user authentication is all carried out when user needs registration terminal system, and in user After having logged on terminal system, user authentication can't be carried out again to the user of using terminal.If After User logs in terminal system, terminal loss or borrowed by other users it is impossible to ensure terminal system The safety of the information of storage in system.For example: user during using terminal, terminal by other users steal, Rob, or borrow, now, already at state after certification, existing authentication mode is to other users for this terminal Will be unable to work again, in terminal system, the information of storage will open to other users.
Content of the invention
The present invention provides a kind of terminal user authentication method and apparatus, to solve in prior art, in user After registration terminal system, user will not be carried out again with user authentication, and the information security issue causing.
For above-mentioned technical problem, the present invention to solve by the following technical programs.
The invention provides a kind of terminal user authentication method, comprising: after entering terminal system, execution User behavior feature verification;In the case of the failure of described user behavior feature verification, execution user biological is special Levy certification;If described user biological feature verification failure, described terminal system is made to enter safe condition; If described user biological feature verification success, described terminal system is made to enter borrow state.
Wherein, described execution user behavior feature verification, comprising: the user of described terminal is currently held in collection Behavior characteristicss;The described behavior characteristicss of collection are mated with the behavior characteristicss prestoring;If coupling Failure, then user behavior feature verification failure;If the match is successful, the success of user behavior feature verification.
Wherein, described behavior characteristicss at least include one below: operating force feature, operation frequency feature and User's gait feature.
Wherein, described execution user biological feature verification, comprising: the user of described terminal is currently held in collection Biological characteristic;The described biological characteristic of collection is mated with the biological characteristic prestoring;If coupling Failure, then user biological feature verification failure;If the match is successful, the success of user biological feature verification.
Wherein, described biological characteristic at least includes one below: fingerprint characteristic, vocal print feature, iris feature And face characteristic.
Present invention also offers a kind of terminal user authentication device, comprising: behavior authentication module, for entering After entering terminal system, execute user behavior feature verification;Biological identification module, for recognizing in described behavior After user behavior feature failure described in card module authentication, execute user biological feature verification;State switches mould Block, for, after user biological feature failure described in described biological identification module authentication, making described terminal system System enters safe condition;After user biological feature success described in described biological identification module authentication, make institute State terminal system and enter borrow state.
Wherein, described behavior authentication module is used for: the behavior characteristicss of the user of described terminal are currently held in collection; The described behavior characteristicss of collection are mated with the behavior characteristicss prestoring;If it fails to match, user Behavior characteristicss authentification failure;If the match is successful, the success of user behavior feature verification.
Wherein, described behavior characteristicss at least include one below: operating force feature, operation frequency feature, User's gait feature.
Wherein, described biological identification module is used for: the biological characteristic of the user of described terminal is currently held in collection; The described biological characteristic of collection is mated with the biological characteristic prestoring;If it fails to match, user Biological characteristic authentication failure;If the match is successful, the success of user biological feature verification.
Wherein, described biological characteristic at least includes one below: fingerprint characteristic, vocal print feature, iris feature And face characteristic.
The present invention has the beneficial effect that:
The present invention, after user's Successful login terminal system, carries out double probate, for the first time for user behavior Feature verification, is for second user biological feature verification, all certification is successful for the first time and for the second time, and system is entered Enter personal state, this state is the personal terminal of home subscriber;First time authentification failure, second certification success, System enters borrow state, and this state borrows terminal for other users;For the first time and for the second time all authentification failure, System enters safe condition, and this state holds terminal for disabled user.Can effectively be strengthened end by the present invention The information security of end system.
Brief description
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, The schematic description and description of the present invention is used for explaining the present invention, does not constitute the improper limit to the present invention Fixed.In the accompanying drawings:
Fig. 1 is the flow chart of terminal user authentication method according to an embodiment of the invention;
Fig. 2 is the structure chart of terminal user authentication device according to an embodiment of the invention.
Specific embodiment
The main thought of the present invention is, after Successful login terminal system, carries out double probate, first Secondary is for second user biological feature verification for user behavior feature verification, for the first time and all certifications for the second time Success, system enters personal state, and this state is the personal terminal of home subscriber;First time authentification failure, Re-authentication success, system enters borrow state, and this state borrows terminal for other users;For the first time and the Secondary all authentification failures, system enters safe condition, and this state holds terminal for disabled user.By this The bright information security that can effectively strengthen terminal system.
The present invention passes through user authentication twice, can with distinguishing terminal be used by oneself by user, other users borrow or Invalid user stealing, carries out different disposal according to different situations, makes user have different access rights.
Under personal state, active user has highest authority, and user can check any in terminal system Information.In the home subscriber using terminal of terminal, system can enter auto state.
Under borrow state, the authority less than personal state for active user's authority, the authority higher than safe condition, User only can check the partial information in terminal system.The partial information that can be checked can be used by ownership Family is arranging.
In the secure state, active user's lack of competence, user can not check any information in terminal system. After terminal system further enters safe condition, screen locking process can be carried out to terminal.
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing and be embodied as Example, is described in further detail to the present invention.
According to embodiments of the invention, there is provided a kind of terminal user authentication method.According to as shown in Figure 1 The flow chart of the terminal user authentication method of one embodiment of the invention.
Step s110, after entering terminal system, executes user behavior feature verification.
User can carry out terminal screen unblock by modes such as password, fingerprint, screen sliding, enters terminal system, Terminal system enters personal state.During user's using terminal, in order to differentiate whether this user is eventually The home subscriber at end, carries out user behavior feature verification to the user currently holding terminal.Home subscriber refers to The owner of terminal.
User behavior feature verification, be judge currently to hold the behavior characteristicss of the user of terminal whether with ownership The behavior characteristicss of user match.Behavior characteristicss at least include one below: operating force feature, operation frequency Rate feature and user's gait feature.For example: the click force of user, click frequency, stride etc..
Step s120, judges whether user behavior feature verification is successful.If it is not, then execution step s130; If so, then execution step s170.
Specifically, the behavior characteristicss of the user a of terminal are currently held in collection;By the behavior characteristicss of collection and in advance The behavior characteristicss first storing are mated;If it fails to match, the failure of user behavior feature verification, illustrate to work as Before to hold the user a of terminal be not home subscriber, be other users;If the match is successful, user behavior is special Levy certification success, illustrate that the user a currently holding terminal is home subscriber.The behavior characteristicss prestoring are The behavior characteristicss of the home subscriber gathering in advance.
Judge that user behavior feature verification successfully needs the condition meeting can include following condition: currently hold The difference of the dynamics of user operation terminal of terminal and the operating force prestoring is less than default first threshold Value;The difference of the frequency of user operation terminal currently holding terminal and the operation frequency prestoring is less than pre- If Second Threshold;The gait of user currently holding terminal is similar with the gait prestoring, such as: all for Crippled, stride is mutually equal.Conversely, judging the failure of user behavior feature verification.
Step s130, executes user biological feature verification.
In the case of the failure of user behavior feature verification, the user a of collected behavior characteristicss is other users. This other users is to borrow user or disabled user.Borrow user and refer in the case of home subscriber mandate, The user of using terminal.Disabled user refers in the case of home subscriber is undelegated, illegal using terminal User.
In order to increase the information security of terminal system, carry out certification again, i.e. user biological feature verification, recognize Card currently holds the biological characteristic of the user of terminal, judges whether this biological characteristic is used with the ownership prestoring Whether the biological characteristic at family mates.Described biological characteristic at least includes one below: fingerprint characteristic, vocal print are special Levy, iris feature and face characteristic.
When executing user biological feature verification, user input biological characteristic can be pointed out.User is in this prompting The biological characteristic that lower input is specified.
Step s140, judges whether user biological feature verification is successful.If so, then execution step s150; If it is not, then execution step s160.
Specifically, the biological characteristic of the user a of terminal is currently held in collection;By the biological characteristic of collection and in advance The biological characteristic first storing is mated;If it fails to match, the failure of user biological feature verification, illustrate to use Family a is not validated user;If the match is successful, the success of user biological feature verification, illustrate that user a is Borrow user.The biological characteristic prestoring is the biological characteristic of the home subscriber gathering in advance.
Judge that user biological feature verification successfully needs the condition meeting can comprise following condition: the working as of collection Before hold similarity between the biological characteristic of user of terminal and the biological characteristic prestoring be more than default Similarity threshold.Further, judge that user biological feature verification successfully needs to meet following condition simultaneously: Similarity between the fingerprint characteristic of collection and the fingerprint characteristic prestoring is more than fingerprint similarity threshold;Adopt Similarity between the vocal print feature of collection and the vocal print feature prestoring is more than vocal print similarity threshold;Collection Iris feature and the iris feature prestoring between similarity be more than iris similarity threshold;And adopt Similarity between the face characteristic of collection and the face characteristic prestoring is more than human face similarity degree threshold value.Conversely, Then judge the failure of user biological feature verification.
Step s150, makes described terminal system enter borrow state.
Step s160, makes described terminal system enter safe condition.
Step s170, makes described terminal system run personal state.
Because when initially entering terminal system, terminal system enters personal state, so, through two After secondary certification, determine that user is home subscriber, terminal system may remain in personal state.
The behavior characteristicss of the home subscriber using during user behavior feature verification, and user biological feature verification When the biological characteristic of home subscriber that uses, can gather during home subscriber using terminal.
Present invention also offers a kind of terminal user authentication device.As shown in Fig. 2 being real according to the present invention one Apply the structure chart of the terminal user authentication device of example.
This device includes:
Behavior authentication module 210, for, after entering terminal system, executing user behavior feature verification.
Biological identification module 220, in user behavior feature failure described in described behavior authentication module authentication Afterwards, execute user biological feature verification.
State handover module 230, in user biological feature described in the certification of described biological identification module 220 After failure, described terminal system is made to enter safe condition;Described in the certification of described biological identification module 220 After user biological feature success, described terminal system is made to enter borrow state.
Described behavior authentication module 210 is used for: the behavior characteristicss of the user of described terminal are held in collection;To adopt The described behavior characteristicss of collection are mated with the behavior characteristicss prestoring;If it fails to match, user behavior Feature verification failure;If the match is successful, the success of user behavior feature verification.Described behavior characteristicss at least wrap Include one below: operating force feature, operation frequency feature, user's gait feature.
Described biological identification module 220 is used for: the biological characteristic of the user of described terminal is held in collection;To adopt The described biological characteristic of collection is mated with the biological characteristic prestoring;If it fails to match, user biological Feature verification failure;If the match is successful, the success of user biological feature verification.Described biological characteristic at least wraps Include one below: fingerprint characteristic, vocal print feature, iris feature and face characteristic.
The function of the device described in the present embodiment is described in the embodiment of the method shown in Fig. 1, Therefore not detailed part in the description of the present embodiment, may refer to the related description in previous embodiment, here is not Repeat.
The foregoing is only embodiments of the invention, be not limited to the present invention, for this area For technical staff, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, Any modification, equivalent substitution and improvement made etc., should be included within scope of the presently claimed invention.

Claims (10)

1. a kind of terminal user authentication method is it is characterised in that include:
After entering terminal system, execute user behavior feature verification;
In the case of the failure of described user behavior feature verification, execute user biological feature verification;
If described user biological feature verification failure, described terminal system is made to enter safe condition;
If described user biological feature verification success, described terminal system is made to enter borrow state.
2. method according to claim 1 is it is characterised in that described execution user behavior feature is recognized Card, comprising:
The behavior characteristicss of the user of described terminal are currently held in collection;
The described behavior characteristicss of collection are mated with the behavior characteristicss prestoring;
If it fails to match, the failure of user behavior feature verification;
If the match is successful, the success of user behavior feature verification.
3. method according to claim 2 it is characterised in that
Described behavior characteristicss at least include one below: operating force feature, operation frequency feature and user's step State feature.
4. method according to claim 1 is it is characterised in that described execution user biological feature is recognized Card, comprising:
The biological characteristic of the user of described terminal is currently held in collection;
The described biological characteristic of collection is mated with the biological characteristic prestoring;
If it fails to match, the failure of user biological feature verification;
If the match is successful, the success of user biological feature verification.
5. method according to claim 4 it is characterised in that
Described biological characteristic at least includes one below: fingerprint characteristic, vocal print feature, iris feature and face Feature.
6. a kind of terminal user authentication device is it is characterised in that include:
Behavior authentication module, for, after entering terminal system, executing user behavior feature verification;
Biological identification module, after failing in user behavior feature described in described behavior authentication module authentication, Execution user biological feature verification;
State handover module, after failing in user biological feature described in described biological identification module authentication, Described terminal system is made to enter safe condition;Become in user biological feature described in described biological identification module authentication After work(, described terminal system is made to enter borrow state.
7. device according to claim 6 is it is characterised in that described behavior authentication module is used for:
The behavior characteristicss of the user of described terminal are currently held in collection;
The described behavior characteristicss of collection are mated with the behavior characteristicss prestoring;
If it fails to match, the failure of user behavior feature verification;
If the match is successful, the success of user behavior feature verification.
8. device according to claim 7 it is characterised in that
Described behavior characteristicss at least include one below: operating force feature, operation frequency feature, Yong Hubu State feature.
9. device according to claim 6 is it is characterised in that described biological identification module is used for:
The biological characteristic of the user of described terminal is currently held in collection;
The described biological characteristic of collection is mated with the biological characteristic prestoring;
If it fails to match, the failure of user biological feature verification;
If the match is successful, the success of user biological feature verification.
10. device according to claim 9 it is characterised in that
Described biological characteristic at least includes one below: fingerprint characteristic, vocal print feature, iris feature and face Feature.
CN201510401516.1A 2015-07-09 2015-07-09 Method and device for authenticating end user Pending CN106339610A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510401516.1A CN106339610A (en) 2015-07-09 2015-07-09 Method and device for authenticating end user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510401516.1A CN106339610A (en) 2015-07-09 2015-07-09 Method and device for authenticating end user

Publications (1)

Publication Number Publication Date
CN106339610A true CN106339610A (en) 2017-01-18

Family

ID=57826428

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510401516.1A Pending CN106339610A (en) 2015-07-09 2015-07-09 Method and device for authenticating end user

Country Status (1)

Country Link
CN (1) CN106339610A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107612921A (en) * 2017-09-30 2018-01-19 北京梆梆安全科技有限公司 A kind of auth method and device based on click location
CN108959865A (en) * 2017-05-25 2018-12-07 阿里巴巴集团控股有限公司 A kind of verification method and device
CN109774653A (en) * 2019-01-31 2019-05-21 上海小蓦智能科技有限公司 A kind of dynamic adjusting method and device of Hierarchical Identity authentication mechanism
CN109858213A (en) * 2019-01-31 2019-06-07 上海小蓦智能科技有限公司 A kind of quick identity authentication method and device
CN112671979A (en) * 2020-12-14 2021-04-16 中国联合网络通信集团有限公司 Terminal anti-theft method and device
WO2021167615A1 (en) * 2020-02-20 2021-08-26 Hewlett-Packard Development Company, L.P. User authentication based on biometric data

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103455737A (en) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 User information protection method and device
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal
CN104008321A (en) * 2014-05-28 2014-08-27 惠州Tcl移动通信有限公司 Judging method and judging system for identifying user right based on fingerprint for mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103455737A (en) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 User information protection method and device
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal
CN104008321A (en) * 2014-05-28 2014-08-27 惠州Tcl移动通信有限公司 Judging method and judging system for identifying user right based on fingerprint for mobile terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959865A (en) * 2017-05-25 2018-12-07 阿里巴巴集团控股有限公司 A kind of verification method and device
CN108959865B (en) * 2017-05-25 2022-12-16 创新先进技术有限公司 Verification method and device
CN107612921A (en) * 2017-09-30 2018-01-19 北京梆梆安全科技有限公司 A kind of auth method and device based on click location
CN109774653A (en) * 2019-01-31 2019-05-21 上海小蓦智能科技有限公司 A kind of dynamic adjusting method and device of Hierarchical Identity authentication mechanism
CN109858213A (en) * 2019-01-31 2019-06-07 上海小蓦智能科技有限公司 A kind of quick identity authentication method and device
CN109858213B (en) * 2019-01-31 2020-09-04 北京蓦然认知科技有限公司 Method and device for rapid identity authentication
WO2021167615A1 (en) * 2020-02-20 2021-08-26 Hewlett-Packard Development Company, L.P. User authentication based on biometric data
CN112671979A (en) * 2020-12-14 2021-04-16 中国联合网络通信集团有限公司 Terminal anti-theft method and device

Similar Documents

Publication Publication Date Title
CN106339610A (en) Method and device for authenticating end user
CN111835689B (en) Identity authentication method of digital key, terminal device and medium
US20220318835A1 (en) Using a wireless transmitter and receiver to prevent unauthorized access to restricted computer systems
CN110851809B (en) Fingerprint identification method and device and touch screen terminal
CN104182670B (en) The method and Wearable being authenticated by Wearable
CN103378876A (en) Bluetooth-based terminal unlocking method
CN106600776A (en) Method and system of access control
CN107896226B (en) Network identity authentication system based on iris recognition
CN109067881B (en) Remote authorization method, device, equipment and storage medium thereof
US20160226883A1 (en) Using a wireless transmitter and receiver to prevent unauthorized access to restricted computer systems
US20180322477A1 (en) Multibank biometric authentication system applied in automatic teller machines equipped with biometric sensors
WO2018014322A1 (en) Residential intelligent door lock system and control method thereof
CN105184135A (en) Fingerprint recognition method and fingerprint recognition system
WO2016188230A1 (en) Unlocking method and device
CN105389497A (en) Security verification method and system for operation interface of fingerprint recognition
CN108154017A (en) A kind of method of password authentication and password validation system based on intelligent terminal
CN102160354A (en) Server system and method for providing at least one service
CN105631273A (en) Electronic apparatus security management and control system and method
JP4846367B2 (en) Presence-based access control
CN105678137A (en) Method and device for identity recognition
CN106127005A (en) The user management method of a kind of mobile terminal and system
CN105678149B (en) A kind of unlocking method and terminal
WO2018000234A1 (en) Method and system for controlling smart door access on basis of dual fingerprints
JP2016040684A (en) Composite authentication system
CN107065579A (en) The management method and system of a kind of smart home

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170118

RJ01 Rejection of invention patent application after publication