CN106339610A - Method and device for authenticating end user - Google Patents
Method and device for authenticating end user Download PDFInfo
- Publication number
- CN106339610A CN106339610A CN201510401516.1A CN201510401516A CN106339610A CN 106339610 A CN106339610 A CN 106339610A CN 201510401516 A CN201510401516 A CN 201510401516A CN 106339610 A CN106339610 A CN 106339610A
- Authority
- CN
- China
- Prior art keywords
- user
- feature
- biological
- behavior
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Abstract
The invention discloses a method and device for authenticating end user. The method comprises following steps: user behavior feature authentication is executed after a terminal system is entered; user biological feature authentication is executed when the user behavior feature authentication is failed; the terminal system is made to enter a safety state if the user biological feature authentication is failed; the terminal system is made to enter a use state if the user biological feature authentication is successful. According to the method and device of the invention, through twice user identification, it is can be distinguished that whether the terminal is used by the user, other users or illegal users, and different users have different use permissions according to different cases so that the information safety of terminal system is effectively enhanced.
Description
Technical field
The present invention relates to communication technical field, more particularly, to a kind of terminal user authentication method and apparatus.
Background technology
At present, in terminal, existing multiple technologies are capable of the certification of user, comprising: input password, handss
Gesture identification, living things feature recognition etc..Disabled user's registration terminal system can effectively be prevented using these technology
System, obtains the information of storage in terminal system.
But, existing user authentication is all carried out when user needs registration terminal system, and in user
After having logged on terminal system, user authentication can't be carried out again to the user of using terminal.If
After User logs in terminal system, terminal loss or borrowed by other users it is impossible to ensure terminal system
The safety of the information of storage in system.For example: user during using terminal, terminal by other users steal,
Rob, or borrow, now, already at state after certification, existing authentication mode is to other users for this terminal
Will be unable to work again, in terminal system, the information of storage will open to other users.
Content of the invention
The present invention provides a kind of terminal user authentication method and apparatus, to solve in prior art, in user
After registration terminal system, user will not be carried out again with user authentication, and the information security issue causing.
For above-mentioned technical problem, the present invention to solve by the following technical programs.
The invention provides a kind of terminal user authentication method, comprising: after entering terminal system, execution
User behavior feature verification;In the case of the failure of described user behavior feature verification, execution user biological is special
Levy certification;If described user biological feature verification failure, described terminal system is made to enter safe condition;
If described user biological feature verification success, described terminal system is made to enter borrow state.
Wherein, described execution user behavior feature verification, comprising: the user of described terminal is currently held in collection
Behavior characteristicss;The described behavior characteristicss of collection are mated with the behavior characteristicss prestoring;If coupling
Failure, then user behavior feature verification failure;If the match is successful, the success of user behavior feature verification.
Wherein, described behavior characteristicss at least include one below: operating force feature, operation frequency feature and
User's gait feature.
Wherein, described execution user biological feature verification, comprising: the user of described terminal is currently held in collection
Biological characteristic;The described biological characteristic of collection is mated with the biological characteristic prestoring;If coupling
Failure, then user biological feature verification failure;If the match is successful, the success of user biological feature verification.
Wherein, described biological characteristic at least includes one below: fingerprint characteristic, vocal print feature, iris feature
And face characteristic.
Present invention also offers a kind of terminal user authentication device, comprising: behavior authentication module, for entering
After entering terminal system, execute user behavior feature verification;Biological identification module, for recognizing in described behavior
After user behavior feature failure described in card module authentication, execute user biological feature verification;State switches mould
Block, for, after user biological feature failure described in described biological identification module authentication, making described terminal system
System enters safe condition;After user biological feature success described in described biological identification module authentication, make institute
State terminal system and enter borrow state.
Wherein, described behavior authentication module is used for: the behavior characteristicss of the user of described terminal are currently held in collection;
The described behavior characteristicss of collection are mated with the behavior characteristicss prestoring;If it fails to match, user
Behavior characteristicss authentification failure;If the match is successful, the success of user behavior feature verification.
Wherein, described behavior characteristicss at least include one below: operating force feature, operation frequency feature,
User's gait feature.
Wherein, described biological identification module is used for: the biological characteristic of the user of described terminal is currently held in collection;
The described biological characteristic of collection is mated with the biological characteristic prestoring;If it fails to match, user
Biological characteristic authentication failure;If the match is successful, the success of user biological feature verification.
Wherein, described biological characteristic at least includes one below: fingerprint characteristic, vocal print feature, iris feature
And face characteristic.
The present invention has the beneficial effect that:
The present invention, after user's Successful login terminal system, carries out double probate, for the first time for user behavior
Feature verification, is for second user biological feature verification, all certification is successful for the first time and for the second time, and system is entered
Enter personal state, this state is the personal terminal of home subscriber;First time authentification failure, second certification success,
System enters borrow state, and this state borrows terminal for other users;For the first time and for the second time all authentification failure,
System enters safe condition, and this state holds terminal for disabled user.Can effectively be strengthened end by the present invention
The information security of end system.
Brief description
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application,
The schematic description and description of the present invention is used for explaining the present invention, does not constitute the improper limit to the present invention
Fixed.In the accompanying drawings:
Fig. 1 is the flow chart of terminal user authentication method according to an embodiment of the invention;
Fig. 2 is the structure chart of terminal user authentication device according to an embodiment of the invention.
Specific embodiment
The main thought of the present invention is, after Successful login terminal system, carries out double probate, first
Secondary is for second user biological feature verification for user behavior feature verification, for the first time and all certifications for the second time
Success, system enters personal state, and this state is the personal terminal of home subscriber;First time authentification failure,
Re-authentication success, system enters borrow state, and this state borrows terminal for other users;For the first time and the
Secondary all authentification failures, system enters safe condition, and this state holds terminal for disabled user.By this
The bright information security that can effectively strengthen terminal system.
The present invention passes through user authentication twice, can with distinguishing terminal be used by oneself by user, other users borrow or
Invalid user stealing, carries out different disposal according to different situations, makes user have different access rights.
Under personal state, active user has highest authority, and user can check any in terminal system
Information.In the home subscriber using terminal of terminal, system can enter auto state.
Under borrow state, the authority less than personal state for active user's authority, the authority higher than safe condition,
User only can check the partial information in terminal system.The partial information that can be checked can be used by ownership
Family is arranging.
In the secure state, active user's lack of competence, user can not check any information in terminal system.
After terminal system further enters safe condition, screen locking process can be carried out to terminal.
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing and be embodied as
Example, is described in further detail to the present invention.
According to embodiments of the invention, there is provided a kind of terminal user authentication method.According to as shown in Figure 1
The flow chart of the terminal user authentication method of one embodiment of the invention.
Step s110, after entering terminal system, executes user behavior feature verification.
User can carry out terminal screen unblock by modes such as password, fingerprint, screen sliding, enters terminal system,
Terminal system enters personal state.During user's using terminal, in order to differentiate whether this user is eventually
The home subscriber at end, carries out user behavior feature verification to the user currently holding terminal.Home subscriber refers to
The owner of terminal.
User behavior feature verification, be judge currently to hold the behavior characteristicss of the user of terminal whether with ownership
The behavior characteristicss of user match.Behavior characteristicss at least include one below: operating force feature, operation frequency
Rate feature and user's gait feature.For example: the click force of user, click frequency, stride etc..
Step s120, judges whether user behavior feature verification is successful.If it is not, then execution step s130;
If so, then execution step s170.
Specifically, the behavior characteristicss of the user a of terminal are currently held in collection;By the behavior characteristicss of collection and in advance
The behavior characteristicss first storing are mated;If it fails to match, the failure of user behavior feature verification, illustrate to work as
Before to hold the user a of terminal be not home subscriber, be other users;If the match is successful, user behavior is special
Levy certification success, illustrate that the user a currently holding terminal is home subscriber.The behavior characteristicss prestoring are
The behavior characteristicss of the home subscriber gathering in advance.
Judge that user behavior feature verification successfully needs the condition meeting can include following condition: currently hold
The difference of the dynamics of user operation terminal of terminal and the operating force prestoring is less than default first threshold
Value;The difference of the frequency of user operation terminal currently holding terminal and the operation frequency prestoring is less than pre-
If Second Threshold;The gait of user currently holding terminal is similar with the gait prestoring, such as: all for
Crippled, stride is mutually equal.Conversely, judging the failure of user behavior feature verification.
Step s130, executes user biological feature verification.
In the case of the failure of user behavior feature verification, the user a of collected behavior characteristicss is other users.
This other users is to borrow user or disabled user.Borrow user and refer in the case of home subscriber mandate,
The user of using terminal.Disabled user refers in the case of home subscriber is undelegated, illegal using terminal
User.
In order to increase the information security of terminal system, carry out certification again, i.e. user biological feature verification, recognize
Card currently holds the biological characteristic of the user of terminal, judges whether this biological characteristic is used with the ownership prestoring
Whether the biological characteristic at family mates.Described biological characteristic at least includes one below: fingerprint characteristic, vocal print are special
Levy, iris feature and face characteristic.
When executing user biological feature verification, user input biological characteristic can be pointed out.User is in this prompting
The biological characteristic that lower input is specified.
Step s140, judges whether user biological feature verification is successful.If so, then execution step s150;
If it is not, then execution step s160.
Specifically, the biological characteristic of the user a of terminal is currently held in collection;By the biological characteristic of collection and in advance
The biological characteristic first storing is mated;If it fails to match, the failure of user biological feature verification, illustrate to use
Family a is not validated user;If the match is successful, the success of user biological feature verification, illustrate that user a is
Borrow user.The biological characteristic prestoring is the biological characteristic of the home subscriber gathering in advance.
Judge that user biological feature verification successfully needs the condition meeting can comprise following condition: the working as of collection
Before hold similarity between the biological characteristic of user of terminal and the biological characteristic prestoring be more than default
Similarity threshold.Further, judge that user biological feature verification successfully needs to meet following condition simultaneously:
Similarity between the fingerprint characteristic of collection and the fingerprint characteristic prestoring is more than fingerprint similarity threshold;Adopt
Similarity between the vocal print feature of collection and the vocal print feature prestoring is more than vocal print similarity threshold;Collection
Iris feature and the iris feature prestoring between similarity be more than iris similarity threshold;And adopt
Similarity between the face characteristic of collection and the face characteristic prestoring is more than human face similarity degree threshold value.Conversely,
Then judge the failure of user biological feature verification.
Step s150, makes described terminal system enter borrow state.
Step s160, makes described terminal system enter safe condition.
Step s170, makes described terminal system run personal state.
Because when initially entering terminal system, terminal system enters personal state, so, through two
After secondary certification, determine that user is home subscriber, terminal system may remain in personal state.
The behavior characteristicss of the home subscriber using during user behavior feature verification, and user biological feature verification
When the biological characteristic of home subscriber that uses, can gather during home subscriber using terminal.
Present invention also offers a kind of terminal user authentication device.As shown in Fig. 2 being real according to the present invention one
Apply the structure chart of the terminal user authentication device of example.
This device includes:
Behavior authentication module 210, for, after entering terminal system, executing user behavior feature verification.
Biological identification module 220, in user behavior feature failure described in described behavior authentication module authentication
Afterwards, execute user biological feature verification.
State handover module 230, in user biological feature described in the certification of described biological identification module 220
After failure, described terminal system is made to enter safe condition;Described in the certification of described biological identification module 220
After user biological feature success, described terminal system is made to enter borrow state.
Described behavior authentication module 210 is used for: the behavior characteristicss of the user of described terminal are held in collection;To adopt
The described behavior characteristicss of collection are mated with the behavior characteristicss prestoring;If it fails to match, user behavior
Feature verification failure;If the match is successful, the success of user behavior feature verification.Described behavior characteristicss at least wrap
Include one below: operating force feature, operation frequency feature, user's gait feature.
Described biological identification module 220 is used for: the biological characteristic of the user of described terminal is held in collection;To adopt
The described biological characteristic of collection is mated with the biological characteristic prestoring;If it fails to match, user biological
Feature verification failure;If the match is successful, the success of user biological feature verification.Described biological characteristic at least wraps
Include one below: fingerprint characteristic, vocal print feature, iris feature and face characteristic.
The function of the device described in the present embodiment is described in the embodiment of the method shown in Fig. 1,
Therefore not detailed part in the description of the present embodiment, may refer to the related description in previous embodiment, here is not
Repeat.
The foregoing is only embodiments of the invention, be not limited to the present invention, for this area
For technical staff, the present invention can have various modifications and variations.All within the spirit and principles in the present invention,
Any modification, equivalent substitution and improvement made etc., should be included within scope of the presently claimed invention.
Claims (10)
1. a kind of terminal user authentication method is it is characterised in that include:
After entering terminal system, execute user behavior feature verification;
In the case of the failure of described user behavior feature verification, execute user biological feature verification;
If described user biological feature verification failure, described terminal system is made to enter safe condition;
If described user biological feature verification success, described terminal system is made to enter borrow state.
2. method according to claim 1 is it is characterised in that described execution user behavior feature is recognized
Card, comprising:
The behavior characteristicss of the user of described terminal are currently held in collection;
The described behavior characteristicss of collection are mated with the behavior characteristicss prestoring;
If it fails to match, the failure of user behavior feature verification;
If the match is successful, the success of user behavior feature verification.
3. method according to claim 2 it is characterised in that
Described behavior characteristicss at least include one below: operating force feature, operation frequency feature and user's step
State feature.
4. method according to claim 1 is it is characterised in that described execution user biological feature is recognized
Card, comprising:
The biological characteristic of the user of described terminal is currently held in collection;
The described biological characteristic of collection is mated with the biological characteristic prestoring;
If it fails to match, the failure of user biological feature verification;
If the match is successful, the success of user biological feature verification.
5. method according to claim 4 it is characterised in that
Described biological characteristic at least includes one below: fingerprint characteristic, vocal print feature, iris feature and face
Feature.
6. a kind of terminal user authentication device is it is characterised in that include:
Behavior authentication module, for, after entering terminal system, executing user behavior feature verification;
Biological identification module, after failing in user behavior feature described in described behavior authentication module authentication,
Execution user biological feature verification;
State handover module, after failing in user biological feature described in described biological identification module authentication,
Described terminal system is made to enter safe condition;Become in user biological feature described in described biological identification module authentication
After work(, described terminal system is made to enter borrow state.
7. device according to claim 6 is it is characterised in that described behavior authentication module is used for:
The behavior characteristicss of the user of described terminal are currently held in collection;
The described behavior characteristicss of collection are mated with the behavior characteristicss prestoring;
If it fails to match, the failure of user behavior feature verification;
If the match is successful, the success of user behavior feature verification.
8. device according to claim 7 it is characterised in that
Described behavior characteristicss at least include one below: operating force feature, operation frequency feature, Yong Hubu
State feature.
9. device according to claim 6 is it is characterised in that described biological identification module is used for:
The biological characteristic of the user of described terminal is currently held in collection;
The described biological characteristic of collection is mated with the biological characteristic prestoring;
If it fails to match, the failure of user biological feature verification;
If the match is successful, the success of user biological feature verification.
10. device according to claim 9 it is characterised in that
Described biological characteristic at least includes one below: fingerprint characteristic, vocal print feature, iris feature and face
Feature.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510401516.1A CN106339610A (en) | 2015-07-09 | 2015-07-09 | Method and device for authenticating end user |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510401516.1A CN106339610A (en) | 2015-07-09 | 2015-07-09 | Method and device for authenticating end user |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106339610A true CN106339610A (en) | 2017-01-18 |
Family
ID=57826428
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510401516.1A Pending CN106339610A (en) | 2015-07-09 | 2015-07-09 | Method and device for authenticating end user |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106339610A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107612921A (en) * | 2017-09-30 | 2018-01-19 | 北京梆梆安全科技有限公司 | A kind of auth method and device based on click location |
CN108959865A (en) * | 2017-05-25 | 2018-12-07 | 阿里巴巴集团控股有限公司 | A kind of verification method and device |
CN109774653A (en) * | 2019-01-31 | 2019-05-21 | 上海小蓦智能科技有限公司 | A kind of dynamic adjusting method and device of Hierarchical Identity authentication mechanism |
CN109858213A (en) * | 2019-01-31 | 2019-06-07 | 上海小蓦智能科技有限公司 | A kind of quick identity authentication method and device |
CN112671979A (en) * | 2020-12-14 | 2021-04-16 | 中国联合网络通信集团有限公司 | Terminal anti-theft method and device |
WO2021167615A1 (en) * | 2020-02-20 | 2021-08-26 | Hewlett-Packard Development Company, L.P. | User authentication based on biometric data |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103455737A (en) * | 2012-05-28 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | User information protection method and device |
CN103927466A (en) * | 2014-04-01 | 2014-07-16 | 可牛网络技术(北京)有限公司 | Method and device for controlling mobile terminal |
CN104008321A (en) * | 2014-05-28 | 2014-08-27 | 惠州Tcl移动通信有限公司 | Judging method and judging system for identifying user right based on fingerprint for mobile terminal |
-
2015
- 2015-07-09 CN CN201510401516.1A patent/CN106339610A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103455737A (en) * | 2012-05-28 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | User information protection method and device |
CN103927466A (en) * | 2014-04-01 | 2014-07-16 | 可牛网络技术(北京)有限公司 | Method and device for controlling mobile terminal |
CN104008321A (en) * | 2014-05-28 | 2014-08-27 | 惠州Tcl移动通信有限公司 | Judging method and judging system for identifying user right based on fingerprint for mobile terminal |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108959865A (en) * | 2017-05-25 | 2018-12-07 | 阿里巴巴集团控股有限公司 | A kind of verification method and device |
CN108959865B (en) * | 2017-05-25 | 2022-12-16 | 创新先进技术有限公司 | Verification method and device |
CN107612921A (en) * | 2017-09-30 | 2018-01-19 | 北京梆梆安全科技有限公司 | A kind of auth method and device based on click location |
CN109774653A (en) * | 2019-01-31 | 2019-05-21 | 上海小蓦智能科技有限公司 | A kind of dynamic adjusting method and device of Hierarchical Identity authentication mechanism |
CN109858213A (en) * | 2019-01-31 | 2019-06-07 | 上海小蓦智能科技有限公司 | A kind of quick identity authentication method and device |
CN109858213B (en) * | 2019-01-31 | 2020-09-04 | 北京蓦然认知科技有限公司 | Method and device for rapid identity authentication |
WO2021167615A1 (en) * | 2020-02-20 | 2021-08-26 | Hewlett-Packard Development Company, L.P. | User authentication based on biometric data |
CN112671979A (en) * | 2020-12-14 | 2021-04-16 | 中国联合网络通信集团有限公司 | Terminal anti-theft method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106339610A (en) | Method and device for authenticating end user | |
CN111835689B (en) | Identity authentication method of digital key, terminal device and medium | |
US20220318835A1 (en) | Using a wireless transmitter and receiver to prevent unauthorized access to restricted computer systems | |
CN110851809B (en) | Fingerprint identification method and device and touch screen terminal | |
CN104182670B (en) | The method and Wearable being authenticated by Wearable | |
CN103378876A (en) | Bluetooth-based terminal unlocking method | |
CN106600776A (en) | Method and system of access control | |
CN107896226B (en) | Network identity authentication system based on iris recognition | |
CN109067881B (en) | Remote authorization method, device, equipment and storage medium thereof | |
US20160226883A1 (en) | Using a wireless transmitter and receiver to prevent unauthorized access to restricted computer systems | |
US20180322477A1 (en) | Multibank biometric authentication system applied in automatic teller machines equipped with biometric sensors | |
WO2018014322A1 (en) | Residential intelligent door lock system and control method thereof | |
CN105184135A (en) | Fingerprint recognition method and fingerprint recognition system | |
WO2016188230A1 (en) | Unlocking method and device | |
CN105389497A (en) | Security verification method and system for operation interface of fingerprint recognition | |
CN108154017A (en) | A kind of method of password authentication and password validation system based on intelligent terminal | |
CN102160354A (en) | Server system and method for providing at least one service | |
CN105631273A (en) | Electronic apparatus security management and control system and method | |
JP4846367B2 (en) | Presence-based access control | |
CN105678137A (en) | Method and device for identity recognition | |
CN106127005A (en) | The user management method of a kind of mobile terminal and system | |
CN105678149B (en) | A kind of unlocking method and terminal | |
WO2018000234A1 (en) | Method and system for controlling smart door access on basis of dual fingerprints | |
JP2016040684A (en) | Composite authentication system | |
CN107065579A (en) | The management method and system of a kind of smart home |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170118 |
|
RJ01 | Rejection of invention patent application after publication |