CN106384027A - User identity recognition system and recognition method thereof - Google Patents

User identity recognition system and recognition method thereof Download PDF

Info

Publication number
CN106384027A
CN106384027A CN201610801163.9A CN201610801163A CN106384027A CN 106384027 A CN106384027 A CN 106384027A CN 201610801163 A CN201610801163 A CN 201610801163A CN 106384027 A CN106384027 A CN 106384027A
Authority
CN
China
Prior art keywords
user
information
flag information
module
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610801163.9A
Other languages
Chinese (zh)
Inventor
李强
王凤琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Electric Co Ltd
Original Assignee
Sichuan Changhong Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Electric Co Ltd filed Critical Sichuan Changhong Electric Co Ltd
Priority to CN201610801163.9A priority Critical patent/CN106384027A/en
Publication of CN106384027A publication Critical patent/CN106384027A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention relates to information security, and provides a recognition method of a user identity recognition system for the problem that the technical means of user identity recognition cannot comprehensively guarantee the security of identity recognition in the prior art. The method comprises the following steps that the system acquires historical operation information of a user and uploads the operation information to a cloud platform, and the cloud platform performs analysis learning on the historical operation information of the user to find out a user operation habit set and stores the user operation habit set as mark information; a historical operation habit set is iteratively updated along with an increase in a usage frequency of the user; and during use, the system verifies identity information of the user, refuses user access if the verification fails, compares the user operation information with the stored mark information if the verification is passed, and runs the user access if the comparison succeeds, otherwise, refuses the user access. The method is suitable for identity recognition.

Description

User identity identification system and its recognition methodss
Technical field
The present invention relates to field of information security technology, particularly to user identity identification.
Background technology
With developing rapidly of the Internet and mobile information, the user of online gets more and more, the device category of online More and more, Network Security Vulnerabilities progressively become than a more prominent problem.Various on network steal user's private information, robber The phenomenons such as brush user credit card emerge in an endless stream.How to ensure the safety of validated user, cause the extensive concern of industry.
The technological means of traditional user identity identification have user to submit username and password to certificate server, logical with this Cross the authentication of certificate server;Or verify user identity using fingerprint recognition;Or be using recognition of face, The technology such as pupil identification are verifying user identity.These technology are all well and good, but have some limitations.When user is passing through It is possible to because some reasons do not do security protection, such as have left the computer of oneself and do not do screen locking operation after authentication; Or user is placed on mobile phone on table and is not screen locking people and just have left;Or to be user lead to oneself because of some careless omissions Username and password is grasped so that being invaded by others, and these phenomenons all may cause damage to user.
And each user has the operating habit of oneself when using smart machines such as computer or mobile phones, for example some people exist Using circle of being accustomed to drawing a circle on the touchscreen during these smart machines, some people are then accustomed to clicking on etc. on the touchscreen how These customs of user being combined with identification, thus being further ensured that the safety of user authentication, being present invention needs The technical problem solving.
Content of the invention
The technical problem to be solved is it is simply that provide a kind of user identity identification system and its recognition methodss with reality Now these customs of user are combined with identification, thus being further ensured that the safety of user authentication.
The present invention solves described technical problem, employed technical scheme comprise that, user identity identification system, including authentication Module, user's custom acquisition module, analysis module, memory module and cloud platform, described analysis module and memory module are arranged at In cloud platform;
Described user is accustomed to acquisition module, for gathering user's history operation information and operation information, and is uploaded to Cloud platform;
Described analysis module, for being analyzed to user's history operation information learning, finds out user operation habits set As flag information, send and stored to memory module;
Described authentication module, for verifying to the identity information of user, if authentication failed, refuses user's visit Asking, if being verified, the flag information of user's operation information and storage being compared, compare and successfully then run user's access, Otherwise refusal user accesses.
Specifically, also include flag information feedback module, described flag information feedback module is arranged at cloud platform;
Described flag information feedback module, analyzes the flag information drawing to user for feedback system.
Specifically, including flag information acquisition module, described flag information acquisition module is connected with memory module;
Described flag information acquisition module, for gathering the flag information of user input, and stores to memory module.
For the recognition methodss of above-mentioned user identity identification system, comprise the following steps:System acquisition user's history operates Information and operation information are uploaded to cloud platform, and cloud platform is analyzed to user's history operation information learning, and finds out user operation Custom set is stored as flag information;Described historical operation custom set increases and iteration with the access times of user Update;During use, the identity information of system of users is verified, if authentication failed, refuses user's access, if being verified Then the flag information of user's operation information and storage is compared, compare and successfully then run user's access, otherwise refuse user Access.
Specifically, further comprising the steps of:The custom set of system of users historical operation is analyzed learning, and finds out user After operating habit is as flag information, flag information is fed back to user.
Specifically, system also directly gathers the flag information of user input and is stored.
Specifically, the identity information of system of users carries out checking inclusion:Usemame/password login authentication and/or OAuth Certificate Authority login authentication and/or fingerprint recognition login authentication and/or recognition of face login authentication and/or pupil identification login are tested Card.
The invention has the beneficial effects as follows:The present invention is that the one kind to existing user identity identification technology is supplemented, and can enter one The safety guarantee of step lifting user identity identification, can be combined with the other security means on current market, implement together, structure Build out safer identification system.
Brief description
Fig. 1 is the workflow diagram of user identity identification system of the present invention and its recognition methodss embodiment.
Specific embodiment with reference to embodiments, is described in further detail to the above of the present invention again. But this scope being interpreted as the above-mentioned theme of the present invention should not be only limitted to Examples below.Thinking without departing from the above-mentioned technology of the present invention In the case of thinking, the various replacements made according to ordinary skill knowledge and customary means or change, all should include at this In bright scope.
Specific embodiment
Below in conjunction with the accompanying drawings and embodiment describe in detail technical scheme:
The present invention be directed to prior art in user identity identification technological means cannot full-scope safeguards identification safety Property problem, provide a kind of user identity identification system, authentication module, user's custom acquisition module, analysis module, storage Module and cloud platform, described analysis module and memory module are arranged in cloud platform;Described user is accustomed to acquisition module, is used for adopting Collection user's history operation information and operation information, and it is uploaded to cloud platform;Described analysis module, for grasping to user's history It is analyzed learning as information, find out user operation habits set as flag information, send and stored to memory module;Institute State authentication module, for verifying to the identity information of user, if authentication failed, refuse user's access, if checking is logical Cross, the flag information of user's operation information and storage is compared, compare and successfully then run user's access, otherwise refusal is used Family accesses.The recognition methodss of user identity identification system, comprise the following steps:System acquisition user's history operation information and operation Information is uploaded to cloud platform, and cloud platform is analyzed to user's history operation information learning, and finds out user operation habits collection cooperation Stored for flag information;Described historical operation custom set increases and iteration renewal with the access times of user;Use When, the identity information of system of users is verified, if authentication failed, refusing user's access, if being verified, user being grasped The flag information making information with storage is compared, and compares and successfully then runs user's access, and otherwise refusal user accesses.The present invention It is that the one kind to existing user identity identification technology is supplemented, the safety guarantee of user identity identification can be lifted further, permissible Combine with the other security means on current market, implement together, construct safer identification system.
Embodiment 1
The user identity identification system of this example, is accustomed to acquisition module, analysis module, deposits including authentication module, user Storage module and cloud platform, described analysis module and memory module are arranged in cloud platform;Described user is accustomed to acquisition module, is used for Collection user's history operation information and operation information, and it is uploaded to cloud platform;Described analysis module, for user's history Operation information is analyzed learning, and finds out user operation habits set as flag information, sends and stored to memory module. Analyzing and processing to user's history operation information and flag information and storage are carried out all in cloud platform.
Described authentication module, for verifying to the identity information of user, if authentication failed, refuses user's visit Asking, if being verified, the flag information of user's operation information and storage being compared, compare and successfully then run user's access, Otherwise refusal user accesses.First, the identity information of user is verified, be traditional identity information checking, body Part authentication module includes at least the typing of user profile, the examination & verification of user profile, certificate request, certificate revocation, certificate update, is The initialization of system, user information management, user certificate management, CA configuration management, the management of CA policy information, the management of key information Etc. function.User can pass through usemame/password login authentication and/or OAuth Certificate Authority login authentication and/or fingerprint recognition Login authentication and/or the mode such as recognition of face login authentication and/or pupil identification login authentication are verified, if authentication failed, System directly refuses user's access, does not provide user service.If subscriber identity information checking is correct, system continues user is grasped The flag information making information with storage is compared checking, if comparing successfully, receive user access, and otherwise refuse user's access not User service is provided.
It should be noted that for new user, due to not having historical behavior record, the operation of therefore this new user is recognized It is empty set under card set initial situation, this collection credit union is with the increase of the number of operations of user, the content of its authenticating operation set Can gradually enrich, accurate certification can be compared to the operation behavior of user to after the regular hour.
In addition, in order to ensure that user knows to flag information, the user identity identification system of this example also includes mark letter Breath feedback module, described flag information feedback module is arranged at cloud platform;Described flag information feedback module, for feedback system Analyze the flag information drawing to user.So that user knows the analysis result to identification information for the system.
Further, user can also be the behavioural information of both sides' agreement using flag information for convenience, specifically, this System also includes flag information acquisition module, and described flag information acquisition module is connected with memory module;Described flag information is adopted Collection module, for gathering the flag information of user input, and stores to memory module.User can directly be adopted by flag information The flag information of collection module settings oneself demand, the flag information that the flag information that user is voluntarily arranged and analysis module analyze Separate can exist it is also possible to exist simultaneously, be user-friendly to.
When using, system acquisition user's history operation information and operation information are uploaded to cloud platform, and cloud platform is to user Historical operation information is analyzed learning, and finds out user operation habits set and is stored as flag information;Described history behaviour The access times making custom set with user increase and iteration renewal;During use, the identity information of system of users is tested Card, if authentication failed, refuses user's access, if being verified, the flag information of user's operation information and storage is compared Right, compare and successfully then run user's access, otherwise refusal user accesses.When system comes into operation, specific flow process such as Fig. 1 institute Show, this flow process mainly includes the following steps that:
Step 101:The normal login system of user.
Described login mode can be that usemame/password logs in, presses fingerprint login, human face scanning logs in, uses pupil Near modes such as scanning holes logins.
Step 102:The identity of system of users is verified, authentication failure, turns to step 103;Authentication becomes Work(, turns to step 104.
The identity recognizing technology that described system adopts can be conventional authentication mode, including usemame/password Login mode, OAuth Certificate Authority login mode, fingerprint recognition login mode, recognition of face login mode, pupil identification log in Mode etc..
Step 103:Authentication failure, system refusal user access.
Step 104:Authentication success, user can be normally using system.Now, user possesses system and is pre-assigned to The authority of user, the service being provided using system.
Step 105:The real time operating data of systematic collection user.User during the service being provided using system, The operation behavior data of user is by the acquisition system real-time collecting at cloud platform end in thesauruss.
Step 106:System analyzes user's history operation information in real time, finds out user operation habits set as flag information Stored.Namely the real-time analyzer at cloud platform end according to user, service condition for a period of time constructs and is more conform with use The authenticating operation set of family operating habit.Accurate certification.
Step 107:It is used user operation habits set to verify user operation behavior as flag information.The reality at cloud platform end When analysis system carry out real-time com-parison and analysis according to user operation behavior using user operation habits set, judge that user is real-time Whether operation information is being in user operation habits set, if belong to flag information.
Step 108:If system judges that user operation behavior belongs to flag information, system continues to provide service to user, and Continue collection user's real time operating data simultaneously, update user operation habits set for iteration.Otherwise, turn to step 103, be The access of system refusal user, that is, stop providing a user with service.
Embodiment 2
User A use mobile phone on-line payment function, open certain pay the bill APP, user every time before delivery operation, in mobile phone Touch screen on describe a circle, then carry out delivery operation.Continuous so carry out delivery operation for several times after, cloud platform end real-time Analysis system can be considered as one of content of user operation habits set such behavior of drawing a circle, as a flag information.As Fruit user A does not do this operation behavior in new delivery operation, will assert it is not the user A operation of itself, thus refusing user Operation.So, even if the information of user A (such as usemame/password) is compromised, because person of peeping does not know user A's Use habit, even if pretending to be the identity information login authentication success using user A, as the exception that operation behavior occurs Make the operation of system closure user, find the safety problem that user exists in time, terminate user and be continuing with servicing, thus Ensure the property safety of user to a certain extent.
In sum, the above embodiment of the present invention, is that the one kind to existing user identity identification technology is supplemented, Ke Yijin One step lifts the safety guarantee of user identity identification.And the user identity identification technology that the present invention provides, can be with current city Other security means on face combine, and implement together, construct safer system.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention Any modification, equivalent and improvement made within god and principle etc., should be included within the scope of the present invention.

Claims (8)

1. user identity identification system is it is characterised in that authentication module, user are accustomed to acquisition module, analysis module, storage Module and cloud platform, described analysis module and memory module are arranged in cloud platform;
Described user is accustomed to acquisition module, for gathering user's history operation information and operation information, and is uploaded to cloud and puts down Platform;
Described analysis module, for being analyzed to user's history operation information learning, finds out user operation habits set conduct Flag information, sends and is stored to memory module;
Described authentication module, for verifying to the identity information of user, if authentication failed, refuses user's access, if It is verified, the flag information of user's operation information and storage is compared, compare and successfully then run user's access, otherwise Refusal user accesses.
2. user identity identification system according to claim 1 is it is characterised in that also include flag information feedback module, Described flag information feedback module is arranged at cloud platform;
Described flag information feedback module, analyzes the flag information drawing to user for feedback system.
3. user identity identification system according to claim 1 is it is characterised in that also include flag information acquisition module, Described flag information acquisition module is connected with memory module;
Described flag information acquisition module, for gathering the flag information of user input, and stores to memory module.
4. it is used for the recognition methodss of the user identity identification system described in claim 1-3 any one it is characterised in that including Following steps:System acquisition user's history operation information and operation information are uploaded to cloud platform, and cloud platform operates to user's history Information is analyzed learning, and finds out user operation habits set and is stored as flag information;Described historical operation custom collection Closing the access times with user increases and iteration renewal;During use, the identity information of system of users is verified, if checking Failure is then refused user and is accessed, if being verified, the flag information of user's operation information and storage being compared, compares into Work(then runs user and accesses, and otherwise refusal user accesses.
5. recognition methodss according to claim 4 are it is characterised in that further comprising the steps of:System of users history is grasped Make custom set be analyzed learn, find out user operation habits as flag information after, flag information is fed back to user.
6. recognition methodss according to claim 4 are it is characterised in that system also directly gathers the flag information of user input And stored.
7. recognition methodss according to claim 4 are it is characterised in that the identity information of system of users carries out checking bag Include:Usemame/password login authentication and/or OAuth Certificate Authority login authentication and/or fingerprint recognition login authentication and/or people Face identification login authentication and/or pupil identification login authentication.
8. recognition methodss according to claim 4 are it is characterised in that further comprising the steps of:User operation is believed by system Breath is compared with the flag information storing, and after comparing unsuccessfully, system refusal user accesses, and prompting user is carried out further simultaneously Authentication, described further authentication at least include identification card number checking and/or mobile phone note verification code checking.
CN201610801163.9A 2016-09-05 2016-09-05 User identity recognition system and recognition method thereof Pending CN106384027A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610801163.9A CN106384027A (en) 2016-09-05 2016-09-05 User identity recognition system and recognition method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610801163.9A CN106384027A (en) 2016-09-05 2016-09-05 User identity recognition system and recognition method thereof

Publications (1)

Publication Number Publication Date
CN106384027A true CN106384027A (en) 2017-02-08

Family

ID=57938002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610801163.9A Pending CN106384027A (en) 2016-09-05 2016-09-05 User identity recognition system and recognition method thereof

Country Status (1)

Country Link
CN (1) CN106384027A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107818251A (en) * 2017-09-27 2018-03-20 维沃移动通信有限公司 A kind of face identification method and mobile terminal
CN108023794A (en) * 2017-12-04 2018-05-11 四川长虹电器股份有限公司 A kind of equipment access control method and device
CN108234454A (en) * 2017-12-13 2018-06-29 中国银联股份有限公司 A kind of identity identifying method, server and client device
CN108400971A (en) * 2018-01-25 2018-08-14 长春市万易科技有限公司 A kind of anti-fake system and method
CN108932411A (en) * 2018-03-04 2018-12-04 徐琳 Intelligent terminal big data analysis method
CN109255223A (en) * 2018-08-23 2019-01-22 杭州在信科技有限公司 A kind of identity verification secure Verification System based on pupil image acquisition technique
CN109800548A (en) * 2017-11-17 2019-05-24 深圳市鹰硕技术有限公司 A kind of method and apparatus preventing leakage of personal information
CN109933963A (en) * 2019-03-21 2019-06-25 娄奥林 One kind knowing method for distinguishing for user behavior track characteristic
CN111143176A (en) * 2019-12-02 2020-05-12 南京理工大学 Automatic identification method for internet surfing service business place
CN111935165A (en) * 2020-08-14 2020-11-13 中国工商银行股份有限公司 Access control method, device, electronic device and medium
CN112639897A (en) * 2018-09-13 2021-04-09 开利公司 Spatial determination of boundary visualizations
CN113542232A (en) * 2021-06-23 2021-10-22 广州欢享网络科技有限公司 Website data safety protection system based on big data
CN114036489A (en) * 2021-11-11 2022-02-11 国网山东省电力公司 Information security management method and system based on big data
CN114884741A (en) * 2022-06-02 2022-08-09 江苏优集科技有限公司 Security access and control system and method under distributed cloud environment
CN115600171A (en) * 2022-10-24 2023-01-13 星空映画(武汉)科技有限公司(Cn) Computer identity recognition system judged according to user habits

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101365193A (en) * 2007-08-09 2009-02-11 财团法人Seoul大学校产学协力财团 System and method for customer authentication execution based on customer behavior mode
US20100146619A1 (en) * 2008-12-04 2010-06-10 Chi Mei Communication Systems, Inc. Electronic device and access control method thereof
CN101833619A (en) * 2010-04-29 2010-09-15 西安交通大学 Method for judging identity based on keyboard-mouse crossed certification
CN101887499A (en) * 2010-07-08 2010-11-17 北京九合创胜网络科技有限公司 User identity management method and system
CN102685093A (en) * 2011-12-08 2012-09-19 陈易 Mobile-terminal-based identity authentication system and method
CN103699822A (en) * 2013-12-31 2014-04-02 同济大学 Application system and detection method for users' abnormal behaviors in e-commerce based on mouse behaviors
CN104318138A (en) * 2014-09-30 2015-01-28 杭州同盾科技有限公司 Method and device for verifying identity of user

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101365193A (en) * 2007-08-09 2009-02-11 财团法人Seoul大学校产学协力财团 System and method for customer authentication execution based on customer behavior mode
US20100146619A1 (en) * 2008-12-04 2010-06-10 Chi Mei Communication Systems, Inc. Electronic device and access control method thereof
CN101833619A (en) * 2010-04-29 2010-09-15 西安交通大学 Method for judging identity based on keyboard-mouse crossed certification
CN101887499A (en) * 2010-07-08 2010-11-17 北京九合创胜网络科技有限公司 User identity management method and system
CN102685093A (en) * 2011-12-08 2012-09-19 陈易 Mobile-terminal-based identity authentication system and method
CN103699822A (en) * 2013-12-31 2014-04-02 同济大学 Application system and detection method for users' abnormal behaviors in e-commerce based on mouse behaviors
CN104318138A (en) * 2014-09-30 2015-01-28 杭州同盾科技有限公司 Method and device for verifying identity of user

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107818251A (en) * 2017-09-27 2018-03-20 维沃移动通信有限公司 A kind of face identification method and mobile terminal
CN109800548B (en) * 2017-11-17 2021-02-02 深圳市鹰硕技术有限公司 Method and device for preventing personal information from being leaked
CN109800548A (en) * 2017-11-17 2019-05-24 深圳市鹰硕技术有限公司 A kind of method and apparatus preventing leakage of personal information
CN108023794A (en) * 2017-12-04 2018-05-11 四川长虹电器股份有限公司 A kind of equipment access control method and device
WO2019114246A1 (en) * 2017-12-13 2019-06-20 中国银联股份有限公司 Identity authentication method, server and client device
CN108234454A (en) * 2017-12-13 2018-06-29 中国银联股份有限公司 A kind of identity identifying method, server and client device
CN108234454B (en) * 2017-12-13 2020-12-18 中国银联股份有限公司 Identity authentication method, server and client device
CN108400971A (en) * 2018-01-25 2018-08-14 长春市万易科技有限公司 A kind of anti-fake system and method
CN108932411A (en) * 2018-03-04 2018-12-04 徐琳 Intelligent terminal big data analysis method
CN109255223A (en) * 2018-08-23 2019-01-22 杭州在信科技有限公司 A kind of identity verification secure Verification System based on pupil image acquisition technique
CN109255223B (en) * 2018-08-23 2020-11-20 杭州天谷信息科技有限公司 Identity verification safety authentication system based on pupil image acquisition technology
US11899771B2 (en) 2018-09-13 2024-02-13 Carrier Corporation Space determination with boundary visualization
CN112639897A (en) * 2018-09-13 2021-04-09 开利公司 Spatial determination of boundary visualizations
CN109933963A (en) * 2019-03-21 2019-06-25 娄奥林 One kind knowing method for distinguishing for user behavior track characteristic
CN111143176A (en) * 2019-12-02 2020-05-12 南京理工大学 Automatic identification method for internet surfing service business place
CN111935165A (en) * 2020-08-14 2020-11-13 中国工商银行股份有限公司 Access control method, device, electronic device and medium
CN113542232A (en) * 2021-06-23 2021-10-22 广州欢享网络科技有限公司 Website data safety protection system based on big data
CN114036489A (en) * 2021-11-11 2022-02-11 国网山东省电力公司 Information security management method and system based on big data
CN114884741A (en) * 2022-06-02 2022-08-09 江苏优集科技有限公司 Security access and control system and method under distributed cloud environment
CN114884741B (en) * 2022-06-02 2024-05-24 上海企源科技股份有限公司 Secure access and control system and method in distributed cloud environment
CN115600171A (en) * 2022-10-24 2023-01-13 星空映画(武汉)科技有限公司(Cn) Computer identity recognition system judged according to user habits
CN115600171B (en) * 2022-10-24 2023-08-04 星空映画(武汉)科技有限公司 Computer user action recognition system based on user habit judgment

Similar Documents

Publication Publication Date Title
CN106384027A (en) User identity recognition system and recognition method thereof
Obaidat et al. Biometric-based physical and cybersecurity systems
US20170221068A1 (en) Personal authentication
US9648046B2 (en) Dynamic adjustment of authentication policy
US8621642B2 (en) Method and apparatus for an end user identity protection suite
US20160371438A1 (en) System and method for biometric-based authentication of a user for a secure event carried out via a portable electronic device
CN101809582B (en) Smart identity system
US9172687B2 (en) Query system and method to determine authentication capabilities
CN108959933A (en) Risk analysis device and method for the certification based on risk
US20140189360A1 (en) System and method for implementing transaction signing within an authentication framework
CN108134791A (en) A kind of data center's total management system login validation method
US20180013758A1 (en) Method and system for dynamic password based user authentication and password management
JP2019504384A (en) Biometric information authentication system and method using financial card information stored in mobile communication terminal
CN104378211A (en) Identity authentication method and device
CN109753783A (en) A kind of single-point logging method based on machine learning, device and computer readable storage medium
US10482225B1 (en) Method of authorization dialog organizing
CN107222477A (en) A kind of equipment access identification Verification System and method
CN105117633A (en) Face recognition login validation system for Windows system
CN107548059A (en) A kind of authentication method and system
Marasco et al. Biometric multi‐factor authentication: On the usability of the FingerPIN scheme
JP2010061329A (en) Authentication processing method and authentication processing system
JP2012118833A (en) Access control method
CN107808082B (en) Electronic device, data access verification method, and computer-readable storage medium
CN104063651B (en) Authentication and issuing means and authentication and submission method
JP4802670B2 (en) Cardless authentication system, cardless authentication method used in the system, and cardless authentication program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170208