CN106384027A - User identity recognition system and recognition method thereof - Google Patents
User identity recognition system and recognition method thereof Download PDFInfo
- Publication number
- CN106384027A CN106384027A CN201610801163.9A CN201610801163A CN106384027A CN 106384027 A CN106384027 A CN 106384027A CN 201610801163 A CN201610801163 A CN 201610801163A CN 106384027 A CN106384027 A CN 106384027A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- flag information
- module
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Social Psychology (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention relates to information security, and provides a recognition method of a user identity recognition system for the problem that the technical means of user identity recognition cannot comprehensively guarantee the security of identity recognition in the prior art. The method comprises the following steps that the system acquires historical operation information of a user and uploads the operation information to a cloud platform, and the cloud platform performs analysis learning on the historical operation information of the user to find out a user operation habit set and stores the user operation habit set as mark information; a historical operation habit set is iteratively updated along with an increase in a usage frequency of the user; and during use, the system verifies identity information of the user, refuses user access if the verification fails, compares the user operation information with the stored mark information if the verification is passed, and runs the user access if the comparison succeeds, otherwise, refuses the user access. The method is suitable for identity recognition.
Description
Technical field
The present invention relates to field of information security technology, particularly to user identity identification.
Background technology
With developing rapidly of the Internet and mobile information, the user of online gets more and more, the device category of online
More and more, Network Security Vulnerabilities progressively become than a more prominent problem.Various on network steal user's private information, robber
The phenomenons such as brush user credit card emerge in an endless stream.How to ensure the safety of validated user, cause the extensive concern of industry.
The technological means of traditional user identity identification have user to submit username and password to certificate server, logical with this
Cross the authentication of certificate server;Or verify user identity using fingerprint recognition;Or be using recognition of face,
The technology such as pupil identification are verifying user identity.These technology are all well and good, but have some limitations.When user is passing through
It is possible to because some reasons do not do security protection, such as have left the computer of oneself and do not do screen locking operation after authentication;
Or user is placed on mobile phone on table and is not screen locking people and just have left;Or to be user lead to oneself because of some careless omissions
Username and password is grasped so that being invaded by others, and these phenomenons all may cause damage to user.
And each user has the operating habit of oneself when using smart machines such as computer or mobile phones, for example some people exist
Using circle of being accustomed to drawing a circle on the touchscreen during these smart machines, some people are then accustomed to clicking on etc. on the touchscreen how
These customs of user being combined with identification, thus being further ensured that the safety of user authentication, being present invention needs
The technical problem solving.
Content of the invention
The technical problem to be solved is it is simply that provide a kind of user identity identification system and its recognition methodss with reality
Now these customs of user are combined with identification, thus being further ensured that the safety of user authentication.
The present invention solves described technical problem, employed technical scheme comprise that, user identity identification system, including authentication
Module, user's custom acquisition module, analysis module, memory module and cloud platform, described analysis module and memory module are arranged at
In cloud platform;
Described user is accustomed to acquisition module, for gathering user's history operation information and operation information, and is uploaded to
Cloud platform;
Described analysis module, for being analyzed to user's history operation information learning, finds out user operation habits set
As flag information, send and stored to memory module;
Described authentication module, for verifying to the identity information of user, if authentication failed, refuses user's visit
Asking, if being verified, the flag information of user's operation information and storage being compared, compare and successfully then run user's access,
Otherwise refusal user accesses.
Specifically, also include flag information feedback module, described flag information feedback module is arranged at cloud platform;
Described flag information feedback module, analyzes the flag information drawing to user for feedback system.
Specifically, including flag information acquisition module, described flag information acquisition module is connected with memory module;
Described flag information acquisition module, for gathering the flag information of user input, and stores to memory module.
For the recognition methodss of above-mentioned user identity identification system, comprise the following steps:System acquisition user's history operates
Information and operation information are uploaded to cloud platform, and cloud platform is analyzed to user's history operation information learning, and finds out user operation
Custom set is stored as flag information;Described historical operation custom set increases and iteration with the access times of user
Update;During use, the identity information of system of users is verified, if authentication failed, refuses user's access, if being verified
Then the flag information of user's operation information and storage is compared, compare and successfully then run user's access, otherwise refuse user
Access.
Specifically, further comprising the steps of:The custom set of system of users historical operation is analyzed learning, and finds out user
After operating habit is as flag information, flag information is fed back to user.
Specifically, system also directly gathers the flag information of user input and is stored.
Specifically, the identity information of system of users carries out checking inclusion:Usemame/password login authentication and/or OAuth
Certificate Authority login authentication and/or fingerprint recognition login authentication and/or recognition of face login authentication and/or pupil identification login are tested
Card.
The invention has the beneficial effects as follows:The present invention is that the one kind to existing user identity identification technology is supplemented, and can enter one
The safety guarantee of step lifting user identity identification, can be combined with the other security means on current market, implement together, structure
Build out safer identification system.
Brief description
Fig. 1 is the workflow diagram of user identity identification system of the present invention and its recognition methodss embodiment.
Specific embodiment with reference to embodiments, is described in further detail to the above of the present invention again.
But this scope being interpreted as the above-mentioned theme of the present invention should not be only limitted to Examples below.Thinking without departing from the above-mentioned technology of the present invention
In the case of thinking, the various replacements made according to ordinary skill knowledge and customary means or change, all should include at this
In bright scope.
Specific embodiment
Below in conjunction with the accompanying drawings and embodiment describe in detail technical scheme:
The present invention be directed to prior art in user identity identification technological means cannot full-scope safeguards identification safety
Property problem, provide a kind of user identity identification system, authentication module, user's custom acquisition module, analysis module, storage
Module and cloud platform, described analysis module and memory module are arranged in cloud platform;Described user is accustomed to acquisition module, is used for adopting
Collection user's history operation information and operation information, and it is uploaded to cloud platform;Described analysis module, for grasping to user's history
It is analyzed learning as information, find out user operation habits set as flag information, send and stored to memory module;Institute
State authentication module, for verifying to the identity information of user, if authentication failed, refuse user's access, if checking is logical
Cross, the flag information of user's operation information and storage is compared, compare and successfully then run user's access, otherwise refusal is used
Family accesses.The recognition methodss of user identity identification system, comprise the following steps:System acquisition user's history operation information and operation
Information is uploaded to cloud platform, and cloud platform is analyzed to user's history operation information learning, and finds out user operation habits collection cooperation
Stored for flag information;Described historical operation custom set increases and iteration renewal with the access times of user;Use
When, the identity information of system of users is verified, if authentication failed, refusing user's access, if being verified, user being grasped
The flag information making information with storage is compared, and compares and successfully then runs user's access, and otherwise refusal user accesses.The present invention
It is that the one kind to existing user identity identification technology is supplemented, the safety guarantee of user identity identification can be lifted further, permissible
Combine with the other security means on current market, implement together, construct safer identification system.
Embodiment 1
The user identity identification system of this example, is accustomed to acquisition module, analysis module, deposits including authentication module, user
Storage module and cloud platform, described analysis module and memory module are arranged in cloud platform;Described user is accustomed to acquisition module, is used for
Collection user's history operation information and operation information, and it is uploaded to cloud platform;Described analysis module, for user's history
Operation information is analyzed learning, and finds out user operation habits set as flag information, sends and stored to memory module.
Analyzing and processing to user's history operation information and flag information and storage are carried out all in cloud platform.
Described authentication module, for verifying to the identity information of user, if authentication failed, refuses user's visit
Asking, if being verified, the flag information of user's operation information and storage being compared, compare and successfully then run user's access,
Otherwise refusal user accesses.First, the identity information of user is verified, be traditional identity information checking, body
Part authentication module includes at least the typing of user profile, the examination & verification of user profile, certificate request, certificate revocation, certificate update, is
The initialization of system, user information management, user certificate management, CA configuration management, the management of CA policy information, the management of key information
Etc. function.User can pass through usemame/password login authentication and/or OAuth Certificate Authority login authentication and/or fingerprint recognition
Login authentication and/or the mode such as recognition of face login authentication and/or pupil identification login authentication are verified, if authentication failed,
System directly refuses user's access, does not provide user service.If subscriber identity information checking is correct, system continues user is grasped
The flag information making information with storage is compared checking, if comparing successfully, receive user access, and otherwise refuse user's access not
User service is provided.
It should be noted that for new user, due to not having historical behavior record, the operation of therefore this new user is recognized
It is empty set under card set initial situation, this collection credit union is with the increase of the number of operations of user, the content of its authenticating operation set
Can gradually enrich, accurate certification can be compared to the operation behavior of user to after the regular hour.
In addition, in order to ensure that user knows to flag information, the user identity identification system of this example also includes mark letter
Breath feedback module, described flag information feedback module is arranged at cloud platform;Described flag information feedback module, for feedback system
Analyze the flag information drawing to user.So that user knows the analysis result to identification information for the system.
Further, user can also be the behavioural information of both sides' agreement using flag information for convenience, specifically, this
System also includes flag information acquisition module, and described flag information acquisition module is connected with memory module;Described flag information is adopted
Collection module, for gathering the flag information of user input, and stores to memory module.User can directly be adopted by flag information
The flag information of collection module settings oneself demand, the flag information that the flag information that user is voluntarily arranged and analysis module analyze
Separate can exist it is also possible to exist simultaneously, be user-friendly to.
When using, system acquisition user's history operation information and operation information are uploaded to cloud platform, and cloud platform is to user
Historical operation information is analyzed learning, and finds out user operation habits set and is stored as flag information;Described history behaviour
The access times making custom set with user increase and iteration renewal;During use, the identity information of system of users is tested
Card, if authentication failed, refuses user's access, if being verified, the flag information of user's operation information and storage is compared
Right, compare and successfully then run user's access, otherwise refusal user accesses.When system comes into operation, specific flow process such as Fig. 1 institute
Show, this flow process mainly includes the following steps that:
Step 101:The normal login system of user.
Described login mode can be that usemame/password logs in, presses fingerprint login, human face scanning logs in, uses pupil
Near modes such as scanning holes logins.
Step 102:The identity of system of users is verified, authentication failure, turns to step 103;Authentication becomes
Work(, turns to step 104.
The identity recognizing technology that described system adopts can be conventional authentication mode, including usemame/password
Login mode, OAuth Certificate Authority login mode, fingerprint recognition login mode, recognition of face login mode, pupil identification log in
Mode etc..
Step 103:Authentication failure, system refusal user access.
Step 104:Authentication success, user can be normally using system.Now, user possesses system and is pre-assigned to
The authority of user, the service being provided using system.
Step 105:The real time operating data of systematic collection user.User during the service being provided using system,
The operation behavior data of user is by the acquisition system real-time collecting at cloud platform end in thesauruss.
Step 106:System analyzes user's history operation information in real time, finds out user operation habits set as flag information
Stored.Namely the real-time analyzer at cloud platform end according to user, service condition for a period of time constructs and is more conform with use
The authenticating operation set of family operating habit.Accurate certification.
Step 107:It is used user operation habits set to verify user operation behavior as flag information.The reality at cloud platform end
When analysis system carry out real-time com-parison and analysis according to user operation behavior using user operation habits set, judge that user is real-time
Whether operation information is being in user operation habits set, if belong to flag information.
Step 108:If system judges that user operation behavior belongs to flag information, system continues to provide service to user, and
Continue collection user's real time operating data simultaneously, update user operation habits set for iteration.Otherwise, turn to step 103, be
The access of system refusal user, that is, stop providing a user with service.
Embodiment 2
User A use mobile phone on-line payment function, open certain pay the bill APP, user every time before delivery operation, in mobile phone
Touch screen on describe a circle, then carry out delivery operation.Continuous so carry out delivery operation for several times after, cloud platform end real-time
Analysis system can be considered as one of content of user operation habits set such behavior of drawing a circle, as a flag information.As
Fruit user A does not do this operation behavior in new delivery operation, will assert it is not the user A operation of itself, thus refusing user
Operation.So, even if the information of user A (such as usemame/password) is compromised, because person of peeping does not know user A's
Use habit, even if pretending to be the identity information login authentication success using user A, as the exception that operation behavior occurs
Make the operation of system closure user, find the safety problem that user exists in time, terminate user and be continuing with servicing, thus
Ensure the property safety of user to a certain extent.
In sum, the above embodiment of the present invention, is that the one kind to existing user identity identification technology is supplemented, Ke Yijin
One step lifts the safety guarantee of user identity identification.And the user identity identification technology that the present invention provides, can be with current city
Other security means on face combine, and implement together, construct safer system.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention
Any modification, equivalent and improvement made within god and principle etc., should be included within the scope of the present invention.
Claims (8)
1. user identity identification system is it is characterised in that authentication module, user are accustomed to acquisition module, analysis module, storage
Module and cloud platform, described analysis module and memory module are arranged in cloud platform;
Described user is accustomed to acquisition module, for gathering user's history operation information and operation information, and is uploaded to cloud and puts down
Platform;
Described analysis module, for being analyzed to user's history operation information learning, finds out user operation habits set conduct
Flag information, sends and is stored to memory module;
Described authentication module, for verifying to the identity information of user, if authentication failed, refuses user's access, if
It is verified, the flag information of user's operation information and storage is compared, compare and successfully then run user's access, otherwise
Refusal user accesses.
2. user identity identification system according to claim 1 is it is characterised in that also include flag information feedback module,
Described flag information feedback module is arranged at cloud platform;
Described flag information feedback module, analyzes the flag information drawing to user for feedback system.
3. user identity identification system according to claim 1 is it is characterised in that also include flag information acquisition module,
Described flag information acquisition module is connected with memory module;
Described flag information acquisition module, for gathering the flag information of user input, and stores to memory module.
4. it is used for the recognition methodss of the user identity identification system described in claim 1-3 any one it is characterised in that including
Following steps:System acquisition user's history operation information and operation information are uploaded to cloud platform, and cloud platform operates to user's history
Information is analyzed learning, and finds out user operation habits set and is stored as flag information;Described historical operation custom collection
Closing the access times with user increases and iteration renewal;During use, the identity information of system of users is verified, if checking
Failure is then refused user and is accessed, if being verified, the flag information of user's operation information and storage being compared, compares into
Work(then runs user and accesses, and otherwise refusal user accesses.
5. recognition methodss according to claim 4 are it is characterised in that further comprising the steps of:System of users history is grasped
Make custom set be analyzed learn, find out user operation habits as flag information after, flag information is fed back to user.
6. recognition methodss according to claim 4 are it is characterised in that system also directly gathers the flag information of user input
And stored.
7. recognition methodss according to claim 4 are it is characterised in that the identity information of system of users carries out checking bag
Include:Usemame/password login authentication and/or OAuth Certificate Authority login authentication and/or fingerprint recognition login authentication and/or people
Face identification login authentication and/or pupil identification login authentication.
8. recognition methodss according to claim 4 are it is characterised in that further comprising the steps of:User operation is believed by system
Breath is compared with the flag information storing, and after comparing unsuccessfully, system refusal user accesses, and prompting user is carried out further simultaneously
Authentication, described further authentication at least include identification card number checking and/or mobile phone note verification code checking.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610801163.9A CN106384027A (en) | 2016-09-05 | 2016-09-05 | User identity recognition system and recognition method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610801163.9A CN106384027A (en) | 2016-09-05 | 2016-09-05 | User identity recognition system and recognition method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106384027A true CN106384027A (en) | 2017-02-08 |
Family
ID=57938002
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610801163.9A Pending CN106384027A (en) | 2016-09-05 | 2016-09-05 | User identity recognition system and recognition method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106384027A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107818251A (en) * | 2017-09-27 | 2018-03-20 | 维沃移动通信有限公司 | A kind of face identification method and mobile terminal |
CN108023794A (en) * | 2017-12-04 | 2018-05-11 | 四川长虹电器股份有限公司 | A kind of equipment access control method and device |
CN108234454A (en) * | 2017-12-13 | 2018-06-29 | 中国银联股份有限公司 | A kind of identity identifying method, server and client device |
CN108400971A (en) * | 2018-01-25 | 2018-08-14 | 长春市万易科技有限公司 | A kind of anti-fake system and method |
CN108932411A (en) * | 2018-03-04 | 2018-12-04 | 徐琳 | Intelligent terminal big data analysis method |
CN109255223A (en) * | 2018-08-23 | 2019-01-22 | 杭州在信科技有限公司 | A kind of identity verification secure Verification System based on pupil image acquisition technique |
CN109800548A (en) * | 2017-11-17 | 2019-05-24 | 深圳市鹰硕技术有限公司 | A kind of method and apparatus preventing leakage of personal information |
CN109933963A (en) * | 2019-03-21 | 2019-06-25 | 娄奥林 | One kind knowing method for distinguishing for user behavior track characteristic |
CN111143176A (en) * | 2019-12-02 | 2020-05-12 | 南京理工大学 | Automatic identification method for internet surfing service business place |
CN111935165A (en) * | 2020-08-14 | 2020-11-13 | 中国工商银行股份有限公司 | Access control method, device, electronic device and medium |
CN112639897A (en) * | 2018-09-13 | 2021-04-09 | 开利公司 | Spatial determination of boundary visualizations |
CN113542232A (en) * | 2021-06-23 | 2021-10-22 | 广州欢享网络科技有限公司 | Website data safety protection system based on big data |
CN114036489A (en) * | 2021-11-11 | 2022-02-11 | 国网山东省电力公司 | Information security management method and system based on big data |
CN114884741A (en) * | 2022-06-02 | 2022-08-09 | 江苏优集科技有限公司 | Security access and control system and method under distributed cloud environment |
CN115600171A (en) * | 2022-10-24 | 2023-01-13 | 星空映画(武汉)科技有限公司(Cn) | Computer identity recognition system judged according to user habits |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101365193A (en) * | 2007-08-09 | 2009-02-11 | 财团法人Seoul大学校产学协力财团 | System and method for customer authentication execution based on customer behavior mode |
US20100146619A1 (en) * | 2008-12-04 | 2010-06-10 | Chi Mei Communication Systems, Inc. | Electronic device and access control method thereof |
CN101833619A (en) * | 2010-04-29 | 2010-09-15 | 西安交通大学 | Method for judging identity based on keyboard-mouse crossed certification |
CN101887499A (en) * | 2010-07-08 | 2010-11-17 | 北京九合创胜网络科技有限公司 | User identity management method and system |
CN102685093A (en) * | 2011-12-08 | 2012-09-19 | 陈易 | Mobile-terminal-based identity authentication system and method |
CN103699822A (en) * | 2013-12-31 | 2014-04-02 | 同济大学 | Application system and detection method for users' abnormal behaviors in e-commerce based on mouse behaviors |
CN104318138A (en) * | 2014-09-30 | 2015-01-28 | 杭州同盾科技有限公司 | Method and device for verifying identity of user |
-
2016
- 2016-09-05 CN CN201610801163.9A patent/CN106384027A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101365193A (en) * | 2007-08-09 | 2009-02-11 | 财团法人Seoul大学校产学协力财团 | System and method for customer authentication execution based on customer behavior mode |
US20100146619A1 (en) * | 2008-12-04 | 2010-06-10 | Chi Mei Communication Systems, Inc. | Electronic device and access control method thereof |
CN101833619A (en) * | 2010-04-29 | 2010-09-15 | 西安交通大学 | Method for judging identity based on keyboard-mouse crossed certification |
CN101887499A (en) * | 2010-07-08 | 2010-11-17 | 北京九合创胜网络科技有限公司 | User identity management method and system |
CN102685093A (en) * | 2011-12-08 | 2012-09-19 | 陈易 | Mobile-terminal-based identity authentication system and method |
CN103699822A (en) * | 2013-12-31 | 2014-04-02 | 同济大学 | Application system and detection method for users' abnormal behaviors in e-commerce based on mouse behaviors |
CN104318138A (en) * | 2014-09-30 | 2015-01-28 | 杭州同盾科技有限公司 | Method and device for verifying identity of user |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107818251A (en) * | 2017-09-27 | 2018-03-20 | 维沃移动通信有限公司 | A kind of face identification method and mobile terminal |
CN109800548B (en) * | 2017-11-17 | 2021-02-02 | 深圳市鹰硕技术有限公司 | Method and device for preventing personal information from being leaked |
CN109800548A (en) * | 2017-11-17 | 2019-05-24 | 深圳市鹰硕技术有限公司 | A kind of method and apparatus preventing leakage of personal information |
CN108023794A (en) * | 2017-12-04 | 2018-05-11 | 四川长虹电器股份有限公司 | A kind of equipment access control method and device |
WO2019114246A1 (en) * | 2017-12-13 | 2019-06-20 | 中国银联股份有限公司 | Identity authentication method, server and client device |
CN108234454A (en) * | 2017-12-13 | 2018-06-29 | 中国银联股份有限公司 | A kind of identity identifying method, server and client device |
CN108234454B (en) * | 2017-12-13 | 2020-12-18 | 中国银联股份有限公司 | Identity authentication method, server and client device |
CN108400971A (en) * | 2018-01-25 | 2018-08-14 | 长春市万易科技有限公司 | A kind of anti-fake system and method |
CN108932411A (en) * | 2018-03-04 | 2018-12-04 | 徐琳 | Intelligent terminal big data analysis method |
CN109255223A (en) * | 2018-08-23 | 2019-01-22 | 杭州在信科技有限公司 | A kind of identity verification secure Verification System based on pupil image acquisition technique |
CN109255223B (en) * | 2018-08-23 | 2020-11-20 | 杭州天谷信息科技有限公司 | Identity verification safety authentication system based on pupil image acquisition technology |
US11899771B2 (en) | 2018-09-13 | 2024-02-13 | Carrier Corporation | Space determination with boundary visualization |
CN112639897A (en) * | 2018-09-13 | 2021-04-09 | 开利公司 | Spatial determination of boundary visualizations |
CN109933963A (en) * | 2019-03-21 | 2019-06-25 | 娄奥林 | One kind knowing method for distinguishing for user behavior track characteristic |
CN111143176A (en) * | 2019-12-02 | 2020-05-12 | 南京理工大学 | Automatic identification method for internet surfing service business place |
CN111935165A (en) * | 2020-08-14 | 2020-11-13 | 中国工商银行股份有限公司 | Access control method, device, electronic device and medium |
CN113542232A (en) * | 2021-06-23 | 2021-10-22 | 广州欢享网络科技有限公司 | Website data safety protection system based on big data |
CN114036489A (en) * | 2021-11-11 | 2022-02-11 | 国网山东省电力公司 | Information security management method and system based on big data |
CN114884741A (en) * | 2022-06-02 | 2022-08-09 | 江苏优集科技有限公司 | Security access and control system and method under distributed cloud environment |
CN114884741B (en) * | 2022-06-02 | 2024-05-24 | 上海企源科技股份有限公司 | Secure access and control system and method in distributed cloud environment |
CN115600171A (en) * | 2022-10-24 | 2023-01-13 | 星空映画(武汉)科技有限公司(Cn) | Computer identity recognition system judged according to user habits |
CN115600171B (en) * | 2022-10-24 | 2023-08-04 | 星空映画(武汉)科技有限公司 | Computer user action recognition system based on user habit judgment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106384027A (en) | User identity recognition system and recognition method thereof | |
Obaidat et al. | Biometric-based physical and cybersecurity systems | |
US20170221068A1 (en) | Personal authentication | |
US9648046B2 (en) | Dynamic adjustment of authentication policy | |
US8621642B2 (en) | Method and apparatus for an end user identity protection suite | |
US20160371438A1 (en) | System and method for biometric-based authentication of a user for a secure event carried out via a portable electronic device | |
CN101809582B (en) | Smart identity system | |
US9172687B2 (en) | Query system and method to determine authentication capabilities | |
CN108959933A (en) | Risk analysis device and method for the certification based on risk | |
US20140189360A1 (en) | System and method for implementing transaction signing within an authentication framework | |
CN108134791A (en) | A kind of data center's total management system login validation method | |
US20180013758A1 (en) | Method and system for dynamic password based user authentication and password management | |
JP2019504384A (en) | Biometric information authentication system and method using financial card information stored in mobile communication terminal | |
CN104378211A (en) | Identity authentication method and device | |
CN109753783A (en) | A kind of single-point logging method based on machine learning, device and computer readable storage medium | |
US10482225B1 (en) | Method of authorization dialog organizing | |
CN107222477A (en) | A kind of equipment access identification Verification System and method | |
CN105117633A (en) | Face recognition login validation system for Windows system | |
CN107548059A (en) | A kind of authentication method and system | |
Marasco et al. | Biometric multi‐factor authentication: On the usability of the FingerPIN scheme | |
JP2010061329A (en) | Authentication processing method and authentication processing system | |
JP2012118833A (en) | Access control method | |
CN107808082B (en) | Electronic device, data access verification method, and computer-readable storage medium | |
CN104063651B (en) | Authentication and issuing means and authentication and submission method | |
JP4802670B2 (en) | Cardless authentication system, cardless authentication method used in the system, and cardless authentication program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170208 |