CN106874717A - A kind of identity identifying method, apparatus and system - Google Patents

A kind of identity identifying method, apparatus and system Download PDF

Info

Publication number
CN106874717A
CN106874717A CN201610491497.0A CN201610491497A CN106874717A CN 106874717 A CN106874717 A CN 106874717A CN 201610491497 A CN201610491497 A CN 201610491497A CN 106874717 A CN106874717 A CN 106874717A
Authority
CN
China
Prior art keywords
text
user
finger print
print information
certification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610491497.0A
Other languages
Chinese (zh)
Inventor
姜成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610491497.0A priority Critical patent/CN106874717A/en
Publication of CN106874717A publication Critical patent/CN106874717A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

This application discloses a kind of identity identifying method, apparatus and system.A kind of identity identifying method includes:The password sequence of user input is received, each of the password sequence is input into the form of text character or finger print information respectively;According to the finger print information and the corresponding relation of text character, the finger print information of user input is resolved into text character, and the password sequence of user input is converted to by full text sequence according to analysis result;The full text sequence that is converted to of judgement whether the certification text password sequences match with the user, if it is determine certification success, otherwise determine authentification failure.Technical scheme provided herein, character password certification and finger print identifying two ways are combined, and effectively increase the security of user password.

Description

A kind of identity identifying method, apparatus and system
Technical field
The application is related to authentication techniques field, more particularly to a kind of identity identifying method, apparatus and system.
Background technology
Certification is the process with reliable certain entity identities of technical identification, in the application such as computer, internet Field, authenticating user identification is a kind of most basic demand, and conventional technology includes that password authentication, physics are recognized The features such as card, biological characteristic authentication etc., wherein password authentication realize simple, easy to use with it turns into application Most commonly used authentication mode.
When user is using equipment such as mobile phone, PCs, password entry is directly carried out commonly using keyboard, this Plant scheme physical presence and larger safety issue, malicious user can in several ways steal password, For example directly peep, be implanted into Malware (such as key information logging software).
Regarding to the issue above, a kind of thinking is to try to make behavior hiddenization of user input password, for example with Implicit password shows, generates virtual keyboard layout etc. at random, and these modes can reduce to a certain extent The risk that password is stolen, but the input behavior of user after all can be by visual discrimination, malicious user If stolen intentionally, still section can reach mesh by many means (such as high-definition camera is taken on the sly) 's.
The content of the invention
For above-mentioned technical problem, the application provides a kind of identity identifying method, apparatus and system, technical side Case is as follows:
According to the first aspect of the application, there is provided a kind of identity identifying method, prestore user and believe in certification Certification text password sequence, certification finger print information and finger print information and text word that the breath structure stage provides The corresponding relation of symbol, the identity identifying method includes:
The password sequence of user input is received, each of the password sequence is believed with text character or fingerprint respectively The form input of breath;
According to the finger print information and the corresponding relation of text character, the finger print information of user input is resolved to Text character, and the password sequence of user input is converted to by full text sequence according to analysis result;
The full text sequence that is converted to of judgement whether the certification text password sequences match with the user, if It is then to determine certification success, otherwise determines authentification failure.
A kind of authentication information construction method, the method includes:
Obtain the certification text password sequence of user input;
For one or more text characters in the certification text password sequence, require that user enters one respectively Step input certification finger print information corresponding with the character;
By the corresponding relation of the certification text password sequence, certification finger print information and finger print information and character Save as the authentication information of the user.
A kind of identification authentication system, the device includes:
Memory module, the certification text password sequence of stage offer is built for prestoring user in authentication information The corresponding relation of row, certification finger print information and finger print information and text character;
Receiver module, the password sequence for receiving user input, each of the password sequence is respectively with text The form input of this character or finger print information;
Parsing module, for the corresponding relation according to the finger print information and text character, by user input Finger print information resolves to text character, and is converted in full the password sequence of user input according to analysis result This sequence;
Authentication module, for judge the full text sequence that is converted to whether the certification text password with the user Sequences match, if it is determines certification success, otherwise determines authentification failure.
A kind of authentication information construction device, the device includes:
Text password sequence obtains module, the certification text password sequence for obtaining user input;
Finger print information obtains module, for for one or more texts in the certification text password sequence Character, requires user's further input certification finger print information corresponding with the character respectively;
Information preserving module, for the certification text password sequence, certification finger print information and fingerprint to be believed Breath saves as the authentication information of the user with the corresponding relation of character.
A kind of the 5th aspect according to the application, there is provided identity authorization system, including above-mentioned authentication dress Put and the authentication information construction device as described in any one of claim 11 or 12.
Technical scheme provided herein, character password certification and finger print identifying two ways are combined, User in authentication registration information phase, the corresponding relation between finger print information and character can be carried out it is self-defined, And then when input password is authenticated every time, can be passed through according to the security of actual environment around, selection Fingerprint mode realizes indirectly the input of text character, compared with character is input into, is input into the movement range of fingerprint It is smaller, it is disguised also more preferable.Importantly, personal characteristics of the finger print information as user, with natural Uniqueness, even if malicious parties see validated user password entry action, validated user cannot obtained In the case of fingerprint, also cannot be by certification.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, The application can not be limited.
Brief description of the drawings
In order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art, below will be to implementing Example or the accompanying drawing to be used needed for description of the prior art are briefly described, it should be apparent that, describe below In accompanying drawing be only some embodiments described in the application, for those of ordinary skill in the art, Other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the identity identifying method of the application;
Fig. 2 is the schematic flow sheet of the authentication information construction method of the application;
Fig. 3 is a kind of interface schematic diagram of input pattern handoff functionality of the application;
Fig. 4 is the structural representation of the identification authentication system of the application;
Fig. 5 is the structural representation of the authentication information construction device of the application.
Specific embodiment
For simple character password input behavior easily reveal problem, scheme provided herein be On the basis of original characters password authentication mechanism, finger print identifying mechanism is further increased, by two ways Combination further improve the security of password entry, reduce disclosure risk.
In order that those skilled in the art more fully understand the technical scheme in the application, below in conjunction with this Shen Accompanying drawing that please be in embodiment, is described in detail, it is clear that institute to the technical scheme in the embodiment of the present application The embodiment of description is only some embodiments of the present application, rather than whole embodiments.Based on the application In embodiment, the every other embodiment that those of ordinary skill in the art are obtained should all belong to this Shen The scope that please be protect.
According to scheme provided herein, user is in authentication information registration phase, it is necessary first to provide one For the text password sequence of certification, then for one or more text characters in the sequence, record respectively Enter corresponding fingerprint, password text sequence that system side is provided according to user, finger print information and both is right Should be related to generate the user authentication information and preserve.In the actual authentication application stage, user can be with Password entry is realized by way of being input into finger print information, system side according to the corresponding relation for pre-saving, from It is dynamic that the finger print information of user input is converted into textual form, then by transformation result and the certification text for prestoring Password sequence is compared, and is finally determined whether by certification according to comparative result.
(registration phase) scheme and identity will be built to authentication information provided herein respectively below Authentication information application (authentication phase) scheme is illustrated.
Fig. 1 show the flow chart of the authentication information construction method of the application offer, and the method can be wrapped Include following steps:
S101, obtains the certification text password sequence of user input;
Scheme provided herein, based on password sequence still in the form of text, a text password Sequence is made up of some text characters, and text character can be using only the form of pure digi-tal here, it is also possible to make The form mixed with letter, additional character or polytype character, the length of sequence can be according to reality Use demand determines that such as 4,6 etc., the application is not defined to this.
After user determines the certification text password sequence oneself to be used, with normal text character input side Formula (such as by physical keyboard, dummy keyboard etc.) is supplied to system side, and " system side " here both may be used To refer to independent subscriber terminal equipment, such as mobile phone, PC etc., it is also possible to refer to and set by user terminal The standby system constituted with network side corollary equipment (such as various application servers etc.).System-side is received After the certification text password sequence of user input, subsequent operation is further performed.
S102, for one or more text characters in certification text password sequence, requires that user enters respectively One step is input into certification finger print information corresponding with the character;
In order to improve the security of password entry, application scheme on the basis of plain text password sequence, Allow for one or more text characters in the sequence to be appointed as replaceable character, and be each replaceable word Symbol provides a corresponding user fingerprints information.
For example, initial text password sequence is 4-digit number sequence 1357, can for this four digital subscribers To record finger print information respectively, it is assumed that corresponding relation is as follows:
1-left index finger
3-left hand middle finger
5-left hand is nameless
7-left hand little finger of toe
It is the certification text password sequence of L for a length in practical application, can run will be therein N (N≤L) individual character definition is replaceable character, and replaceable character may be located at any position of sequence Put.For example for 4-digit number sequence 1357, can only define the first or end be replaceable character or Define " 1 ", " 3 " be replaceable character, definition " 5 ", " 7 " be replaceable character etc..It is specific to need It is replaceable character by which character definition in certification text password sequence, can be specified by system side, Can also voluntarily be selected by user.
Above-mentioned " finger print information " and the corresponding relation of " charactor ", is not limited in one-to-one relation, Can also be the corresponding relation of " one-to-many " or " many-one ", i.e., every finger print information one character of correspondence The sequence pair that subsequence or a plurality of finger print information are constituted answers a character.So on the one hand can increase mouth The complexity of order, lifting cracks difficulty, and can also solve the problems, such as to a certain extent can be less with fingerprint. For example, for 4-digit number sequence 1357, a finger print information can be recorded for " 13 ", for " 57 " Record another finger print information, etc..
It is understood that the differentiation to finger print information is not limited in different single fingers, can also be The combination of multiple fingers.In addition, according to the actual functional capability of input equipment, can also be further combined with " pressing The dimension such as duration ", " pressing dynamics " is made a distinction to finger print information, and specific technology is realized and the application Scheme is unrelated, no longer describes in detail here.
S103, by certification text password sequence, certification finger print information and finger print information pass corresponding with character System saves as the authentication information of the user.
It can be seen from abovementioned steps, user needs to include three sides to the information of system side offer in registration phase Face:The corresponding relation of certification text password sequence, certification finger print information and finger print information and character.Wherein First two information is required to user and is input into, and " corresponding relation " is then in the process of user input first two information In automatically generated by system side.This three partial information together constitutes the authentication information of user, is After system side preserves to this three partial information, that is, complete the structure operation of one-time identity authentication information.Root Factually the application scenarios on border, can be stored in subscriber terminal equipment locally by above-mentioned authentication information, also may be used Preserved with being uploaded in the equipment such as the server of network side.
It is understood that building flow according to general authentication information, may further require that user repeats Input authentication text password sequence and each bar finger print information, to avoid input error, the application to this no longer Do expansion explanation.
Corresponding to above-mentioned authentication information constructing plan, the application was further provided in the authentication stage Actual treatment scheme, Fig. 2 show the flow chart of the identity identifying method of the application offer, and the method can be with Comprise the following steps:
S201, receives the password sequence of user input;
S202, according to finger print information and the corresponding relation of text character, the finger print information of user input is parsed It is text character, and the password sequence of user input is converted to by full text sequence according to analysis result;
S203, the full text sequence that is converted to of judgement whether the certification text password sequences match with the user, If it is determine certification success, otherwise determine authentification failure.
Needing to carry out user the application scenarios of authentication, system side can point out user input certification password. Now user can be input into according to the authentication information form provided in registration phase.Here " be System side " is identical with the explanation in preceding embodiment, and the present embodiment is not repeated explanation.
For example, user is 1357 in the text password sequence that authentication information builds stage offer, and record respectively Entered 4 corresponding fingerprints of numeral, then according to S201, user can be sequentially input in certification left index finger, Left hand middle finger, left hand are nameless, the finger print information of left hand little finger of toe.
And then, according to S202, system side according to the corresponding relation for prestoring, by left index finger, left hand middle finger, Left hand is nameless, the finger print information of left hand little finger of toe resolves to 1,3,5,7, and obtains this sequence in full respectively Row 1357.
Finally, according to S203, the full text sequence " 1357 " that system side will be obtained and the certification text for prestoring Password sequence is compared, and the comparative result of this example is that both are consistent, it is thus determined that this authentication success. If comparative result is inconsistent, it is determined that authentification failure, that is, think that active user is not validated user.
If building the stage in authentication information, a part of replaceable character is only specify, then in authentication phase, User needs to carry out Mixed design to text character and finger print information.Correspondingly, system side can provide fingerprint The selection of information input pattern and text character input pattern or handoff functionality, the function can be by software sides Formula realization, for example, provide the operation marks such as button, menu, it is also possible to by hardware mode on a user interface Realize, for example, special button, switch etc. are provided in equipment.The versatility of software mode more preferably, can With suitable for different equipment, different operating system.And in some special equipment, such as cash dispenser, In POS, then can be realized by the way of hardware, those skilled in the art can be according to actual conditions spirit Selection living.
Fig. 3 shows one kind in mobile-phone payment application, and the boundary that input pattern switches is realized by software mode Face schematic diagram, in the password entry interface of touch-screen mobile phone, the lower left corner provides handoff functionality button, interface Shown current input mode is text character input pattern, after user clicks on handoff functionality button, will be cut It is changed to finger print information input pattern.
In addition, in the specific embodiment of the application, user uses for convenience, can also further carry For more flexible certification input mode, for example:
1) allow user voluntarily selects which kind of pattern to be input into password with.
Application scheme is the purpose that finger print information is added based on text password also for reduction Disclosure risk of the user during text password is input into.In view of the situation, fingerprint form (bag can be set Include fingerprint mixed with character) password and textual form password effectively simultaneously.It is defeated that system-side receives user After the password sequence for entering, the password of the password comprising finger print information or full textual form is first determined whether, such as Fruit is the previous case, then the password for being first converted to full textual form is authenticated judging (i.e. foregoing again S202-S203), if latter event, then can directly be authenticated judging.
Using such scheme, if it is safe (such as at oneself that user can determine current surrounding environment Family), then password directly can be in the form of text input into, the purpose of operation is simplified to reach, while also can letter Change the follow-up judgement treatment of system side;, whereas if user cannot determine the security (example of currently used environment As in public), then fingerprint mode can be switched to be input into password avoid leakage.
Additionally, this mode can also effectively lift the scope of application of application scheme, defeated without fingerprint Enter in the equipment of function, user still can be authenticated using the password of textual form.Typical applied field Scape is for example:Applied for certain payment, if the mobile phone version of the currently used application of user, and user Currently used mobile phone supports fingerprint input, then user can be made using fingerprint form input port;If with The currently used mobile phone in family do not support fingerprint be input into or with the PC versions of the currently used application (here Assuming that PC does not support that fingerprint is input into), then user's same trade can complete certification using the password of textual form.
2) user is allowed voluntarily to select the input pattern of single character.
Embodiment above was once mentioned:The stage is built in authentication information, is the certification of L for a length Text password sequence, can be replaceable character only by N therein (N≤L) individual character definition, and can Substitute character may be located at the optional position of sequence.And in authentication phase, can further provide for:For bag Certification text password sequence containing N number of replaceable character, it is allowed to which user is individual for M therein (M≤N) Character input finger print information, system-side is received after user input password sequence, by M bars fingerprint therein Information resolves to text character respectively, as long as the full text sequence for finally giving and certification text password sequence phase Matching, then can determine that certification success, without paying close attention to the finger print information quantity that user is input into.
For example, for 4-digit number sequence 1357, and foregoing corresponding relation, user in certification, Can be input into:
1-3-5-7、
Left index finger fingerprint -3-5-7,
Left index finger fingerprint-left hand middle finger fingerprint -5-7,
1-3-5- left hand little fingers of toe fingerprint,
Etc.
Because the full textual form obtained after above-mentioned input finally conversion is " 1357 ", with certification text password Sequence matches, therefore can be by certification.
In this way, it is also possible to reach the purpose of simplified user operation, in fact as M=0, i.e. phase When in scheme 1) described by situation.Additionally, this mode also causes that the input behavior of user is more flexible, So as to serve the concealed effect of raising indirectly.
According to actual application scenarios or application demand, S202 and S203 can locally be realized in user equipment Or network side equipment is realized.Under the scene that network side is realized, user is input into fingerprint (bag by terminal device Including situation about mixing with character all referring to line and fingerprint) after information, finger print information is uploaded to net by terminal device Network side apparatus, the finger print information row of user input by network side equipment resolved to text character and carried out After authentication determination, authentication result is fed back into terminal device.Can certainly be that network side equipment is only used for solution Analysis finger print information, then feeds back to analysis result terminal device and is authenticated sentencing by terminal device itself It is disconnected.
In addition, in actual applications, the problem that finger print information cannot be parsed often occurs, such as user works as Certain fingerprint clear degree of preceding input is not enough or is not found and user in the authentication information for prestoring Finger print information that the finger print information of current input matches, etc., in this case, system side can also be straight The result that S202 provides authentification failure is connected on, if the equal successfully resolved of all finger print informations, further performs The operation of S203.
Below authentication information constructing plan provided herein is described respectively and authentication information should Use scheme.It is understood that the structure in order to realize user's ID authentication information, typically requires that user exists The equipment that the stage is used at least possesses character input function and fingerprint input function, is also not precluded from certainly Using modes such as upper transmitting files come input authentication text password sequence and finger print information.And in actual authentication application In the stage, the equipment that user used is not necessarily in many cases and is provided simultaneously with character input function and is referred to Line input function, this also further increases the scope of application of application scheme.
Corresponding to above method embodiment, the application also provides a kind of authentication information construction device, referring to Shown in Fig. 4, the device can include:
Text password sequence obtains module 110, the certification text password sequence for obtaining user input;
Finger print information obtains module 120, for for one or more the text words in certification text password sequence Symbol, requires user's further input certification finger print information corresponding with the character respectively;
Information preserving module 130, for by certification text password sequence, certification finger print information and finger print information With the authentication information that the corresponding relation of character saves as the user.
In a kind of specific embodiment of the application, said one or multiple text characters can be referred to by user Fixed or system is specified.
The application also provides a kind of identification authentication system, shown in Figure 5, and the device can include:
Memory module 210, the certification text password of stage offer is built for prestoring user in authentication information The corresponding relation of sequence, certification finger print information and finger print information and text character;
Receiver module 220, the password sequence for receiving user input, the password sequence each respectively with The form input of text character or finger print information;
Parsing module 230, for the corresponding relation according to finger print information and text character, by the finger of user input Line information analysis are text character, and are converted in full originally the password sequence of user input according to analysis result Sequence;
Authentication module 240, for judge the full text sequence that is converted to whether the certification textport with the user Sequences match is made, certification success is if it is determined, authentification failure is otherwise determined.
In a kind of specific embodiment of the application, authentication module 240 can be also used for:In parsing module In the case of to the parsing failure of the finger print information of user input, authentification failure is directly determined.
In a kind of specific embodiment of the application, receiver module 220 can be also used for:
According to the selection operation of user, by current input pattern switch to finger print information input pattern or Switch to text character input pattern.
The application also provides a kind of identity authorization system, and the system can include above-mentioned authentication information structure Device and identification authentication system are built, the structural representation of the system is not shown here.According to explanation above Understand, both cooperation relations are:Information preserving module 130 is by certification text password sequence, certification fingerprint After information and finger print information save as the authentication information of the user with the corresponding relation of character, directly deposit Store up to memory module 210.
As seen through the above description of the embodiments, those skilled in the art can be understood that this Application can add the mode of required general hardware platform to realize by software.Based on such understanding, this Shen The part that technical scheme please substantially contributes to prior art in other words can be in the form of software product Embody, the computer software product can be stored in storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions are used to so that computer equipment (can be personal computer, server, Or the network equipment etc.) perform method described in some parts of each embodiment of the application or embodiment.
Each embodiment in this specification is described by the way of progressive, identical phase between each embodiment As part mutually referring to what each embodiment was stressed is the difference with other embodiment. For especially for device or system embodiment, because it is substantially similar to embodiment of the method, so description Obtain fairly simple, the relevent part can refer to the partial explaination of embodiments of method.Device described above or System embodiment be only it is schematical, wherein it is described as separating component illustrate module can be or Can not be it is physically separate, when application scheme is implemented can the function of each module same or Realized in multiple softwares and/or hardware.Some or all of mould therein can also according to the actual needs be selected Block realizes the purpose of this embodiment scheme.Those of ordinary skill in the art are not paying the feelings of creative work Under condition, you can to understand and implement.
The above is only the specific embodiment of the application, it is noted that common for the art For technical staff, on the premise of the application principle is not departed from, some improvements and modifications can also be made, These improvements and modifications also should be regarded as the protection domain of the application.

Claims (13)

1. a kind of identity identifying method, it is characterised in that prestore user and build the stage in authentication information and carry The corresponding relation of the certification text password sequence, certification finger print information and finger print information and text character of confession, The identity identifying method includes:
The password sequence of user input is received, each of the password sequence is believed with text character or fingerprint respectively The form input of breath;
According to the finger print information and the corresponding relation of text character, the finger print information of user input is resolved to Text character, and the password sequence of user input is converted to by full text sequence according to analysis result;
The full text sequence that is converted to of judgement whether the certification text password sequences match with the user, if It is then to determine certification success, otherwise determines authentification failure.
2. method according to claim 1, it is characterised in that methods described also includes:
If the finger print information to user input parses failure, authentification failure is directly determined.
3. method according to claim 1, it is characterised in that methods described also includes:
According to the selection operation of user, by current input pattern switch to finger print information input pattern or Switch to text character input pattern.
4. method according to claim 3, it is characterised in that the selection operation, by user circle The operation mark provided on face is realized, or is realized by the physical unit on user equipment.
5. method according to claim 1, it is characterised in that the finger print information by user input Row resolve to text character, including:
Arranged in the local finger print information by user input of user equipment and resolve to text character;
Or
The finger print information is uploaded to network side equipment by user equipment, by network side equipment by user input Finger print information row resolve to text character.
6. a kind of authentication information construction method, it is characterised in that the method includes:
Obtain the certification text password sequence of user input;
For one or more text characters in the certification text password sequence, require that user enters one respectively Step input certification finger print information corresponding with the character;
By the corresponding relation of the certification text password sequence, certification finger print information and finger print information and character Save as the authentication information of the user.
7. method according to claim 5, it is characterised in that one or more of text characters by User is specified or system is specified.
8. a kind of identification authentication system, it is characterised in that the device includes:
Memory module, the certification text password sequence of stage offer is built for prestoring user in authentication information The corresponding relation of row, certification finger print information and finger print information and text character;
Receiver module, the password sequence for receiving user input, each of the password sequence is respectively with text The form input of this character or finger print information;
Parsing module, for the corresponding relation according to the finger print information and text character, by user input Finger print information resolves to text character, and is converted in full the password sequence of user input according to analysis result This sequence;
Authentication module, for judge the full text sequence that is converted to whether the certification text password with the user Sequences match, if it is determines certification success, otherwise determines authentification failure.
9. device according to claim 8, it is characterised in that the authentication module is additionally operable to:
In the case of finger print information parsing failure of the parsing module to user input, certification is directly determined Failure.
10. device according to claim 8, it is characterised in that the receiver module is additionally operable to:
According to the selection operation of user, by current input pattern switch to finger print information input pattern or Switch to text character input pattern.
11. a kind of authentication information construction devices, it is characterised in that the device includes:
Text password sequence obtains module, the certification text password sequence for obtaining user input;
Finger print information obtains module, for for one or more texts in the certification text password sequence Character, requires user's further input certification finger print information corresponding with the character respectively;
Information preserving module, for the certification text password sequence, certification finger print information and fingerprint to be believed Breath saves as the authentication information of the user with the corresponding relation of character.
12. devices according to claim 11, it is characterised in that one or more of text characters Specified by user or system is specified.
13. a kind of identity authorization systems, it is characterised in that including as described in any one of claim 8 to 10 Identification authentication system and authentication information as described in any one of claim 11 or 12 build dress Put.
CN201610491497.0A 2016-06-28 2016-06-28 A kind of identity identifying method, apparatus and system Pending CN106874717A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610491497.0A CN106874717A (en) 2016-06-28 2016-06-28 A kind of identity identifying method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610491497.0A CN106874717A (en) 2016-06-28 2016-06-28 A kind of identity identifying method, apparatus and system

Publications (1)

Publication Number Publication Date
CN106874717A true CN106874717A (en) 2017-06-20

Family

ID=59239292

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610491497.0A Pending CN106874717A (en) 2016-06-28 2016-06-28 A kind of identity identifying method, apparatus and system

Country Status (1)

Country Link
CN (1) CN106874717A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019033867A1 (en) * 2017-08-18 2019-02-21 西安中兴新软件有限责任公司 Input method and device, and electronic device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182673A (en) * 2014-08-12 2014-12-03 赵守中 Identity identification method, system and equipment based on fingerprints
CN104462911A (en) * 2013-09-25 2015-03-25 南京神盾信息技术有限公司 Method for achieving identity authentication on mobile terminal
CN105635052A (en) * 2014-10-31 2016-06-01 江苏威盾网络科技有限公司 Network identity dynamic fingerprint authentication method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462911A (en) * 2013-09-25 2015-03-25 南京神盾信息技术有限公司 Method for achieving identity authentication on mobile terminal
CN104182673A (en) * 2014-08-12 2014-12-03 赵守中 Identity identification method, system and equipment based on fingerprints
CN105635052A (en) * 2014-10-31 2016-06-01 江苏威盾网络科技有限公司 Network identity dynamic fingerprint authentication method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019033867A1 (en) * 2017-08-18 2019-02-21 西安中兴新软件有限责任公司 Input method and device, and electronic device
CN109409055A (en) * 2017-08-18 2019-03-01 西安中兴新软件有限责任公司 A kind of input method and device, electronic equipment

Similar Documents

Publication Publication Date Title
Braz et al. Security and usability: the case of the user authentication methods
KR100884376B1 (en) Method and apparatus of OTP based on Challenge/Response
US8407762B2 (en) System for three level authentication of a user
US20160127134A1 (en) User authentication system and method
RU2720563C2 (en) Authentication method and system
CN107113175A (en) Multi-user's strong authentication token
JP2013528857A (en) Password safe input system using password key movement value and password safe input method
EP2936277B1 (en) Method and apparatus for information verification
CN102804201A (en) Offline two-factor user authentication system, method thereforthereof, and program thereforthereof
CN1894882B (en) Authentication system
CN106709382A (en) Keyboard display method and device
CN105763536B (en) Network registering method based on motion graphics password and system
Forget et al. Choose your own authentication
US8984599B2 (en) Real time password generation apparatus and method
TWI540874B (en) Identity authentication method, device and system
CN109688150A (en) A kind of multi-platform account interoperability methods and device
AU2007309051B2 (en) User authentication system and method
TW201544983A (en) Data communication method and system, client terminal and server
Silva Calls for behavioural biometrics as bank fraud soars
CN106874717A (en) A kind of identity identifying method, apparatus and system
CN104980279A (en) Identity authentication method, and related equipment and system
Kansuwan et al. Authentication model using the bundled CAPTCHA OTP instead of traditional password
Jiping et al. An improved biometric-based user authentication scheme for c/s system
JP2002041478A (en) System and method for authentication, and recording medium with authentication program recorded thereon
US20140304789A1 (en) Convenient one-time password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1237920

Country of ref document: HK

RJ01 Rejection of invention patent application after publication

Application publication date: 20170620

RJ01 Rejection of invention patent application after publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1237920

Country of ref document: HK