CN106874717A - A kind of identity identifying method, apparatus and system - Google Patents
A kind of identity identifying method, apparatus and system Download PDFInfo
- Publication number
- CN106874717A CN106874717A CN201610491497.0A CN201610491497A CN106874717A CN 106874717 A CN106874717 A CN 106874717A CN 201610491497 A CN201610491497 A CN 201610491497A CN 106874717 A CN106874717 A CN 106874717A
- Authority
- CN
- China
- Prior art keywords
- text
- user
- finger print
- print information
- certification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000010276 construction Methods 0.000 claims description 9
- 238000013475 authorization Methods 0.000 claims description 3
- 210000003811 finger Anatomy 0.000 description 12
- 230000006399 behavior Effects 0.000 description 4
- 238000012905 input function Methods 0.000 description 4
- 210000004932 little finger Anatomy 0.000 description 4
- 230000000052 comparative effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000003825 pressing Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 244000144985 peep Species 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
Abstract
This application discloses a kind of identity identifying method, apparatus and system.A kind of identity identifying method includes:The password sequence of user input is received, each of the password sequence is input into the form of text character or finger print information respectively;According to the finger print information and the corresponding relation of text character, the finger print information of user input is resolved into text character, and the password sequence of user input is converted to by full text sequence according to analysis result;The full text sequence that is converted to of judgement whether the certification text password sequences match with the user, if it is determine certification success, otherwise determine authentification failure.Technical scheme provided herein, character password certification and finger print identifying two ways are combined, and effectively increase the security of user password.
Description
Technical field
The application is related to authentication techniques field, more particularly to a kind of identity identifying method, apparatus and system.
Background technology
Certification is the process with reliable certain entity identities of technical identification, in the application such as computer, internet
Field, authenticating user identification is a kind of most basic demand, and conventional technology includes that password authentication, physics are recognized
The features such as card, biological characteristic authentication etc., wherein password authentication realize simple, easy to use with it turns into application
Most commonly used authentication mode.
When user is using equipment such as mobile phone, PCs, password entry is directly carried out commonly using keyboard, this
Plant scheme physical presence and larger safety issue, malicious user can in several ways steal password,
For example directly peep, be implanted into Malware (such as key information logging software).
Regarding to the issue above, a kind of thinking is to try to make behavior hiddenization of user input password, for example with
Implicit password shows, generates virtual keyboard layout etc. at random, and these modes can reduce to a certain extent
The risk that password is stolen, but the input behavior of user after all can be by visual discrimination, malicious user
If stolen intentionally, still section can reach mesh by many means (such as high-definition camera is taken on the sly)
's.
The content of the invention
For above-mentioned technical problem, the application provides a kind of identity identifying method, apparatus and system, technical side
Case is as follows:
According to the first aspect of the application, there is provided a kind of identity identifying method, prestore user and believe in certification
Certification text password sequence, certification finger print information and finger print information and text word that the breath structure stage provides
The corresponding relation of symbol, the identity identifying method includes:
The password sequence of user input is received, each of the password sequence is believed with text character or fingerprint respectively
The form input of breath;
According to the finger print information and the corresponding relation of text character, the finger print information of user input is resolved to
Text character, and the password sequence of user input is converted to by full text sequence according to analysis result;
The full text sequence that is converted to of judgement whether the certification text password sequences match with the user, if
It is then to determine certification success, otherwise determines authentification failure.
A kind of authentication information construction method, the method includes:
Obtain the certification text password sequence of user input;
For one or more text characters in the certification text password sequence, require that user enters one respectively
Step input certification finger print information corresponding with the character;
By the corresponding relation of the certification text password sequence, certification finger print information and finger print information and character
Save as the authentication information of the user.
A kind of identification authentication system, the device includes:
Memory module, the certification text password sequence of stage offer is built for prestoring user in authentication information
The corresponding relation of row, certification finger print information and finger print information and text character;
Receiver module, the password sequence for receiving user input, each of the password sequence is respectively with text
The form input of this character or finger print information;
Parsing module, for the corresponding relation according to the finger print information and text character, by user input
Finger print information resolves to text character, and is converted in full the password sequence of user input according to analysis result
This sequence;
Authentication module, for judge the full text sequence that is converted to whether the certification text password with the user
Sequences match, if it is determines certification success, otherwise determines authentification failure.
A kind of authentication information construction device, the device includes:
Text password sequence obtains module, the certification text password sequence for obtaining user input;
Finger print information obtains module, for for one or more texts in the certification text password sequence
Character, requires user's further input certification finger print information corresponding with the character respectively;
Information preserving module, for the certification text password sequence, certification finger print information and fingerprint to be believed
Breath saves as the authentication information of the user with the corresponding relation of character.
A kind of the 5th aspect according to the application, there is provided identity authorization system, including above-mentioned authentication dress
Put and the authentication information construction device as described in any one of claim 11 or 12.
Technical scheme provided herein, character password certification and finger print identifying two ways are combined,
User in authentication registration information phase, the corresponding relation between finger print information and character can be carried out it is self-defined,
And then when input password is authenticated every time, can be passed through according to the security of actual environment around, selection
Fingerprint mode realizes indirectly the input of text character, compared with character is input into, is input into the movement range of fingerprint
It is smaller, it is disguised also more preferable.Importantly, personal characteristics of the finger print information as user, with natural
Uniqueness, even if malicious parties see validated user password entry action, validated user cannot obtained
In the case of fingerprint, also cannot be by certification.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory,
The application can not be limited.
Brief description of the drawings
In order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art, below will be to implementing
Example or the accompanying drawing to be used needed for description of the prior art are briefly described, it should be apparent that, describe below
In accompanying drawing be only some embodiments described in the application, for those of ordinary skill in the art,
Other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the identity identifying method of the application;
Fig. 2 is the schematic flow sheet of the authentication information construction method of the application;
Fig. 3 is a kind of interface schematic diagram of input pattern handoff functionality of the application;
Fig. 4 is the structural representation of the identification authentication system of the application;
Fig. 5 is the structural representation of the authentication information construction device of the application.
Specific embodiment
For simple character password input behavior easily reveal problem, scheme provided herein be
On the basis of original characters password authentication mechanism, finger print identifying mechanism is further increased, by two ways
Combination further improve the security of password entry, reduce disclosure risk.
In order that those skilled in the art more fully understand the technical scheme in the application, below in conjunction with this Shen
Accompanying drawing that please be in embodiment, is described in detail, it is clear that institute to the technical scheme in the embodiment of the present application
The embodiment of description is only some embodiments of the present application, rather than whole embodiments.Based on the application
In embodiment, the every other embodiment that those of ordinary skill in the art are obtained should all belong to this Shen
The scope that please be protect.
According to scheme provided herein, user is in authentication information registration phase, it is necessary first to provide one
For the text password sequence of certification, then for one or more text characters in the sequence, record respectively
Enter corresponding fingerprint, password text sequence that system side is provided according to user, finger print information and both is right
Should be related to generate the user authentication information and preserve.In the actual authentication application stage, user can be with
Password entry is realized by way of being input into finger print information, system side according to the corresponding relation for pre-saving, from
It is dynamic that the finger print information of user input is converted into textual form, then by transformation result and the certification text for prestoring
Password sequence is compared, and is finally determined whether by certification according to comparative result.
(registration phase) scheme and identity will be built to authentication information provided herein respectively below
Authentication information application (authentication phase) scheme is illustrated.
Fig. 1 show the flow chart of the authentication information construction method of the application offer, and the method can be wrapped
Include following steps:
S101, obtains the certification text password sequence of user input;
Scheme provided herein, based on password sequence still in the form of text, a text password
Sequence is made up of some text characters, and text character can be using only the form of pure digi-tal here, it is also possible to make
The form mixed with letter, additional character or polytype character, the length of sequence can be according to reality
Use demand determines that such as 4,6 etc., the application is not defined to this.
After user determines the certification text password sequence oneself to be used, with normal text character input side
Formula (such as by physical keyboard, dummy keyboard etc.) is supplied to system side, and " system side " here both may be used
To refer to independent subscriber terminal equipment, such as mobile phone, PC etc., it is also possible to refer to and set by user terminal
The standby system constituted with network side corollary equipment (such as various application servers etc.).System-side is received
After the certification text password sequence of user input, subsequent operation is further performed.
S102, for one or more text characters in certification text password sequence, requires that user enters respectively
One step is input into certification finger print information corresponding with the character;
In order to improve the security of password entry, application scheme on the basis of plain text password sequence,
Allow for one or more text characters in the sequence to be appointed as replaceable character, and be each replaceable word
Symbol provides a corresponding user fingerprints information.
For example, initial text password sequence is 4-digit number sequence 1357, can for this four digital subscribers
To record finger print information respectively, it is assumed that corresponding relation is as follows:
1-left index finger
3-left hand middle finger
5-left hand is nameless
7-left hand little finger of toe
It is the certification text password sequence of L for a length in practical application, can run will be therein
N (N≤L) individual character definition is replaceable character, and replaceable character may be located at any position of sequence
Put.For example for 4-digit number sequence 1357, can only define the first or end be replaceable character or
Define " 1 ", " 3 " be replaceable character, definition " 5 ", " 7 " be replaceable character etc..It is specific to need
It is replaceable character by which character definition in certification text password sequence, can be specified by system side,
Can also voluntarily be selected by user.
Above-mentioned " finger print information " and the corresponding relation of " charactor ", is not limited in one-to-one relation,
Can also be the corresponding relation of " one-to-many " or " many-one ", i.e., every finger print information one character of correspondence
The sequence pair that subsequence or a plurality of finger print information are constituted answers a character.So on the one hand can increase mouth
The complexity of order, lifting cracks difficulty, and can also solve the problems, such as to a certain extent can be less with fingerprint.
For example, for 4-digit number sequence 1357, a finger print information can be recorded for " 13 ", for " 57 "
Record another finger print information, etc..
It is understood that the differentiation to finger print information is not limited in different single fingers, can also be
The combination of multiple fingers.In addition, according to the actual functional capability of input equipment, can also be further combined with " pressing
The dimension such as duration ", " pressing dynamics " is made a distinction to finger print information, and specific technology is realized and the application
Scheme is unrelated, no longer describes in detail here.
S103, by certification text password sequence, certification finger print information and finger print information pass corresponding with character
System saves as the authentication information of the user.
It can be seen from abovementioned steps, user needs to include three sides to the information of system side offer in registration phase
Face:The corresponding relation of certification text password sequence, certification finger print information and finger print information and character.Wherein
First two information is required to user and is input into, and " corresponding relation " is then in the process of user input first two information
In automatically generated by system side.This three partial information together constitutes the authentication information of user, is
After system side preserves to this three partial information, that is, complete the structure operation of one-time identity authentication information.Root
Factually the application scenarios on border, can be stored in subscriber terminal equipment locally by above-mentioned authentication information, also may be used
Preserved with being uploaded in the equipment such as the server of network side.
It is understood that building flow according to general authentication information, may further require that user repeats
Input authentication text password sequence and each bar finger print information, to avoid input error, the application to this no longer
Do expansion explanation.
Corresponding to above-mentioned authentication information constructing plan, the application was further provided in the authentication stage
Actual treatment scheme, Fig. 2 show the flow chart of the identity identifying method of the application offer, and the method can be with
Comprise the following steps:
S201, receives the password sequence of user input;
S202, according to finger print information and the corresponding relation of text character, the finger print information of user input is parsed
It is text character, and the password sequence of user input is converted to by full text sequence according to analysis result;
S203, the full text sequence that is converted to of judgement whether the certification text password sequences match with the user,
If it is determine certification success, otherwise determine authentification failure.
Needing to carry out user the application scenarios of authentication, system side can point out user input certification password.
Now user can be input into according to the authentication information form provided in registration phase.Here " be
System side " is identical with the explanation in preceding embodiment, and the present embodiment is not repeated explanation.
For example, user is 1357 in the text password sequence that authentication information builds stage offer, and record respectively
Entered 4 corresponding fingerprints of numeral, then according to S201, user can be sequentially input in certification left index finger,
Left hand middle finger, left hand are nameless, the finger print information of left hand little finger of toe.
And then, according to S202, system side according to the corresponding relation for prestoring, by left index finger, left hand middle finger,
Left hand is nameless, the finger print information of left hand little finger of toe resolves to 1,3,5,7, and obtains this sequence in full respectively
Row 1357.
Finally, according to S203, the full text sequence " 1357 " that system side will be obtained and the certification text for prestoring
Password sequence is compared, and the comparative result of this example is that both are consistent, it is thus determined that this authentication success.
If comparative result is inconsistent, it is determined that authentification failure, that is, think that active user is not validated user.
If building the stage in authentication information, a part of replaceable character is only specify, then in authentication phase,
User needs to carry out Mixed design to text character and finger print information.Correspondingly, system side can provide fingerprint
The selection of information input pattern and text character input pattern or handoff functionality, the function can be by software sides
Formula realization, for example, provide the operation marks such as button, menu, it is also possible to by hardware mode on a user interface
Realize, for example, special button, switch etc. are provided in equipment.The versatility of software mode more preferably, can
With suitable for different equipment, different operating system.And in some special equipment, such as cash dispenser,
In POS, then can be realized by the way of hardware, those skilled in the art can be according to actual conditions spirit
Selection living.
Fig. 3 shows one kind in mobile-phone payment application, and the boundary that input pattern switches is realized by software mode
Face schematic diagram, in the password entry interface of touch-screen mobile phone, the lower left corner provides handoff functionality button, interface
Shown current input mode is text character input pattern, after user clicks on handoff functionality button, will be cut
It is changed to finger print information input pattern.
In addition, in the specific embodiment of the application, user uses for convenience, can also further carry
For more flexible certification input mode, for example:
1) allow user voluntarily selects which kind of pattern to be input into password with.
Application scheme is the purpose that finger print information is added based on text password also for reduction
Disclosure risk of the user during text password is input into.In view of the situation, fingerprint form (bag can be set
Include fingerprint mixed with character) password and textual form password effectively simultaneously.It is defeated that system-side receives user
After the password sequence for entering, the password of the password comprising finger print information or full textual form is first determined whether, such as
Fruit is the previous case, then the password for being first converted to full textual form is authenticated judging (i.e. foregoing again
S202-S203), if latter event, then can directly be authenticated judging.
Using such scheme, if it is safe (such as at oneself that user can determine current surrounding environment
Family), then password directly can be in the form of text input into, the purpose of operation is simplified to reach, while also can letter
Change the follow-up judgement treatment of system side;, whereas if user cannot determine the security (example of currently used environment
As in public), then fingerprint mode can be switched to be input into password avoid leakage.
Additionally, this mode can also effectively lift the scope of application of application scheme, defeated without fingerprint
Enter in the equipment of function, user still can be authenticated using the password of textual form.Typical applied field
Scape is for example:Applied for certain payment, if the mobile phone version of the currently used application of user, and user
Currently used mobile phone supports fingerprint input, then user can be made using fingerprint form input port;If with
The currently used mobile phone in family do not support fingerprint be input into or with the PC versions of the currently used application (here
Assuming that PC does not support that fingerprint is input into), then user's same trade can complete certification using the password of textual form.
2) user is allowed voluntarily to select the input pattern of single character.
Embodiment above was once mentioned:The stage is built in authentication information, is the certification of L for a length
Text password sequence, can be replaceable character only by N therein (N≤L) individual character definition, and can
Substitute character may be located at the optional position of sequence.And in authentication phase, can further provide for:For bag
Certification text password sequence containing N number of replaceable character, it is allowed to which user is individual for M therein (M≤N)
Character input finger print information, system-side is received after user input password sequence, by M bars fingerprint therein
Information resolves to text character respectively, as long as the full text sequence for finally giving and certification text password sequence phase
Matching, then can determine that certification success, without paying close attention to the finger print information quantity that user is input into.
For example, for 4-digit number sequence 1357, and foregoing corresponding relation, user in certification,
Can be input into:
1-3-5-7、
Left index finger fingerprint -3-5-7,
Left index finger fingerprint-left hand middle finger fingerprint -5-7,
1-3-5- left hand little fingers of toe fingerprint,
Etc.
Because the full textual form obtained after above-mentioned input finally conversion is " 1357 ", with certification text password
Sequence matches, therefore can be by certification.
In this way, it is also possible to reach the purpose of simplified user operation, in fact as M=0, i.e. phase
When in scheme 1) described by situation.Additionally, this mode also causes that the input behavior of user is more flexible,
So as to serve the concealed effect of raising indirectly.
According to actual application scenarios or application demand, S202 and S203 can locally be realized in user equipment
Or network side equipment is realized.Under the scene that network side is realized, user is input into fingerprint (bag by terminal device
Including situation about mixing with character all referring to line and fingerprint) after information, finger print information is uploaded to net by terminal device
Network side apparatus, the finger print information row of user input by network side equipment resolved to text character and carried out
After authentication determination, authentication result is fed back into terminal device.Can certainly be that network side equipment is only used for solution
Analysis finger print information, then feeds back to analysis result terminal device and is authenticated sentencing by terminal device itself
It is disconnected.
In addition, in actual applications, the problem that finger print information cannot be parsed often occurs, such as user works as
Certain fingerprint clear degree of preceding input is not enough or is not found and user in the authentication information for prestoring
Finger print information that the finger print information of current input matches, etc., in this case, system side can also be straight
The result that S202 provides authentification failure is connected on, if the equal successfully resolved of all finger print informations, further performs
The operation of S203.
Below authentication information constructing plan provided herein is described respectively and authentication information should
Use scheme.It is understood that the structure in order to realize user's ID authentication information, typically requires that user exists
The equipment that the stage is used at least possesses character input function and fingerprint input function, is also not precluded from certainly
Using modes such as upper transmitting files come input authentication text password sequence and finger print information.And in actual authentication application
In the stage, the equipment that user used is not necessarily in many cases and is provided simultaneously with character input function and is referred to
Line input function, this also further increases the scope of application of application scheme.
Corresponding to above method embodiment, the application also provides a kind of authentication information construction device, referring to
Shown in Fig. 4, the device can include:
Text password sequence obtains module 110, the certification text password sequence for obtaining user input;
Finger print information obtains module 120, for for one or more the text words in certification text password sequence
Symbol, requires user's further input certification finger print information corresponding with the character respectively;
Information preserving module 130, for by certification text password sequence, certification finger print information and finger print information
With the authentication information that the corresponding relation of character saves as the user.
In a kind of specific embodiment of the application, said one or multiple text characters can be referred to by user
Fixed or system is specified.
The application also provides a kind of identification authentication system, shown in Figure 5, and the device can include:
Memory module 210, the certification text password of stage offer is built for prestoring user in authentication information
The corresponding relation of sequence, certification finger print information and finger print information and text character;
Receiver module 220, the password sequence for receiving user input, the password sequence each respectively with
The form input of text character or finger print information;
Parsing module 230, for the corresponding relation according to finger print information and text character, by the finger of user input
Line information analysis are text character, and are converted in full originally the password sequence of user input according to analysis result
Sequence;
Authentication module 240, for judge the full text sequence that is converted to whether the certification textport with the user
Sequences match is made, certification success is if it is determined, authentification failure is otherwise determined.
In a kind of specific embodiment of the application, authentication module 240 can be also used for:In parsing module
In the case of to the parsing failure of the finger print information of user input, authentification failure is directly determined.
In a kind of specific embodiment of the application, receiver module 220 can be also used for:
According to the selection operation of user, by current input pattern switch to finger print information input pattern or
Switch to text character input pattern.
The application also provides a kind of identity authorization system, and the system can include above-mentioned authentication information structure
Device and identification authentication system are built, the structural representation of the system is not shown here.According to explanation above
Understand, both cooperation relations are:Information preserving module 130 is by certification text password sequence, certification fingerprint
After information and finger print information save as the authentication information of the user with the corresponding relation of character, directly deposit
Store up to memory module 210.
As seen through the above description of the embodiments, those skilled in the art can be understood that this
Application can add the mode of required general hardware platform to realize by software.Based on such understanding, this Shen
The part that technical scheme please substantially contributes to prior art in other words can be in the form of software product
Embody, the computer software product can be stored in storage medium, such as ROM/RAM, magnetic disc,
CD etc., including some instructions are used to so that computer equipment (can be personal computer, server,
Or the network equipment etc.) perform method described in some parts of each embodiment of the application or embodiment.
Each embodiment in this specification is described by the way of progressive, identical phase between each embodiment
As part mutually referring to what each embodiment was stressed is the difference with other embodiment.
For especially for device or system embodiment, because it is substantially similar to embodiment of the method, so description
Obtain fairly simple, the relevent part can refer to the partial explaination of embodiments of method.Device described above or
System embodiment be only it is schematical, wherein it is described as separating component illustrate module can be or
Can not be it is physically separate, when application scheme is implemented can the function of each module same or
Realized in multiple softwares and/or hardware.Some or all of mould therein can also according to the actual needs be selected
Block realizes the purpose of this embodiment scheme.Those of ordinary skill in the art are not paying the feelings of creative work
Under condition, you can to understand and implement.
The above is only the specific embodiment of the application, it is noted that common for the art
For technical staff, on the premise of the application principle is not departed from, some improvements and modifications can also be made,
These improvements and modifications also should be regarded as the protection domain of the application.
Claims (13)
1. a kind of identity identifying method, it is characterised in that prestore user and build the stage in authentication information and carry
The corresponding relation of the certification text password sequence, certification finger print information and finger print information and text character of confession,
The identity identifying method includes:
The password sequence of user input is received, each of the password sequence is believed with text character or fingerprint respectively
The form input of breath;
According to the finger print information and the corresponding relation of text character, the finger print information of user input is resolved to
Text character, and the password sequence of user input is converted to by full text sequence according to analysis result;
The full text sequence that is converted to of judgement whether the certification text password sequences match with the user, if
It is then to determine certification success, otherwise determines authentification failure.
2. method according to claim 1, it is characterised in that methods described also includes:
If the finger print information to user input parses failure, authentification failure is directly determined.
3. method according to claim 1, it is characterised in that methods described also includes:
According to the selection operation of user, by current input pattern switch to finger print information input pattern or
Switch to text character input pattern.
4. method according to claim 3, it is characterised in that the selection operation, by user circle
The operation mark provided on face is realized, or is realized by the physical unit on user equipment.
5. method according to claim 1, it is characterised in that the finger print information by user input
Row resolve to text character, including:
Arranged in the local finger print information by user input of user equipment and resolve to text character;
Or
The finger print information is uploaded to network side equipment by user equipment, by network side equipment by user input
Finger print information row resolve to text character.
6. a kind of authentication information construction method, it is characterised in that the method includes:
Obtain the certification text password sequence of user input;
For one or more text characters in the certification text password sequence, require that user enters one respectively
Step input certification finger print information corresponding with the character;
By the corresponding relation of the certification text password sequence, certification finger print information and finger print information and character
Save as the authentication information of the user.
7. method according to claim 5, it is characterised in that one or more of text characters by
User is specified or system is specified.
8. a kind of identification authentication system, it is characterised in that the device includes:
Memory module, the certification text password sequence of stage offer is built for prestoring user in authentication information
The corresponding relation of row, certification finger print information and finger print information and text character;
Receiver module, the password sequence for receiving user input, each of the password sequence is respectively with text
The form input of this character or finger print information;
Parsing module, for the corresponding relation according to the finger print information and text character, by user input
Finger print information resolves to text character, and is converted in full the password sequence of user input according to analysis result
This sequence;
Authentication module, for judge the full text sequence that is converted to whether the certification text password with the user
Sequences match, if it is determines certification success, otherwise determines authentification failure.
9. device according to claim 8, it is characterised in that the authentication module is additionally operable to:
In the case of finger print information parsing failure of the parsing module to user input, certification is directly determined
Failure.
10. device according to claim 8, it is characterised in that the receiver module is additionally operable to:
According to the selection operation of user, by current input pattern switch to finger print information input pattern or
Switch to text character input pattern.
11. a kind of authentication information construction devices, it is characterised in that the device includes:
Text password sequence obtains module, the certification text password sequence for obtaining user input;
Finger print information obtains module, for for one or more texts in the certification text password sequence
Character, requires user's further input certification finger print information corresponding with the character respectively;
Information preserving module, for the certification text password sequence, certification finger print information and fingerprint to be believed
Breath saves as the authentication information of the user with the corresponding relation of character.
12. devices according to claim 11, it is characterised in that one or more of text characters
Specified by user or system is specified.
13. a kind of identity authorization systems, it is characterised in that including as described in any one of claim 8 to 10
Identification authentication system and authentication information as described in any one of claim 11 or 12 build dress
Put.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610491497.0A CN106874717A (en) | 2016-06-28 | 2016-06-28 | A kind of identity identifying method, apparatus and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610491497.0A CN106874717A (en) | 2016-06-28 | 2016-06-28 | A kind of identity identifying method, apparatus and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106874717A true CN106874717A (en) | 2017-06-20 |
Family
ID=59239292
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610491497.0A Pending CN106874717A (en) | 2016-06-28 | 2016-06-28 | A kind of identity identifying method, apparatus and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106874717A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019033867A1 (en) * | 2017-08-18 | 2019-02-21 | 西安中兴新软件有限责任公司 | Input method and device, and electronic device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104182673A (en) * | 2014-08-12 | 2014-12-03 | 赵守中 | Identity identification method, system and equipment based on fingerprints |
CN104462911A (en) * | 2013-09-25 | 2015-03-25 | 南京神盾信息技术有限公司 | Method for achieving identity authentication on mobile terminal |
CN105635052A (en) * | 2014-10-31 | 2016-06-01 | 江苏威盾网络科技有限公司 | Network identity dynamic fingerprint authentication method |
-
2016
- 2016-06-28 CN CN201610491497.0A patent/CN106874717A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104462911A (en) * | 2013-09-25 | 2015-03-25 | 南京神盾信息技术有限公司 | Method for achieving identity authentication on mobile terminal |
CN104182673A (en) * | 2014-08-12 | 2014-12-03 | 赵守中 | Identity identification method, system and equipment based on fingerprints |
CN105635052A (en) * | 2014-10-31 | 2016-06-01 | 江苏威盾网络科技有限公司 | Network identity dynamic fingerprint authentication method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019033867A1 (en) * | 2017-08-18 | 2019-02-21 | 西安中兴新软件有限责任公司 | Input method and device, and electronic device |
CN109409055A (en) * | 2017-08-18 | 2019-03-01 | 西安中兴新软件有限责任公司 | A kind of input method and device, electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Braz et al. | Security and usability: the case of the user authentication methods | |
KR100884376B1 (en) | Method and apparatus of OTP based on Challenge/Response | |
US8407762B2 (en) | System for three level authentication of a user | |
US20160127134A1 (en) | User authentication system and method | |
RU2720563C2 (en) | Authentication method and system | |
CN107113175A (en) | Multi-user's strong authentication token | |
JP2013528857A (en) | Password safe input system using password key movement value and password safe input method | |
EP2936277B1 (en) | Method and apparatus for information verification | |
CN102804201A (en) | Offline two-factor user authentication system, method thereforthereof, and program thereforthereof | |
CN1894882B (en) | Authentication system | |
CN106709382A (en) | Keyboard display method and device | |
CN105763536B (en) | Network registering method based on motion graphics password and system | |
Forget et al. | Choose your own authentication | |
US8984599B2 (en) | Real time password generation apparatus and method | |
TWI540874B (en) | Identity authentication method, device and system | |
CN109688150A (en) | A kind of multi-platform account interoperability methods and device | |
AU2007309051B2 (en) | User authentication system and method | |
TW201544983A (en) | Data communication method and system, client terminal and server | |
Silva | Calls for behavioural biometrics as bank fraud soars | |
CN106874717A (en) | A kind of identity identifying method, apparatus and system | |
CN104980279A (en) | Identity authentication method, and related equipment and system | |
Kansuwan et al. | Authentication model using the bundled CAPTCHA OTP instead of traditional password | |
Jiping et al. | An improved biometric-based user authentication scheme for c/s system | |
JP2002041478A (en) | System and method for authentication, and recording medium with authentication program recorded thereon | |
US20140304789A1 (en) | Convenient one-time password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1237920 Country of ref document: HK |
|
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170620 |
|
RJ01 | Rejection of invention patent application after publication | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1237920 Country of ref document: HK |