CN107294981B - Authentication method and equipment - Google Patents

Authentication method and equipment Download PDF

Info

Publication number
CN107294981B
CN107294981B CN201710517649.4A CN201710517649A CN107294981B CN 107294981 B CN107294981 B CN 107294981B CN 201710517649 A CN201710517649 A CN 201710517649A CN 107294981 B CN107294981 B CN 107294981B
Authority
CN
China
Prior art keywords
mobile terminal
authentication
multivariate
user
parameters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710517649.4A
Other languages
Chinese (zh)
Other versions
CN107294981A (en
Inventor
冯继强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Secid Information Technology Co ltd
Original Assignee
Suzhou Secid Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Secid Information Technology Co ltd filed Critical Suzhou Secid Information Technology Co ltd
Priority to CN201710517649.4A priority Critical patent/CN107294981B/en
Publication of CN107294981A publication Critical patent/CN107294981A/en
Priority claimed from PCT/CN2018/093618 external-priority patent/WO2019001566A1/en
Application granted granted Critical
Publication of CN107294981B publication Critical patent/CN107294981B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0876Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The invention provides an authentication method and equipment, wherein the method comprises the following steps: acquiring multivariate parameters of a mobile terminal, wherein the multivariate parameters comprise: a running environment, the collected user behavior characteristics and an identifier for uniquely determining the mobile terminal; authenticating the multivariate parameters through a preset intelligent analysis model; and when the running environment in the multivariate parameters, the user behavior characteristics and the identification pass the verification through a preset intelligent analysis model, confirming that the operator of the mobile terminal is a preset user, and passing the authentication. Therefore, by verifying the multi-element parameters, particularly the user behavior characteristics in the multi-element parameters, the instant behavior characteristics of the user are dynamic and are not easy to steal, the authentication safety is further improved, and the use experience of the user is ensured.

Description

Authentication method and equipment
Technical Field
The present invention relates to the field of authentication, and in particular, to a method and an apparatus for authentication.
Background
With the rapid development of the internet, the situation of network security is becoming more and more complex and changeable, people pay more and more attention to the network security, identity authentication is ubiquitous, and the conventional identity authentication mode cannot well meet the development of the network security situation.
The existing authentication technology, such as traditional character password, confirmation push, Personal Identification Number (PIN) code, short message and voice, has the defect of insufficient security because of being stolen.
There is therefore a need for a more secure authentication scheme.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides an authentication method and equipment, which further improve the authentication safety and ensure the use experience of a user by verifying multivariate parameters, particularly user behavior characteristics in the multivariate parameters.
Specifically, the present invention proposes the following specific examples:
the embodiment of the invention provides an authentication method, which comprises the following steps:
acquiring multivariate parameters of a mobile terminal, wherein the multivariate parameters comprise: a running environment, the collected user behavior characteristics and an identifier for uniquely determining the mobile terminal;
authenticating the multivariate parameters through a preset intelligent analysis model;
and when the running environment, the user behavior characteristics and the identification in the multivariate parameters are verified to pass through the intelligent analysis model, confirming that the operator of the mobile terminal is a preset user, and authenticating the user.
In a specific embodiment, before the obtaining of the multivariate parameter of the mobile terminal, the method further includes:
receiving an authentication request; the authentication request comprises information of the mobile terminal to be authenticated;
matching a mobile terminal corresponding to the authentication request based on the information;
and sending challenge authentication to the mobile terminal so that the mobile terminal reports the multivariate parameters.
In a specific embodiment, the method further comprises the following steps:
and when the running environment, the user behavior characteristics and the identification in the multivariate parameters are not completely verified through a preset intelligent analysis model, the authentication fails, and the process corresponding to the authentication on the mobile terminal is terminated.
In a specific embodiment, the method further comprises the following steps:
and releasing the flow corresponding to the authentication on the mobile terminal.
In a specific embodiment, the intelligent analysis model stores an identifier of each mobile terminal, human behavior characteristics of a preset user corresponding to each mobile terminal, and a security database for judging whether the operating environment is safe;
the method further comprises the following steps:
storing the metadata in a database in the intelligent analytics model.
The embodiment of the present invention further provides an authentication device, including:
an obtaining module, configured to obtain a multivariate parameter of a mobile terminal, where the multivariate parameter includes: a running environment, the collected user behavior characteristics and an identifier for uniquely determining the mobile terminal;
the authentication module is used for authenticating the multivariate parameters through a preset intelligent analysis model;
and the determining module is used for confirming that the operator of the mobile terminal is a preset user when the running environment, the user behavior characteristics and the identification in the multivariate parameters pass the verification through the intelligent analysis model, and the authentication passes.
In a specific embodiment, the apparatus further comprises:
a request module for receiving an authentication request; the authentication request comprises information of the mobile terminal to be authenticated;
matching a mobile terminal corresponding to the authentication request based on the information;
and sending challenge authentication to the mobile terminal so that the mobile terminal reports the multivariate parameters.
In a specific embodiment, the apparatus further comprises:
and the termination module is used for failing authentication and terminating the corresponding authentication process on the mobile terminal when the running environment, the user behavior characteristics and the identification in the multi-parameter are not completely verified through a preset intelligent analysis model.
In a specific embodiment, the apparatus further comprises:
and the releasing module is used for releasing the flow corresponding to the authentication on the mobile terminal.
In a specific embodiment, the intelligent analysis model stores an identifier of each mobile terminal, human behavior characteristics of a preset user corresponding to each mobile terminal, and a security database for judging whether the operating environment is safe;
the apparatus further comprises:
a storage module for storing the metadata in a database in the intelligent analysis model.
Therefore, the embodiment of the invention provides an authentication method and equipment, wherein the authentication method comprises the following steps: acquiring multivariate parameters of a mobile terminal, wherein the multivariate parameters comprise: a running environment, the collected user behavior characteristics and an identifier for uniquely determining the mobile terminal; authenticating the multivariate parameters through a preset intelligent analysis model; and when the running environment in the multivariate parameters, the user behavior characteristics and the identification pass the verification through a preset intelligent analysis model, confirming that the operator of the mobile terminal is a preset user, and passing the authentication. Therefore, by verifying the multi-element parameters, particularly the user behavior characteristics in the multi-element parameters, the instant behavior characteristics of the user are dynamic and are not easy to steal, the authentication safety is further improved, and the use experience of the user is ensured.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a flowchart illustrating an authentication method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an authentication method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an authentication device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an authentication device according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an authentication device according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an authentication device according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an authentication device according to an embodiment of the present invention.
Detailed Description
Various embodiments of the present disclosure will be described more fully hereinafter. The present disclosure is capable of various embodiments and of modifications and variations therein. However, it should be understood that: there is no intention to limit the various embodiments of the disclosure to the specific embodiments disclosed herein, but rather, the disclosure is to cover all modifications, equivalents, and/or alternatives falling within the spirit and scope of the various embodiments of the disclosure.
Hereinafter, the term "includes" or "may include" used in various embodiments of the present disclosure indicates the presence of the disclosed functions, operations, or elements, and does not limit the addition of one or more functions, operations, or elements. Furthermore, as used in various embodiments of the present disclosure, the terms "comprising," "having," and their derivatives, are intended to be only representative of the particular features, integers, steps, operations, elements, components, or combinations of the foregoing, and should not be construed as first excluding the existence of, or adding to one or more other features, integers, steps, operations, elements, components, or combinations of the foregoing.
In various embodiments of the disclosure, the expression "or" at least one of a or/and B "includes any or all combinations of the words listed simultaneously. For example, the expression "a or B" or "at least one of a or/and B" may include a, may include B, or may include both a and B.
Expressions (such as "first", "second", and the like) used in various embodiments of the present disclosure may modify various constituent elements in the various embodiments, but may not limit the respective constituent elements. For example, the above description does not limit the order and/or importance of the elements described. The foregoing description is for the purpose of distinguishing one element from another. For example, the first user device and the second user device indicate different user devices, although both are user devices. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of various embodiments of the present disclosure.
It should be noted that: if it is described that one constituent element is "connected" to another constituent element, the first constituent element may be directly connected to the second constituent element, and a third constituent element may be "connected" between the first constituent element and the second constituent element. In contrast, when one constituent element is "directly connected" to another constituent element, it is understood that there is no third constituent element between the first constituent element and the second constituent element.
The term "user" used in various embodiments of the present disclosure may indicate a person using an electronic device or a device using an electronic device (e.g., an artificial intelligence electronic device).
The terminology used in the various embodiments of the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the various embodiments of the present disclosure. As used herein, the singular forms are intended to include the plural forms as well, unless the context clearly indicates otherwise. Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which the various embodiments of the present disclosure belong. The terms (such as those defined in commonly used dictionaries) should be interpreted as having a meaning that is consistent with their contextual meaning in the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined in various embodiments of the present disclosure.
Example 1
Embodiment 1 of the present invention discloses an authentication method, as shown in fig. 1, including the following steps:
step 101, obtaining a multivariate parameter of a mobile terminal, wherein the multivariate parameter comprises: a running environment, the collected user behavior characteristics and an identifier for uniquely determining the mobile terminal;
specifically, the mobile terminal may be, for example, a mobile phone, a tablet computer, etc., and it is only required that the mobile terminal is a written terminal device, and the specific operating environment includes, for example, a network security environment when the mobile phone is operating, such as whether a virus exists or not, or whether a high-risk website is being accessed or not, and the behavior characteristics of the user are data caused by biological behaviors of the user when the user operates the mobile terminal, such as a moving track, a pressing pressure, etc., and the identifier is uniquely used for determining the mobile phone to avoid using the mobile phone on other mobile phones, and the risk generated thereby, that is, subsequent verification, whether the operating environment is safe or not needs to be verified, whether the behavior characteristics of the user are a preset user (for example, the owner of the mobile terminal) corresponding to the mobile terminal, and whether the user is operating on the specified mobile phone, only if all three are satisfied, all the verifications pass, and the final verification passes.
Step 102, authenticating the multivariate parameters through a preset intelligent analysis model;
specifically, the intelligent analysis model stores the identification of each mobile terminal, the human behavior characteristics of a preset user corresponding to each mobile terminal, and a safety database for judging whether the operating environment is safe; therefore, the multivariate parameters can be effectively identified to determine whether the verification is passed and finally determine whether the operation corresponding to the authentication needs to be normally executed or should be stopped.
And 103, when the running environment, the user behavior characteristics and the identification in the multivariate parameters are verified through the intelligent analysis model, confirming that the operator of the mobile terminal is a preset user, and authenticating the user.
Specifically, the multivariate parameters need to be authenticated, and the authentication is passed.
Specifically, the operating environment needs to be safe, or for example, the risk value is smaller than a preset value, the identifier needs to be matched with the identifier in the security database, and the user behavior characteristics need to be matched with human behavior characteristics.
In a specific embodiment, before the obtaining of the multivariate parameter of the mobile terminal, the method further includes:
receiving an authentication request; the authentication request comprises information of the mobile terminal to be authenticated;
matching a mobile terminal corresponding to the authentication request based on the information;
and sending challenge authentication to the mobile terminal so that the mobile terminal reports the multivariate parameters.
Specifically, the multivariate parameter may be obtained in various manners, for example, the behavior characteristics of the user may be obtained by a sensor on the mobile phone, such as a gyroscope, a GPS positioning device, a pressure sensor, etc., other operating environments, such as a network detection manner, may be obtained, and the identifier may be read from the information or stored in a preset information character segment.
In a specific embodiment, the method further comprises:
and when the running environment, the user behavior characteristics and the identification in the multivariate parameters are not completely verified through a preset intelligent analysis model, the authentication fails, and the process corresponding to the authentication on the mobile terminal is terminated.
Specifically, for example, when the process corresponding to the authentication is, for example, payment, in this case, the authentication does not pass, the process of the payment needs to be terminated, so as to ensure security and avoid risks.
In a specific embodiment, when the authentication passes, the method further comprises:
and releasing the flow corresponding to the authentication on the mobile terminal.
In a specific embodiment, the method further comprises:
storing the metadata in a database in the intelligent analytics model.
Specifically, new data is continuously generated to generate multiple data to be stored in a database in the intelligent analysis model, so that the subsequent identification is more and more accurate.
Thus, in one embodiment, as shown in fig. 2, a complete authentication process is as follows:
1. the authenticated service initiates an authentication request to the authentication processing server.
2. The authentication processing server matches the mobile phone corresponding to the request
3. The authentication processing server sends challenge authentication to the user mobile phone
4. The mobile phone sends the information of current mobile phone environment, user behavior mode, mobile phone security and the like to the authentication processing server
5. The authentication processing server sends the received information to the big data machine learning server
6. The big data machine learning server analyzes whether the current user is the user himself or not, whether the environment is abnormal or not and the like according to the model established in the user information collection process, and returns a verification result
7. And the authentication processing server passes or rejects the service authentication request in the first step according to the verification result.
Thus, the authentication method of the scheme has the following characteristics:
1. the safety certification concept is diversified and comprises three-factor certification, namely information (mobile phone environment) known by a user, certification facilities (mobile phone itself) held by the user and user biological characteristics (user behaviors);
2. sensitive data adopts an encryption technology to prevent data plaintext from being transmitted and stored;
3. the authentication is mobile, diversified and unique. The mobile authentication is realized by using mobile equipment such as a mobile phone, the diversification is realized by adding and deleting authentication factors according to the self needs, and the unique authentication is realized in the current domestic authentication system similar to the product;
4. the back end adopts machine learning, big data analysis, high efficiency and intelligent identification analysis data to accurately judge whether the user authentication is legal;
5. the technology is different from the technologies of face recognition, fingerprint recognition, voice recognition and blink recognition in the world at present by three factors, the authentication can be completed by a single factor, and the copying imitativeness of each factor is very low.
6. Simple and easy to use, safe and efficient, and is advanced with time.
Example 2
Embodiment 2 of the present invention discloses an authentication device, as shown in fig. 3, including:
an obtaining module 201, configured to obtain a multivariate parameter of a mobile terminal, where the multivariate parameter includes: a running environment, the collected user behavior characteristics and an identifier for uniquely determining the mobile terminal;
the authentication module 202 is configured to authenticate the multivariate parameters through a preset intelligent analysis model;
and the determining module 203 is configured to, when the running environment, the user behavior characteristics and the identifier in the multivariate parameters are verified through a preset intelligent analysis model, confirm that the operator of the mobile terminal is a preset user and authenticate the operator.
In a specific embodiment, as shown in fig. 4, the apparatus further comprises:
a request module 204, configured to receive an authentication request; the authentication request comprises information of the mobile terminal to be authenticated;
matching a mobile terminal corresponding to the authentication request based on the information;
and sending challenge authentication to the mobile terminal so that the mobile terminal reports the multivariate parameters.
In a specific embodiment, as shown in fig. 5, the apparatus further comprises:
a terminating module 205, configured to fail authentication and terminate a process corresponding to the authentication on the mobile terminal when the running environment, the user behavior characteristics, and the identifier in the multivariate parameter are not completely verified through a preset intelligent analysis model.
In a specific embodiment, as shown in fig. 6, the apparatus further comprises:
a releasing module 206, configured to release the process corresponding to the authentication on the mobile terminal.
In a specific embodiment, the intelligent analysis model stores an identifier of each mobile terminal, human behavior characteristics of a preset user corresponding to each mobile terminal, and a security database for judging whether the operating environment is safe;
in a specific embodiment, as shown in fig. 7, the apparatus further comprises: a storage module 207, configured to store the metadata in a database in the intelligent analysis model.
Therefore, the embodiment of the invention provides an authentication method and equipment, wherein the authentication method comprises the following steps: acquiring multivariate parameters of a mobile terminal, wherein the multivariate parameters comprise: a running environment, the collected user behavior characteristics and an identifier for uniquely determining the mobile terminal; authenticating the multivariate parameters through a preset intelligent analysis model; and when the running environment in the multivariate parameters, the user behavior characteristics and the identification pass the verification through a preset intelligent analysis model, confirming that the operator of the mobile terminal is a preset user, and passing the authentication. Therefore, by verifying the multi-element parameters, particularly the user behavior characteristics in the multi-element parameters, the instant behavior characteristics of the user are dynamic and are not easy to steal, the authentication safety is further improved, and the use experience of the user is ensured.
Those skilled in the art will appreciate that the figures are merely schematic representations of one preferred implementation scenario and that the blocks or flow diagrams in the figures are not necessarily required to practice the present invention.
Those skilled in the art will appreciate that the modules in the devices in the implementation scenario may be distributed in the devices in the implementation scenario according to the description of the implementation scenario, or may be located in one or more devices different from the present implementation scenario with corresponding changes. The modules of the implementation scenario may be combined into one module, or may be further split into a plurality of sub-modules.
The above-mentioned invention numbers are merely for description and do not represent the merits of the implementation scenarios.
The above disclosure is only a few specific implementation scenarios of the present invention, however, the present invention is not limited thereto, and any variations that can be made by those skilled in the art are intended to fall within the scope of the present invention.

Claims (8)

1. A method of authentication, comprising:
acquiring multivariate parameters of a mobile terminal, wherein the multivariate parameters comprise: a running environment, the collected user behavior characteristics and an identifier for uniquely determining the mobile terminal; the operation environment comprises any one or combination of a network security environment and a visited website when the mobile terminal operates;
authenticating the multivariate parameters through a preset intelligent analysis model;
when the running environment, the user behavior characteristics and the identification in the multivariate parameters are verified to pass through the intelligent analysis model, confirming that an operator of the mobile terminal is a preset user and passing the authentication;
the intelligent analysis model is stored with an identifier of each mobile terminal, human behavior characteristics of a preset user corresponding to each mobile terminal and a safety database for judging whether the operation environment is safe or not;
the method further comprises the following steps:
storing the metadata in a database in the intelligent analytics model.
2. The method of claim 1, wherein before obtaining the multivariate parameters of the mobile terminal, further comprising:
receiving an authentication request; the authentication request comprises information of the mobile terminal to be authenticated;
matching a mobile terminal corresponding to the authentication request based on the information;
and sending challenge authentication to the mobile terminal so that the mobile terminal reports the multivariate parameters.
3. The method of authentication of claim 1, further comprising:
and when the running environment, the user behavior characteristics and the identification in the multivariate parameters are not completely verified through a preset intelligent analysis model, the authentication fails, and the process corresponding to the authentication on the mobile terminal is terminated.
4. The method of authentication of claim 1, further comprising:
and releasing the flow corresponding to the authentication on the mobile terminal.
5. An authenticated device, comprising:
an obtaining module, configured to obtain a multivariate parameter of a mobile terminal, where the multivariate parameter includes: a running environment, the collected user behavior characteristics and an identifier for uniquely determining the mobile terminal; the operation environment comprises any one or combination of a network security environment and a visited website when the mobile terminal operates;
the authentication module is used for authenticating the multivariate parameters through a preset intelligent analysis model;
the determining module is used for determining that the operator of the mobile terminal is a preset user when the running environment, the user behavior characteristics and the identification in the multivariate parameters are verified through the intelligent analysis model, and the operator passes authentication;
the intelligent analysis model is stored with an identifier of each mobile terminal, human behavior characteristics of a preset user corresponding to each mobile terminal and a safety database for judging whether the operation environment is safe or not;
the apparatus further comprises:
a storage module for storing the metadata in a database in the intelligent analysis model.
6. The authenticated device of claim 5, further comprising:
a request module for receiving an authentication request; the authentication request comprises information of the mobile terminal to be authenticated;
matching a mobile terminal corresponding to the authentication request based on the information;
and sending challenge authentication to the mobile terminal so that the mobile terminal reports the multivariate parameters.
7. The authenticated device of claim 5, further comprising:
and the termination module is used for failing authentication and terminating the corresponding authentication process on the mobile terminal when the running environment, the user behavior characteristics and the identification in the multi-parameter are not completely verified through a preset intelligent analysis model.
8. The authenticated device of claim 5, further comprising:
and the releasing module is used for releasing the flow corresponding to the authentication on the mobile terminal.
CN201710517649.4A 2017-06-29 2017-06-29 Authentication method and equipment Active CN107294981B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710517649.4A CN107294981B (en) 2017-06-29 2017-06-29 Authentication method and equipment

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201710517649.4A CN107294981B (en) 2017-06-29 2017-06-29 Authentication method and equipment
PCT/CN2018/093618 WO2019001566A1 (en) 2017-06-29 2018-06-29 Authentication method and device
PCT/CN2018/093553 WO2019001558A1 (en) 2017-06-29 2018-06-29 Human and machine recognition method and device

Publications (2)

Publication Number Publication Date
CN107294981A CN107294981A (en) 2017-10-24
CN107294981B true CN107294981B (en) 2020-04-17

Family

ID=60099132

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710517649.4A Active CN107294981B (en) 2017-06-29 2017-06-29 Authentication method and equipment

Country Status (1)

Country Link
CN (1) CN107294981B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019001566A1 (en) * 2017-06-29 2019-01-03 苏州锦佰安信息技术有限公司 Authentication method and device
CN109361660B (en) * 2018-09-29 2021-09-03 武汉极意网络科技有限公司 Abnormal behavior analysis method, system, server and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104703180A (en) * 2013-12-09 2015-06-10 江良洲 Implicit multiple authentication method based on mobile Internet and intelligent terminal
CN105049421A (en) * 2015-06-24 2015-11-11 百度在线网络技术(北京)有限公司 Authentication method based on use behavior characteristic of user, server, terminal, and system
CN106713241A (en) * 2015-11-16 2017-05-24 腾讯科技(深圳)有限公司 Identity verification method, device and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105827406A (en) * 2015-01-05 2016-08-03 腾讯科技(深圳)有限公司 Identity verification method, identity verification device, and identity verification system
CN104778387B (en) * 2015-04-23 2017-12-08 西安交通大学 Cross-platform identity authorization system and method based on man-machine interaction behavior
US10289819B2 (en) * 2015-08-12 2019-05-14 Kryptowire LLC Active authentication of users
CN106790129A (en) * 2016-12-27 2017-05-31 中国银联股份有限公司 A kind of identity authentication method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104703180A (en) * 2013-12-09 2015-06-10 江良洲 Implicit multiple authentication method based on mobile Internet and intelligent terminal
CN105049421A (en) * 2015-06-24 2015-11-11 百度在线网络技术(北京)有限公司 Authentication method based on use behavior characteristic of user, server, terminal, and system
CN106713241A (en) * 2015-11-16 2017-05-24 腾讯科技(深圳)有限公司 Identity verification method, device and system

Also Published As

Publication number Publication date
CN107294981A (en) 2017-10-24

Similar Documents

Publication Publication Date Title
CN104780043B (en) Access control method and system based on two dimensional code
CN104205721B (en) The adaptive authentication method of context aware and device
CN205015915U (en) Management system by oneself stays
CN107169499B (en) Risk identification method and device
CN105279416A (en) Identity recognition method and system based on multi-biometric feature in combination with device fingerprint
US10231124B2 (en) Anti-theft method and client for a mobile terminal
US20190251570A1 (en) Method and apparatus for service implementation
CN107800672B (en) Information verification method, electronic equipment, server and information verification system
US9667613B1 (en) Detecting mobile device emulation
US9202035B1 (en) User authentication based on biometric handwriting aspects of a handwritten code
JP2022513977A (en) Identity identification method, device and server for designated point approval
CN104967553A (en) Message interaction method, related device and communication system
US20150098631A1 (en) Apparatus and method for recording evidence of a person's situation
CN107872433A (en) A kind of auth method and its equipment
CN107294981B (en) Authentication method and equipment
CN109561085A (en) A kind of auth method based on EIC equipment identification code, server and medium
CN104486306A (en) Method for identity authentication based on finger vein recognition and cloud service
CN104935548B (en) Auth method, apparatus and system based on intelligent equipment of tatooing
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN105577385B (en) Method and device for acquiring signature authority
CN104735067A (en) O2O real name registration admittance system and method
CN205427857U (en) Identity identification system based on many biological characteristics combine equipment fingerprint
EP3217593A1 (en) Two-factor authentication method for increasing the security of transactions between a user and a transaction point or system
CN111882425A (en) Service data processing method and device and server
CN111275506A (en) Bill issuing method and block link point equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant