CN107743131A - A kind of identity identifying method and device based on a variety of different types input composite sequence - Google Patents
A kind of identity identifying method and device based on a variety of different types input composite sequence Download PDFInfo
- Publication number
- CN107743131A CN107743131A CN201711159989.0A CN201711159989A CN107743131A CN 107743131 A CN107743131 A CN 107743131A CN 201711159989 A CN201711159989 A CN 201711159989A CN 107743131 A CN107743131 A CN 107743131A
- Authority
- CN
- China
- Prior art keywords
- input
- composite sequence
- user
- password
- input composite
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 239000002131 composite material Substances 0.000 title claims abstract description 92
- 238000000034 method Methods 0.000 title claims abstract description 26
- 230000004048 modification Effects 0.000 claims description 13
- 238000012986 modification Methods 0.000 claims description 13
- 238000012217 deletion Methods 0.000 claims description 7
- 230000037430 deletion Effects 0.000 claims description 7
- 239000000203 mixture Substances 0.000 claims description 3
- 230000002180 anti-stress Effects 0.000 abstract description 7
- 230000006870 function Effects 0.000 description 23
- 238000007726 management method Methods 0.000 description 15
- 238000005516 engineering process Methods 0.000 description 12
- 238000003860 storage Methods 0.000 description 11
- 230000005540 biological transmission Effects 0.000 description 9
- 238000012795 verification Methods 0.000 description 8
- 210000003811 finger Anatomy 0.000 description 5
- 230000004927 fusion Effects 0.000 description 4
- 239000011159 matrix material Substances 0.000 description 4
- 230000001755 vocal effect Effects 0.000 description 4
- 230000001133 acceleration Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 3
- 238000012550 audit Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 230000003542 behavioural effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 210000005224 forefinger Anatomy 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- QVGXLLKOCUKJST-UHFFFAOYSA-N atomic oxygen Chemical compound [O] QVGXLLKOCUKJST-UHFFFAOYSA-N 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 239000008280 blood Substances 0.000 description 1
- 210000004369 blood Anatomy 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005021 gait Effects 0.000 description 1
- 239000007789 gas Substances 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 210000004932 little finger Anatomy 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 239000001301 oxygen Substances 0.000 description 1
- 229910052760 oxygen Inorganic materials 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 210000003462 vein Anatomy 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of identity identifying method and device based on a variety of different types input composite sequence, this method comprises the following steps:Receive the multi input composite sequence of input;Multi input composite sequence is compared with the comparison information prestored;Based on comparison result, validated user and the identity authentication of disabled user are carried out;Wherein, sequential combination of the multi input composite sequence based on biological characteristic input and non-biometric input, or the sequential combination of at least two biological characteristics;Non-biometric input also includes multiple user names.It a kind of identity identifying method and device based on multi input composite sequence according to embodiments of the present invention, can be used in identifying the intention of user, there is the characteristics of anti-stress and antibiont feature are usurped.
Description
Technical field
It is specifically, more particularly to a kind of to be inputted based on a variety of different types the present invention relates to identity identifying technology field
The identity identifying method and device of composite sequence.
Background technology
Biometrics identification technology (such as:Fingerprint, iris, vocal print and face etc.) because of high exclusiveness that it has and in body
Part field of authentication has a wide range of applications, and the technology is also because be easier to usurp and endure to the fullest extent and denounce, such as:Fingerprint can be one
Extracted on a little implements, iris and face can be extracted by taking pictures, and vocal print can be extracted by recording.Therefore, exist
Many fields, password and token (such as:IC-card, contactless card etc.) still it is widely used in user's progress identification.
Traditional identity identifying technology can only according to known to user, all or unique physical trait judge user's
Identity, it can not judge that user's is specifically intended.In addition, traditional identity identifying technology does not have anti-coercive.Once user's quilt
Stress only meets that the requirement of intimidator can just make intimidator terminate coercive act, and intimidator requirement that What is more is gone back after being satisfied
The measure such as do away with a witness may be taken.
Although multiple biological characteristics that traditional multi-modal biological characteristic identification technology can combine people carry out identification, respectively
Data Layer fusion, Feature-level fusion, matching layer fusion and Decision-level fusion are carried out, but still can not solve the theft of biological characteristic.
The content of the invention
It is contemplated that at least solves one of above-mentioned technical problem of the prior art to a certain extent.
In view of this, the invention provides it is a kind of based on a variety of different types input composite sequence identity identifying method and
It device, can be used in identifying the intention of user, there is the characteristics of anti-stress and antibiont feature are usurped.
In a first aspect, being a kind of identity identifying method, comprise the following steps:Receive the multi input composite sequence of input;Will
Multi input composite sequence compares with the comparison information prestored;Based on comparison result, validated user and disabled user are carried out
Identity authentication;Wherein, sequential combination of the multi input composite sequence based on non-biometric and biological characteristic, or at least two lifes
The sequential combination of thing feature;Non-biometric includes multiple user passwords.
In one embodiment, the multi input composite sequence is a variety of different types of input composite sequences of input simultaneously.
In one embodiment, the multi input composite sequence is multiple same type of input composite sequences of input simultaneously.
In one embodiment, it is described that the multi input composite sequence compares with the comparison information prestored, enter
One step includes:Whether the multi input composite sequence for judging to receive belongs to white list, if so, then showing the described how defeated of input
Enter composite sequence and can be used for authenticating user identification and intention assessment;The white list is able to carry out legal life to preset
Typing, modification, deletion and the inquiry of thing feature input, and the setting of non-biometric class input range, modification, delete and look into
Ask, increase, modification, deletion and the inquiry of self-defined input type.
In one embodiment, it is described that the multi input composite sequence compares with the comparison information prestored, enter
One step includes:Whether the multi input composite sequence for judging to receive belongs to blacklist, if so, then showing the described how defeated of input
Enter composite sequence and not can be used for authenticating user identification or intention assessment;The blacklist is able to carry out to preset
The function of the addition, removal and the inquiry that illegally input.
In one embodiment, the multi input composite sequence also includes user password, and the user password includes normal
Operate password and stress operation password.
In one embodiment, it is described to be based on comparison result, carry out validated user and the identity authentication and meaning of disabled user
Figure identification, further comprises:Local verification, the checking of full high in the clouds or the checking of part high in the clouds.
In one embodiment, the comparison result can be shared in the product or system trusted each other.
In one embodiment, the user password of the multi input composite sequence is configured to:Judge composition, the password of password
Length set, the replacement cycle of password and history do not repeat whether password quantity meets to preset, if so, then this time
User, which inputs password, can be used as legal input information;Otherwise not receive.
A kind of identity identifying method according to embodiments of the present invention, by the way that password and biology/non-biometric are combined
Technology --- the multi input composite sequence come, have it is anti-usurp, anti-stress and the advantages of programmable transmission information, may be additionally used for
Identify the intention of user.
Second aspect, it is a kind of identification authentication system, including:Input equipment, the multi input for receiving input combine sequence
Row;Server, for multi input composite sequence to be compared with the comparison information prestored;Perform equipment, for based on than
To result, validated user and the identity authentication of disabled user are carried out;Wherein, multi input composite sequence be based on biological characteristic input and
The sequential combination of non-biometric input, or the sequential combination of at least two biological characteristics;Multi input composite sequence includes multiple
User name and multiple user passwords.
A kind of identification authentication system according to embodiments of the present invention, by the way that password and biology/non-biometric are combined
Technology --- the multi input composite sequence come, have it is anti-usurp, anti-stress and the advantages of programmable transmission information, may be additionally used for
Identify the intention of user.
Brief description of the drawings
The accompanying drawing for forming the part of the present invention is used for providing a further understanding of the present invention, schematic reality of the invention
Apply example and its illustrate to be used to explain the present invention, do not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is a kind of schematic flow sheet of identity identifying method;
Fig. 2 is a kind of structural representation of identification authentication system;
Fig. 3 is a kind of concrete structure schematic diagram of identification authentication system;
Fig. 4 is a kind of structural representation of the input equipment of identification authentication system.
Embodiment
Embodiments of the invention are described below in detail, the example of embodiment is shown in the drawings, wherein identical from beginning to end
Or similar label represents same or similar element or the element with same or like function.Retouched below with reference to accompanying drawing
The embodiment stated is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
As shown in figure 1, being a kind of identity identifying method, reference picture 1, the identity identifying method comprises the following steps:
S100, receive the multi input composite sequence of input.
S110, multi input composite sequence is compared with the comparison information prestored.
In one embodiment, multi input composite sequence is compared with the comparison information prestored, further comprised:
Judge receive multi input composite sequence whether belong to white list, if so, then show input multi input composite sequence can by with
In authenticating user identification and intention assessment;White list is able to carry out the typing of legal biological characteristic input, repaiied to preset
Change, delete and inquire about, and setting, modification, deletion and the inquiry of non-biometric class input range, self-defined input type
Increase, modification, delete and inquire about.
In one embodiment, multi input composite sequence is compared with the comparison information prestored and further comprised:
Whether the multi input composite sequence for judging to receive belongs to blacklist, if so, then showing that the multi input composite sequence of input can not be by
For authenticating user identification or intention assessment;Blacklist to preset, and be able to carry out illegally inputting addition, remove and
The function of inquiry.
S120, based on comparison result, carry out validated user and the identity authentication of disabled user.
In one embodiment, based on comparison result, carry out the identity authentication of validated user and disabled user and be intended to know
Not, further comprise:Local verification, the checking of full high in the clouds or the checking of part high in the clouds.Local verification refers to local in product or system
Carry out the storage and checking of multi input composite sequence black and white lists and multi input composite sequence.Full high in the clouds checking refers to beyond the clouds
Server carries out the storage and checking of multi input composite sequence black and white lists and multi input composite sequence.Verify in part high in the clouds
Refer to the storage and checking that multi input composite sequence black and white lists are locally carried out in product or system, and server progress is more beyond the clouds
Input the storage and checking of composite sequence.
Wherein, sequential combination of the multi input composite sequence based on non-biometric and biological characteristic, or at least two biologies
The sequential combination of feature;Non-biometric also includes multiple user names.
In one embodiment, multi input composite sequence is a variety of different types of input composite sequences of input simultaneously.
In one embodiment, multi input composite sequence is multiple same type of input composite sequences of input simultaneously.
In one embodiment, user password is divided into normal operating password and stress operation password two parts.It can manage
Solution, user password is set and claimed:First, the user password of all users of requirement comprises at least normal operating password
Password is operated with stress, wherein stress operation password is used to notify product or system user to be in by the state of stress;Two
It is to allow User Defined product or system to receive the operation taken after stress operation password, including:To sensitive data
It is hidden, backs up, destroying operation, there is provided false data;Application or function are hidden, there is provided false function;Activation or
Person disables a certain multi input built-up sequence;Linkage signal is sent, notifies related product or system to take action.
In one embodiment, based on comparison result, carry out the identity authentication of validated user and disabled user and be intended to know
Not, further comprise:Local verification, the checking of full high in the clouds or the checking of part high in the clouds.Local verification refers to local in product or system
Carry out the storage and checking of multi input composite sequence black and white lists and multi input composite sequence.Full high in the clouds checking refers to beyond the clouds
Server carries out the storage and checking of multi input composite sequence black and white lists and multi input composite sequence.Verify in part high in the clouds
Refer to the storage and checking that multi input composite sequence black and white lists are locally carried out in product or system, and server progress is more beyond the clouds
Input the storage and checking of composite sequence.
In one embodiment, comparison result can be shared in the product or system trusted each other, including following functions,
Product or systems share comparison result to trust;New product or system are added into trust product or system list,
Or the product or system that are already present in trust product or system list are removed;Receive trust product or systems share
The comparison result come.
In one embodiment, the user password of multi input composite sequence is configured to:Judge composition, the length of password of password
Degree is set, replacement cycle of password and, history does not repeat whether password quantity meets to preset, if so, then this user
Input password can be used as legal input information;Otherwise not receive.
Specifically, username & password is changed into " multi-to-multi " mapping, namely a user by " one-to-one " mapping
Can be with covering obstructed user name and password more, and a user name can correspond to multiple passwords, can then be existed according to user
Perform the different passwords inputted during certain operation and implement different concrete operations.Password is included into the scope of content by biological characteristic
Signal or non-biometric signal, which are used alone to expand to, to be applied in combination, and allows user to input a variety of different types of mouths simultaneously
Element is made, biological characteristic signal includes but is not limited to:Known to fingerprint, iris, face, palmmprint, vocal print etc. or future may be made
For the technology of biological characteristic, non-biometric signal includes but is not limited to:Input through keyboard upper and lower case letter, numeral, spcial character
Deng so making password space enlargement, so as to improve the cost of Brute Force, reduce password by the probability of Brute Force.When only
During using biological characteristic as password, it is desirable to user at least along successively/(either simultaneously) input two or two kinds (or two simultaneously
Kind) more than biological characteristic, and when in password only have a biological characteristic when, then by biological characteristic requirement must be with abiotic spy
Sign input (such as input through keyboard) is used in mixed way, so as to improve the complexity of password;Usurped from biological characteristic is anti-in terms of angle, by life
Thing characteristic signal is either used in mixed way with non-biometric signal (such as input through keyboard), can make to usurp biological characteristic merely
Become nonsensical.
Further, multi input can be divided into biological characteristic input and non-biometric inputs two major classes;Wherein abiotic spy
Sign input refers to the input beyond biological characteristic input, can be categorized as input through keyboard, sensor input and other non-biometrics
Input three groups.Biological characteristic refers to the intrinsic physiological characteristic or behavioural characteristic of human body, and physiological characteristic including but not limited to refers to
Line, iris, face, palmmprint, refer to vein etc., behavioural characteristic includes but is not limited to vocal print, gait, signature, keystroke dynamics etc.;Keyboard
Input can be divided into letter, numeral and spcial character, wherein spcial character and refer to the character beyond letter and number.Sensor can be divided into
Light sensor, range sensor, touch sensor, gravity sensor, acceleration transducer, gyroscope, fingerprint sensor, gas
Pressure sensor, heart rate sensor, blood oxygen transducer.Other non-biometrics input refer to biological characteristic input, input through keyboard and
Sensor input beyond input, including the time, the date, access times, geographical position, equipment itself posture, speed, temperature,
Humidity, electric current, voltage.The combination of multi input can be divided into four kinds of situations, and one refers to that biological characteristic input inputs with non-biometric
It is both present in multi input composite sequence, two refer to that belonging to the input of different type biological characteristic is both present in multi input composite sequence
In, it is both present in third, belonging to biological characteristic different in same type biological characteristic in multi input composite sequence, fourth, single
Biological characteristic appears in multi input composite sequence more than twice.User name can be character string, cell-phone number, Email Accounts, social activity
Account, other websites or application system account, wherein social account includes WeChat ID, QQ number, microblogging number;User name not may include
Biological characteristic;User password is multi input composite sequence;When user password part only has a kind of biology in multi input composite sequence
Feature time series length must be more than 1.Comparison information includes prestoring the user account for being stored in local or high in the clouds, user
Password, biological attribute data, multi input composite sequence matrix, multi input composite sequence blacklist, the white name of multi input composite sequence
List and/or digital certificate.Multi input composite sequence matrix includes sequence number part, a username portion, user password part, password shape
Polymorphic segment and meaning part, wherein sequence number part are used to sort;A username portion is used to record a username portion data;User
Password component is used to record user password data;Password state, which is divided into, have been activated and has disabled two classes;Meaning part is used to identify
The operation that corresponding meaning and product or system will be taken.Multi input composite sequence matrix has openness, can take utilization
The less sparse matrix storage of memory space.
With reference to one embodiment, the anti-stress methods based on a variety of different input composite sequences a kind of to the present invention
Multi input composite sequence is described further.
As shown in table 1, first sequence represents that a username portion of this sequence is normal user name, user password portion
Divide and be made up of 3 biologies (being belonging respectively to different types) input, is followed successively by sequentially in time:Face, right hand forefinger and a left side
Eye iris.Set First ray to be expressed as normally logging in, open encryption data space.
Second sequence represents that a username portion of this sequence is cell-phone number 1, and user password part is only a kind of by fingerprint
Biological characteristic forms, and is followed successively by sequentially in time:Left hand middle finger and left index finger.Set second sequence to be expressed as stress to step on
Record, only open common data space.
3rd sequence represents in one sequence, if hardware allows, can input two kinds (or even two kinds simultaneously
More than) biological characteristic, be followed successively by sequentially in time:Input left hand middle finger and iris of left eye and then simultaneously defeated simultaneously first
Enter left hand little finger and face, last while input left hand middle finger and iris of right eye.The 3rd sequence is set to be expressed as normal industry
Business operation 1.
4th sequence represents in one sequence, it is allowed to which same feature repeats, and inputs right hand forefinger three times.
The 4th sequence is set to be expressed as coercing business operation 2.
5th sequence represents in one sequence, it is allowed to biological characteristic and non-biometric occurs, sequentially in time
It is followed successively by:Left index finger and then input numeral 1 are inputted first, recently enter lowercase a.The 5th sequence is set to be expressed as
On-line alarm.
Table 1
A kind of identity identifying method according to embodiments of the present invention, by the way that password and biology/non-biometric are combined
Technology --- the multi input composite sequence come, have it is anti-usurp, anti-stress and the advantages of programmable transmission information, may be additionally used for
Identify the intention of user.
As shown in Fig. 2 being a kind of structural representation of identification authentication system, a kind of reference picture 2, identification authentication system includes
Input equipment 20, for receiving the multi input composite sequence of input;Server 22, for by multi input composite sequence with depositing in advance
The comparison information of storage compares;Equipment 24 is performed, for based on comparison result, carrying out validated user and the identity mirror of disabled user
It is fixed;Wherein, sequential combination of the multi input composite sequence based on non-biometric and biological characteristic, or at least two biological characteristics
Sequential combination;Non-biometric includes multiple user names and multiple user passwords.
In one embodiment, in addition to sensing apparatus 26 and encryption and decryption equipment 28, sensing apparatus 26 be used to perceiving biology/
Biology/non-biometric signal is simultaneously sent to server 22 by non-biometric signal.Encryption and decryption equipment 28 is used for biological/non-
Biological characteristic signal is encrypted or decryption oprerations.
A kind of identification authentication system according to embodiments of the present invention, by the way that password and biology/non-biometric are combined
Technology --- the multi input composite sequence come, have it is anti-usurp, anti-stress and the advantages of programmable transmission information, may be additionally used for
Identify the intention of user.
As shown in figure 3, it is a kind of concrete structure schematic diagram of identification authentication system.With reference to figure 3, the device includes storage mould
Block 30, input acquisition module 32, state aware module 34, data transmission module 36 and data encrypting and deciphering module 38.
Specifically, memory module 30, for storing user password, biological attribute data, biometric features combination order square
User's sensitive datas such as battle array, digital certificate private key, it is ensured that data can not be divided into by unauthorized access and module is locally stored and high in the clouds is deposited
Module is stored up, can be the hardware devices such as USB key or Micro SD cards.Acquisition module 32 is inputted, for gathering the defeated of user
Enter, including but not limited to biological characteristic input and non-biometric input (such as:Input through keyboard) etc. may be used as the defeated of password
Enter, acquisition module can be the input equipments such as keyboard, camera, microphone.State aware module 34, for perceive product or
The state of system, can be the sensors such as geographical position, speed, acceleration.Data transmission module 36, using ICP/IP protocol,
Wifi, wapi, mobile communication agreement (2G, 3G, 4G, 5G etc.), bluetooth, infrared, NFC etc. are wired or wireless protocols carry out data
Transmission.Data encrypting and deciphering module 388, calculated using the international enciphering and deciphering algorithm such as RSA, and the domestic encryption and decryption such as SM series
Method, data are carried out with symmetrical or asymmetric encryption and decryption and is operated, it is ensured that the integrality and confidentiality of data.
As shown in figure 4, it is a kind of structural representation of the input equipment of identification authentication system.Fig. 4 is refer to, the input is set
It is standby to include biometric features combination sequence management module 40, white list management module 41, blacklist management module 42, monitor list pipe
Reason 43, interlocking module 44, local verification module 45, high in the clouds authentication module 46, Role Management module 47, password complexity management mould
Block 48, authority management module 49 and log audit module 50.
Specifically, biometric features combination sequence management module 40, specific function include:Set, modification, delete, with
Operation association sets, inquired about, generalized relating (includes but is not limited to:Time, geographical position range, altitude ranges, speed, acceleration
The sensor senses factors such as degree, product itself posture) etc..
White list management module 41, the scope of legal input is pre-entered or sets, so as to ensure only in white list
Interior input just can be as the input in biometric features combination order.Legal input includes the input of biological characteristic class and abiotic spy
The input of sign class (such as:Input through keyboard).The function of white list management module includes:The typing of legal biological characteristic class input, repair
Change, delete and inquire about, and setting, modification, deletion and the inquiry of non-biometric class input range, self-defined input type
Increase, modification, delete and inquire about.
Blacklist management module 42, blacklist management be it is corresponding with white list, input in blacklist (including:
The input of biological characteristic class, the input of non-biometric class and biometric features combination order) it not can be used for authentication, specifically
Function includes:Blacklist is added, removes, inquire about from blacklist.
List management 43 is monitored, once there is the input that user is inputted in monitoring list, product or system will be to user behaviors
Monitored and recorded, specific function includes:Monitor increase, deletion, modification and the inquiry of list.
Interlocking module 44, with other products or system interlink, linkage signal is sent according to making an appointment, to notify other productions
Product or system take action (such as:Alarm), specific function includes:Linkage function is opened, and linkage function is closed, linkage action
Set, delete, changing, inquiry.
Local verification module 45, all checkings and identifying procedure are completed in local terminal, will finally verified and authentication result
Signature, encrypted transmission to high in the clouds, carry out the authentication of other systems, specific function includes:Local verification function is opened, this
Ground authentication function is closed.
High in the clouds authentication module 46, user terminal locally after collection biometric features combination order, by sequential encoding, are obtained and plucked
, to sign, encrypted transmission to high in the clouds, be compared beyond the clouds, and comparison result is signed, encrypts and passes user terminal back to complete
Checking and identifying procedure, specific function include:High in the clouds authentication function is opened, high in the clouds authentication function is closed.
Role Management module 47, for distinguishing different user types and corresponding authority in product or system, role is at least
It is divided into keeper, auditor and operator, specific function includes:Role is created, changed, deleting, inquiring about, role-security is set
Put.
Password complexity management module 48, for managing the complexity of user password, specific function includes:Password forms
Set, password length sets (minimum value is 2), password replacement cycle to set, history does not repeat password quantity and set.
Authority management module 49, for being configured to the authority of user or role, specific function includes:Authority increases
Add, delete, change, inquire about.
Log audit module 50, it is managed for the daily record to product or system, specific function includes:Audit day
Will inquiry, backup, export.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description
Point is contained at least one embodiment or example of the present invention.In this manual, to the schematic representation of above-mentioned term not
Identical embodiment or example must be directed to.Moreover, specific features, structure, material or the feature of description can be with office
What combined in an appropriate manner in one or more embodiments or example.In addition, those skilled in the art can say this
Different embodiments or example described in bright book are engaged and combined.
Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example
Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art within the scope of the invention can be to above-mentioned
Embodiment is changed, changed, replacing and modification.
Claims (10)
1. a kind of identity identifying method based on a variety of different types input composite sequence, it is characterised in that comprise the following steps:
Receive the multi input composite sequence of input;
The multi input composite sequence is compared with the comparison information prestored;
Based on comparison result, validated user and the identity authentication of disabled user are carried out;
Wherein, sequential combination of the multi input composite sequence based on biological characteristic input and non-biometric input, or at least
The sequential combination of two biological characteristics;The non-biometric input also includes multiple user names.
2. identity identifying method according to claim 1, it is characterised in that
The multi input composite sequence is a variety of different types of input composite sequences of input simultaneously.
3. identity identifying method according to claim 1, it is characterised in that
The multi input composite sequence is multiple same type of input composite sequences of input simultaneously.
4. identity identifying method according to claim 1, it is characterised in that described by the multi input composite sequence and pre-
The comparison information first stored compares, and further comprises:
Whether the multi input composite sequence for judging to receive belongs to white list, if so, then showing the multi input group of input
Close sequence and can be used for authenticating user identification and intention assessment;
The white list is to preset, and is able to carry out typing, modification, deletion and the inquiry of legal biological characteristic input, and
Setting, modification, deletion and the inquiry of non-biometric class input range, the increase of self-defined input type, modification, delete and look into
Ask.
5. identity identifying method according to claim 1, it is characterised in that described by the multi input composite sequence and pre-
The comparison information first stored compares, and further comprises:
Whether the multi input composite sequence for judging to receive belongs to blacklist, if so, then showing the multi input group of input
Close sequence and not can be used for authenticating user identification or intention assessment;
The blacklist is able to carry out the function of addition, removal and inquiry of illegally inputting to preset.
6. identity identifying method according to claim 1, it is characterised in that the multi input composite sequence also includes user
Password, the user password include normal operating password and stress operation password.
7. identity identifying method according to claim 1, it is characterised in that
It is described to be based on comparison result, validated user and the identity authentication and intention assessment of disabled user are carried out, is further comprised:This
Ground checking, the checking of full high in the clouds or the checking of part high in the clouds.
8. identity identifying method according to claim 1, it is characterised in that the comparison result is in the product trusted each other
Or it can be shared in system.
9. identity identifying method according to claim 1, it is characterised in that the user password of the multi input composite sequence
It is configured to:
Judge that the composition of password, the length of password are set, whether completely the replacement cycle of password and history do not repeat password quantity
Foot is preset, if so, then this user's input password can be used as legal input information;Otherwise not receive.
A kind of 10. identification authentication system based on a variety of different types input composite sequence, it is characterised in that including:
Input equipment, for receiving the multi input composite sequence of input;
Server, for the multi input composite sequence to be compared with the comparison information prestored;
Equipment is performed, for based on comparison result, carrying out validated user and the identity authentication of disabled user;
Wherein, sequential combination of the multi input composite sequence based on biological characteristic input and non-biometric input, or at least
The sequential combination of two biological characteristics;The multi input composite sequence includes multiple user names and multiple user passwords.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711159989.0A CN107743131A (en) | 2017-11-20 | 2017-11-20 | A kind of identity identifying method and device based on a variety of different types input composite sequence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711159989.0A CN107743131A (en) | 2017-11-20 | 2017-11-20 | A kind of identity identifying method and device based on a variety of different types input composite sequence |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107743131A true CN107743131A (en) | 2018-02-27 |
Family
ID=61238926
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711159989.0A Pending CN107743131A (en) | 2017-11-20 | 2017-11-20 | A kind of identity identifying method and device based on a variety of different types input composite sequence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107743131A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108717635A (en) * | 2018-06-08 | 2018-10-30 | 中国农业银行股份有限公司 | The method and system for being authenticated or being identified based on multi-biological characteristic |
CN109241718A (en) * | 2018-08-23 | 2019-01-18 | 百度在线网络技术(北京)有限公司 | Cipher processing method and equipment |
CN109344722A (en) * | 2018-09-04 | 2019-02-15 | 阿里巴巴集团控股有限公司 | A kind of user identity determines method, apparatus and electronic equipment |
CN110826113A (en) * | 2018-08-09 | 2020-02-21 | 深圳市菲德越科技有限公司 | Data secure storage method and device |
CN111625797A (en) * | 2020-05-26 | 2020-09-04 | 中国平安财产保险股份有限公司 | Mobile terminal control method and authentication method based on biological recognition |
CN113536271A (en) * | 2021-07-30 | 2021-10-22 | 陕西科技大学 | Combined password verification input device and verification method based on multiple biological characteristics |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1441380A (en) * | 2003-01-08 | 2003-09-10 | 章映东 | Vital fingerprint distinguishing technology for identity antifake and resisting forcing |
KR20050048977A (en) * | 2003-11-20 | 2005-05-25 | 주식회사 투비링크 | Method for proving the identity using the biometrics signature verification system |
CN101711029A (en) * | 2009-12-17 | 2010-05-19 | 中国联合网络通信集团有限公司 | Method and equipment for certifying access of terminal, and method for restoring equipment validity |
US20130263238A1 (en) * | 2012-04-02 | 2013-10-03 | Prasanna Bidare | Personalized Biometric Identification and Non-Repudiation System |
CN104378211A (en) * | 2014-11-26 | 2015-02-25 | 深圳市银雁金融配套服务有限公司 | Identity authentication method and device |
CN105229709A (en) * | 2013-03-28 | 2016-01-06 | 荣耀全球解决方案(国际)有限公司 | Security ststem |
CN106878344A (en) * | 2017-04-25 | 2017-06-20 | 北京洋浦伟业科技发展有限公司 | A kind of biological characteristic authentication, register method and device |
WO2017177435A1 (en) * | 2016-04-15 | 2017-10-19 | 深圳前海达闼云端智能科技有限公司 | Identity authentication method, terminal and server |
CN107277046A (en) * | 2017-07-25 | 2017-10-20 | 湖南云迪生物识别科技有限公司 | Coerce-proof password management-control method and device |
-
2017
- 2017-11-20 CN CN201711159989.0A patent/CN107743131A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1441380A (en) * | 2003-01-08 | 2003-09-10 | 章映东 | Vital fingerprint distinguishing technology for identity antifake and resisting forcing |
KR20050048977A (en) * | 2003-11-20 | 2005-05-25 | 주식회사 투비링크 | Method for proving the identity using the biometrics signature verification system |
CN101711029A (en) * | 2009-12-17 | 2010-05-19 | 中国联合网络通信集团有限公司 | Method and equipment for certifying access of terminal, and method for restoring equipment validity |
US20130263238A1 (en) * | 2012-04-02 | 2013-10-03 | Prasanna Bidare | Personalized Biometric Identification and Non-Repudiation System |
CN105229709A (en) * | 2013-03-28 | 2016-01-06 | 荣耀全球解决方案(国际)有限公司 | Security ststem |
CN104378211A (en) * | 2014-11-26 | 2015-02-25 | 深圳市银雁金融配套服务有限公司 | Identity authentication method and device |
WO2017177435A1 (en) * | 2016-04-15 | 2017-10-19 | 深圳前海达闼云端智能科技有限公司 | Identity authentication method, terminal and server |
CN106878344A (en) * | 2017-04-25 | 2017-06-20 | 北京洋浦伟业科技发展有限公司 | A kind of biological characteristic authentication, register method and device |
CN107277046A (en) * | 2017-07-25 | 2017-10-20 | 湖南云迪生物识别科技有限公司 | Coerce-proof password management-control method and device |
Non-Patent Citations (3)
Title |
---|
何国辉;甘俊英;: "基于多生物特征识别的网络身份认证研究", 计算机应用研究, no. 10, pages 125 - 127 * |
杨城;赵奇;康立;: "口令重用行为与多维口令体系研究", no. 12, pages 114 - 120 * |
王德松: "基于生物特征信息隐藏与身份认证及其应用研究", 博士电子期刊 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108717635A (en) * | 2018-06-08 | 2018-10-30 | 中国农业银行股份有限公司 | The method and system for being authenticated or being identified based on multi-biological characteristic |
CN110826113A (en) * | 2018-08-09 | 2020-02-21 | 深圳市菲德越科技有限公司 | Data secure storage method and device |
CN109241718A (en) * | 2018-08-23 | 2019-01-18 | 百度在线网络技术(北京)有限公司 | Cipher processing method and equipment |
CN109344722A (en) * | 2018-09-04 | 2019-02-15 | 阿里巴巴集团控股有限公司 | A kind of user identity determines method, apparatus and electronic equipment |
US10997460B2 (en) | 2018-09-04 | 2021-05-04 | Advanced New Technologies Co., Ltd. | User identity determining method, apparatus, and device |
TWI738011B (en) * | 2018-09-04 | 2021-09-01 | 開曼群島商創新先進技術有限公司 | Method, device and electronic equipment for determining user identity |
US11244199B2 (en) | 2018-09-04 | 2022-02-08 | Advanced New Technologies Co., Ltd. | User identity determining method, apparatus, and device |
CN111625797A (en) * | 2020-05-26 | 2020-09-04 | 中国平安财产保险股份有限公司 | Mobile terminal control method and authentication method based on biological recognition |
CN113536271A (en) * | 2021-07-30 | 2021-10-22 | 陕西科技大学 | Combined password verification input device and verification method based on multiple biological characteristics |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107743131A (en) | A kind of identity identifying method and device based on a variety of different types input composite sequence | |
US11310058B2 (en) | Methods for digitally signing an electronic file and authentication method | |
US20130314208A1 (en) | Systems And Methods For Storing And Accessing Confidential Data | |
JP5184442B2 (en) | Methods used in systems for digital authentication, encryption and signing | |
US20090183008A1 (en) | Identity authentication and secured access systems, components, and methods | |
US8224293B1 (en) | Encoded colorgram for mobile device security | |
JPWO2003069489A1 (en) | Identification method | |
TW201528029A (en) | Method performed by a controller device and a controller device | |
CN105429761A (en) | Key generation method and device | |
CN107871081A (en) | A kind of computer information safe system | |
US10432618B1 (en) | Encrypted verification of digital identifications | |
Shafique et al. | Modern authentication techniques in smart phones: Security and usability perspective | |
CN106650372B (en) | The activating method and device of administrator right | |
CN106033625A (en) | Lockset, mobile terminal, lockset control method, and lockset control system | |
CN109831300A (en) | A kind of cipher key destruction method and device | |
Gifford et al. | Networked biometrics systems—requirements based on iris recognition | |
CN109522694A (en) | A kind of identification system based on computer network | |
Subha | Biometrics in internet of things (iot) security | |
CN108322440A (en) | It is a kind of to utilize safety equipment Card Reader login method and Security Login System | |
Gupta | Implementation of biometric security in a smartphone based domotics | |
Wilkins | Can biometrics secure manufacturing? | |
EP1877887B1 (en) | A system and method for protecting the privacy and security of stored biometric data | |
CN108701183B (en) | User authentication method and system using whether junk data are consistent | |
Pricop | Biometrics the secret to securing industrial control systems | |
CN111625797A (en) | Mobile terminal control method and authentication method based on biological recognition |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |