CN107743131A - A kind of identity identifying method and device based on a variety of different types input composite sequence - Google Patents

A kind of identity identifying method and device based on a variety of different types input composite sequence Download PDF

Info

Publication number
CN107743131A
CN107743131A CN201711159989.0A CN201711159989A CN107743131A CN 107743131 A CN107743131 A CN 107743131A CN 201711159989 A CN201711159989 A CN 201711159989A CN 107743131 A CN107743131 A CN 107743131A
Authority
CN
China
Prior art keywords
input
composite sequence
user
password
input composite
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711159989.0A
Other languages
Chinese (zh)
Inventor
张博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201711159989.0A priority Critical patent/CN107743131A/en
Publication of CN107743131A publication Critical patent/CN107743131A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of identity identifying method and device based on a variety of different types input composite sequence, this method comprises the following steps:Receive the multi input composite sequence of input;Multi input composite sequence is compared with the comparison information prestored;Based on comparison result, validated user and the identity authentication of disabled user are carried out;Wherein, sequential combination of the multi input composite sequence based on biological characteristic input and non-biometric input, or the sequential combination of at least two biological characteristics;Non-biometric input also includes multiple user names.It a kind of identity identifying method and device based on multi input composite sequence according to embodiments of the present invention, can be used in identifying the intention of user, there is the characteristics of anti-stress and antibiont feature are usurped.

Description

A kind of identity identifying method and device based on a variety of different types input composite sequence
Technical field
It is specifically, more particularly to a kind of to be inputted based on a variety of different types the present invention relates to identity identifying technology field The identity identifying method and device of composite sequence.
Background technology
Biometrics identification technology (such as:Fingerprint, iris, vocal print and face etc.) because of high exclusiveness that it has and in body Part field of authentication has a wide range of applications, and the technology is also because be easier to usurp and endure to the fullest extent and denounce, such as:Fingerprint can be one Extracted on a little implements, iris and face can be extracted by taking pictures, and vocal print can be extracted by recording.Therefore, exist Many fields, password and token (such as:IC-card, contactless card etc.) still it is widely used in user's progress identification.
Traditional identity identifying technology can only according to known to user, all or unique physical trait judge user's Identity, it can not judge that user's is specifically intended.In addition, traditional identity identifying technology does not have anti-coercive.Once user's quilt Stress only meets that the requirement of intimidator can just make intimidator terminate coercive act, and intimidator requirement that What is more is gone back after being satisfied The measure such as do away with a witness may be taken.
Although multiple biological characteristics that traditional multi-modal biological characteristic identification technology can combine people carry out identification, respectively Data Layer fusion, Feature-level fusion, matching layer fusion and Decision-level fusion are carried out, but still can not solve the theft of biological characteristic.
The content of the invention
It is contemplated that at least solves one of above-mentioned technical problem of the prior art to a certain extent.
In view of this, the invention provides it is a kind of based on a variety of different types input composite sequence identity identifying method and It device, can be used in identifying the intention of user, there is the characteristics of anti-stress and antibiont feature are usurped.
In a first aspect, being a kind of identity identifying method, comprise the following steps:Receive the multi input composite sequence of input;Will Multi input composite sequence compares with the comparison information prestored;Based on comparison result, validated user and disabled user are carried out Identity authentication;Wherein, sequential combination of the multi input composite sequence based on non-biometric and biological characteristic, or at least two lifes The sequential combination of thing feature;Non-biometric includes multiple user passwords.
In one embodiment, the multi input composite sequence is a variety of different types of input composite sequences of input simultaneously.
In one embodiment, the multi input composite sequence is multiple same type of input composite sequences of input simultaneously.
In one embodiment, it is described that the multi input composite sequence compares with the comparison information prestored, enter One step includes:Whether the multi input composite sequence for judging to receive belongs to white list, if so, then showing the described how defeated of input Enter composite sequence and can be used for authenticating user identification and intention assessment;The white list is able to carry out legal life to preset Typing, modification, deletion and the inquiry of thing feature input, and the setting of non-biometric class input range, modification, delete and look into Ask, increase, modification, deletion and the inquiry of self-defined input type.
In one embodiment, it is described that the multi input composite sequence compares with the comparison information prestored, enter One step includes:Whether the multi input composite sequence for judging to receive belongs to blacklist, if so, then showing the described how defeated of input Enter composite sequence and not can be used for authenticating user identification or intention assessment;The blacklist is able to carry out to preset The function of the addition, removal and the inquiry that illegally input.
In one embodiment, the multi input composite sequence also includes user password, and the user password includes normal Operate password and stress operation password.
In one embodiment, it is described to be based on comparison result, carry out validated user and the identity authentication and meaning of disabled user Figure identification, further comprises:Local verification, the checking of full high in the clouds or the checking of part high in the clouds.
In one embodiment, the comparison result can be shared in the product or system trusted each other.
In one embodiment, the user password of the multi input composite sequence is configured to:Judge composition, the password of password Length set, the replacement cycle of password and history do not repeat whether password quantity meets to preset, if so, then this time User, which inputs password, can be used as legal input information;Otherwise not receive.
A kind of identity identifying method according to embodiments of the present invention, by the way that password and biology/non-biometric are combined Technology --- the multi input composite sequence come, have it is anti-usurp, anti-stress and the advantages of programmable transmission information, may be additionally used for Identify the intention of user.
Second aspect, it is a kind of identification authentication system, including:Input equipment, the multi input for receiving input combine sequence Row;Server, for multi input composite sequence to be compared with the comparison information prestored;Perform equipment, for based on than To result, validated user and the identity authentication of disabled user are carried out;Wherein, multi input composite sequence be based on biological characteristic input and The sequential combination of non-biometric input, or the sequential combination of at least two biological characteristics;Multi input composite sequence includes multiple User name and multiple user passwords.
A kind of identification authentication system according to embodiments of the present invention, by the way that password and biology/non-biometric are combined Technology --- the multi input composite sequence come, have it is anti-usurp, anti-stress and the advantages of programmable transmission information, may be additionally used for Identify the intention of user.
Brief description of the drawings
The accompanying drawing for forming the part of the present invention is used for providing a further understanding of the present invention, schematic reality of the invention Apply example and its illustrate to be used to explain the present invention, do not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is a kind of schematic flow sheet of identity identifying method;
Fig. 2 is a kind of structural representation of identification authentication system;
Fig. 3 is a kind of concrete structure schematic diagram of identification authentication system;
Fig. 4 is a kind of structural representation of the input equipment of identification authentication system.
Embodiment
Embodiments of the invention are described below in detail, the example of embodiment is shown in the drawings, wherein identical from beginning to end Or similar label represents same or similar element or the element with same or like function.Retouched below with reference to accompanying drawing The embodiment stated is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
As shown in figure 1, being a kind of identity identifying method, reference picture 1, the identity identifying method comprises the following steps:
S100, receive the multi input composite sequence of input.
S110, multi input composite sequence is compared with the comparison information prestored.
In one embodiment, multi input composite sequence is compared with the comparison information prestored, further comprised: Judge receive multi input composite sequence whether belong to white list, if so, then show input multi input composite sequence can by with In authenticating user identification and intention assessment;White list is able to carry out the typing of legal biological characteristic input, repaiied to preset Change, delete and inquire about, and setting, modification, deletion and the inquiry of non-biometric class input range, self-defined input type Increase, modification, delete and inquire about.
In one embodiment, multi input composite sequence is compared with the comparison information prestored and further comprised: Whether the multi input composite sequence for judging to receive belongs to blacklist, if so, then showing that the multi input composite sequence of input can not be by For authenticating user identification or intention assessment;Blacklist to preset, and be able to carry out illegally inputting addition, remove and The function of inquiry.
S120, based on comparison result, carry out validated user and the identity authentication of disabled user.
In one embodiment, based on comparison result, carry out the identity authentication of validated user and disabled user and be intended to know Not, further comprise:Local verification, the checking of full high in the clouds or the checking of part high in the clouds.Local verification refers to local in product or system Carry out the storage and checking of multi input composite sequence black and white lists and multi input composite sequence.Full high in the clouds checking refers to beyond the clouds Server carries out the storage and checking of multi input composite sequence black and white lists and multi input composite sequence.Verify in part high in the clouds Refer to the storage and checking that multi input composite sequence black and white lists are locally carried out in product or system, and server progress is more beyond the clouds Input the storage and checking of composite sequence.
Wherein, sequential combination of the multi input composite sequence based on non-biometric and biological characteristic, or at least two biologies The sequential combination of feature;Non-biometric also includes multiple user names.
In one embodiment, multi input composite sequence is a variety of different types of input composite sequences of input simultaneously. In one embodiment, multi input composite sequence is multiple same type of input composite sequences of input simultaneously.
In one embodiment, user password is divided into normal operating password and stress operation password two parts.It can manage Solution, user password is set and claimed:First, the user password of all users of requirement comprises at least normal operating password Password is operated with stress, wherein stress operation password is used to notify product or system user to be in by the state of stress;Two It is to allow User Defined product or system to receive the operation taken after stress operation password, including:To sensitive data It is hidden, backs up, destroying operation, there is provided false data;Application or function are hidden, there is provided false function;Activation or Person disables a certain multi input built-up sequence;Linkage signal is sent, notifies related product or system to take action.
In one embodiment, based on comparison result, carry out the identity authentication of validated user and disabled user and be intended to know Not, further comprise:Local verification, the checking of full high in the clouds or the checking of part high in the clouds.Local verification refers to local in product or system Carry out the storage and checking of multi input composite sequence black and white lists and multi input composite sequence.Full high in the clouds checking refers to beyond the clouds Server carries out the storage and checking of multi input composite sequence black and white lists and multi input composite sequence.Verify in part high in the clouds Refer to the storage and checking that multi input composite sequence black and white lists are locally carried out in product or system, and server progress is more beyond the clouds Input the storage and checking of composite sequence.
In one embodiment, comparison result can be shared in the product or system trusted each other, including following functions, Product or systems share comparison result to trust;New product or system are added into trust product or system list, Or the product or system that are already present in trust product or system list are removed;Receive trust product or systems share The comparison result come.
In one embodiment, the user password of multi input composite sequence is configured to:Judge composition, the length of password of password Degree is set, replacement cycle of password and, history does not repeat whether password quantity meets to preset, if so, then this user Input password can be used as legal input information;Otherwise not receive.
Specifically, username & password is changed into " multi-to-multi " mapping, namely a user by " one-to-one " mapping Can be with covering obstructed user name and password more, and a user name can correspond to multiple passwords, can then be existed according to user Perform the different passwords inputted during certain operation and implement different concrete operations.Password is included into the scope of content by biological characteristic Signal or non-biometric signal, which are used alone to expand to, to be applied in combination, and allows user to input a variety of different types of mouths simultaneously Element is made, biological characteristic signal includes but is not limited to:Known to fingerprint, iris, face, palmmprint, vocal print etc. or future may be made For the technology of biological characteristic, non-biometric signal includes but is not limited to:Input through keyboard upper and lower case letter, numeral, spcial character Deng so making password space enlargement, so as to improve the cost of Brute Force, reduce password by the probability of Brute Force.When only During using biological characteristic as password, it is desirable to user at least along successively/(either simultaneously) input two or two kinds (or two simultaneously Kind) more than biological characteristic, and when in password only have a biological characteristic when, then by biological characteristic requirement must be with abiotic spy Sign input (such as input through keyboard) is used in mixed way, so as to improve the complexity of password;Usurped from biological characteristic is anti-in terms of angle, by life Thing characteristic signal is either used in mixed way with non-biometric signal (such as input through keyboard), can make to usurp biological characteristic merely Become nonsensical.
Further, multi input can be divided into biological characteristic input and non-biometric inputs two major classes;Wherein abiotic spy Sign input refers to the input beyond biological characteristic input, can be categorized as input through keyboard, sensor input and other non-biometrics Input three groups.Biological characteristic refers to the intrinsic physiological characteristic or behavioural characteristic of human body, and physiological characteristic including but not limited to refers to Line, iris, face, palmmprint, refer to vein etc., behavioural characteristic includes but is not limited to vocal print, gait, signature, keystroke dynamics etc.;Keyboard Input can be divided into letter, numeral and spcial character, wherein spcial character and refer to the character beyond letter and number.Sensor can be divided into Light sensor, range sensor, touch sensor, gravity sensor, acceleration transducer, gyroscope, fingerprint sensor, gas Pressure sensor, heart rate sensor, blood oxygen transducer.Other non-biometrics input refer to biological characteristic input, input through keyboard and Sensor input beyond input, including the time, the date, access times, geographical position, equipment itself posture, speed, temperature, Humidity, electric current, voltage.The combination of multi input can be divided into four kinds of situations, and one refers to that biological characteristic input inputs with non-biometric It is both present in multi input composite sequence, two refer to that belonging to the input of different type biological characteristic is both present in multi input composite sequence In, it is both present in third, belonging to biological characteristic different in same type biological characteristic in multi input composite sequence, fourth, single Biological characteristic appears in multi input composite sequence more than twice.User name can be character string, cell-phone number, Email Accounts, social activity Account, other websites or application system account, wherein social account includes WeChat ID, QQ number, microblogging number;User name not may include Biological characteristic;User password is multi input composite sequence;When user password part only has a kind of biology in multi input composite sequence Feature time series length must be more than 1.Comparison information includes prestoring the user account for being stored in local or high in the clouds, user Password, biological attribute data, multi input composite sequence matrix, multi input composite sequence blacklist, the white name of multi input composite sequence List and/or digital certificate.Multi input composite sequence matrix includes sequence number part, a username portion, user password part, password shape Polymorphic segment and meaning part, wherein sequence number part are used to sort;A username portion is used to record a username portion data;User Password component is used to record user password data;Password state, which is divided into, have been activated and has disabled two classes;Meaning part is used to identify The operation that corresponding meaning and product or system will be taken.Multi input composite sequence matrix has openness, can take utilization The less sparse matrix storage of memory space.
With reference to one embodiment, the anti-stress methods based on a variety of different input composite sequences a kind of to the present invention Multi input composite sequence is described further.
As shown in table 1, first sequence represents that a username portion of this sequence is normal user name, user password portion Divide and be made up of 3 biologies (being belonging respectively to different types) input, is followed successively by sequentially in time:Face, right hand forefinger and a left side Eye iris.Set First ray to be expressed as normally logging in, open encryption data space.
Second sequence represents that a username portion of this sequence is cell-phone number 1, and user password part is only a kind of by fingerprint Biological characteristic forms, and is followed successively by sequentially in time:Left hand middle finger and left index finger.Set second sequence to be expressed as stress to step on Record, only open common data space.
3rd sequence represents in one sequence, if hardware allows, can input two kinds (or even two kinds simultaneously More than) biological characteristic, be followed successively by sequentially in time:Input left hand middle finger and iris of left eye and then simultaneously defeated simultaneously first Enter left hand little finger and face, last while input left hand middle finger and iris of right eye.The 3rd sequence is set to be expressed as normal industry Business operation 1.
4th sequence represents in one sequence, it is allowed to which same feature repeats, and inputs right hand forefinger three times. The 4th sequence is set to be expressed as coercing business operation 2.
5th sequence represents in one sequence, it is allowed to biological characteristic and non-biometric occurs, sequentially in time It is followed successively by:Left index finger and then input numeral 1 are inputted first, recently enter lowercase a.The 5th sequence is set to be expressed as On-line alarm.
Table 1
A kind of identity identifying method according to embodiments of the present invention, by the way that password and biology/non-biometric are combined Technology --- the multi input composite sequence come, have it is anti-usurp, anti-stress and the advantages of programmable transmission information, may be additionally used for Identify the intention of user.
As shown in Fig. 2 being a kind of structural representation of identification authentication system, a kind of reference picture 2, identification authentication system includes Input equipment 20, for receiving the multi input composite sequence of input;Server 22, for by multi input composite sequence with depositing in advance The comparison information of storage compares;Equipment 24 is performed, for based on comparison result, carrying out validated user and the identity mirror of disabled user It is fixed;Wherein, sequential combination of the multi input composite sequence based on non-biometric and biological characteristic, or at least two biological characteristics Sequential combination;Non-biometric includes multiple user names and multiple user passwords.
In one embodiment, in addition to sensing apparatus 26 and encryption and decryption equipment 28, sensing apparatus 26 be used to perceiving biology/ Biology/non-biometric signal is simultaneously sent to server 22 by non-biometric signal.Encryption and decryption equipment 28 is used for biological/non- Biological characteristic signal is encrypted or decryption oprerations.
A kind of identification authentication system according to embodiments of the present invention, by the way that password and biology/non-biometric are combined Technology --- the multi input composite sequence come, have it is anti-usurp, anti-stress and the advantages of programmable transmission information, may be additionally used for Identify the intention of user.
As shown in figure 3, it is a kind of concrete structure schematic diagram of identification authentication system.With reference to figure 3, the device includes storage mould Block 30, input acquisition module 32, state aware module 34, data transmission module 36 and data encrypting and deciphering module 38.
Specifically, memory module 30, for storing user password, biological attribute data, biometric features combination order square User's sensitive datas such as battle array, digital certificate private key, it is ensured that data can not be divided into by unauthorized access and module is locally stored and high in the clouds is deposited Module is stored up, can be the hardware devices such as USB key or Micro SD cards.Acquisition module 32 is inputted, for gathering the defeated of user Enter, including but not limited to biological characteristic input and non-biometric input (such as:Input through keyboard) etc. may be used as the defeated of password Enter, acquisition module can be the input equipments such as keyboard, camera, microphone.State aware module 34, for perceive product or The state of system, can be the sensors such as geographical position, speed, acceleration.Data transmission module 36, using ICP/IP protocol, Wifi, wapi, mobile communication agreement (2G, 3G, 4G, 5G etc.), bluetooth, infrared, NFC etc. are wired or wireless protocols carry out data Transmission.Data encrypting and deciphering module 388, calculated using the international enciphering and deciphering algorithm such as RSA, and the domestic encryption and decryption such as SM series Method, data are carried out with symmetrical or asymmetric encryption and decryption and is operated, it is ensured that the integrality and confidentiality of data.
As shown in figure 4, it is a kind of structural representation of the input equipment of identification authentication system.Fig. 4 is refer to, the input is set It is standby to include biometric features combination sequence management module 40, white list management module 41, blacklist management module 42, monitor list pipe Reason 43, interlocking module 44, local verification module 45, high in the clouds authentication module 46, Role Management module 47, password complexity management mould Block 48, authority management module 49 and log audit module 50.
Specifically, biometric features combination sequence management module 40, specific function include:Set, modification, delete, with Operation association sets, inquired about, generalized relating (includes but is not limited to:Time, geographical position range, altitude ranges, speed, acceleration The sensor senses factors such as degree, product itself posture) etc..
White list management module 41, the scope of legal input is pre-entered or sets, so as to ensure only in white list Interior input just can be as the input in biometric features combination order.Legal input includes the input of biological characteristic class and abiotic spy The input of sign class (such as:Input through keyboard).The function of white list management module includes:The typing of legal biological characteristic class input, repair Change, delete and inquire about, and setting, modification, deletion and the inquiry of non-biometric class input range, self-defined input type Increase, modification, delete and inquire about.
Blacklist management module 42, blacklist management be it is corresponding with white list, input in blacklist (including: The input of biological characteristic class, the input of non-biometric class and biometric features combination order) it not can be used for authentication, specifically Function includes:Blacklist is added, removes, inquire about from blacklist.
List management 43 is monitored, once there is the input that user is inputted in monitoring list, product or system will be to user behaviors Monitored and recorded, specific function includes:Monitor increase, deletion, modification and the inquiry of list.
Interlocking module 44, with other products or system interlink, linkage signal is sent according to making an appointment, to notify other productions Product or system take action (such as:Alarm), specific function includes:Linkage function is opened, and linkage function is closed, linkage action Set, delete, changing, inquiry.
Local verification module 45, all checkings and identifying procedure are completed in local terminal, will finally verified and authentication result Signature, encrypted transmission to high in the clouds, carry out the authentication of other systems, specific function includes:Local verification function is opened, this Ground authentication function is closed.
High in the clouds authentication module 46, user terminal locally after collection biometric features combination order, by sequential encoding, are obtained and plucked , to sign, encrypted transmission to high in the clouds, be compared beyond the clouds, and comparison result is signed, encrypts and passes user terminal back to complete Checking and identifying procedure, specific function include:High in the clouds authentication function is opened, high in the clouds authentication function is closed.
Role Management module 47, for distinguishing different user types and corresponding authority in product or system, role is at least It is divided into keeper, auditor and operator, specific function includes:Role is created, changed, deleting, inquiring about, role-security is set Put.
Password complexity management module 48, for managing the complexity of user password, specific function includes:Password forms Set, password length sets (minimum value is 2), password replacement cycle to set, history does not repeat password quantity and set.
Authority management module 49, for being configured to the authority of user or role, specific function includes:Authority increases Add, delete, change, inquire about.
Log audit module 50, it is managed for the daily record to product or system, specific function includes:Audit day Will inquiry, backup, export.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment or example of the present invention.In this manual, to the schematic representation of above-mentioned term not Identical embodiment or example must be directed to.Moreover, specific features, structure, material or the feature of description can be with office What combined in an appropriate manner in one or more embodiments or example.In addition, those skilled in the art can say this Different embodiments or example described in bright book are engaged and combined.
Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art within the scope of the invention can be to above-mentioned Embodiment is changed, changed, replacing and modification.

Claims (10)

1. a kind of identity identifying method based on a variety of different types input composite sequence, it is characterised in that comprise the following steps:
Receive the multi input composite sequence of input;
The multi input composite sequence is compared with the comparison information prestored;
Based on comparison result, validated user and the identity authentication of disabled user are carried out;
Wherein, sequential combination of the multi input composite sequence based on biological characteristic input and non-biometric input, or at least The sequential combination of two biological characteristics;The non-biometric input also includes multiple user names.
2. identity identifying method according to claim 1, it is characterised in that
The multi input composite sequence is a variety of different types of input composite sequences of input simultaneously.
3. identity identifying method according to claim 1, it is characterised in that
The multi input composite sequence is multiple same type of input composite sequences of input simultaneously.
4. identity identifying method according to claim 1, it is characterised in that described by the multi input composite sequence and pre- The comparison information first stored compares, and further comprises:
Whether the multi input composite sequence for judging to receive belongs to white list, if so, then showing the multi input group of input Close sequence and can be used for authenticating user identification and intention assessment;
The white list is to preset, and is able to carry out typing, modification, deletion and the inquiry of legal biological characteristic input, and Setting, modification, deletion and the inquiry of non-biometric class input range, the increase of self-defined input type, modification, delete and look into Ask.
5. identity identifying method according to claim 1, it is characterised in that described by the multi input composite sequence and pre- The comparison information first stored compares, and further comprises:
Whether the multi input composite sequence for judging to receive belongs to blacklist, if so, then showing the multi input group of input Close sequence and not can be used for authenticating user identification or intention assessment;
The blacklist is able to carry out the function of addition, removal and inquiry of illegally inputting to preset.
6. identity identifying method according to claim 1, it is characterised in that the multi input composite sequence also includes user Password, the user password include normal operating password and stress operation password.
7. identity identifying method according to claim 1, it is characterised in that
It is described to be based on comparison result, validated user and the identity authentication and intention assessment of disabled user are carried out, is further comprised:This Ground checking, the checking of full high in the clouds or the checking of part high in the clouds.
8. identity identifying method according to claim 1, it is characterised in that the comparison result is in the product trusted each other Or it can be shared in system.
9. identity identifying method according to claim 1, it is characterised in that the user password of the multi input composite sequence It is configured to:
Judge that the composition of password, the length of password are set, whether completely the replacement cycle of password and history do not repeat password quantity Foot is preset, if so, then this user's input password can be used as legal input information;Otherwise not receive.
A kind of 10. identification authentication system based on a variety of different types input composite sequence, it is characterised in that including:
Input equipment, for receiving the multi input composite sequence of input;
Server, for the multi input composite sequence to be compared with the comparison information prestored;
Equipment is performed, for based on comparison result, carrying out validated user and the identity authentication of disabled user;
Wherein, sequential combination of the multi input composite sequence based on biological characteristic input and non-biometric input, or at least The sequential combination of two biological characteristics;The multi input composite sequence includes multiple user names and multiple user passwords.
CN201711159989.0A 2017-11-20 2017-11-20 A kind of identity identifying method and device based on a variety of different types input composite sequence Pending CN107743131A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711159989.0A CN107743131A (en) 2017-11-20 2017-11-20 A kind of identity identifying method and device based on a variety of different types input composite sequence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711159989.0A CN107743131A (en) 2017-11-20 2017-11-20 A kind of identity identifying method and device based on a variety of different types input composite sequence

Publications (1)

Publication Number Publication Date
CN107743131A true CN107743131A (en) 2018-02-27

Family

ID=61238926

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711159989.0A Pending CN107743131A (en) 2017-11-20 2017-11-20 A kind of identity identifying method and device based on a variety of different types input composite sequence

Country Status (1)

Country Link
CN (1) CN107743131A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108717635A (en) * 2018-06-08 2018-10-30 中国农业银行股份有限公司 The method and system for being authenticated or being identified based on multi-biological characteristic
CN109241718A (en) * 2018-08-23 2019-01-18 百度在线网络技术(北京)有限公司 Cipher processing method and equipment
CN109344722A (en) * 2018-09-04 2019-02-15 阿里巴巴集团控股有限公司 A kind of user identity determines method, apparatus and electronic equipment
CN110826113A (en) * 2018-08-09 2020-02-21 深圳市菲德越科技有限公司 Data secure storage method and device
CN111625797A (en) * 2020-05-26 2020-09-04 中国平安财产保险股份有限公司 Mobile terminal control method and authentication method based on biological recognition
CN113536271A (en) * 2021-07-30 2021-10-22 陕西科技大学 Combined password verification input device and verification method based on multiple biological characteristics

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1441380A (en) * 2003-01-08 2003-09-10 章映东 Vital fingerprint distinguishing technology for identity antifake and resisting forcing
KR20050048977A (en) * 2003-11-20 2005-05-25 주식회사 투비링크 Method for proving the identity using the biometrics signature verification system
CN101711029A (en) * 2009-12-17 2010-05-19 中国联合网络通信集团有限公司 Method and equipment for certifying access of terminal, and method for restoring equipment validity
US20130263238A1 (en) * 2012-04-02 2013-10-03 Prasanna Bidare Personalized Biometric Identification and Non-Repudiation System
CN104378211A (en) * 2014-11-26 2015-02-25 深圳市银雁金融配套服务有限公司 Identity authentication method and device
CN105229709A (en) * 2013-03-28 2016-01-06 荣耀全球解决方案(国际)有限公司 Security ststem
CN106878344A (en) * 2017-04-25 2017-06-20 北京洋浦伟业科技发展有限公司 A kind of biological characteristic authentication, register method and device
WO2017177435A1 (en) * 2016-04-15 2017-10-19 深圳前海达闼云端智能科技有限公司 Identity authentication method, terminal and server
CN107277046A (en) * 2017-07-25 2017-10-20 湖南云迪生物识别科技有限公司 Coerce-proof password management-control method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1441380A (en) * 2003-01-08 2003-09-10 章映东 Vital fingerprint distinguishing technology for identity antifake and resisting forcing
KR20050048977A (en) * 2003-11-20 2005-05-25 주식회사 투비링크 Method for proving the identity using the biometrics signature verification system
CN101711029A (en) * 2009-12-17 2010-05-19 中国联合网络通信集团有限公司 Method and equipment for certifying access of terminal, and method for restoring equipment validity
US20130263238A1 (en) * 2012-04-02 2013-10-03 Prasanna Bidare Personalized Biometric Identification and Non-Repudiation System
CN105229709A (en) * 2013-03-28 2016-01-06 荣耀全球解决方案(国际)有限公司 Security ststem
CN104378211A (en) * 2014-11-26 2015-02-25 深圳市银雁金融配套服务有限公司 Identity authentication method and device
WO2017177435A1 (en) * 2016-04-15 2017-10-19 深圳前海达闼云端智能科技有限公司 Identity authentication method, terminal and server
CN106878344A (en) * 2017-04-25 2017-06-20 北京洋浦伟业科技发展有限公司 A kind of biological characteristic authentication, register method and device
CN107277046A (en) * 2017-07-25 2017-10-20 湖南云迪生物识别科技有限公司 Coerce-proof password management-control method and device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
何国辉;甘俊英;: "基于多生物特征识别的网络身份认证研究", 计算机应用研究, no. 10, pages 125 - 127 *
杨城;赵奇;康立;: "口令重用行为与多维口令体系研究", no. 12, pages 114 - 120 *
王德松: "基于生物特征信息隐藏与身份认证及其应用研究", 博士电子期刊 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108717635A (en) * 2018-06-08 2018-10-30 中国农业银行股份有限公司 The method and system for being authenticated or being identified based on multi-biological characteristic
CN110826113A (en) * 2018-08-09 2020-02-21 深圳市菲德越科技有限公司 Data secure storage method and device
CN109241718A (en) * 2018-08-23 2019-01-18 百度在线网络技术(北京)有限公司 Cipher processing method and equipment
CN109344722A (en) * 2018-09-04 2019-02-15 阿里巴巴集团控股有限公司 A kind of user identity determines method, apparatus and electronic equipment
US10997460B2 (en) 2018-09-04 2021-05-04 Advanced New Technologies Co., Ltd. User identity determining method, apparatus, and device
TWI738011B (en) * 2018-09-04 2021-09-01 開曼群島商創新先進技術有限公司 Method, device and electronic equipment for determining user identity
US11244199B2 (en) 2018-09-04 2022-02-08 Advanced New Technologies Co., Ltd. User identity determining method, apparatus, and device
CN111625797A (en) * 2020-05-26 2020-09-04 中国平安财产保险股份有限公司 Mobile terminal control method and authentication method based on biological recognition
CN113536271A (en) * 2021-07-30 2021-10-22 陕西科技大学 Combined password verification input device and verification method based on multiple biological characteristics

Similar Documents

Publication Publication Date Title
CN107743131A (en) A kind of identity identifying method and device based on a variety of different types input composite sequence
US11310058B2 (en) Methods for digitally signing an electronic file and authentication method
US20130314208A1 (en) Systems And Methods For Storing And Accessing Confidential Data
JP5184442B2 (en) Methods used in systems for digital authentication, encryption and signing
US20090183008A1 (en) Identity authentication and secured access systems, components, and methods
US8224293B1 (en) Encoded colorgram for mobile device security
JPWO2003069489A1 (en) Identification method
TW201528029A (en) Method performed by a controller device and a controller device
CN105429761A (en) Key generation method and device
CN107871081A (en) A kind of computer information safe system
US10432618B1 (en) Encrypted verification of digital identifications
Shafique et al. Modern authentication techniques in smart phones: Security and usability perspective
CN106650372B (en) The activating method and device of administrator right
CN106033625A (en) Lockset, mobile terminal, lockset control method, and lockset control system
CN109831300A (en) A kind of cipher key destruction method and device
Gifford et al. Networked biometrics systems—requirements based on iris recognition
CN109522694A (en) A kind of identification system based on computer network
Subha Biometrics in internet of things (iot) security
CN108322440A (en) It is a kind of to utilize safety equipment Card Reader login method and Security Login System
Gupta Implementation of biometric security in a smartphone based domotics
Wilkins Can biometrics secure manufacturing?
EP1877887B1 (en) A system and method for protecting the privacy and security of stored biometric data
CN108701183B (en) User authentication method and system using whether junk data are consistent
Pricop Biometrics the secret to securing industrial control systems
CN111625797A (en) Mobile terminal control method and authentication method based on biological recognition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination