CN109246133A - A kind of network access verifying method based on bio-identification - Google Patents
A kind of network access verifying method based on bio-identification Download PDFInfo
- Publication number
- CN109246133A CN109246133A CN201811221453.1A CN201811221453A CN109246133A CN 109246133 A CN109246133 A CN 109246133A CN 201811221453 A CN201811221453 A CN 201811221453A CN 109246133 A CN109246133 A CN 109246133A
- Authority
- CN
- China
- Prior art keywords
- information
- biological
- processor
- certificate server
- auth type
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the present invention provides a kind of network access verifying method based on bio-identification, comprising: sends authentication request packet to certificate server, receives the auth type instruction that the certificate server returns;According to the auth type in auth type instruction, the corresponding biological information of the auth type is obtained, and the biological information is sent to the certificate server, so that the certificate server authenticates the biological information;Receive the authentication success message that the certificate server is sent.Method provided by the invention extends biological identification technology in Portal authentication techniques, and the legitimacy of accessing user is judged using the method for bio-identification, so that user's access in network is more safe and reliable.
Description
Technical field
The present embodiments relate to technical field of network security more particularly to a kind of network insertion based on bio-identification to recognize
Card method.
Background technique
With the continuous development of society and economy, network becomes essential a part in people's life.However, with
The development of network, a series of safety problem also come one after another, great security threat is produced to current network environment, such as
DDOS attack, SSL attack, DNS abduction etc..Especially in the high network of security requirement, such as financial system or public security system
In network, assault or the generation of information leakage often bring extremely serious consequence, cause to society and economy
Huge loss.Therefore, guarantee that the identity reality of accessing user is particularly significant in internet.
A kind of security management mechanism of the aaa protocol as access in network security control and authentication, provides
Three kinds of security services of authentication, authorization, accounting, are widely applied by existing internet.Portal authentication techniques are nowadays using most
One of extensive aaa protocol.When judging whether an accessing user is legal, existing AAA technology mostly uses greatly two kinds of machines
System --- usemame/password mechanism and certificate mechanism.
In the prior art, usemame/password mechanism is easily lost, forgets, lends and cracks;Certificate mechanism is user one
Private key or other tokens are installed and stored in fixed equipment, if equipment is fallen into the hand of malicious user, malicious user will have the right
Access or replicate the certificate.Therefore, in the high network of security requirement, both authentication mechanisms are not effective to ensure that net
Network safety.
Summary of the invention
The embodiment of the present invention provides a kind of network access verifying method based on bio-identification, to solve in the prior art
Usemame/password mechanism is easily lost, forgets, lends and cracks;Certificate mechanism is that user installs and deposits in certain equipment
Private key or other tokens are stored up, if equipment is fallen into the hand of malicious user, malicious user would have access to or replicate the certificate.Cause
This, in the high network of security requirement, the problem of both authentication mechanisms are not effective to ensure that network security.
In a first aspect, the embodiment of the present invention provides a kind of network access verifying method based on bio-identification, comprising:
Authentication request packet is sent to certificate server, receives the auth type instruction that the certificate server returns;
According to the auth type in auth type instruction, the corresponding biological information of the auth type is obtained,
And the biological information is sent to the certificate server, so that the certificate server is to the biological information
It is authenticated;
Receive the authentication success message that the certificate server is sent.
Wherein, the corresponding biological information of the auth type includes at least: face characteristic information, fingerprint characteristic letter
One of breath, palm print characteristics information, voice characteristics information and iris feature information are a variety of.
Wherein described the step of obtaining the auth type corresponding biological information, specifically includes: receiving user biological
The raw information of feature pre-processes the raw information of the biological characteristic, obtains biological condition code;It is special to the biology
Sign code is encrypted, and obtains encrypted biological condition code, and the encrypted biological condition code is special as the biology
Reference breath.
Second aspect, the embodiment of the present invention also provide a kind of network access verifying method based on bio-identification, comprising:
The request message that user terminal is sent is received, according to the request message, sends certification class to the user terminal
It is corresponding to obtain the auth type so that the user terminal is according to the auth type in auth type instruction for type instruction
Biological information;
Biological information is received, the biological information is authenticated, it is whole to the user after certification passes through
End sends authentication success message.
Wherein, the reception biological information, the step of certification to the biological information further include: if recognizing
Card failure, then to the user terminal return authentication failure information.
Wherein, after described the step of sending authentication success message to the user terminal, further include, it is whole to the user
Corresponding IP address is held to open gateway outlet, so that user terminal visit passes through the gateway access network.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, the program
The step of method as provided by above-mentioned first aspect is realized when being executed by processor.
The embodiment of the present invention also provides a kind of user terminal, comprising:
At least one processor;And at least one processor being connected to the processor, in which: the memory is deposited
The program instruction that can be executed by the processor is contained, the processor calls described program instruction to be able to carry out such as above-mentioned first
Method provided by aspect.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, the program
The step of method as provided by above-mentioned second aspect is realized when being executed by processor.
The embodiment of the present invention also provides a kind of certificate server, comprising:
At least one processor;And at least one processor being connected to the processor, in which: the memory is deposited
The program instruction that can be executed by the processor is contained, the processor calls described program instruction to be able to carry out such as above-mentioned second
Method provided by aspect.
Network access verifying method provided in an embodiment of the present invention based on bio-identification, expands in Portal authentication techniques
Biological identification technology is opened up, the legitimacy of accessing user is judged using the method for bio-identification, so that the user in network connects
Enter more safe and reliable.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair
Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of flow chart of the network access verifying method based on bio-identification provided in an embodiment of the present invention;
Fig. 2 is a kind of certificate server of the network access verifying method based on bio-identification provided in an embodiment of the present invention
Flow diagram;
Fig. 3 is that a kind of another process of the network access verifying method based on bio-identification provided in an embodiment of the present invention is shown
It is intended to;
Fig. 4 is a kind of structural schematic diagram of user terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of certificate server provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
With reference to Fig. 1, Fig. 1 is a kind of stream of the network access verifying method based on bio-identification provided in an embodiment of the present invention
Cheng Tu, provided method include:
S1 sends authentication request packet to certificate server, receives the auth type instruction that the certificate server returns.
S2 obtains the corresponding biological characteristic letter of the auth type according to the auth type in auth type instruction
Breath, and the biological information is sent to the certificate server, so that the certificate server is to the biological characteristic
Information is authenticated.
Specifically, certification terminal initiates Portal certification first during a Portal authenticates network insertion, to
Certificate server sends authentication request packet, and certificate server responds asking for user terminal after receiving authentication request packet
Message is sought, certificate server returns to the message for carrying authentication mode type.
User terminal is after receiving the message for carrying authentication mode type, the certification class that is referred to according to type in message
Type, obtains corresponding biological information, such as when type value is 1, and expression needs face characteristic as biological information,
When type value is 2, expression needs fingerprint characteristic as biological information.
User terminal pre-processes by carrying out biometric scan and generates corresponding biological condition code as biological characteristic
Information is sent to certificate server, and so that certificate server verifies user terminal, certificate server believes biological characteristic
Breath, is compared with the information stored in property data base, judges whether the biological information is legal, while return authentication knot
Fruit is to user terminal, if certification passes through, network can be accessed by authenticating terminal;Otherwise refusal certification accessing terminal to network.
Method provided by the invention extends biological identification technology in Portal authentication techniques, uses the side of bio-identification
Method judges the legitimacy of accessing user, so that user's access in network is more safe and reliable.
On the basis of the above embodiments, the corresponding biological information of the auth type includes at least: face characteristic
One of information, fingerprint feature information, palm print characteristics information, voice characteristics information and iris feature information are a variety of.
Specifically, certification terminal needs to facilitate scanning and obtains target biological feature, including but not limited to following identification
One kind of technology or combinations thereof: recognition of face, fingerprint recognition, personal recognition, speech recognition, iris recognition etc., certificate server
It can be the combination of single biological information or a variety of biological informations in the auth type instruction of return.
On the basis of the above embodiments, described the step of obtaining the auth type corresponding biological information, is specific
Include:
The raw information for receiving user biological feature, pre-processes the raw information of the biological characteristic, is given birth to
Object condition code;
The biological condition code is encrypted, obtains encrypted biological condition code, and by the encrypted biology
Condition code is as the biological information.
Specifically, certification terminal includes biometric scan module, biological characteristic preprocessing module, communication module and other
Module.Wherein biometric scan module is used to obtain the raw information of user biological feature, and carries out by preprocessing module
The associated biomolecule condition code that can communicate and identify is handled, this feature code need to meet unforgeable and privacy.
With reference to Fig. 2, Fig. 2 is a kind of recognizing for network access verifying method based on bio-identification provided in an embodiment of the present invention
Server flow diagram is demonstrate,proved, provided method includes:
S21 receives the request message that user terminal is sent, and according to the request message, recognizes to user terminal transmission
Type instruction is demonstrate,proved, so that the user terminal is according to the auth type in auth type instruction, obtains the auth type
Corresponding biological information;
S22 receives biological information, authenticates to the biological information, to the use after certification passes through
Family terminal sends authentication success message.
Specifically, certificate server responds the request, authentication service after the request message for receiving user terminal transmission
Device returns to the message for carrying authentication mode type, and wherein type is the traditional user name cipher mechanism of 0 expression, and 1 is recognition of face,
2 be fingerprint recognition, and so on, if type > 0, user terminal takes correlated characteristic code using corresponding biometric discrimination method;
Otherwise, user name password is inputted;User terminal receive certificate server response information after, by IP address, MAC Address,
User name password or biological condition code are sent to certificate server, and certificate server judges user name password or biological information
Whether legal, if legal, then notification gateway opens gateway outlet to the IP address, and subsequent certificate server return authentication is successfully believed
It ceases to user terminal, the accessible outside network resource of user terminal.
By the method, biological identification technology is extended in Portal authentication techniques, is judged using the method for bio-identification
The legitimacy of accessing user, so that user's access in network is more safe and reliable.
On the basis of the above embodiments, the reception biological information, authenticates the biological information
The step of further include: if authentification failure, to the user terminal return authentication failure information.
After described the step of sending authentication success message to the user terminal, further include, to the user terminal pair
The IP address answered opens gateway outlet, so that user terminal visit passes through the gateway access network.
Specifically, saving the associated biomolecule condition code information of all legitimate users in certificate server, ratio can be passed through
The biological condition code to be identified that send to user terminal simultaneously judges whether it is legal, and then direct return authentication loses if it is illegal
Lose information.
With reference to Fig. 3, Fig. 3 be a kind of network access verifying method based on bio-identification provided in an embodiment of the present invention again
One flow diagram, wherein entire Verification System is divided into certification two parts of terminal and certificate server.
Authenticating terminal includes biometric scan module, biological characteristic preprocessing module, communication module and other modules.Its
Middle biometric scan module is used to obtain the raw information of user biological feature, and is handled to obtain by preprocessing module
The associated biomolecule condition code that can communicate and identify, this feature code need to meet unforgeable and privacy;Communication module
For being communicated with certificate server;Other modules refer to the other required functional modules of certification terminal.
Certificate server includes biological characteristic storing data library, biological characteristic recognition module, communication module and other modules.
Biological characteristic storing data library saves the associated biomolecule condition code information of all legitimate users;Biological characteristic recognition module is used to
It compares the biological condition code to be identified that certification terminal is sent and judges whether it is legal;Communication module is used to and certification terminal
Communication;Other modules refer to the other required functional modules of certificate server.
The detailed process of network access verifying method based on bio-identification is as follows, and certification terminal initiates Portal certification,
Certificate server responds the request, and certification terminal carries out biometric scan, pretreatment and generates corresponding biological condition code;Recognize
It demonstrate,proves terminal and encrypted biological condition code is sent to certificate server by communication module;Certificate server is through living things feature recognition
Module is compared with property data base, judges whether this feature code is legal;Certificate server return authentication result is whole to certification
End;If certification passes through, network can be accessed by authenticating terminal;Otherwise refusal certification accessing terminal to network.
Fig. 4 illustrates a kind of structural schematic diagram of user terminal, as shown in figure 4, the server may include: processor
(processor) 410, memory (memory) 430 and bus 440, wherein processor 410, memory 430 pass through bus 440
Complete mutual communication.Processor 410 can call the logical order in memory 430, to execute following method: to certification
Server sends authentication request packet, receives the auth type instruction that the certificate server returns;According to the auth type
Auth type in instruction obtains the corresponding biological information of the auth type, and the biological information is sent
To the certificate server, so that the certificate server authenticates the biological information;Receive the certification clothes
The authentication success message that business device is sent.
The present embodiment also provides a kind of computer program product, and the computer program product includes being stored in non-transient meter
Computer program on calculation machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is counted
When calculation machine executes, computer is able to carry out method provided by above-mentioned each method embodiment, for example, sends out to certificate server
Authentication request packet is sent, the auth type instruction that the certificate server returns is received;According in auth type instruction
Auth type, obtains the corresponding biological information of the auth type, and the biological information is sent to and described is recognized
Server is demonstrate,proved, so that the certificate server authenticates the biological information;The certificate server is received to send
Authentication success message.
The present embodiment provides a kind of non-transient computer readable storage medium, the non-transient computer readable storage medium
Computer instruction is stored, the computer instruction makes the computer execute method provided by above-mentioned each method embodiment, example
Such as include: to send authentication request packet to certificate server, receives the auth type instruction that the certificate server returns;According to
Auth type in auth type instruction, obtains the corresponding biological information of the auth type, and by the biology
Characteristic information is sent to the certificate server, so that the certificate server authenticates the biological information;It connects
Receive the authentication success message that the certificate server is sent.
Fig. 5 illustrates a kind of structural schematic diagram of certificate server, as shown in figure 5, the server may include: processor
(processor) 510, memory (memory) 530 and bus 540, wherein processor 510, memory 530 pass through bus 540
Complete mutual communication.Processor 510 can call the logical order in memory 530, to execute following method: receiving and use
The request message that family terminal is sent sends auth type instruction to the user terminal, for described according to the request message
User terminal obtains the corresponding biological information of the auth type according to the auth type in auth type instruction;
Biological information is received, the biological information is authenticated, is recognized after certification passes through to user terminal transmission
Demonstrate,prove successful information.
The present embodiment also provides a kind of computer program product, and the computer program product includes being stored in non-transient meter
Computer program on calculation machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is counted
When calculation machine executes, computer is able to carry out method provided by above-mentioned each method embodiment, for example, receives user terminal hair
The request message sent sends auth type instruction to the user terminal, for the user terminal according to the request message
According to the auth type in auth type instruction, the corresponding biological information of the auth type is obtained;Receive biology
Characteristic information authenticates the biological information, authenticates after certification passes through to user terminal transmission and successfully believes
Breath.
The present embodiment provides a kind of non-transient computer readable storage medium, the non-transient computer readable storage medium
Computer instruction is stored, the computer instruction makes the computer execute method provided by above-mentioned each method embodiment, example
Such as include: the request message for receiving user terminal and sending, according to the request message, sends auth type to the user terminal
It is corresponding to obtain the auth type so that the user terminal is according to the auth type in auth type instruction for instruction
Biological information;Biological information is received, the biological information is authenticated, to the use after certification passes through
Family terminal sends authentication success message.
The apparatus embodiments described above are merely exemplary, wherein described, unit can as illustrated by the separation member
It is physically separated with being or may not be, component shown as a unit may or may not be physics list
Member, it can it is in one place, or may be distributed over multiple network units.It can be selected according to the actual needs
In some or all of the modules achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness
Labour in the case where, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can
It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on
Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should
Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers
It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation
Method described in certain parts of example or embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;
And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and
Range.
Claims (10)
1. a kind of network access verifying method based on bio-identification characterized by comprising
Authentication request packet is sent to certificate server, receives the auth type instruction that the certificate server returns;
According to the auth type in auth type instruction, the corresponding biological information of the auth type is obtained, and will
The biological information is sent to the certificate server, so that the certificate server carries out the biological information
Certification;
Receive the authentication success message that the certificate server is sent.
2. the method according to claim 1, wherein the corresponding biological information of the auth type at least wraps
It includes: one of face characteristic information, fingerprint feature information, palm print characteristics information, voice characteristics information and iris feature information
Or it is a variety of.
3. the method according to claim 1, wherein described obtain the corresponding biological characteristic letter of the auth type
The step of breath, specifically includes:
The raw information for receiving user biological feature, pre-processes the raw information of the biological characteristic, and it is special to obtain biology
Levy code;
The biological condition code is encrypted, obtains encrypted biological condition code, and by the encrypted biological characteristic
Code is used as the biological information.
4. a kind of network access verifying method based on bio-identification characterized by comprising
The request message that user terminal is sent is received, according to the request message, auth type is sent to the user terminal and refers to
It enables, so that the user terminal is according to the auth type in auth type instruction, obtains the corresponding life of the auth type
Object characteristic information;
Biological information is received, the biological information is authenticated, is sent out after certification passes through to the user terminal
Send authentication success message.
5. according to the method described in claim 4, it is characterized in that, the reception biological information, to the biological characteristic
The step of information is authenticated further include: if authentification failure, to the user terminal return authentication failure information.
6. according to the method described in claim 4, it is characterized in that, described send authentication success message to the user terminal
It after step, further include that gateway outlet is opened to the corresponding IP address of the user terminal, so that user terminal visit passes through
The gateway access network.
7. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor
The step of method as described in any in claims 1 to 3 is realized when row.
8. a kind of user terminal characterized by comprising
At least one processor;And at least one processor being connected to the processor, in which:
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to instruct energy
Enough methods executed as described in claims 1 to 3 is any.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor
The step of method as described in any in claim 4 to 6 is realized when row.
10. a kind of certificate server characterized by comprising
At least one processor;And at least one processor being connected to the processor, in which:
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to instruct energy
Enough methods executed as described in claim 4 to 6 is any.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811221453.1A CN109246133A (en) | 2018-10-19 | 2018-10-19 | A kind of network access verifying method based on bio-identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811221453.1A CN109246133A (en) | 2018-10-19 | 2018-10-19 | A kind of network access verifying method based on bio-identification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109246133A true CN109246133A (en) | 2019-01-18 |
Family
ID=65080730
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811221453.1A Pending CN109246133A (en) | 2018-10-19 | 2018-10-19 | A kind of network access verifying method based on bio-identification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109246133A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111178140A (en) * | 2019-12-05 | 2020-05-19 | 航天信息股份有限公司 | Biometric identification system and biometric identification method |
CN111274563A (en) * | 2020-01-07 | 2020-06-12 | 腾讯科技(深圳)有限公司 | Security authentication method and related device |
CN112084479A (en) * | 2020-09-15 | 2020-12-15 | 成都知道创宇信息技术有限公司 | Website attack interception method, device, server and storage medium |
CN113726797A (en) * | 2021-09-01 | 2021-11-30 | 世纪龙信息网络有限责任公司 | Safe login method, system and account management device |
CN116402510A (en) * | 2023-04-14 | 2023-07-07 | 广东车卫士信息科技有限公司 | Non-inductive payment method, medium and equipment based on high concurrency network service |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101227278A (en) * | 2007-01-18 | 2008-07-23 | 中国科学院自动化研究所 | Method and system of remote network identification authenticating based on multiple biology characteristics |
CN105245529A (en) * | 2015-10-21 | 2016-01-13 | 四川省宁潮科技有限公司 | User biological characteristic code-based distributed authentication method, terminal and system |
CN107079034A (en) * | 2016-11-15 | 2017-08-18 | 深圳达闼科技控股有限公司 | A kind of identity authentication method, terminal device, certificate server and electronic equipment |
CN107864476A (en) * | 2017-11-08 | 2018-03-30 | 上海创功通讯技术有限公司 | The access authentication method and terminal of a kind of wireless network |
-
2018
- 2018-10-19 CN CN201811221453.1A patent/CN109246133A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101227278A (en) * | 2007-01-18 | 2008-07-23 | 中国科学院自动化研究所 | Method and system of remote network identification authenticating based on multiple biology characteristics |
CN105245529A (en) * | 2015-10-21 | 2016-01-13 | 四川省宁潮科技有限公司 | User biological characteristic code-based distributed authentication method, terminal and system |
CN107079034A (en) * | 2016-11-15 | 2017-08-18 | 深圳达闼科技控股有限公司 | A kind of identity authentication method, terminal device, certificate server and electronic equipment |
CN107864476A (en) * | 2017-11-08 | 2018-03-30 | 上海创功通讯技术有限公司 | The access authentication method and terminal of a kind of wireless network |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111178140A (en) * | 2019-12-05 | 2020-05-19 | 航天信息股份有限公司 | Biometric identification system and biometric identification method |
CN111274563A (en) * | 2020-01-07 | 2020-06-12 | 腾讯科技(深圳)有限公司 | Security authentication method and related device |
CN112084479A (en) * | 2020-09-15 | 2020-12-15 | 成都知道创宇信息技术有限公司 | Website attack interception method, device, server and storage medium |
CN113726797A (en) * | 2021-09-01 | 2021-11-30 | 世纪龙信息网络有限责任公司 | Safe login method, system and account management device |
CN116402510A (en) * | 2023-04-14 | 2023-07-07 | 广东车卫士信息科技有限公司 | Non-inductive payment method, medium and equipment based on high concurrency network service |
CN116402510B (en) * | 2023-04-14 | 2024-01-30 | 广东车卫士信息科技有限公司 | Non-inductive payment method, medium and equipment based on high concurrency network service |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109246133A (en) | A kind of network access verifying method based on bio-identification | |
O'Gorman | Comparing passwords, tokens, and biometrics for user authentication | |
Pinkas et al. | Securing passwords against dictionary attacks | |
CN110677252A (en) | RCS combined block chain identity model and safety personal identification information data transmission model | |
CN107257336A (en) | A kind of user authen method and system | |
US20070113090A1 (en) | Access control system based on a hardware and software signature of a requesting device | |
CN105357186B (en) | A kind of secondary authentication method based on out-of-band authentication and enhancing OTP mechanism | |
US20100107228A1 (en) | Ip address secure multi-channel authentication for online transactions | |
CN111931144A (en) | Unified safe login authentication method and device for operating system and service application | |
Parmar et al. | A comprehensive study on passwordless authentication | |
CN110661800A (en) | Multi-factor identity authentication method supporting guarantee level | |
CN111027035A (en) | Multi-identity authentication method and system based on block chain | |
CN107733636A (en) | Authentication method and Verification System | |
CN109150547A (en) | A kind of system and method for the digital asset real name registration based on block chain | |
CN107113613A (en) | Server, mobile terminal, real-name network authentication system and method | |
US8635454B2 (en) | Authentication systems and methods using a packet telephony device | |
Al Rousan et al. | A comparative analysis of biometrics types: literature review | |
CN106888091A (en) | Trustable network cut-in method and system based on EAP | |
EP2082518A2 (en) | Access control system based on a hardware and software signature of a requesting device | |
CN113301028B (en) | Gateway protection method and data labeling method | |
CN112822176B (en) | Remote APP identity authentication method | |
US9686270B2 (en) | Authentication systems and methods using a packet telephony device | |
CN111756721B (en) | Associated authentication method and device, IAM server and readable storage medium | |
CN113343278B (en) | Login request verification method and device for preventing CSRF attack | |
US7631344B2 (en) | Distributed authentication framework stack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |
|
RJ01 | Rejection of invention patent application after publication |