CN109246133A - A kind of network access verifying method based on bio-identification - Google Patents

A kind of network access verifying method based on bio-identification Download PDF

Info

Publication number
CN109246133A
CN109246133A CN201811221453.1A CN201811221453A CN109246133A CN 109246133 A CN109246133 A CN 109246133A CN 201811221453 A CN201811221453 A CN 201811221453A CN 109246133 A CN109246133 A CN 109246133A
Authority
CN
China
Prior art keywords
information
biological
processor
certificate server
auth type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811221453.1A
Other languages
Chinese (zh)
Inventor
李贺武
武博阳
吴茜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN201811221453.1A priority Critical patent/CN109246133A/en
Publication of CN109246133A publication Critical patent/CN109246133A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the present invention provides a kind of network access verifying method based on bio-identification, comprising: sends authentication request packet to certificate server, receives the auth type instruction that the certificate server returns;According to the auth type in auth type instruction, the corresponding biological information of the auth type is obtained, and the biological information is sent to the certificate server, so that the certificate server authenticates the biological information;Receive the authentication success message that the certificate server is sent.Method provided by the invention extends biological identification technology in Portal authentication techniques, and the legitimacy of accessing user is judged using the method for bio-identification, so that user's access in network is more safe and reliable.

Description

A kind of network access verifying method based on bio-identification
Technical field
The present embodiments relate to technical field of network security more particularly to a kind of network insertion based on bio-identification to recognize Card method.
Background technique
With the continuous development of society and economy, network becomes essential a part in people's life.However, with The development of network, a series of safety problem also come one after another, great security threat is produced to current network environment, such as DDOS attack, SSL attack, DNS abduction etc..Especially in the high network of security requirement, such as financial system or public security system In network, assault or the generation of information leakage often bring extremely serious consequence, cause to society and economy Huge loss.Therefore, guarantee that the identity reality of accessing user is particularly significant in internet.
A kind of security management mechanism of the aaa protocol as access in network security control and authentication, provides Three kinds of security services of authentication, authorization, accounting, are widely applied by existing internet.Portal authentication techniques are nowadays using most One of extensive aaa protocol.When judging whether an accessing user is legal, existing AAA technology mostly uses greatly two kinds of machines System --- usemame/password mechanism and certificate mechanism.
In the prior art, usemame/password mechanism is easily lost, forgets, lends and cracks;Certificate mechanism is user one Private key or other tokens are installed and stored in fixed equipment, if equipment is fallen into the hand of malicious user, malicious user will have the right Access or replicate the certificate.Therefore, in the high network of security requirement, both authentication mechanisms are not effective to ensure that net Network safety.
Summary of the invention
The embodiment of the present invention provides a kind of network access verifying method based on bio-identification, to solve in the prior art Usemame/password mechanism is easily lost, forgets, lends and cracks;Certificate mechanism is that user installs and deposits in certain equipment Private key or other tokens are stored up, if equipment is fallen into the hand of malicious user, malicious user would have access to or replicate the certificate.Cause This, in the high network of security requirement, the problem of both authentication mechanisms are not effective to ensure that network security.
In a first aspect, the embodiment of the present invention provides a kind of network access verifying method based on bio-identification, comprising:
Authentication request packet is sent to certificate server, receives the auth type instruction that the certificate server returns;
According to the auth type in auth type instruction, the corresponding biological information of the auth type is obtained, And the biological information is sent to the certificate server, so that the certificate server is to the biological information It is authenticated;
Receive the authentication success message that the certificate server is sent.
Wherein, the corresponding biological information of the auth type includes at least: face characteristic information, fingerprint characteristic letter One of breath, palm print characteristics information, voice characteristics information and iris feature information are a variety of.
Wherein described the step of obtaining the auth type corresponding biological information, specifically includes: receiving user biological The raw information of feature pre-processes the raw information of the biological characteristic, obtains biological condition code;It is special to the biology Sign code is encrypted, and obtains encrypted biological condition code, and the encrypted biological condition code is special as the biology Reference breath.
Second aspect, the embodiment of the present invention also provide a kind of network access verifying method based on bio-identification, comprising:
The request message that user terminal is sent is received, according to the request message, sends certification class to the user terminal It is corresponding to obtain the auth type so that the user terminal is according to the auth type in auth type instruction for type instruction Biological information;
Biological information is received, the biological information is authenticated, it is whole to the user after certification passes through End sends authentication success message.
Wherein, the reception biological information, the step of certification to the biological information further include: if recognizing Card failure, then to the user terminal return authentication failure information.
Wherein, after described the step of sending authentication success message to the user terminal, further include, it is whole to the user Corresponding IP address is held to open gateway outlet, so that user terminal visit passes through the gateway access network.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, the program The step of method as provided by above-mentioned first aspect is realized when being executed by processor.
The embodiment of the present invention also provides a kind of user terminal, comprising:
At least one processor;And at least one processor being connected to the processor, in which: the memory is deposited The program instruction that can be executed by the processor is contained, the processor calls described program instruction to be able to carry out such as above-mentioned first Method provided by aspect.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, the program The step of method as provided by above-mentioned second aspect is realized when being executed by processor.
The embodiment of the present invention also provides a kind of certificate server, comprising:
At least one processor;And at least one processor being connected to the processor, in which: the memory is deposited The program instruction that can be executed by the processor is contained, the processor calls described program instruction to be able to carry out such as above-mentioned second Method provided by aspect.
Network access verifying method provided in an embodiment of the present invention based on bio-identification, expands in Portal authentication techniques Biological identification technology is opened up, the legitimacy of accessing user is judged using the method for bio-identification, so that the user in network connects Enter more safe and reliable.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of flow chart of the network access verifying method based on bio-identification provided in an embodiment of the present invention;
Fig. 2 is a kind of certificate server of the network access verifying method based on bio-identification provided in an embodiment of the present invention Flow diagram;
Fig. 3 is that a kind of another process of the network access verifying method based on bio-identification provided in an embodiment of the present invention is shown It is intended to;
Fig. 4 is a kind of structural schematic diagram of user terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of certificate server provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
With reference to Fig. 1, Fig. 1 is a kind of stream of the network access verifying method based on bio-identification provided in an embodiment of the present invention Cheng Tu, provided method include:
S1 sends authentication request packet to certificate server, receives the auth type instruction that the certificate server returns.
S2 obtains the corresponding biological characteristic letter of the auth type according to the auth type in auth type instruction Breath, and the biological information is sent to the certificate server, so that the certificate server is to the biological characteristic Information is authenticated.
Specifically, certification terminal initiates Portal certification first during a Portal authenticates network insertion, to Certificate server sends authentication request packet, and certificate server responds asking for user terminal after receiving authentication request packet Message is sought, certificate server returns to the message for carrying authentication mode type.
User terminal is after receiving the message for carrying authentication mode type, the certification class that is referred to according to type in message Type, obtains corresponding biological information, such as when type value is 1, and expression needs face characteristic as biological information, When type value is 2, expression needs fingerprint characteristic as biological information.
User terminal pre-processes by carrying out biometric scan and generates corresponding biological condition code as biological characteristic Information is sent to certificate server, and so that certificate server verifies user terminal, certificate server believes biological characteristic Breath, is compared with the information stored in property data base, judges whether the biological information is legal, while return authentication knot Fruit is to user terminal, if certification passes through, network can be accessed by authenticating terminal;Otherwise refusal certification accessing terminal to network.
Method provided by the invention extends biological identification technology in Portal authentication techniques, uses the side of bio-identification Method judges the legitimacy of accessing user, so that user's access in network is more safe and reliable.
On the basis of the above embodiments, the corresponding biological information of the auth type includes at least: face characteristic One of information, fingerprint feature information, palm print characteristics information, voice characteristics information and iris feature information are a variety of.
Specifically, certification terminal needs to facilitate scanning and obtains target biological feature, including but not limited to following identification One kind of technology or combinations thereof: recognition of face, fingerprint recognition, personal recognition, speech recognition, iris recognition etc., certificate server It can be the combination of single biological information or a variety of biological informations in the auth type instruction of return.
On the basis of the above embodiments, described the step of obtaining the auth type corresponding biological information, is specific Include:
The raw information for receiving user biological feature, pre-processes the raw information of the biological characteristic, is given birth to Object condition code;
The biological condition code is encrypted, obtains encrypted biological condition code, and by the encrypted biology Condition code is as the biological information.
Specifically, certification terminal includes biometric scan module, biological characteristic preprocessing module, communication module and other Module.Wherein biometric scan module is used to obtain the raw information of user biological feature, and carries out by preprocessing module The associated biomolecule condition code that can communicate and identify is handled, this feature code need to meet unforgeable and privacy.
With reference to Fig. 2, Fig. 2 is a kind of recognizing for network access verifying method based on bio-identification provided in an embodiment of the present invention Server flow diagram is demonstrate,proved, provided method includes:
S21 receives the request message that user terminal is sent, and according to the request message, recognizes to user terminal transmission Type instruction is demonstrate,proved, so that the user terminal is according to the auth type in auth type instruction, obtains the auth type Corresponding biological information;
S22 receives biological information, authenticates to the biological information, to the use after certification passes through Family terminal sends authentication success message.
Specifically, certificate server responds the request, authentication service after the request message for receiving user terminal transmission Device returns to the message for carrying authentication mode type, and wherein type is the traditional user name cipher mechanism of 0 expression, and 1 is recognition of face, 2 be fingerprint recognition, and so on, if type > 0, user terminal takes correlated characteristic code using corresponding biometric discrimination method; Otherwise, user name password is inputted;User terminal receive certificate server response information after, by IP address, MAC Address, User name password or biological condition code are sent to certificate server, and certificate server judges user name password or biological information Whether legal, if legal, then notification gateway opens gateway outlet to the IP address, and subsequent certificate server return authentication is successfully believed It ceases to user terminal, the accessible outside network resource of user terminal.
By the method, biological identification technology is extended in Portal authentication techniques, is judged using the method for bio-identification The legitimacy of accessing user, so that user's access in network is more safe and reliable.
On the basis of the above embodiments, the reception biological information, authenticates the biological information The step of further include: if authentification failure, to the user terminal return authentication failure information.
After described the step of sending authentication success message to the user terminal, further include, to the user terminal pair The IP address answered opens gateway outlet, so that user terminal visit passes through the gateway access network.
Specifically, saving the associated biomolecule condition code information of all legitimate users in certificate server, ratio can be passed through The biological condition code to be identified that send to user terminal simultaneously judges whether it is legal, and then direct return authentication loses if it is illegal Lose information.
With reference to Fig. 3, Fig. 3 be a kind of network access verifying method based on bio-identification provided in an embodiment of the present invention again One flow diagram, wherein entire Verification System is divided into certification two parts of terminal and certificate server.
Authenticating terminal includes biometric scan module, biological characteristic preprocessing module, communication module and other modules.Its Middle biometric scan module is used to obtain the raw information of user biological feature, and is handled to obtain by preprocessing module The associated biomolecule condition code that can communicate and identify, this feature code need to meet unforgeable and privacy;Communication module For being communicated with certificate server;Other modules refer to the other required functional modules of certification terminal.
Certificate server includes biological characteristic storing data library, biological characteristic recognition module, communication module and other modules. Biological characteristic storing data library saves the associated biomolecule condition code information of all legitimate users;Biological characteristic recognition module is used to It compares the biological condition code to be identified that certification terminal is sent and judges whether it is legal;Communication module is used to and certification terminal Communication;Other modules refer to the other required functional modules of certificate server.
The detailed process of network access verifying method based on bio-identification is as follows, and certification terminal initiates Portal certification, Certificate server responds the request, and certification terminal carries out biometric scan, pretreatment and generates corresponding biological condition code;Recognize It demonstrate,proves terminal and encrypted biological condition code is sent to certificate server by communication module;Certificate server is through living things feature recognition Module is compared with property data base, judges whether this feature code is legal;Certificate server return authentication result is whole to certification End;If certification passes through, network can be accessed by authenticating terminal;Otherwise refusal certification accessing terminal to network.
Fig. 4 illustrates a kind of structural schematic diagram of user terminal, as shown in figure 4, the server may include: processor (processor) 410, memory (memory) 430 and bus 440, wherein processor 410, memory 430 pass through bus 440 Complete mutual communication.Processor 410 can call the logical order in memory 430, to execute following method: to certification Server sends authentication request packet, receives the auth type instruction that the certificate server returns;According to the auth type Auth type in instruction obtains the corresponding biological information of the auth type, and the biological information is sent To the certificate server, so that the certificate server authenticates the biological information;Receive the certification clothes The authentication success message that business device is sent.
The present embodiment also provides a kind of computer program product, and the computer program product includes being stored in non-transient meter Computer program on calculation machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is counted When calculation machine executes, computer is able to carry out method provided by above-mentioned each method embodiment, for example, sends out to certificate server Authentication request packet is sent, the auth type instruction that the certificate server returns is received;According in auth type instruction Auth type, obtains the corresponding biological information of the auth type, and the biological information is sent to and described is recognized Server is demonstrate,proved, so that the certificate server authenticates the biological information;The certificate server is received to send Authentication success message.
The present embodiment provides a kind of non-transient computer readable storage medium, the non-transient computer readable storage medium Computer instruction is stored, the computer instruction makes the computer execute method provided by above-mentioned each method embodiment, example Such as include: to send authentication request packet to certificate server, receives the auth type instruction that the certificate server returns;According to Auth type in auth type instruction, obtains the corresponding biological information of the auth type, and by the biology Characteristic information is sent to the certificate server, so that the certificate server authenticates the biological information;It connects Receive the authentication success message that the certificate server is sent.
Fig. 5 illustrates a kind of structural schematic diagram of certificate server, as shown in figure 5, the server may include: processor (processor) 510, memory (memory) 530 and bus 540, wherein processor 510, memory 530 pass through bus 540 Complete mutual communication.Processor 510 can call the logical order in memory 530, to execute following method: receiving and use The request message that family terminal is sent sends auth type instruction to the user terminal, for described according to the request message User terminal obtains the corresponding biological information of the auth type according to the auth type in auth type instruction; Biological information is received, the biological information is authenticated, is recognized after certification passes through to user terminal transmission Demonstrate,prove successful information.
The present embodiment also provides a kind of computer program product, and the computer program product includes being stored in non-transient meter Computer program on calculation machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is counted When calculation machine executes, computer is able to carry out method provided by above-mentioned each method embodiment, for example, receives user terminal hair The request message sent sends auth type instruction to the user terminal, for the user terminal according to the request message According to the auth type in auth type instruction, the corresponding biological information of the auth type is obtained;Receive biology Characteristic information authenticates the biological information, authenticates after certification passes through to user terminal transmission and successfully believes Breath.
The present embodiment provides a kind of non-transient computer readable storage medium, the non-transient computer readable storage medium Computer instruction is stored, the computer instruction makes the computer execute method provided by above-mentioned each method embodiment, example Such as include: the request message for receiving user terminal and sending, according to the request message, sends auth type to the user terminal It is corresponding to obtain the auth type so that the user terminal is according to the auth type in auth type instruction for instruction Biological information;Biological information is received, the biological information is authenticated, to the use after certification passes through Family terminal sends authentication success message.
The apparatus embodiments described above are merely exemplary, wherein described, unit can as illustrated by the separation member It is physically separated with being or may not be, component shown as a unit may or may not be physics list Member, it can it is in one place, or may be distributed over multiple network units.It can be selected according to the actual needs In some or all of the modules achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness Labour in the case where, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation Method described in certain parts of example or embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of network access verifying method based on bio-identification characterized by comprising
Authentication request packet is sent to certificate server, receives the auth type instruction that the certificate server returns;
According to the auth type in auth type instruction, the corresponding biological information of the auth type is obtained, and will The biological information is sent to the certificate server, so that the certificate server carries out the biological information Certification;
Receive the authentication success message that the certificate server is sent.
2. the method according to claim 1, wherein the corresponding biological information of the auth type at least wraps It includes: one of face characteristic information, fingerprint feature information, palm print characteristics information, voice characteristics information and iris feature information Or it is a variety of.
3. the method according to claim 1, wherein described obtain the corresponding biological characteristic letter of the auth type The step of breath, specifically includes:
The raw information for receiving user biological feature, pre-processes the raw information of the biological characteristic, and it is special to obtain biology Levy code;
The biological condition code is encrypted, obtains encrypted biological condition code, and by the encrypted biological characteristic Code is used as the biological information.
4. a kind of network access verifying method based on bio-identification characterized by comprising
The request message that user terminal is sent is received, according to the request message, auth type is sent to the user terminal and refers to It enables, so that the user terminal is according to the auth type in auth type instruction, obtains the corresponding life of the auth type Object characteristic information;
Biological information is received, the biological information is authenticated, is sent out after certification passes through to the user terminal Send authentication success message.
5. according to the method described in claim 4, it is characterized in that, the reception biological information, to the biological characteristic The step of information is authenticated further include: if authentification failure, to the user terminal return authentication failure information.
6. according to the method described in claim 4, it is characterized in that, described send authentication success message to the user terminal It after step, further include that gateway outlet is opened to the corresponding IP address of the user terminal, so that user terminal visit passes through The gateway access network.
7. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The step of method as described in any in claims 1 to 3 is realized when row.
8. a kind of user terminal characterized by comprising
At least one processor;And at least one processor being connected to the processor, in which:
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to instruct energy Enough methods executed as described in claims 1 to 3 is any.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The step of method as described in any in claim 4 to 6 is realized when row.
10. a kind of certificate server characterized by comprising
At least one processor;And at least one processor being connected to the processor, in which:
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to instruct energy Enough methods executed as described in claim 4 to 6 is any.
CN201811221453.1A 2018-10-19 2018-10-19 A kind of network access verifying method based on bio-identification Pending CN109246133A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811221453.1A CN109246133A (en) 2018-10-19 2018-10-19 A kind of network access verifying method based on bio-identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811221453.1A CN109246133A (en) 2018-10-19 2018-10-19 A kind of network access verifying method based on bio-identification

Publications (1)

Publication Number Publication Date
CN109246133A true CN109246133A (en) 2019-01-18

Family

ID=65080730

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811221453.1A Pending CN109246133A (en) 2018-10-19 2018-10-19 A kind of network access verifying method based on bio-identification

Country Status (1)

Country Link
CN (1) CN109246133A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111178140A (en) * 2019-12-05 2020-05-19 航天信息股份有限公司 Biometric identification system and biometric identification method
CN111274563A (en) * 2020-01-07 2020-06-12 腾讯科技(深圳)有限公司 Security authentication method and related device
CN112084479A (en) * 2020-09-15 2020-12-15 成都知道创宇信息技术有限公司 Website attack interception method, device, server and storage medium
CN113726797A (en) * 2021-09-01 2021-11-30 世纪龙信息网络有限责任公司 Safe login method, system and account management device
CN116402510A (en) * 2023-04-14 2023-07-07 广东车卫士信息科技有限公司 Non-inductive payment method, medium and equipment based on high concurrency network service

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227278A (en) * 2007-01-18 2008-07-23 中国科学院自动化研究所 Method and system of remote network identification authenticating based on multiple biology characteristics
CN105245529A (en) * 2015-10-21 2016-01-13 四川省宁潮科技有限公司 User biological characteristic code-based distributed authentication method, terminal and system
CN107079034A (en) * 2016-11-15 2017-08-18 深圳达闼科技控股有限公司 A kind of identity authentication method, terminal device, certificate server and electronic equipment
CN107864476A (en) * 2017-11-08 2018-03-30 上海创功通讯技术有限公司 The access authentication method and terminal of a kind of wireless network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227278A (en) * 2007-01-18 2008-07-23 中国科学院自动化研究所 Method and system of remote network identification authenticating based on multiple biology characteristics
CN105245529A (en) * 2015-10-21 2016-01-13 四川省宁潮科技有限公司 User biological characteristic code-based distributed authentication method, terminal and system
CN107079034A (en) * 2016-11-15 2017-08-18 深圳达闼科技控股有限公司 A kind of identity authentication method, terminal device, certificate server and electronic equipment
CN107864476A (en) * 2017-11-08 2018-03-30 上海创功通讯技术有限公司 The access authentication method and terminal of a kind of wireless network

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111178140A (en) * 2019-12-05 2020-05-19 航天信息股份有限公司 Biometric identification system and biometric identification method
CN111274563A (en) * 2020-01-07 2020-06-12 腾讯科技(深圳)有限公司 Security authentication method and related device
CN112084479A (en) * 2020-09-15 2020-12-15 成都知道创宇信息技术有限公司 Website attack interception method, device, server and storage medium
CN113726797A (en) * 2021-09-01 2021-11-30 世纪龙信息网络有限责任公司 Safe login method, system and account management device
CN116402510A (en) * 2023-04-14 2023-07-07 广东车卫士信息科技有限公司 Non-inductive payment method, medium and equipment based on high concurrency network service
CN116402510B (en) * 2023-04-14 2024-01-30 广东车卫士信息科技有限公司 Non-inductive payment method, medium and equipment based on high concurrency network service

Similar Documents

Publication Publication Date Title
CN109246133A (en) A kind of network access verifying method based on bio-identification
O'Gorman Comparing passwords, tokens, and biometrics for user authentication
Pinkas et al. Securing passwords against dictionary attacks
CN110677252A (en) RCS combined block chain identity model and safety personal identification information data transmission model
CN107257336A (en) A kind of user authen method and system
US20070113090A1 (en) Access control system based on a hardware and software signature of a requesting device
CN105357186B (en) A kind of secondary authentication method based on out-of-band authentication and enhancing OTP mechanism
US20100107228A1 (en) Ip address secure multi-channel authentication for online transactions
CN111931144A (en) Unified safe login authentication method and device for operating system and service application
Parmar et al. A comprehensive study on passwordless authentication
CN110661800A (en) Multi-factor identity authentication method supporting guarantee level
CN111027035A (en) Multi-identity authentication method and system based on block chain
CN107733636A (en) Authentication method and Verification System
CN109150547A (en) A kind of system and method for the digital asset real name registration based on block chain
CN107113613A (en) Server, mobile terminal, real-name network authentication system and method
US8635454B2 (en) Authentication systems and methods using a packet telephony device
Al Rousan et al. A comparative analysis of biometrics types: literature review
CN106888091A (en) Trustable network cut-in method and system based on EAP
EP2082518A2 (en) Access control system based on a hardware and software signature of a requesting device
CN113301028B (en) Gateway protection method and data labeling method
CN112822176B (en) Remote APP identity authentication method
US9686270B2 (en) Authentication systems and methods using a packet telephony device
CN111756721B (en) Associated authentication method and device, IAM server and readable storage medium
CN113343278B (en) Login request verification method and device for preventing CSRF attack
US7631344B2 (en) Distributed authentication framework stack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190118

RJ01 Rejection of invention patent application after publication