CN109711134A - Network-based user identity anti-theft system, method, equipment and storage medium - Google Patents

Network-based user identity anti-theft system, method, equipment and storage medium Download PDF

Info

Publication number
CN109711134A
CN109711134A CN201811628086.7A CN201811628086A CN109711134A CN 109711134 A CN109711134 A CN 109711134A CN 201811628086 A CN201811628086 A CN 201811628086A CN 109711134 A CN109711134 A CN 109711134A
Authority
CN
China
Prior art keywords
user
information
network
identity
user identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811628086.7A
Other languages
Chinese (zh)
Other versions
CN109711134B (en
Inventor
李映
范滢
郑建兵
王春荣
谈鹏程
李恺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Jiangsu Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Jiangsu Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Jiangsu Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201811628086.7A priority Critical patent/CN109711134B/en
Publication of CN109711134A publication Critical patent/CN109711134A/en
Application granted granted Critical
Publication of CN109711134B publication Critical patent/CN109711134B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to a kind of network-based user identity anti-theft system, method, equipment and storage mediums, the system includes: multiple working groups parallel with one another, each working group includes: type identity information collecting device, for obtaining the identity information of user, and acquires the biological information of user;At least one network terminal, connects with type identity information collecting device, and the network terminal is used to obtain the network login password information of user setting;Cloud database service platform is connect by network with multiple workgroup communications, and cloud database service platform is used to generate the user identity identification coding of user, and user identity identification coding is pushed to the network terminal;Whether the network terminal is further used for, be stolen according to the identity information of user identity identification code verification user.The present invention is it is possible to prevente effectively from user identity such as usurps, falsely uses at menace networks user security and the safe phenomenon generation of networking operational environment.

Description

Network-based user identity anti-theft system, method, equipment and storage medium
Technical field
The present invention relates to information systems and technical field of network security, more particularly to a kind of network-based user identity Anti-theft system and method, network-based user identity identification code generating method, equipment and storage medium.
Background technique
Currently with the promotion and application of the network information technology, numerous business activities be required to by based on network into Row also causes currently in carrying out network activity simultaneously although greatly facilitating the network user and improving work efficiency, Criminal, opportunist etc. usurp network subscriber information and carry out illegal activity, cause heavy losses to user, seriously affect The safety and reliability of network system operation, causes great Socie-economic loss and severe social influence.
Current main counter-measure is often to complicate and improve secrecy journey to the identity validation password of user Degree, but produce little effect, and user network service password management difficulty is caused to increase.Meanwhile it usurping, emitting for user identity occurs With etc. illegal network operation, also effectively the identity for usurping user information personnel effectively can not be confirmed, thus to subsequent Management work of tracing have caused great difficulties.
Summary of the invention
The object of the present invention is to provide a kind of network-based user identity anti-theft system and methods, network-based use Family pincode generation method, the user identity method for preventing fraudulent-using can effectively prevent the identity information of user to answer in network It is stolen in.
On the one hand, the embodiment of the invention provides a kind of network-based user identity anti-theft systems comprising: mutually Multiple working groups in parallel, each working group includes: type identity information collecting device, for obtaining the identity information of user, and is adopted Collect the biological information of user;At least one network terminal, connects with type identity information collecting device, and the network terminal is for obtaining The network login password information of user setting;Cloud database service platform is connect by network with multiple workgroup communications, cloud number It is used to store the identity information and corresponding biological information of the user of type identity information collecting device acquisition according to library service platform, And biological information is collected as digital watermarking encoded information;Cloud database service platform is further used for storage user and passes through The network login password information of network terminal setting, and digital watermarking encoded information is embedded into network login password information, To generate the user identity identification coding of user, and user identity identification coding is pushed into the network terminal;The network terminal is into one Whether step is used for, be stolen according to the identity information of user identity identification code verification user.
One side according to an embodiment of the present invention, cloud database service platform are further used for, by the user setting of storage Network login password information generate list, and establish index point for network login password information, network login password passes through The digital watermarking encoded information of index point and user correspond.
One side according to an embodiment of the present invention, the network terminal are further used for, and the network login for obtaining user's input is close Code information;According to the user identity identification coding of network login password information inquiry storage, to obtain user identity identification coding In digital watermarking encoded information;The biological information of the user of type identity information collecting device acquisition is obtained, and will be biological special Reference breath is compared with digital watermarking encoded information, to confirm whether the identity information of user is stolen.
One side according to an embodiment of the present invention, the network terminal are further used for, if biological information and digital water Encoded information matching is printed, then confirms that the identity information of user is not stolen, authorized user operates the network terminal;If biological characteristic Information and digital watermarking encoded information mismatch, then confirm that the identity information of user is stolen, limit the user's operation network terminal, And the biological information of the user of acquisition is subjected to caching process.
One side according to an embodiment of the present invention, cloud database service platform are further used for, and receive identity information acquisition The respective hardware identification coding and software identification coding that device and the network terminal are sent, based on the received hardware identification coding and Software identification coding carries out unified compilation, and with generating independent communication IP respectively for type identity information collecting device and the network terminal Location, to realize communication connection.
One side according to an embodiment of the present invention, type identity information collecting device is with the biological characteristic of preset frequency acquisition user Biological information is compared with digital watermarking encoded information with preset frequency for information, the network terminal, to confirm user's Whether identity information is stolen.
On the other hand, the embodiment of the invention also provides a kind of network-based user identity anti-theft systems comprising: Obtain the network login password information that user inputs in the network terminal;Network terminal storage is inquired according to network login password information User identity identification coding, with obtain user identity identification coding in digital watermarking encoded information, user identity identification compile Code is embedded into network login password information by the digital watermarking encoded information that the biological information of user collects to be generated;Acquisition The biological information of user;Biological information is compared with digital watermarking encoded information, to confirm the identity of user Whether information is stolen.
One side according to an embodiment of the present invention, user identity method for preventing fraudulent-using further comprises: if biological characteristic is believed Breath is matched with digital watermarking encoded information, then confirms that the identity information of user is not stolen, and authorized user operates the network terminal;Such as Fruit biological information and digital watermarking encoded information mismatch, then confirm that the identity information of user is stolen, limitation user behaviour Make the network terminal, and the biological information of the user of acquisition is subjected to caching process.
One side according to an embodiment of the present invention, user identity method for preventing fraudulent-using further comprises: being acquired with preset frequency The biological information of user, and biological information is compared with digital watermarking encoded information with preset frequency, with true Whether the identity information for recognizing user is stolen.
On the other hand, the embodiment of the invention also provides a kind of network-based user identity identification code generating method, Comprising: obtain the identity information of user;According to the biological information of identity information acquisition user, and by biological information Compilation is digital watermarking encoded information;The network login password information of user setting is obtained according to identity information;By digital watermarking Encoded information is embedded into network login password information, to generate user identity identification coding.
One side according to an embodiment of the present invention, digital watermarking encoded information is embedded into network login password information, It include: to believe the identity information of user, digital watermarking encoded information and network login password to generate user identity identification coding Breath is encoded respectively, to generate corresponding data segment encoded information;Corresponding data segment encoded information is generated first respectively Data acquisition system, the second data set and third data acquisition system;First data acquisition system and the second data set are subjected to Hash operation, To obtain the first cryptographic Hash;First data acquisition system and third data acquisition system are subjected to Hash operation, to obtain the second cryptographic Hash;It will First cryptographic Hash and the second cryptographic Hash carry out modular arithmetic, to generate multiple watermark datas;Multiple watermark datas are randomly-embedded In the data segment encoded information of network login password information, to generate user identity identification coding.
On the other hand, the embodiment of the invention also provides a kind of network-based user identity anti-theft equipment, comprising: deposits Reservoir is stored with computer program instructions;Processor is realized foregoing when computer program instructions are executed by processor Network-based user identity method for preventing fraudulent-using and network-based user identity identification code generating method.
On the other hand, the embodiment of the invention also provides a kind of computer storage medium, computer readable storage medium packets Instruction is included, when instruction is run on computers, so that the foregoing network-based user identity of computer execution is antitheft With method and network-based user identity identification code generating method.
Network-based user identity anti-theft system provided in an embodiment of the present invention and method, pass through cloud database service The identity information and biological information for the user that platform stores type identity information collecting device generate digital watermarking encoded information, And digital watermarking encoded information is embedded into generation user's body in the network login password information that user is arranged on the network terminal Part identification coding, to form multistage password preservation management system, to realize the efficient knot between biological characteristic and dynamic password Operation is closed, the precision of user identity authenticity verification operation is improved, user identity is effectively prevented and the prestige such as usurps, falsely uses It coerces network user's safety and the safe phenomenon of networking operational environment occurs.
Detailed description of the invention
The feature, advantage and technical effect of exemplary embodiment of the present described below with reference to the accompanying drawings.
Fig. 1 is a kind of diagrammatic view in principle frame of network-based user identity anti-theft system provided in an embodiment of the present invention Figure;
Fig. 2 is a kind of flow diagram of network-based user identity method for preventing fraudulent-using provided in an embodiment of the present invention;
Fig. 3 is a kind of flow chart element of network-based user identity identification code generating method provided in an embodiment of the present invention Figure.
Specific embodiment
Embodiments of the present invention are described in further detail with reference to the accompanying drawings and examples.Following embodiment it is detailed Thin description and attached drawing cannot be used to limit the scope of the invention for illustratively illustrating the principle of the present invention, i.e., of the invention It is not limited to described embodiment.
In the description of the present invention, it should be noted that unless otherwise indicated, term " first ", " second ", " third " etc. It is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
For a better understanding of the present invention, below with reference to Fig. 1 to Fig. 3 to network-based user's body of the embodiment of the present invention Part anti-theft system and method are described in detail.
Refering to fig. 1, the embodiment of the invention provides a kind of network-based user identity anti-theft system, the user identity Anti-theft system includes: multiple working groups 10 parallel with one another and the cloud data by network and the communication connection of multiple working groups 10 Library service platform 20.
Each working group 10 includes the type identity information collecting device 11 and at least one Network Termination #1 2 being serially connected.
Type identity information collecting device 11 is used to obtain the identity information of user, and acquires the biological information of user.Its In, the identity information of user includes but is not limited to the much informations such as the name of user, ID card No., phone number, and biology is special Reference breath include but is not limited to the finger print information of user, acoustic information, facial information, in iris information both at least.
The network terminal 20 can for personal computer, industrial computer, in intelligent movable communicating terminal any one or The more persons of person share.Network Termination #1 2 is used to obtain the network login password information of user setting.The network login password information is Data structure based on character and/or image.
Cloud database service platform 20 is that each user establishes identity identification information memory space, for storing identity information The identity information and corresponding biological information for the user that acquisition device 11 acquires, and be number by biological information compilation Watermark encoder information.The acquisition of the biological information of user can carry out at random, and no fixed collection point is also set without fixed acquisition It is standby, it is easy to operate, flexible.
Cloud database service platform 20 further establishes network login password memory space for each user, uses for storing Family passes through the network login password information that Network Termination #1 2 is arranged, and digital watermarking encoded information is embedded into network login password In information, to generate user identity identification coding, and user identity identification coding is pushed into Network Termination #1 2.
User identity identification is encoded to the digital information and program code of non-state in kind, by digital watermarking coding and net Network login password two parts are constituted, and the two is carrying out backup and data encoding processing based on cloud database service platform 20, On the one hand family pincode can be used can effectively be updated in time, and update convenient rapid, another aspect Avoid " entity certificate " needs carry it is equal caused by it is inconvenient for use, meet current internet technology and information network interact Etc. technologies rapid development needs.
Whether Network Termination #1 2 is further used for, be stolen according to the identity information of user identity identification code verification user With.Cloud database service platform 20 also establishes identity code memory space for each user, knows for storing the user identity It does not encode.
Above-mentioned digital watermarking encoded information and network login password information are directly completed to deposit in cloud database service platform Storage, coding, compilation operation and user identity authentication can effectively improve data centralized management and data managerial flexibility and precision While, data-handling capacity and leakage prevention capability can also be effectively improved, the peace of user's ID authentication information management is improved Complete and reliability.
Network-based user identity anti-theft system provided in an embodiment of the present invention, passes through cloud database service platform 20 The identity information and biological information for the user that type identity information collecting device 11 is stored generate digital watermarking encoded information, and Digital watermarking encoded information is embedded into generation user's body in the network login password information that user is arranged on Network Termination #1 2 Part identification coding, to form multistage password preservation management system, to realize the efficient knot between biological characteristic and dynamic password Operation is closed, the precision of user identity authenticity verification operation is improved, user identity is effectively prevented and the prestige such as usurps, falsely uses It coerces network user's safety and the safe phenomenon of networking operational environment occurs.
In addition, cloud database service platform 20 is further used for, by the network login password of multiple user settings of storage Information generates list, and establishes index point for each network login password information, network login password by index point with The digital watermarking encoded information of user corresponds, whereby it was confirmed that whether the identity information of multiple users is stolen.
Network login password in user identity identification coding is shown in Network Termination #1 2 to be exported, user identity identification coding In digital watermarking coding as back-end data run.Network Termination #1 2 is further used for, and the network for obtaining user's input logs in Encrypted message;According to the user identity identification coding of network login password information inquiry storage, to obtain user identity identification volume Digital watermarking encoded information in code;The biological information of the user of type identity information collecting device acquisition is obtained, and will be biological Characteristic information is compared with digital watermarking encoded information, to confirm whether the identity information of user is stolen.
Network Termination #1 2 is further used for, if biological information is matched with digital watermarking encoded information, confirms use The identity information at family is not stolen, and authorized user operates Network Termination #1 2;If biological information and digital watermarking coding are believed Breath mismatches, then confirms that the identity information of user is stolen, limits user's operation Network Termination #1 2, and by the life of the user of acquisition Object characteristic information carries out caching process.For example, at least one week time of caching, may be implemented to usurp the behavior of user identity into Row effective monitoring, and it is subsequent trace equal durings full and accurate data information is provided, realize and usurp, emit user identity occurs With phenomena such as when, the biological characteristic for usurping, falsely using user's body information personnel is acquired, convenient for subsequent relevant departments carry out into One step is traced, thus greatly improve trace management operation precision and efficiency, improve the network operation safety and can By property.
In order to further increase the accuracy of identity information verifying, type identity information collecting device 11 is acquired with preset frequency and is used The biological information at family, Network Termination #1 2 are compared biological information and digital watermarking encoded information with preset frequency It is right, to confirm whether the identity information of user is stolen.Such as with the preset frequency of 1-5 times/hour to the identity information of user Whole process dynamic monitoring is carried out, thus while improving authentication flexibility, also by the dynamic of user identity identification coding Update has been effectively prevented " entity certificate " incident leakage of information, stolen risk.
In addition, cloud database service platform 20 is further used for, type identity information collecting device 11 and Network Termination #1 2 are received Send respective hardware identification coding and software identification coding, based on the received hardware identification coding and software identification encode into The unified compilation of row, and independent communication IP address is generated respectively for type identity information collecting device and the network terminal, to realize communication Connection.
Referring to Fig.2, the embodiment of the invention also provides a kind of network-based user identity method for preventing fraudulent-using comprising:
Step S1: the network login password information that user inputs in the network terminal is obtained;
Step S2: encoding according to the user identity identification that network login password information inquires network terminal storage, to obtain Digital watermarking encoded information in user identity identification coding, user identity identification is encoded to be collected by the biological information of user Digital watermarking encoded information be embedded into network login password information and generate;
Step S3: the biological information of user is acquired;
Step S4: biological information is compared with digital watermarking encoded information, to confirm the identity information of user Whether it is stolen.
Further, in step S4, confirm whether the identity information of user is stolen further include:
Step S41: if biological information is matched with digital watermarking encoded information, confirm the identity information of user not Stolen, authorized user operates the network terminal;
Step S42: if biological information and digital watermarking encoded information mismatch, confirm the identity information of user It is stolen, the user's operation network terminal is limited, and the biological information of the user of acquisition is subjected to caching process.
In addition, user identity method for preventing fraudulent-using further comprises: with the biological information of preset frequency acquisition user, and Biological information is compared with digital watermarking encoded information with preset frequency, with confirm user identity information whether by It usurps.Such as whole process dynamic monitoring is carried out with identity information of the frequency of 1-5 times/hour to user, to be tested improving identity While demonstrate,proving flexibility, it is incident that " entity certificate " has been effectively prevented also by the dynamic update of user identity identification coding Leakage of information, stolen risk.
Refering to Fig. 3, the embodiment of the invention also provides a kind of network-based user identity identification code generating method, Include:
Step S21: the identity information of user is obtained;
Step S22: being number according to the biological information of identity information acquisition user, and by biological information compilation Watermark encoder information;
Step S23: the network login password information of user setting is obtained according to identity information;
Step S24: digital watermarking encoded information is embedded into network login password information, to generate user identity identification Coding.
Further, in step S24, digital watermarking encoded information is embedded into network login password information, to generate User identity identification encodes
Step S241: the identity information of user, digital watermarking encoded information and network login password information are carried out respectively Coding, to generate corresponding data segment encoded information.Identity information, network login password information and the digital watermark encoder of user Information can collect as based on any one data segment encoded information in binary system, octal system and hexadecimal.
Step S242: corresponding data segment encoded information is generated into the first data acquisition system, the second data set and respectively Three data acquisition systems;
Step S243: the first data acquisition system and the second data set are subjected to Hash operation, to obtain the first cryptographic Hash;
Step S244: the first data acquisition system and third data acquisition system are subjected to Hash operation, to obtain the second cryptographic Hash;
Step S245: the first cryptographic Hash and the second cryptographic Hash are subjected to modular arithmetic, to generate multiple watermark datas;
Step S246: multiple watermark datas being randomly-embedded in the data segment encoded information of network login password information, To generate user identity identification coding, to complete coding compilation operation and obtain complete user identity identification coding.
Further, in step S245, the first cryptographic Hash and the second cryptographic Hash are subjected to modular arithmetic, to generate multiple watermarks Data include: that the first cryptographic Hash and the second cryptographic Hash are done modular arithmetic to watermark length, according to remainder to all carrier elements Grouping, obtains T=[T0, T1, T2... ... TL-1].Wherein, L is watermark length, and T is carrying group, and Arabic numerals are T carrying The corresponding watermark bit number of group.
It is understood that network-based user identity method for preventing fraudulent-using provided in an embodiment of the present invention and be based on network Pincode generation method using network-based user identity anti-theft system above-mentioned as executing subject, be based on network User identity method for preventing fraudulent-using and network-based pincode generation method content especially by network-based Each device of user identity anti-theft system realizes that details are not described herein.
In addition, the embodiment of the invention also provides a kind of network-based user identity anti-theft equipment, comprising: storage Device is stored with computer program instructions;Processor realizes foregoing base when computer program instructions are executed by processor In the user identity method for preventing fraudulent-using and network-based user identity identification code generating method of network.
In addition, computer readable storage medium includes referring to the embodiment of the invention also provides a kind of computer storage medium It enables, when instruction is run on computers, so that computer executes foregoing network-based user identity anti-theft side Method and network-based user identity identification code generating method.
Although by reference to preferred embodiment, invention has been described, the case where not departing from the scope of the present invention Under, various improvement can be carried out to it and can replace component therein with equivalent.Especially, as long as there is no structures to rush Prominent, items technical characteristic mentioned in the various embodiments can be combined in any way.The invention is not limited to texts Disclosed in predetermined embodiment, but include all technical solutions falling within the scope of the claims.

Claims (13)

1. a kind of network-based user identity anti-theft system, which is characterized in that the user identity anti-theft system includes:
Multiple working groups parallel with one another, each working group include:
Type identity information collecting device for obtaining the identity information of user, and acquires the biological information of the user;
At least one network terminal is connected with the type identity information collecting device, and the network terminal is for obtaining the user The network login password information of setting;
Cloud database service platform is connect by network with the multiple workgroup communications,
The cloud database service platform is used to store the identity information of the user of the type identity information collecting device acquisition And corresponding biological information, and the biological information is collected as digital watermarking encoded information;The cloud database Service platform is further used for storing the network login password information that is arranged by the network terminal of user, and by the number Watermark encoder information is embedded into the network login password information, to generate the user identity identification coding of user, and by institute It states user identity identification coding and pushes to the network terminal;
Whether the network terminal is further used for, be stolen according to the identity information of the user identity identification code verification user With.
2. user identity anti-theft system according to claim 1, which is characterized in that the cloud database service platform into One step is used for, and the network login password information of the user setting of storage is generated list, and be the network login password Information establishes index point, the digital watermarking encoded information that the network login password passes through the index point and user It corresponds.
3. user identity anti-theft system according to claim 1, which is characterized in that the network terminal is further used In the network login password information of acquisition user's input;According to the user of network login password information inquiry storage Pincode, to obtain the digital watermarking encoded information in the user identity identification coding;Obtain the identity The biological information of the user of information collecting device acquisition, and the biological information and the digital watermarking are compiled Code information is compared, to confirm whether the identity information of the user is stolen.
4. user identity anti-theft system according to claim 3, which is characterized in that the network terminal is further used In confirming the identity information of the user not if the biological information is matched with the digital watermarking encoded information It is stolen, authorize the network terminal described in the user's operation;If the biological information and digital watermarking coding are believed Breath mismatches, then confirms that the identity information of the user is stolen, limits the network terminal described in the user's operation, and will acquisition The user the biological information carry out caching process.
5. user identity anti-theft system according to claim 1, which is characterized in that the cloud database service platform into One step is used for, and receives respective hardware identification coding and software that the type identity information collecting device and the network terminal are sent Identification coding, the hardware identification coding and software identification coding carry out unified compilation based on the received, and believe for the identity Breath acquisition device and the network terminal generate independent communication IP address respectively, to realize communication connection.
6. user identity anti-theft system according to any one of claims 1 to 5, which is characterized in that the identity information Acquisition device acquires the biological information of the user with preset frequency, and the network terminal will be described with the preset frequency Biological information is compared with the digital watermarking encoded information, to confirm whether the identity information of the user is stolen With.
7. a kind of network-based user identity method for preventing fraudulent-using characterized by comprising
Obtain the network login password information that user inputs in the network terminal;
The user identity identification coding that the network terminal storage is inquired according to the network login password information, described in obtaining Digital watermarking encoded information in user identity identification coding, the user identity identification encode the biological information by user The digital watermarking encoded information of compilation, which is embedded into the network login password information, to be generated;
Acquire the biological information of the user;
The biological information is compared with the digital watermarking encoded information, to confirm the identity information of the user Whether it is stolen.
8. user identity method for preventing fraudulent-using according to claim 7, which is characterized in that the user identity method for preventing fraudulent-using Further comprise:
If the biological information is matched with the digital watermarking encoded information, the identity information of the user is confirmed not It is stolen, authorize the network terminal described in the user's operation;
If the biological information and the digital watermarking encoded information mismatch, the identity information of the user is confirmed It is stolen, the network terminal described in the user's operation is limited, and the biological information of the user of acquisition is carried out Caching process.
9. user identity method for preventing fraudulent-using according to claim 7 or 8, which is characterized in that the user identity anti-theft Method further comprises: acquiring the biological information of the user with preset frequency, and with the preset frequency by the life Object characteristic information is compared with the digital watermarking encoded information, to confirm whether the identity information of the user is stolen.
10. a kind of network-based user identity identification code generating method characterized by comprising
Obtain the identity information of user;
It collects according to the biological information of the identity information acquisition user, and by the biological information as digital watermarking Encoded information;
The network login password information of user setting is obtained according to the identity information;
The digital watermarking encoded information is embedded into the network login password information, to generate the user identity identification Coding.
11. user identity identification code generating method according to claim 10, which is characterized in that described by the number Watermark encoder information is embedded into the network login password information, includes: to generate the user identity identification coding
The identity information of user, the digital watermarking encoded information and the network login password information are compiled respectively Code, to generate corresponding data segment encoded information;
The corresponding data segment encoded information is generated into the first data acquisition system, the second data set and third data set respectively It closes;
First data acquisition system and the second data set are subjected to Hash operation, to obtain the first cryptographic Hash;
First data acquisition system and the third data acquisition system are subjected to Hash operation, to obtain the second cryptographic Hash;
First cryptographic Hash and second cryptographic Hash are subjected to modular arithmetic, to generate multiple watermark datas;
The multiple watermark data is randomly-embedded in the data segment encoded information of the network login password information, with Generate the user identity identification coding.
12. a kind of network-based user identity anti-theft equipment characterized by comprising
Memory is stored with computer program instructions;
Processor is realized as described in any one of claim 7 to 9 when the computer program instructions are executed by the processor Network-based user identity method for preventing fraudulent-using and the described in any item network-based user identity of claim 10 to 11 Identify code generating method.
13. a kind of computer readable storage medium, which is characterized in that
The computer readable storage medium includes instruction, when described instruction is run on computers, so that computer executes Such as any one of the described in any item network-based user identity method for preventing fraudulent-using of claim 7 to 9 and claim 10 to 11 The network-based user identity identification code generating method.
CN201811628086.7A 2018-12-28 2018-12-28 Network-based user identity anti-theft system, method, equipment and storage medium Active CN109711134B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811628086.7A CN109711134B (en) 2018-12-28 2018-12-28 Network-based user identity anti-theft system, method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811628086.7A CN109711134B (en) 2018-12-28 2018-12-28 Network-based user identity anti-theft system, method, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109711134A true CN109711134A (en) 2019-05-03
CN109711134B CN109711134B (en) 2021-06-29

Family

ID=66258064

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811628086.7A Active CN109711134B (en) 2018-12-28 2018-12-28 Network-based user identity anti-theft system, method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109711134B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111614697A (en) * 2020-06-02 2020-09-01 支付宝(杭州)信息技术有限公司 Method and system for identity recognition

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425920A (en) * 2013-08-26 2013-12-04 江苏物联网研究发展中心 Audio information-based database security access control method of digital watermark
CN103595719A (en) * 2013-11-15 2014-02-19 清华大学 Authentication method and system based on fingerprints
CN105530230A (en) * 2014-10-21 2016-04-27 阿里巴巴集团控股有限公司 Fingerprint authentication method, device and server
CN106411813A (en) * 2015-07-28 2017-02-15 宇龙计算机通信科技(深圳)有限公司 Biological characteristic transmission method and device and mobile terminal
CN108024018A (en) * 2017-12-11 2018-05-11 原敏虎 Anti-theft and anti-losing cell phone system, identification firmware and its application
US10021095B1 (en) * 2015-05-29 2018-07-10 Amdocs Development Limited System, method, and computer program for two layer user authentication associated with connected home devices
CN109067766A (en) * 2018-08-30 2018-12-21 郑州云海信息技术有限公司 A kind of identity identifying method, server end and client

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425920A (en) * 2013-08-26 2013-12-04 江苏物联网研究发展中心 Audio information-based database security access control method of digital watermark
CN103595719A (en) * 2013-11-15 2014-02-19 清华大学 Authentication method and system based on fingerprints
CN105530230A (en) * 2014-10-21 2016-04-27 阿里巴巴集团控股有限公司 Fingerprint authentication method, device and server
US10021095B1 (en) * 2015-05-29 2018-07-10 Amdocs Development Limited System, method, and computer program for two layer user authentication associated with connected home devices
CN106411813A (en) * 2015-07-28 2017-02-15 宇龙计算机通信科技(深圳)有限公司 Biological characteristic transmission method and device and mobile terminal
CN108024018A (en) * 2017-12-11 2018-05-11 原敏虎 Anti-theft and anti-losing cell phone system, identification firmware and its application
CN109067766A (en) * 2018-08-30 2018-12-21 郑州云海信息技术有限公司 A kind of identity identifying method, server end and client

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111614697A (en) * 2020-06-02 2020-09-01 支付宝(杭州)信息技术有限公司 Method and system for identity recognition

Also Published As

Publication number Publication date
CN109711134B (en) 2021-06-29

Similar Documents

Publication Publication Date Title
Shi et al. Implicit authentication through learning user behavior
Liu et al. Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks
CN105164971A (en) Verification system and method with extra security for lower-entropy input records
Chen et al. Measuring query privacy in location-based services
CN104871171B (en) Distributed mode is found
CN109583889B (en) Seal or signature recognition system based on block chain
Paul et al. IoT based secure smart city architecture using blockchain
Xue et al. Sequence data matching and beyond: New privacy-preserving primitives based on bloom filters
CN109242481A (en) Information approach, device and computer equipment are pledged based on block chain query
Lycklama et al. Rofl: Robustness of secure federated learning
CN109242666A (en) Personal reference method, apparatus and computer equipment are obtained based on block chain
Giura et al. Is it really you? User identification via adaptive behavior fingerprinting
Ouda A framework for next generation user authentication
de Groot et al. Quantization in zero leakage helper data schemes
CN115242371A (en) Method, device and system for calculating set intersection and cardinality of differential privacy protection
Schumacher et al. A fundamental framework for network security
Gurunathan et al. A review and development methodology of a lightweight security model for IoT-based smart devices
Ametepe et al. Data provenance collection and security in a distributed environment: a survey
CN109711134A (en) Network-based user identity anti-theft system, method, equipment and storage medium
Sankar et al. The role of signal processing in meeting privacy challenges: An overview
CN109104449A (en) A kind of more Backup Data property held methods of proof under cloud storage environment
CN117151736A (en) Anti-electricity fraud management early warning method and system
CN111711521A (en) Block chain account private key resetting method and system
CN110611641B (en) Block chain mobile user terminal system
CN101233716B (en) Method for safety communication between user and entity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant