CN109711134B - Network-based user identity anti-theft system, method, equipment and storage medium - Google Patents

Network-based user identity anti-theft system, method, equipment and storage medium Download PDF

Info

Publication number
CN109711134B
CN109711134B CN201811628086.7A CN201811628086A CN109711134B CN 109711134 B CN109711134 B CN 109711134B CN 201811628086 A CN201811628086 A CN 201811628086A CN 109711134 B CN109711134 B CN 109711134B
Authority
CN
China
Prior art keywords
information
user
network
identity
biological characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811628086.7A
Other languages
Chinese (zh)
Other versions
CN109711134A (en
Inventor
李映
范滢
郑建兵
王春荣
谈鹏程
李恺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Jiangsu Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Jiangsu Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Jiangsu Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201811628086.7A priority Critical patent/CN109711134B/en
Publication of CN109711134A publication Critical patent/CN109711134A/en
Application granted granted Critical
Publication of CN109711134B publication Critical patent/CN109711134B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a user identity anti-theft system, method, device and storage medium based on network, the system includes: a plurality of working groups connected in parallel with each other, each working group comprising: the identity information acquisition device is used for acquiring the identity information of the user and acquiring the biological characteristic information of the user; the network terminal is connected with the identity information acquisition device in series and is used for acquiring network login password information set by a user; the cloud database service platform is in communication connection with the plurality of working groups through a network, and is used for generating a user identification code of the user and pushing the user identification code to the network terminal; the network terminal is further used for confirming whether the identity information of the user is stolen or not according to the identity identification code of the user. The invention can effectively avoid the phenomena of threatening the safety of network users and the safety of the network operation environment, such as the embezzlement, the impersonation and the like of the user identity.

Description

Network-based user identity anti-theft system, method, equipment and storage medium
Technical Field
The invention relates to the technical field of information systems and network security, in particular to a user identity anti-theft system and method based on a network, a user identity identification code generation method based on the network, equipment and a storage medium.
Background
With the popularization and application of network information technology, numerous business activities need to be carried out on the basis of a network, which greatly facilitates network users and improves work efficiency, but also causes lawless persons, speculators and the like to steal network user information to carry out illegal activities in the current network activities, thereby causing serious loss to the users, seriously affecting the safety and reliability of network system operation, and causing great social and economic loss and severe social impact.
The current main countermeasures are to complicate and improve the confidentiality of the user's identity confirmation password, but the effect is very small, and the difficulty of managing the user's network service password is increased. Meanwhile, for illegal network operations such as user identity embezzlement, impersonation and the like, the identity of a person who embezzles user information cannot be effectively confirmed, so that great difficulty is caused for subsequent follow-up management work.
Disclosure of Invention
The invention aims to provide a user identity anti-theft system and a user identity anti-theft method based on a network and a user identity identification code generation method based on the network.
In one aspect, an embodiment of the present invention provides a network-based user identity anti-theft system, which includes: a plurality of working groups connected in parallel with each other, each working group comprising: the identity information acquisition device is used for acquiring the identity information of the user and acquiring the biological characteristic information of the user; the network terminal is connected with the identity information acquisition device in series and is used for acquiring network login password information set by a user; the cloud database service platform is in communication connection with the plurality of working groups through a network, and is used for storing the identity information of the user and corresponding biological characteristic information acquired by the identity information acquisition device and compiling the biological characteristic information into digital watermark coding information; the cloud database service platform is further used for storing network login password information set by a user through a network terminal, embedding digital watermark coding information into the network login password information to generate a user identification code of the user, and pushing the user identification code to the network terminal; the network terminal is further used for confirming whether the identity information of the user is stolen or not according to the identity identification code of the user.
According to an aspect of the embodiment of the present invention, the cloud database service platform is further configured to generate a list of stored network login password information set by the user, and establish an index pointer for the network login password information, where the network login password corresponds to the digital watermark encoding information of the user one to one through the index pointer.
According to an aspect of the embodiments of the present invention, the network terminal is further configured to obtain network login password information input by a user; inquiring the stored user identification code according to the network login password information to obtain digital watermark coding information in the user identification code; and acquiring the biological characteristic information of the user acquired by the identity information acquisition device, and comparing the biological characteristic information with the digital watermark coding information to confirm whether the identity information of the user is stolen.
According to an aspect of the embodiments of the present invention, the network terminal is further configured to, if the biometric information matches the digital watermark encoding information, confirm that the identity information of the user is not stolen, and authorize the user to operate the network terminal; and if the biological characteristic information is not matched with the digital watermark coding information, the identity information of the user is confirmed to be stolen, the user is limited to operate the network terminal, and the acquired biological characteristic information of the user is cached.
According to an aspect of the embodiment of the present invention, the cloud database service platform is further configured to receive the hardware identification code and the software identification code sent by the identity information acquisition device and the network terminal, perform unified assembly according to the received hardware identification code and software identification code, and generate an independent communication IP address for the identity information acquisition device and the network terminal, respectively, so as to implement communication connection.
According to an aspect of the embodiments of the present invention, the identity information acquiring apparatus acquires the biometric information of the user at a predetermined frequency, and the network terminal compares the biometric information with the digital watermark encoding information at the predetermined frequency to determine whether the identity information of the user is stolen.
On the other hand, the embodiment of the invention also provides a user identity anti-theft system based on the network, which comprises the following components: acquiring network login password information input by a user at a network terminal; inquiring a user identification code stored in a network terminal according to the network login password information to obtain digital watermark coding information in the user identification code, wherein the user identification code is generated by embedding the digital watermark coding information compiled by the biological characteristic information of the user into the network login password information; collecting biological characteristic information of a user; and comparing the biological characteristic information with the digital watermark coding information to confirm whether the identity information of the user is stolen.
According to an aspect of the embodiment of the present invention, the method for preventing the user identity from being stolen further comprises: if the biological characteristic information is matched with the digital watermark coding information, the identity information of the user is confirmed not to be stolen, and the user is authorized to operate the network terminal; and if the biological characteristic information is not matched with the digital watermark coding information, the identity information of the user is confirmed to be stolen, the user is limited to operate the network terminal, and the acquired biological characteristic information of the user is cached.
According to an aspect of the embodiment of the present invention, the method for preventing the user identity from being stolen further comprises: and acquiring the biological characteristic information of the user at a preset frequency, and comparing the biological characteristic information with the digital watermark coding information at the preset frequency to confirm whether the identity information of the user is stolen.
On the other hand, the embodiment of the invention also provides a user identification code generating method based on the network, which comprises the following steps: acquiring identity information of a user; acquiring biological characteristic information of a user according to the identity information, and compiling the biological characteristic information into digital watermark coding information; acquiring network login password information set by a user according to the identity information; and embedding the digital watermark encoding information into the network login password information to generate a user identification code.
According to an aspect of the embodiments of the present invention, embedding the digital watermark encoding information into the network login password information to generate the user identification code comprises: respectively encoding the identity information, the digital watermark encoding information and the network login password information of the user to generate corresponding data segment encoding information; respectively generating a first data set, a second data set and a third data set from the corresponding data segment coding information; performing hash operation on the first data set and the second data set to obtain a first hash value; performing hash operation on the first data set and the third data set to obtain a second hash value; performing modulo operation on the first hash value and the second hash value to generate a plurality of watermark data; and randomly embedding a plurality of watermark data into data segment coding information of the network login password information to generate a user identification code.
On the other hand, the embodiment of the invention also provides a user identity anti-theft device based on the network, which comprises: a memory storing computer program instructions; and a processor, wherein the computer program instructions, when executed by the processor, implement the network-based user identity anti-theft method and the network-based user identity recognition code generation method as described above.
In another aspect, an embodiment of the present invention further provides a computer storage medium, where the computer storage medium includes instructions, and when the instructions are executed on a computer, the instructions cause the computer to perform the network-based user identity anti-theft method and the network-based user identity identification code generation method as described above.
The invention provides a network-based user identity anti-theft system and a network-based user identity anti-theft method, which generate digital watermark coding information from user identity information and biological characteristic information stored by an identity information acquisition device through a cloud database service platform, and embed the digital watermark coding information into network login password information set on a network terminal by a user to generate a user identity identification code so as to form a multi-stage password storage management system, thereby realizing efficient combined operation between biological characteristics and dynamic passwords, improving the accuracy of user identity authenticity verification operation, and effectively avoiding the phenomena of network user security threat and network operation environment security such as user identity theft and misuse.
Drawings
Features, advantages and technical effects of exemplary embodiments of the present invention will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic block diagram of a network-based user identity anti-theft system according to an embodiment of the present invention;
FIG. 2 is a flow chart of a method for preventing unauthorized use of user identity based on a network according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for generating a network-based user identification code according to an embodiment of the present invention.
Detailed Description
The embodiments of the present invention will be described in further detail with reference to the drawings and examples. The following detailed description of the embodiments and the accompanying drawings are provided to illustrate the principles of the invention and are not intended to limit the scope of the invention, i.e., the invention is not limited to the described embodiments.
In the description of the present invention, it should be noted that the terms "first", "second", "third", and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance, unless otherwise stated.
For better understanding of the present invention, the network-based user identity anti-theft system and method according to the embodiment of the present invention are described in detail below with reference to fig. 1 to 3.
Referring to fig. 1, an embodiment of the present invention provides a network-based user identity anti-theft system, including: a plurality of workgroups 10 connected in parallel with each other and a cloud database service platform 20 communicatively connected to the plurality of workgroups 10 through a network.
Each work group 10 comprises an identity information acquisition device 11 and at least one network terminal 12 connected in series with each other.
The identity information acquisition device 11 is used for acquiring identity information of a user and acquiring biological feature information of the user. The identity information of the user includes but is not limited to a plurality of information such as a name, an identification number, a mobile phone number and the like of the user, and the biometric information includes but is not limited to at least two of fingerprint information, voice information, face information and iris information of the user.
The network terminal 20 can be shared by any one or more of a personal computer, an industrial computer and a mobile intelligent communication terminal. The network terminal 12 is used for acquiring the network login password information set by the user. The network login password information is a data structure based on characters and/or images.
The cloud database service platform 20 establishes an identification information storage space for each user, and is used for storing the user identification information and the corresponding biological characteristic information acquired by the identification information acquisition device 11, and compiling the biological characteristic information into digital watermark encoding information. The collection of the biological characteristic information of the user can be carried out randomly, no fixed collection point or fixed collection equipment is provided, and the operation is simple, convenient and flexible.
The cloud database service platform 20 further establishes a network login password storage space for each user, and is configured to store network login password information set by the user through the network terminal 12, embed the digital watermark encoding information into the network login password information to generate a user identification code, and push the user identification code to the network terminal 12.
The user identification code is digital information and program codes in a non-physical state, and consists of a digital watermark code and a network login password, and the two are backed up and processed by data coding on the basis of the cloud database service platform 20, so that on one hand, the user identification code can be effectively updated in time, the updating is convenient and rapid, on the other hand, the inconvenience in use caused by the fact that a 'physical certificate' needs to be carried about and the like is avoided, and the requirements of rapid development of the current internet technology, information network interaction and other technologies are met.
The network terminal 12 is further configured to determine whether the identity information of the user is stolen according to the user identity identification code. The cloud database service platform 20 also establishes an identification code storage space for each user, for storing the identification code of the user.
The digital watermark coding information and the network login password information are directly stored, coded, assembled and operated in the cloud database service platform, user identity authentication is achieved, data centralized management and data management flexibility and accuracy can be effectively improved, meanwhile, data processing capacity and leakage prevention capacity can be effectively improved, and safety and reliability of user identity authentication information management are improved.
According to the network-based user identity anti-theft system provided by the embodiment of the invention, the cloud database service platform 20 is used for generating digital watermark coding information from the identity information and the biological characteristic information of the user stored by the identity information acquisition device 11, and embedding the digital watermark coding information into the network login password information set on the network terminal 12 by the user to generate the user identity identification code so as to form a multi-stage password storage management system, so that the efficient combined operation between the biological characteristic and the dynamic password is realized, the accuracy of the user identity authenticity verification operation is improved, and the phenomena that the user identity is stolen, falsely used and the like threatens the network user safety and the network operation environment safety are effectively avoided.
In addition, the cloud database service platform 20 is further configured to generate a list of stored network login password information set by multiple users, and establish an index pointer for each network login password information, where the network login password corresponds to the digital watermark encoding information of the user one to one through the index pointer, so as to determine whether the identity information of the multiple users is stolen.
The network login password in the user identification code is displayed and output at the network terminal 12, and the digital watermark code in the user identification code is operated as background data. The network terminal 12 is further configured to obtain network login password information input by the user; inquiring the stored user identification code according to the network login password information to obtain digital watermark coding information in the user identification code; and acquiring the biological characteristic information of the user acquired by the identity information acquisition device, and comparing the biological characteristic information with the digital watermark coding information to confirm whether the identity information of the user is stolen.
The network terminal 12 is further configured to, if the biometric information matches the digital watermark encoding information, confirm that the identity information of the user is not stolen, and authorize the user to operate the network terminal 12; if the biological characteristic information is not matched with the digital watermark coding information, the identity information of the user is confirmed to be stolen, the user is limited to operate the network terminal 12, and the collected biological characteristic information of the user is cached. For example, the behavior of stealing the user identity can be effectively monitored by caching for at least one week, detailed data information is provided in the subsequent tracing process and the like, and the biological characteristics of the information personnel of the stealing and falsifying users are collected when the phenomena of stealing, falsifying and the like of the user identity occur, so that the follow-up further tracing of related departments is facilitated, the precision and the efficiency of tracing management operation are greatly improved, and the safety and the reliability of network operation are improved.
In order to further improve the accuracy of the identity information verification, the identity information acquisition device 11 acquires the biometric information of the user at a predetermined frequency, and the network terminal 12 compares the biometric information with the digital watermark encoding information at the predetermined frequency to determine whether the identity information of the user is stolen. For example, the identity information of the user is dynamically monitored in the whole process at a preset frequency of 1-5 times/hour, so that the flexibility of identity verification is improved, and meanwhile, the risk of information leakage and embezzlement which are easy to occur to the 'physical certificate' is effectively avoided through the dynamic updating of the user identity identification code.
In addition, the cloud database service platform 20 is further configured to receive the hardware identification code and the software identification code sent by the identity information acquisition device 11 and the network terminal 12, perform unified assembly according to the received hardware identification code and software identification code, and generate independent communication IP addresses for the identity information acquisition device and the network terminal, respectively, so as to implement communication connection.
Referring to fig. 2, an embodiment of the present invention further provides a network-based method for preventing a user identity from being stolen, which includes:
step S1: acquiring network login password information input by a user at a network terminal;
step S2: inquiring a user identification code stored in a network terminal according to the network login password information to obtain digital watermark coding information in the user identification code, wherein the user identification code is generated by embedding the digital watermark coding information compiled by the biological characteristic information of the user into the network login password information;
step S3: collecting biological characteristic information of a user;
step S4: and comparing the biological characteristic information with the digital watermark coding information to confirm whether the identity information of the user is stolen.
Further, in step S4, the step of confirming whether the identity information of the user is stolen further includes:
step S41: if the biological characteristic information is matched with the digital watermark coding information, the identity information of the user is confirmed not to be stolen, and the user is authorized to operate the network terminal;
step S42: and if the biological characteristic information is not matched with the digital watermark coding information, the identity information of the user is confirmed to be stolen, the user is limited to operate the network terminal, and the acquired biological characteristic information of the user is cached.
In addition, the method for preventing the user identity from being stolen further comprises the following steps: and acquiring the biological characteristic information of the user at a preset frequency, and comparing the biological characteristic information with the digital watermark coding information at the preset frequency to confirm whether the identity information of the user is stolen. For example, the identity information of the user is dynamically monitored in the whole process at the frequency of 1-5 times/hour, so that the flexibility of identity verification is improved, and meanwhile, the risk of information leakage and embezzlement which are easy to occur to the 'real object certificate' is effectively avoided through the dynamic updating of the user identity identification code.
Referring to fig. 3, an embodiment of the present invention further provides a method for generating a user identification code based on a network, including:
step S21: acquiring identity information of a user;
step S22: acquiring biological characteristic information of a user according to the identity information, and compiling the biological characteristic information into digital watermark coding information;
step S23: acquiring network login password information set by a user according to the identity information;
step S24: and embedding the digital watermark encoding information into the network login password information to generate a user identification code.
Further, in step S24, the embedding the digital watermark encoding information into the network login password information to generate the user identification code includes:
step S241: and respectively encoding the identity information, the digital watermark encoding information and the network login password information of the user to generate corresponding data segment encoding information. The identity information, the network login password information and the digital watermark coding information of the user can be compiled into any data segment coding information based on binary system, octal system and hexadecimal system.
Step S242: respectively generating a first data set, a second data set and a third data set from the corresponding data segment coding information;
step S243: performing hash operation on the first data set and the second data set to obtain a first hash value;
step S244: performing hash operation on the first data set and the third data set to obtain a second hash value;
step S245: performing modulo operation on the first hash value and the second hash value to generate a plurality of watermark data;
step S246: and randomly embedding a plurality of watermark data into the data segment coding information of the network login password information to generate a user identification code, thereby completing the code assembly operation and obtaining a complete user identification code.
Further, in step S245, performing modulo operation on the first hash value and the second hash value to generate a plurality of watermark data includes: performing modulo operation on the watermark length by the first hash value and the second hash value, and grouping all carrier units according to the remainder to obtain T ═ T [ T ]0,T1,T2,……TL-1]. Wherein, L is the watermark length, T is the bearing group, and Arabic numerals are the number of watermark bits corresponding to the Tth bearing group.
It can be understood that the network-based user identity anti-theft method and the network-based identity recognition code generation method provided in the embodiments of the present invention are implemented by using the aforementioned network-based user identity anti-theft system as an execution subject, and the contents of the network-based user identity anti-theft method and the network-based identity recognition code generation method are specifically implemented by each device of the network-based user identity anti-theft system, and are not described herein again.
In addition, an embodiment of the present invention further provides a network-based user identity anti-theft device, including: a memory storing computer program instructions; and a processor, wherein the computer program instructions, when executed by the processor, implement the network-based user identity anti-theft method and the network-based user identity recognition code generation method as described above.
In addition, an embodiment of the present invention further provides a computer storage medium, where the computer storage medium includes instructions, and when the instructions are executed on a computer, the instructions cause the computer to execute the network-based user identity anti-theft method and the network-based user identity identification code generation method as described above.
While the invention has been described with reference to a preferred embodiment, various modifications may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention. In particular, the technical features mentioned in the embodiments can be combined in any way as long as there is no structural conflict. The present invention is not limited to the predetermined embodiments disclosed herein but encompasses all technical solutions falling within the scope of the claims.

Claims (12)

1. A network-based user identity anti-theft system, the user identity anti-theft system comprising:
a plurality of working groups connected in parallel with each other, each of the working groups comprising:
the identity information acquisition device is used for acquiring identity information of a user and acquiring biological feature information of the user, wherein the identity information comprises at least one of a name, an identity card number and a mobile phone number of the user, and the biological feature information comprises at least two of fingerprint information, voice information, face information and iris information of the user;
the network terminal is connected with the identity information acquisition device in series and is used for acquiring network login password information set by the user;
a cloud database service platform in communication connection with the plurality of workgroups through a network,
the cloud database service platform is used for storing the identity information of the user and corresponding biological characteristic information acquired by the identity information acquisition device and compiling the biological characteristic information into digital watermark coding information; the cloud database service platform is further used for storing network login password information set by a user through the network terminal, embedding the digital watermark coding information into the network login password information to generate a user identification code of the user, and pushing the user identification code to the network terminal;
the network terminal is further used for acquiring network login password information input by a user; inquiring the stored user identification code according to the network login password information to obtain the digital watermark coding information in the user identification code; and acquiring the biological characteristic information of the user acquired by the identity information acquisition device, and comparing the biological characteristic information with the digital watermark coding information to confirm whether the identity information of the user is stolen.
2. The system of claim 1, wherein the cloud database service platform is further configured to generate a list of the stored network login password information set by the user, and establish an index pointer for the network login password information, and the network login password corresponds to the digital watermark encoding information of the user one to one through the index pointer.
3. The system of claim 1, wherein the network terminal is further configured to confirm that the identity information of the user is not stolen and authorize the user to operate the network terminal if the biometric information matches the digital watermark encoding information; and if the biological characteristic information is not matched with the digital watermark coding information, confirming that the identity information of the user is stolen, limiting the user to operate the network terminal, and caching the collected biological characteristic information of the user.
4. The system of claim 1, wherein the cloud database service platform is further configured to receive hardware identification codes and software identification codes sent by the identity information collection device and the network terminal, perform unified assembly according to the received hardware identification codes and software identification codes, and generate independent communication IP addresses for the identity information collection device and the network terminal, respectively, to implement communication connection.
5. The system as claimed in any one of claims 1 to 4, wherein the identity information acquiring means acquires biometric information of the user at a predetermined frequency, and the network terminal compares the biometric information with the digital watermark encoding information at the predetermined frequency to determine whether the identity information of the user is stolen.
6. A method for preventing theft of user identity based on network is characterized by comprising the following steps:
acquiring identity information of a user and network login password information input by the user at a network terminal, wherein the identity information comprises at least one of a name, an identity card number and a mobile phone number of the user;
inquiring a user identification code stored in the network terminal according to the network login password information and the identity information of the user to obtain digital watermark code information in the user identification code, wherein the user identification code is generated by embedding the digital watermark code information compiled by the biological characteristic information of the user into the network login password information;
collecting biological characteristic information of the user, wherein the biological characteristic information comprises at least two of fingerprint information, voice information, face information and iris information of the user;
and comparing the biological characteristic information with the digital watermark coding information to confirm whether the identity information of the user is stolen.
7. The method of claim 6, further comprising:
if the biological characteristic information is matched with the digital watermark coding information, the identity information of the user is confirmed not to be stolen, and the user is authorized to operate the network terminal;
and if the biological characteristic information is not matched with the digital watermark coding information, confirming that the identity information of the user is stolen, limiting the user to operate the network terminal, and caching the collected biological characteristic information of the user.
8. The method of claim 6 or 7, further comprising: and acquiring the biological characteristic information of the user at a preset frequency, and comparing the biological characteristic information with the digital watermark coding information at the preset frequency to confirm whether the identity information of the user is stolen.
9. A method for generating a user identification code based on a network is characterized by comprising the following steps:
acquiring identity information of a user, wherein the identity information comprises at least one of a name, an identification card number and a mobile phone number of the user;
collecting biological characteristic information of the user, and compiling the biological characteristic information into digital watermark coding information, wherein the biological characteristic information comprises at least two of fingerprint information, voice information, face information and iris information of the user;
acquiring network login password information set by the user;
and embedding the digital watermark encoding information into the network login password information to generate the user identification code of the user.
10. The method of claim 9, wherein the embedding the digital watermarking code information into the network entry password information to generate the user identification code comprises:
respectively encoding the identity information, the digital watermark encoding information and the network login password information of the user to generate corresponding data segment encoding information;
respectively generating a first data set, a second data set and a third data set from the corresponding data segment coding information;
performing a hash operation on the first data set and the second data set to obtain a first hash value;
performing a hash operation on the first data set and the third data set to obtain a second hash value;
performing modulo operation on the first hash value and the second hash value to generate a plurality of watermark data;
and randomly embedding the plurality of watermark data into the data segment coding information of the network login password information to generate the user identification code.
11. A network-based user identity anti-theft device, comprising:
a memory storing computer program instructions;
a processor which, when executed by the processor, implements the network-based subscriber identity anti-theft method of any one of claims 6 to 8 and the network-based subscriber identity code generation method of claim 9 or 10.
12. A computer-readable storage medium, characterized in that,
the computer-readable storage medium includes instructions that, when executed on a computer, cause the computer to perform the network-based user identity anti-theft method of any one of claims 6 to 8 and the network-based user identification code generation method of claim 9 or 10.
CN201811628086.7A 2018-12-28 2018-12-28 Network-based user identity anti-theft system, method, equipment and storage medium Active CN109711134B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811628086.7A CN109711134B (en) 2018-12-28 2018-12-28 Network-based user identity anti-theft system, method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811628086.7A CN109711134B (en) 2018-12-28 2018-12-28 Network-based user identity anti-theft system, method, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109711134A CN109711134A (en) 2019-05-03
CN109711134B true CN109711134B (en) 2021-06-29

Family

ID=66258064

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811628086.7A Active CN109711134B (en) 2018-12-28 2018-12-28 Network-based user identity anti-theft system, method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109711134B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111614697A (en) * 2020-06-02 2020-09-01 支付宝(杭州)信息技术有限公司 Method and system for identity recognition

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108024018A (en) * 2017-12-11 2018-05-11 原敏虎 Anti-theft and anti-losing cell phone system, identification firmware and its application

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425920A (en) * 2013-08-26 2013-12-04 江苏物联网研究发展中心 Audio information-based database security access control method of digital watermark
CN103595719A (en) * 2013-11-15 2014-02-19 清华大学 Authentication method and system based on fingerprints
CN105530230A (en) * 2014-10-21 2016-04-27 阿里巴巴集团控股有限公司 Fingerprint authentication method, device and server
US10021095B1 (en) * 2015-05-29 2018-07-10 Amdocs Development Limited System, method, and computer program for two layer user authentication associated with connected home devices
CN106411813A (en) * 2015-07-28 2017-02-15 宇龙计算机通信科技(深圳)有限公司 Biological characteristic transmission method and device and mobile terminal
CN109067766A (en) * 2018-08-30 2018-12-21 郑州云海信息技术有限公司 A kind of identity identifying method, server end and client

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108024018A (en) * 2017-12-11 2018-05-11 原敏虎 Anti-theft and anti-losing cell phone system, identification firmware and its application

Also Published As

Publication number Publication date
CN109711134A (en) 2019-05-03

Similar Documents

Publication Publication Date Title
US11163907B2 (en) Decentralized token table generation
Shi et al. Implicit authentication through learning user behavior
US11811754B2 (en) Authenticating devices via tokens and verification computing devices
CN109327444B (en) Account information registration and authentication method and device
CN106572076A (en) Web service access method, client side and server side
CN111914264A (en) Index creation method and device, and data verification method and device
CA3066701A1 (en) Controlling access to data
ITTO20030079A1 (en) PROCEDURE AND SYSTEM FOR THE IDENTIFICATION OF A SUBJECT
CN110598383A (en) Method and device for removing account permission limitation
CN109711134B (en) Network-based user identity anti-theft system, method, equipment and storage medium
CN111445231A (en) Method and device for realizing MOTOpay and electronic equipment
CN114090994A (en) Face recognition authentication method and system based on block chain
CN113821780A (en) Video analysis method and device, electronic equipment and storage medium
CN106951865B (en) Privacy protection biological identification method based on Hamming distance
CN105681044A (en) Verification code recognition system taking password or verification code as sequence number
CN108965335B (en) Method for preventing malicious access to login interface, electronic device and computer medium
CN100429957C (en) Indentifying method for telecommunication smart card and terminal
CN114553573A (en) Identity authentication method and device
CN109862008B (en) Key recovery method and device, electronic equipment and storage medium
Nair et al. Multibiometric cryptosystem based on decision level fusion for file uploading in cloud
Asadpour et al. Presenting a new method of authentication for the internet of things based on RFID
Aramice et al. Secure Code Generation for Multi-Level Mutual Authentication
CN116781234B (en) Financial data sharing method and device based on pseudorandom disordered encryption
CN114978620B (en) Encryption method and decryption method for identity identification number
CN114978552B (en) Security management method, device, equipment and medium for mailbox verification code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant