CN110121174A - A kind of implicit identity identifying method of mobile intelligent terminal - Google Patents
A kind of implicit identity identifying method of mobile intelligent terminal Download PDFInfo
- Publication number
- CN110121174A CN110121174A CN201910409157.2A CN201910409157A CN110121174A CN 110121174 A CN110121174 A CN 110121174A CN 201910409157 A CN201910409157 A CN 201910409157A CN 110121174 A CN110121174 A CN 110121174A
- Authority
- CN
- China
- Prior art keywords
- sensor
- intelligent terminal
- behavioral data
- weight
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of implicit identity identifying methods of mobile intelligent terminal, it include: the password and legal WiFi of mobile intelligent terminal identification service system setting certain length, and behavioral data is touched when acquiring setting code, behavioral data is touched by being stored into database after the dynamic time warpping algorithm process based on weight;The legitimacy of real-time monitoring WiFi environment, legal WiFi environment user checks information automatically into mobile intelligent terminal without inputting password, illegal WiFi environment user need to input password, the touch behavioral data stored in touch behavioral data and database when comparing input password according to the dynamic time warpping algorithm based on weight simultaneously, determine the legitimacy of the identity of certification user, legal entrance mobile intelligent terminal checks information;The present invention enhances existing authentication mechanism in convenience and safety, can be avoided user and frequently enters password.
Description
Technical field
The invention belongs to mobile intelligent terminal identity identifying technologies, more particularly to the implicit body of mobile intelligent terminal a kind of
Identity authentication method.
Background technique
Currently, very universal by the mobile intelligent terminal of representative of smart phone.With the high speed of mobile intelligent terminal
Development, mobile application downloading service market also increase rapidly, and the application such as mobile office, mobile payment is also widely used, still,
For mobile intelligent terminal while offering convenience to everybody, the safety problem of its own also becomes a major challenge.
First safe outpost of the ID authentication mechanism as information security, can allow mobile intelligent terminal to user's
Identity is authenticated, and guarantees the safety that equipment and application program use, currently, common ID authentication mechanism include password,
Living things feature recognition and smart card etc..But the existing generally existing following deficiency of ID authentication mechanism:
(1) inconvenient for use, such as password mechanism needs user to remember one or more complex characters strings, smart card carries not
Just and it is easy to be lost;And certification is frequently, when each wake-up device, requires to be authenticated, though user in security context (such as
In family) it is also required to be authenticated;
(2) the problems such as there are safety defects, such as password mechanism is attacked there are password reuse, social engineering, biology is special
Sign, which can then be imitated and once crack, to be difficult to cancel or change;When inconvenient for use there are also authentication mechanism, lead to certain customers
It is reluctant that any authentication mechanism is arranged, so that mobile device is among risk.
Therefore, it is necessary to which designing one kind takes into account safe and convenient and fast authentication method, meets the needs of mobile subscriber.
Summary of the invention
In view of the above-mentioned problems, being solved well the invention proposes a kind of implicit identity identifying method of mobile intelligent terminal
Having determined, existing ID authentication mechanism is inconvenient for use, there are problems that safety defect.
To achieve the goals above, The technical solution adopted by the invention is as follows: a kind of implicit identity of mobile intelligent terminal
Authentication method, comprising:
Pass through the legitimacy of mobile intelligent terminal system real-time monitoring WiFi environment;
When the WiFi environment is legal, user is without inputting password automatically into mobile intelligent terminal;
When the WiFi environment is illegal, user needs to input password, while being tested by the dynamic time warpping algorithm based on weight
The legitimacy of touch behavioral data information when card input password,
If the touch behavioral data when password and input password of input is legal, it is verified, movement can be entered
Intelligent terminal,
If the touch behavioral data information when password or input password of input is illegal, it need to re-enter.
Further, the password is preset by mobile intelligent terminal, while passing through mobile intelligent terminal
In the touch behavioral data of built-in each sensor when acquiring setting code.
Further, the touch behavioral data pass through the dynamic time warpping algorithm process based on weight, it is described based on
The dynamic time warpping algorithm process method of weight is as follows:
The adopted value of the touch behavioral data of each sensor of acquisition is defined, the weight for setting each adopted value is respectively
q1, q2..., qn。
Proper password three times is repeatedly input when user's setting code,
If the touch behavioral data of each sensor is vector X, X=< X when input password for the first time1, X2..., Xn>,
Wherein, < X1, X2..., Xn> be respectively each sensor touch behavioral data adopted value;
If the touch behavioral data of each sensor is vector Y, Y=< Y when second of input password1, Y2..., Yn>,
Wherein, < Y1, Y2..., Yn> be respectively each sensor touch behavioral data adopted value;
If the touch behavioral data of each sensor is vector Z, Z=< Z when third time input password1, Z2..., Zn>,
Wherein, < Z1, Z2..., Zn> be respectively each sensor touch behavioral data adopted value;
Then the geometric distance d between tri- vectors of X, Y, Z is calculated separatelyI, i,
Wherein, i, j ∈ { X, Y, Z } ∧ (i ≠ j),
Define d=max (dI, j), in the database by vector X, Y, Z and d storage.
Further, touching when being verified while described by the dynamic time warpping proof of algorithm based on weight when input password
The method for touching the legitimacy of behavioral data information is as follows:
The touch behavioral data of user is collected and recorded by each sensor when inputting password,
The data for defining each sensor acquisition are set as vector U, U=< U1, U2..., Un>,
Wherein, < U1, U2..., Un> be respectively each sensor touch behavioral data adopted value;
Calculate U and X, Y, Z distance dU, j,
Wherein, j ∈ { X, Y, Z },
Define d`=min { dU, j, if d '≤d, certification pass through.
Further, the sensor includes gyroscope, light intensity sensor, X-direction sensor, Y-direction sensor, Z
Direction sensor, magnetic field sensor, linear acceleration sensors.
Further, the weight of each sensor need to give in advance, then the weight of light intensity sensor is 0.01;X
The weight of direction sensor is 0.35;The weight of Y-direction sensor is 0.3;The weight of Z-direction sensor is 0.15;Gravity passes
The weight of sensor is 0.06;The weight of magnetic field sensor is 0.03;The weight of gyroscope is 0.05;The weight of linear acceleration is
0.05。
Further, the legal WiFi is the WiFi setup module by mobile intelligent terminal system
Addition deletes and trusts WiFi for legal WiFi, includes the trust WiFi of setting in the WiFi list of mobile intelligent terminal, indicates
Mobile intelligent terminal is in legal WiFi environment, is otherwise in illegal WiFi environment.
Compared with prior art, the invention has the following advantages:
1, the legitimacy of real-time monitoring WiFi environment, legal WiFi environment are not necessarily to directly pass through certification by inputting password
Into mobile intelligent terminal, there is convenience;When being in illegal WiFi environment, need to input password, and by being based on weight
Dynamic time warpping algorithm determine input password when touch behavioral data information legitimacy, determine certification user identity conjunction
Method checks information into mobile intelligent terminal, ensure that the information security of user, it is therefore prevented that believes caused by due to password leakage
Breath leakage, safety are relatively high.
2, the dynamic time warpping algorithm based on weight, training data very little are not required to a large amount of storage space, and need to calculate
Sample to be tested and training data concentrate the time of the distance of all samples considerably less, also, by setting weight, can be avoided sample
Influence brought by this unbalanced data sample, treatment effeciency is high, is suitble to use on the mobile apparatus, has simple, quick
And advantage easy to accomplish.
Detailed description of the invention
Fig. 1 is that the present invention is based on a kind of implicit identity identifying method implementation flow charts of mobile intelligent terminal;
Fig. 2 is that the present invention is based on a kind of a kind of test implicit authentication machines of the implicit identity identifying method of mobile intelligent terminal
The module of system forms figure;
Fig. 3 is login module flow chart in Fig. 2 system module;
Fig. 4 is the implicit authentication functional flow diagram of the dynamic time warpping algorithm based on weight in Fig. 2 system module.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, a kind of implicit identity identifying method of mobile intelligent terminal of the present invention, comprising: mobile intelligence
The password (4 or 6) and legal WiFi of energy terminal authentication service system setting certain length, are logical for legal WiFi
The WiFi setup module addition of mobile intelligent terminal system is crossed, deletes and trusts WiFi;In setting code, pass through intelligent movable end
Built-in gyroscope in end, light intensity sensor, direction sensor (X-direction sensor, Y-direction sensor, Z-direction sensor),
Magnetic field sensor, the touch behavioral data of linear acceleration sensors acquisition at this time, meanwhile, digital-to-analogue behavioral data passes through based on power
The dynamic time warpping algorithm process of value, since each sensing data is in the importance difference to the behavior of touch judgement, so being set to it
Different weights is set, to guarantee that the accuracy of identification, the dynamic time warpping algorithm process method based on weight are as follows:
The adopted value of the touch behavioral data of each sensor of acquisition is defined, the weight for setting each adopted value is respectively
q1, q2..., qn。
Proper password three times is repeatedly input when user's setting code,
If the touch behavioral data of each sensor is vector X, X=< X when input password for the first time1, X2..., Xn>,
Wherein, < X1, X2..., Xn> be respectively each sensor touch behavioral data adopted value;
If the touch behavioral data of each sensor is vector Y, Y=< Y when second of input password1, Y2..., Yn>,
Wherein, < Y1, Y2..., Yn> be respectively each sensor touch behavioral data adopted value;
If the touch behavioral data of each sensor is vector Z, Z=< Z when third time input password1, Z2..., Zn>,
Wherein, < Z1, Z2..., Zn> be respectively each sensor touch behavioral data adopted value;
Then the geometric distance d between tri- vectors of X, Y, Z is calculated separatelyI, i;
Wherein, i, j ∈ { X, Y, Z } ∧ (i ≠ j),
Define d=max (dI, j)
Above-mentioned algorithm is the dynamic time warpping algorithm based on weight, touches behavioral data and calculates by the dynamic time warpping based on weight
After method processing, vector X, Y, Z and d are obtained, and be stored into database, these obtained data are training data.
During using mobile terminal, real-time monitoring mobile terminal is in the legitimacy of WiFi environment, i.e., when mobile intelligence
It can include the trust WiFi being arranged in the WiFi list of terminal, mean that mobile intelligent terminal is in legal WiFi environment, it is legal
In WiFi environment, user checks information automatically into mobile intelligent terminal without inputting password, has convenience, avoids cumbersome heavy
Password is inputted again;Illegal WiFi environment user need to input legal password, while be compared according to the dynamic time warpping algorithm based on weight
The touch behavioral data stored in touch behavioral data and database when inputting password judges to touch the legal of behavioral data
Property, the method is as follows:
When inputting password authentification, the touch behavioral data of user is collected and recorded by each sensor,
The parameter vector for defining each sensor acquisition is set as U, U=< U1, U2..., Un>,
Wherein, < U1, U2..., Un> be respectively each sensor touch behavioral data adopted value;
Calculate U and X, Y, Z distance dU, j,
Wherein, j ∈ { X, Y, Z },
Define d`=min { dU, j, it is compared with training data d, if d '≤d, it is determined that it is legal for authenticating the identity of user
, it is verified, mobile intelligent terminal can be entered and check information, it is therefore prevented that information leakage caused by due to password leakage, peace
Full property is relatively high.
Dynamic time warpping algorithm based on weight, training data very little are not required to a large amount of storage space, and need to calculate to
Test sample sheet and training data concentrate the time of the distance of all samples considerably less;The weight of the algorithm needs to give in advance, light intensity
The weight of sensor is 0.01;The weight of X-direction sensor is 0.35;The weight of Y-direction sensor is 0.3;Z-direction sensor
Weight be 0.15;The weight of gravity sensor is 0.06;The weight of magnetic field sensor is 0.03;The weight of gyroscope is
0.05;The weight of linear acceleration is 0.05, and setting weight can influence to avoid brought by data unbalanced in sample, on
Different weight specific gravity can be arranged in the weight stated according to the difference of environment;It can be seen that the algorithm is suitble to make on the mobile apparatus
With, have the advantages that it is simple, quickly and readily realize.
As shown in figs 2-4, in order to realize the above method, a kind of test process for realizing this method is shown below, is somebody's turn to do
Test process is the implicit ID authentication mechanism based on the above method, including login module, implicit authentication module and and notepad
Module, implicit authentication module have WiFi setting, obtain sensing data, password setting and the dynamic time warpping algorithm based on weight
Implicit authentication function;Notepad module is mainly to realize to change the data progress additions and deletions of user record to look into, and can store use
The important information at family.
The major function of WIFI setting is addition, deletes and trust WIFI.So-called trust WIFI just refers to that user is arranged self
Safe WIFI mean that user is locating at present if WIFI in user mobile phone list includes the trust WIFI of user setting
Environment it is very safe;WiFi setting in have multiple physical interfaces, including ScanResult, WiFiConfiguration,
The function of WiFiInfo and WiFiManager, interface are described as follows table:
The interface algorithm of WiFi setting is described as follows:
The function of login module is when user is initially opened login interface, and prompt allows user to input password on interface, when
When user inputs password in triplicate, system is the registration monitor of sensor, and the registration algorithm of sensor setting is described as follows:
Three groups of touch behavioral datas are stored in into database while password is set, corresponding algorithm description is as follows:
Behavioral data is touched using the dynamic time warpping algorithm process based on weight, forms the distinctive touch row of the user
For information;It is described as follows to the dynamic time warpping algorithm based on weight of the above method:
When user logs on, first confirm that whether open implicit authentication module, it is only defeated when being logged in if being not turned on
Enter password, without touching behavioral data certification, if opening, implicit authentication function will WiFi ring locating for real-time monitoring notepad
The algorithm description of the state in border, realization is as follows:
So when user is in the WiFi environment of safety, user can be successfully entered the notepad page without logging in;
When user is in non-security WiFi environment, login module can enable the dynamic time warpping algorithm based on weight of implicit authentication module
Implicit authentication function carry out touch behavioural information certification, only password and input password when touch behavioral data authenticate
It is just logined successfully by user, the accessible notepad page stores important information, corresponding unlatching implicit authentication mould
Being described as follows for the corresponding dynamic time warpping algorithm based on weight is called when block:
Certainly, implicit ID authentication mechanism can also be opened up due to can be realized perception and identification of the equipment to user identity
Exhibition is applied to other field, such as smart city, smart home, prediction mobile computing field, can provide personalization for user
Service, is with a wide range of applications.
Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art,
It is still possible to modify the technical solutions described in the foregoing embodiments, or part of technical characteristic is carried out etc.
With replacement, all within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in this
Within the protection scope of invention.
Claims (7)
1. a kind of implicit identity identifying method of mobile intelligent terminal, it is characterised in that: include:
Pass through the legitimacy of mobile intelligent terminal system real-time monitoring WiFi environment;
When the WiFi environment is legal, user is without inputting password automatically into mobile intelligent terminal;
When the WiFi environment is illegal, user needs to input password, while defeated by the dynamic time warpping proof of algorithm based on weight
Enter the legitimacy for touching behavioral data information when password,
If the touch behavioral data when password and input password of input is legal, it is verified, intelligent movable can be entered
Terminal,
If the touch behavioral data information when password or input password of input is illegal, it need to re-enter.
2. a kind of implicit identity identifying method of mobile intelligent terminal according to claim 1, it is characterised in that: described
Password is preset by mobile intelligent terminal, while being set by each sensor acquisition built-in in mobile intelligent terminal
Determine touch behavioral data when password.
3. a kind of implicit identity identifying method of mobile intelligent terminal according to claim 2, it is characterised in that: described
It touches behavioral data and passes through the dynamic time warpping algorithm process based on weight, the dynamic time warpping algorithm process side based on weight
Method is as follows:
The adopted value of the touch behavioral data of each sensor of acquisition is defined, the weight for setting each adopted value is respectively q1,
q2..., qn。
Proper password three times is repeatedly input when user's setting code,
If the touch behavioral data of each sensor is vector X, X=< X when input password for the first time1, X2..., Xn>,
Wherein < X1, X2..., Xn> be respectively each sensor touch behavioral data adopted value;
If the touch behavioral data of each sensor is vector Y, Y=< Y when second of input password1, Y2..., Yn>,
Wherein < Y1, Y2..., Yn> be respectively each sensor touch behavioral data adopted value;
If the touch behavioral data of each sensor is vector Z, Z=< Z when third time input password1, Z2..., Zn>,
Wherein < Z1, Z2..., Zn> be respectively each sensor touch behavioral data adopted value;
Then the geometric distance d between tri- vectors of X, Y, Z is calculated separatelyI, j;
Wherein, i, j ∈ { X, Y, Z } ∧ (i ≠ j),
Define d=max (dI, j), in the database by vector X, Y, Z and d storage.
4. a kind of implicit identity identifying method of mobile intelligent terminal according to claim 3, it is characterised in that: described
The legitimacy of touch behavioral data information when being verified simultaneously by the dynamic time warpping proof of algorithm based on weight when input password
Method it is as follows:
The touch behavioral data of user is collected and recorded by each sensor when inputting password,
The data for defining each sensor acquisition are set as vector U, U=< U1, U2..., Un>,
Wherein, < U1, U2..., Un> be respectively each sensor touch behavioral data adopted value;
Calculate U and X, Y, Z distance dU, j,
Wherein, j ∈ { X, Y, Z },
Define d`=min { dU, j, if d '≤d, certification pass through.
5. a kind of implicit identity identifying method of mobile intelligent terminal according to claim 2, it is characterised in that: described
Sensor includes gyroscope, light intensity sensor, X-direction sensor, Y-direction sensor, Z-direction sensor, magnetic field sensor, line
Property acceleration transducer.
6. a kind of implicit identity identifying method of mobile intelligent terminal according to claim 5, it is characterised in that: described
The weight of each sensor need to give in advance, then the weight of light intensity sensor is 0.01;The weight of X-direction sensor is 0.35;Y
The weight of direction sensor is 0.3;The weight of Z-direction sensor is 0.15;The weight of gravity sensor is 0.06;Magnetic field sensing
The weight of device is 0.03;The weight of gyroscope is 0.05;The weight of linear acceleration is 0.05.
7. a kind of implicit identity identifying method of intelligent terminal according to claim 1, it is characterised in that: described is legal
WiFi, be by the addition of the WiFi setup module of mobile intelligent terminal system, delete that trust WiFi be legal WiFi, it is mobile
Trust WiFi comprising setting in the WiFi list of intelligent terminal indicates that mobile intelligent terminal is in legal WiFi environment, otherwise
In illegal WiFi environment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910409157.2A CN110121174B (en) | 2019-05-16 | 2019-05-16 | Implicit identity authentication method of mobile intelligent terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910409157.2A CN110121174B (en) | 2019-05-16 | 2019-05-16 | Implicit identity authentication method of mobile intelligent terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110121174A true CN110121174A (en) | 2019-08-13 |
CN110121174B CN110121174B (en) | 2022-04-15 |
Family
ID=67522617
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910409157.2A Active CN110121174B (en) | 2019-05-16 | 2019-05-16 | Implicit identity authentication method of mobile intelligent terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110121174B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111159698A (en) * | 2019-12-31 | 2020-05-15 | 北京交通大学 | Terminal implicit identity authentication method based on Sudoku password |
CN116342128A (en) * | 2023-03-23 | 2023-06-27 | 杭州自旋科技有限责任公司 | Payment system based on blockchain technology |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102830932A (en) * | 2012-08-17 | 2012-12-19 | 东莞宇龙通信科技有限公司 | Terminal and method for automatically switching unlocking patterns of terminal |
CN103235684A (en) * | 2013-03-27 | 2013-08-07 | 广东欧珀移动通信有限公司 | Method and device for conducting dynamic switching to screen locking mode of mobile terminal |
CN103369511A (en) * | 2012-03-28 | 2013-10-23 | 宇龙计算机通信科技(深圳)有限公司 | WiFi network-based unlocking or locking method and communication terminal |
US20130347101A1 (en) * | 2011-06-01 | 2013-12-26 | Huawei Device Co., Ltd | Terminal Authentication Method and Device |
CN103714278A (en) * | 2012-09-29 | 2014-04-09 | 北京三星通信技术研究有限公司 | Password authentication method and password authentication device of terminal equipment |
CN104301117A (en) * | 2014-10-22 | 2015-01-21 | 中国联合网络通信集团有限公司 | Identity verification method and device |
CN105279405A (en) * | 2015-10-28 | 2016-01-27 | 同济大学 | Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof |
CN105898015A (en) * | 2015-12-04 | 2016-08-24 | 乐视致新电子科技(天津)有限公司 | Safety certification controlling method and terminal |
CN106446624A (en) * | 2015-08-06 | 2017-02-22 | 中兴通讯股份有限公司 | Mobile terminal unlocking method and mobile terminal |
CN110891045A (en) * | 2018-09-11 | 2020-03-17 | 珠海格力电器股份有限公司 | Password setting method, password verification method and related equipment |
-
2019
- 2019-05-16 CN CN201910409157.2A patent/CN110121174B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130347101A1 (en) * | 2011-06-01 | 2013-12-26 | Huawei Device Co., Ltd | Terminal Authentication Method and Device |
CN103369511A (en) * | 2012-03-28 | 2013-10-23 | 宇龙计算机通信科技(深圳)有限公司 | WiFi network-based unlocking or locking method and communication terminal |
CN102830932A (en) * | 2012-08-17 | 2012-12-19 | 东莞宇龙通信科技有限公司 | Terminal and method for automatically switching unlocking patterns of terminal |
CN103714278A (en) * | 2012-09-29 | 2014-04-09 | 北京三星通信技术研究有限公司 | Password authentication method and password authentication device of terminal equipment |
CN103235684A (en) * | 2013-03-27 | 2013-08-07 | 广东欧珀移动通信有限公司 | Method and device for conducting dynamic switching to screen locking mode of mobile terminal |
CN104301117A (en) * | 2014-10-22 | 2015-01-21 | 中国联合网络通信集团有限公司 | Identity verification method and device |
CN106446624A (en) * | 2015-08-06 | 2017-02-22 | 中兴通讯股份有限公司 | Mobile terminal unlocking method and mobile terminal |
CN105279405A (en) * | 2015-10-28 | 2016-01-27 | 同济大学 | Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof |
CN105898015A (en) * | 2015-12-04 | 2016-08-24 | 乐视致新电子科技(天津)有限公司 | Safety certification controlling method and terminal |
CN110891045A (en) * | 2018-09-11 | 2020-03-17 | 珠海格力电器股份有限公司 | Password setting method, password verification method and related equipment |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111159698A (en) * | 2019-12-31 | 2020-05-15 | 北京交通大学 | Terminal implicit identity authentication method based on Sudoku password |
CN116342128A (en) * | 2023-03-23 | 2023-06-27 | 杭州自旋科技有限责任公司 | Payment system based on blockchain technology |
Also Published As
Publication number | Publication date |
---|---|
CN110121174B (en) | 2022-04-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11133929B1 (en) | System and method of biobehavioral derived credentials identification | |
CN107122641B (en) | Intelligent equipment owner identification method and intelligent equipment owner identification device based on use habit | |
CN108269187A (en) | Verification method, device, equipment and the computer storage media of financial business | |
US20150317638A1 (en) | Methods, Devices and Systems for Transaction Initiation | |
Singh et al. | Biometric identification system: security and privacy concern | |
CN106022030A (en) | Identity authentication system and method based on user habit behavior features | |
KR20100114110A (en) | Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data | |
Datta et al. | Survey of security and privacy issues on biometric system | |
CN102456102A (en) | Method for carrying out identity recertification on particular operation of information system by using Usb key technology | |
US8474026B2 (en) | Realization of access control conditions as boolean expressions in credential authentications | |
CN104765453B (en) | A kind of identity identifying method of the handheld device based on embedded three-dimensional accelerometer | |
CN106878344A (en) | A kind of biological characteristic authentication, register method and device | |
CN111563746A (en) | Method, device, electronic equipment and medium for user identity authentication | |
CN110121174A (en) | A kind of implicit identity identifying method of mobile intelligent terminal | |
CN108154017A (en) | A kind of method of password authentication and password validation system based on intelligent terminal | |
US20210173910A1 (en) | Thermally enriched multi-modal and multi-channel biometric authentication | |
CN106470192A (en) | Auth method, apparatus and system | |
US10740447B2 (en) | Using biometric user-specific attributes | |
JP5903257B2 (en) | Authentication system, registration device, and authentication device | |
US20050286761A1 (en) | Ported system for personal identity verification | |
Goicoechea-Telleria et al. | Attack potential evaluation in desktop and smartphone fingerprint sensors: can they be attacked by anyone? | |
Bock | Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication | |
Goicoechea-Telleria et al. | Vulnerabilities of Biometric Systems integrated in Mobile Devices: an evaluation | |
CN109068009B (en) | Smart phone implicit identity authentication method based on context detection | |
WO2021135800A1 (en) | Extended biological feature authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |