CN110121174A - A kind of implicit identity identifying method of mobile intelligent terminal - Google Patents

A kind of implicit identity identifying method of mobile intelligent terminal Download PDF

Info

Publication number
CN110121174A
CN110121174A CN201910409157.2A CN201910409157A CN110121174A CN 110121174 A CN110121174 A CN 110121174A CN 201910409157 A CN201910409157 A CN 201910409157A CN 110121174 A CN110121174 A CN 110121174A
Authority
CN
China
Prior art keywords
sensor
intelligent terminal
behavioral data
weight
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910409157.2A
Other languages
Chinese (zh)
Other versions
CN110121174B (en
Inventor
徐国愚
杨进源
郭梦茹
曹欢欢
冯天洋
刘振
刘洋
奈申奥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xu Guo Yu
Original Assignee
Xu Guo Yu
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xu Guo Yu filed Critical Xu Guo Yu
Priority to CN201910409157.2A priority Critical patent/CN110121174B/en
Publication of CN110121174A publication Critical patent/CN110121174A/en
Application granted granted Critical
Publication of CN110121174B publication Critical patent/CN110121174B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of implicit identity identifying methods of mobile intelligent terminal, it include: the password and legal WiFi of mobile intelligent terminal identification service system setting certain length, and behavioral data is touched when acquiring setting code, behavioral data is touched by being stored into database after the dynamic time warpping algorithm process based on weight;The legitimacy of real-time monitoring WiFi environment, legal WiFi environment user checks information automatically into mobile intelligent terminal without inputting password, illegal WiFi environment user need to input password, the touch behavioral data stored in touch behavioral data and database when comparing input password according to the dynamic time warpping algorithm based on weight simultaneously, determine the legitimacy of the identity of certification user, legal entrance mobile intelligent terminal checks information;The present invention enhances existing authentication mechanism in convenience and safety, can be avoided user and frequently enters password.

Description

A kind of implicit identity identifying method of mobile intelligent terminal
Technical field
The invention belongs to mobile intelligent terminal identity identifying technologies, more particularly to the implicit body of mobile intelligent terminal a kind of Identity authentication method.
Background technique
Currently, very universal by the mobile intelligent terminal of representative of smart phone.With the high speed of mobile intelligent terminal Development, mobile application downloading service market also increase rapidly, and the application such as mobile office, mobile payment is also widely used, still, For mobile intelligent terminal while offering convenience to everybody, the safety problem of its own also becomes a major challenge.
First safe outpost of the ID authentication mechanism as information security, can allow mobile intelligent terminal to user's Identity is authenticated, and guarantees the safety that equipment and application program use, currently, common ID authentication mechanism include password, Living things feature recognition and smart card etc..But the existing generally existing following deficiency of ID authentication mechanism:
(1) inconvenient for use, such as password mechanism needs user to remember one or more complex characters strings, smart card carries not Just and it is easy to be lost;And certification is frequently, when each wake-up device, requires to be authenticated, though user in security context (such as In family) it is also required to be authenticated;
(2) the problems such as there are safety defects, such as password mechanism is attacked there are password reuse, social engineering, biology is special Sign, which can then be imitated and once crack, to be difficult to cancel or change;When inconvenient for use there are also authentication mechanism, lead to certain customers It is reluctant that any authentication mechanism is arranged, so that mobile device is among risk.
Therefore, it is necessary to which designing one kind takes into account safe and convenient and fast authentication method, meets the needs of mobile subscriber.
Summary of the invention
In view of the above-mentioned problems, being solved well the invention proposes a kind of implicit identity identifying method of mobile intelligent terminal Having determined, existing ID authentication mechanism is inconvenient for use, there are problems that safety defect.
To achieve the goals above, The technical solution adopted by the invention is as follows: a kind of implicit identity of mobile intelligent terminal Authentication method, comprising:
Pass through the legitimacy of mobile intelligent terminal system real-time monitoring WiFi environment;
When the WiFi environment is legal, user is without inputting password automatically into mobile intelligent terminal;
When the WiFi environment is illegal, user needs to input password, while being tested by the dynamic time warpping algorithm based on weight The legitimacy of touch behavioral data information when card input password,
If the touch behavioral data when password and input password of input is legal, it is verified, movement can be entered Intelligent terminal,
If the touch behavioral data information when password or input password of input is illegal, it need to re-enter.
Further, the password is preset by mobile intelligent terminal, while passing through mobile intelligent terminal In the touch behavioral data of built-in each sensor when acquiring setting code.
Further, the touch behavioral data pass through the dynamic time warpping algorithm process based on weight, it is described based on The dynamic time warpping algorithm process method of weight is as follows:
The adopted value of the touch behavioral data of each sensor of acquisition is defined, the weight for setting each adopted value is respectively q1, q2..., qn
Proper password three times is repeatedly input when user's setting code,
If the touch behavioral data of each sensor is vector X, X=< X when input password for the first time1, X2..., Xn>,
Wherein, < X1, X2..., Xn> be respectively each sensor touch behavioral data adopted value;
If the touch behavioral data of each sensor is vector Y, Y=< Y when second of input password1, Y2..., Yn>,
Wherein, < Y1, Y2..., Yn> be respectively each sensor touch behavioral data adopted value;
If the touch behavioral data of each sensor is vector Z, Z=< Z when third time input password1, Z2..., Zn>,
Wherein, < Z1, Z2..., Zn> be respectively each sensor touch behavioral data adopted value;
Then the geometric distance d between tri- vectors of X, Y, Z is calculated separatelyI, i,
Wherein, i, j ∈ { X, Y, Z } ∧ (i ≠ j),
Define d=max (dI, j), in the database by vector X, Y, Z and d storage.
Further, touching when being verified while described by the dynamic time warpping proof of algorithm based on weight when input password The method for touching the legitimacy of behavioral data information is as follows:
The touch behavioral data of user is collected and recorded by each sensor when inputting password,
The data for defining each sensor acquisition are set as vector U, U=< U1, U2..., Un>,
Wherein, < U1, U2..., Un> be respectively each sensor touch behavioral data adopted value;
Calculate U and X, Y, Z distance dU, j,
Wherein, j ∈ { X, Y, Z },
Define d`=min { dU, j, if d '≤d, certification pass through.
Further, the sensor includes gyroscope, light intensity sensor, X-direction sensor, Y-direction sensor, Z Direction sensor, magnetic field sensor, linear acceleration sensors.
Further, the weight of each sensor need to give in advance, then the weight of light intensity sensor is 0.01;X The weight of direction sensor is 0.35;The weight of Y-direction sensor is 0.3;The weight of Z-direction sensor is 0.15;Gravity passes The weight of sensor is 0.06;The weight of magnetic field sensor is 0.03;The weight of gyroscope is 0.05;The weight of linear acceleration is 0.05。
Further, the legal WiFi is the WiFi setup module by mobile intelligent terminal system Addition deletes and trusts WiFi for legal WiFi, includes the trust WiFi of setting in the WiFi list of mobile intelligent terminal, indicates Mobile intelligent terminal is in legal WiFi environment, is otherwise in illegal WiFi environment.
Compared with prior art, the invention has the following advantages:
1, the legitimacy of real-time monitoring WiFi environment, legal WiFi environment are not necessarily to directly pass through certification by inputting password Into mobile intelligent terminal, there is convenience;When being in illegal WiFi environment, need to input password, and by being based on weight Dynamic time warpping algorithm determine input password when touch behavioral data information legitimacy, determine certification user identity conjunction Method checks information into mobile intelligent terminal, ensure that the information security of user, it is therefore prevented that believes caused by due to password leakage Breath leakage, safety are relatively high.
2, the dynamic time warpping algorithm based on weight, training data very little are not required to a large amount of storage space, and need to calculate Sample to be tested and training data concentrate the time of the distance of all samples considerably less, also, by setting weight, can be avoided sample Influence brought by this unbalanced data sample, treatment effeciency is high, is suitble to use on the mobile apparatus, has simple, quick And advantage easy to accomplish.
Detailed description of the invention
Fig. 1 is that the present invention is based on a kind of implicit identity identifying method implementation flow charts of mobile intelligent terminal;
Fig. 2 is that the present invention is based on a kind of a kind of test implicit authentication machines of the implicit identity identifying method of mobile intelligent terminal The module of system forms figure;
Fig. 3 is login module flow chart in Fig. 2 system module;
Fig. 4 is the implicit authentication functional flow diagram of the dynamic time warpping algorithm based on weight in Fig. 2 system module.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, a kind of implicit identity identifying method of mobile intelligent terminal of the present invention, comprising: mobile intelligence The password (4 or 6) and legal WiFi of energy terminal authentication service system setting certain length, are logical for legal WiFi The WiFi setup module addition of mobile intelligent terminal system is crossed, deletes and trusts WiFi;In setting code, pass through intelligent movable end Built-in gyroscope in end, light intensity sensor, direction sensor (X-direction sensor, Y-direction sensor, Z-direction sensor), Magnetic field sensor, the touch behavioral data of linear acceleration sensors acquisition at this time, meanwhile, digital-to-analogue behavioral data passes through based on power The dynamic time warpping algorithm process of value, since each sensing data is in the importance difference to the behavior of touch judgement, so being set to it Different weights is set, to guarantee that the accuracy of identification, the dynamic time warpping algorithm process method based on weight are as follows:
The adopted value of the touch behavioral data of each sensor of acquisition is defined, the weight for setting each adopted value is respectively q1, q2..., qn
Proper password three times is repeatedly input when user's setting code,
If the touch behavioral data of each sensor is vector X, X=< X when input password for the first time1, X2..., Xn>,
Wherein, < X1, X2..., Xn> be respectively each sensor touch behavioral data adopted value;
If the touch behavioral data of each sensor is vector Y, Y=< Y when second of input password1, Y2..., Yn>,
Wherein, < Y1, Y2..., Yn> be respectively each sensor touch behavioral data adopted value;
If the touch behavioral data of each sensor is vector Z, Z=< Z when third time input password1, Z2..., Zn>,
Wherein, < Z1, Z2..., Zn> be respectively each sensor touch behavioral data adopted value;
Then the geometric distance d between tri- vectors of X, Y, Z is calculated separatelyI, i
Wherein, i, j ∈ { X, Y, Z } ∧ (i ≠ j),
Define d=max (dI, j)
Above-mentioned algorithm is the dynamic time warpping algorithm based on weight, touches behavioral data and calculates by the dynamic time warpping based on weight After method processing, vector X, Y, Z and d are obtained, and be stored into database, these obtained data are training data.
During using mobile terminal, real-time monitoring mobile terminal is in the legitimacy of WiFi environment, i.e., when mobile intelligence It can include the trust WiFi being arranged in the WiFi list of terminal, mean that mobile intelligent terminal is in legal WiFi environment, it is legal In WiFi environment, user checks information automatically into mobile intelligent terminal without inputting password, has convenience, avoids cumbersome heavy Password is inputted again;Illegal WiFi environment user need to input legal password, while be compared according to the dynamic time warpping algorithm based on weight The touch behavioral data stored in touch behavioral data and database when inputting password judges to touch the legal of behavioral data Property, the method is as follows:
When inputting password authentification, the touch behavioral data of user is collected and recorded by each sensor,
The parameter vector for defining each sensor acquisition is set as U, U=< U1, U2..., Un>,
Wherein, < U1, U2..., Un> be respectively each sensor touch behavioral data adopted value;
Calculate U and X, Y, Z distance dU, j,
Wherein, j ∈ { X, Y, Z },
Define d`=min { dU, j, it is compared with training data d, if d '≤d, it is determined that it is legal for authenticating the identity of user , it is verified, mobile intelligent terminal can be entered and check information, it is therefore prevented that information leakage caused by due to password leakage, peace Full property is relatively high.
Dynamic time warpping algorithm based on weight, training data very little are not required to a large amount of storage space, and need to calculate to Test sample sheet and training data concentrate the time of the distance of all samples considerably less;The weight of the algorithm needs to give in advance, light intensity The weight of sensor is 0.01;The weight of X-direction sensor is 0.35;The weight of Y-direction sensor is 0.3;Z-direction sensor Weight be 0.15;The weight of gravity sensor is 0.06;The weight of magnetic field sensor is 0.03;The weight of gyroscope is 0.05;The weight of linear acceleration is 0.05, and setting weight can influence to avoid brought by data unbalanced in sample, on Different weight specific gravity can be arranged in the weight stated according to the difference of environment;It can be seen that the algorithm is suitble to make on the mobile apparatus With, have the advantages that it is simple, quickly and readily realize.
As shown in figs 2-4, in order to realize the above method, a kind of test process for realizing this method is shown below, is somebody's turn to do Test process is the implicit ID authentication mechanism based on the above method, including login module, implicit authentication module and and notepad Module, implicit authentication module have WiFi setting, obtain sensing data, password setting and the dynamic time warpping algorithm based on weight Implicit authentication function;Notepad module is mainly to realize to change the data progress additions and deletions of user record to look into, and can store use The important information at family.
The major function of WIFI setting is addition, deletes and trust WIFI.So-called trust WIFI just refers to that user is arranged self Safe WIFI mean that user is locating at present if WIFI in user mobile phone list includes the trust WIFI of user setting Environment it is very safe;WiFi setting in have multiple physical interfaces, including ScanResult, WiFiConfiguration, The function of WiFiInfo and WiFiManager, interface are described as follows table:
The interface algorithm of WiFi setting is described as follows:
The function of login module is when user is initially opened login interface, and prompt allows user to input password on interface, when When user inputs password in triplicate, system is the registration monitor of sensor, and the registration algorithm of sensor setting is described as follows:
Three groups of touch behavioral datas are stored in into database while password is set, corresponding algorithm description is as follows:
Behavioral data is touched using the dynamic time warpping algorithm process based on weight, forms the distinctive touch row of the user For information;It is described as follows to the dynamic time warpping algorithm based on weight of the above method:
When user logs on, first confirm that whether open implicit authentication module, it is only defeated when being logged in if being not turned on Enter password, without touching behavioral data certification, if opening, implicit authentication function will WiFi ring locating for real-time monitoring notepad The algorithm description of the state in border, realization is as follows:
So when user is in the WiFi environment of safety, user can be successfully entered the notepad page without logging in; When user is in non-security WiFi environment, login module can enable the dynamic time warpping algorithm based on weight of implicit authentication module Implicit authentication function carry out touch behavioural information certification, only password and input password when touch behavioral data authenticate It is just logined successfully by user, the accessible notepad page stores important information, corresponding unlatching implicit authentication mould Being described as follows for the corresponding dynamic time warpping algorithm based on weight is called when block:
Certainly, implicit ID authentication mechanism can also be opened up due to can be realized perception and identification of the equipment to user identity Exhibition is applied to other field, such as smart city, smart home, prediction mobile computing field, can provide personalization for user Service, is with a wide range of applications.
Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art, It is still possible to modify the technical solutions described in the foregoing embodiments, or part of technical characteristic is carried out etc. With replacement, all within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in this Within the protection scope of invention.

Claims (7)

1. a kind of implicit identity identifying method of mobile intelligent terminal, it is characterised in that: include:
Pass through the legitimacy of mobile intelligent terminal system real-time monitoring WiFi environment;
When the WiFi environment is legal, user is without inputting password automatically into mobile intelligent terminal;
When the WiFi environment is illegal, user needs to input password, while defeated by the dynamic time warpping proof of algorithm based on weight Enter the legitimacy for touching behavioral data information when password,
If the touch behavioral data when password and input password of input is legal, it is verified, intelligent movable can be entered Terminal,
If the touch behavioral data information when password or input password of input is illegal, it need to re-enter.
2. a kind of implicit identity identifying method of mobile intelligent terminal according to claim 1, it is characterised in that: described Password is preset by mobile intelligent terminal, while being set by each sensor acquisition built-in in mobile intelligent terminal Determine touch behavioral data when password.
3. a kind of implicit identity identifying method of mobile intelligent terminal according to claim 2, it is characterised in that: described It touches behavioral data and passes through the dynamic time warpping algorithm process based on weight, the dynamic time warpping algorithm process side based on weight Method is as follows:
The adopted value of the touch behavioral data of each sensor of acquisition is defined, the weight for setting each adopted value is respectively q1, q2..., qn
Proper password three times is repeatedly input when user's setting code,
If the touch behavioral data of each sensor is vector X, X=< X when input password for the first time1, X2..., Xn>,
Wherein < X1, X2..., Xn> be respectively each sensor touch behavioral data adopted value;
If the touch behavioral data of each sensor is vector Y, Y=< Y when second of input password1, Y2..., Yn>,
Wherein < Y1, Y2..., Yn> be respectively each sensor touch behavioral data adopted value;
If the touch behavioral data of each sensor is vector Z, Z=< Z when third time input password1, Z2..., Zn>,
Wherein < Z1, Z2..., Zn> be respectively each sensor touch behavioral data adopted value;
Then the geometric distance d between tri- vectors of X, Y, Z is calculated separatelyI, j
Wherein, i, j ∈ { X, Y, Z } ∧ (i ≠ j),
Define d=max (dI, j), in the database by vector X, Y, Z and d storage.
4. a kind of implicit identity identifying method of mobile intelligent terminal according to claim 3, it is characterised in that: described The legitimacy of touch behavioral data information when being verified simultaneously by the dynamic time warpping proof of algorithm based on weight when input password Method it is as follows:
The touch behavioral data of user is collected and recorded by each sensor when inputting password,
The data for defining each sensor acquisition are set as vector U, U=< U1, U2..., Un>,
Wherein, < U1, U2..., Un> be respectively each sensor touch behavioral data adopted value;
Calculate U and X, Y, Z distance dU, j,
Wherein, j ∈ { X, Y, Z },
Define d`=min { dU, j, if d '≤d, certification pass through.
5. a kind of implicit identity identifying method of mobile intelligent terminal according to claim 2, it is characterised in that: described Sensor includes gyroscope, light intensity sensor, X-direction sensor, Y-direction sensor, Z-direction sensor, magnetic field sensor, line Property acceleration transducer.
6. a kind of implicit identity identifying method of mobile intelligent terminal according to claim 5, it is characterised in that: described The weight of each sensor need to give in advance, then the weight of light intensity sensor is 0.01;The weight of X-direction sensor is 0.35;Y The weight of direction sensor is 0.3;The weight of Z-direction sensor is 0.15;The weight of gravity sensor is 0.06;Magnetic field sensing The weight of device is 0.03;The weight of gyroscope is 0.05;The weight of linear acceleration is 0.05.
7. a kind of implicit identity identifying method of intelligent terminal according to claim 1, it is characterised in that: described is legal WiFi, be by the addition of the WiFi setup module of mobile intelligent terminal system, delete that trust WiFi be legal WiFi, it is mobile Trust WiFi comprising setting in the WiFi list of intelligent terminal indicates that mobile intelligent terminal is in legal WiFi environment, otherwise In illegal WiFi environment.
CN201910409157.2A 2019-05-16 2019-05-16 Implicit identity authentication method of mobile intelligent terminal Active CN110121174B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910409157.2A CN110121174B (en) 2019-05-16 2019-05-16 Implicit identity authentication method of mobile intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910409157.2A CN110121174B (en) 2019-05-16 2019-05-16 Implicit identity authentication method of mobile intelligent terminal

Publications (2)

Publication Number Publication Date
CN110121174A true CN110121174A (en) 2019-08-13
CN110121174B CN110121174B (en) 2022-04-15

Family

ID=67522617

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910409157.2A Active CN110121174B (en) 2019-05-16 2019-05-16 Implicit identity authentication method of mobile intelligent terminal

Country Status (1)

Country Link
CN (1) CN110121174B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111159698A (en) * 2019-12-31 2020-05-15 北京交通大学 Terminal implicit identity authentication method based on Sudoku password
CN116342128A (en) * 2023-03-23 2023-06-27 杭州自旋科技有限责任公司 Payment system based on blockchain technology

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102830932A (en) * 2012-08-17 2012-12-19 东莞宇龙通信科技有限公司 Terminal and method for automatically switching unlocking patterns of terminal
CN103235684A (en) * 2013-03-27 2013-08-07 广东欧珀移动通信有限公司 Method and device for conducting dynamic switching to screen locking mode of mobile terminal
CN103369511A (en) * 2012-03-28 2013-10-23 宇龙计算机通信科技(深圳)有限公司 WiFi network-based unlocking or locking method and communication terminal
US20130347101A1 (en) * 2011-06-01 2013-12-26 Huawei Device Co., Ltd Terminal Authentication Method and Device
CN103714278A (en) * 2012-09-29 2014-04-09 北京三星通信技术研究有限公司 Password authentication method and password authentication device of terminal equipment
CN104301117A (en) * 2014-10-22 2015-01-21 中国联合网络通信集团有限公司 Identity verification method and device
CN105279405A (en) * 2015-10-28 2016-01-27 同济大学 Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof
CN105898015A (en) * 2015-12-04 2016-08-24 乐视致新电子科技(天津)有限公司 Safety certification controlling method and terminal
CN106446624A (en) * 2015-08-06 2017-02-22 中兴通讯股份有限公司 Mobile terminal unlocking method and mobile terminal
CN110891045A (en) * 2018-09-11 2020-03-17 珠海格力电器股份有限公司 Password setting method, password verification method and related equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130347101A1 (en) * 2011-06-01 2013-12-26 Huawei Device Co., Ltd Terminal Authentication Method and Device
CN103369511A (en) * 2012-03-28 2013-10-23 宇龙计算机通信科技(深圳)有限公司 WiFi network-based unlocking or locking method and communication terminal
CN102830932A (en) * 2012-08-17 2012-12-19 东莞宇龙通信科技有限公司 Terminal and method for automatically switching unlocking patterns of terminal
CN103714278A (en) * 2012-09-29 2014-04-09 北京三星通信技术研究有限公司 Password authentication method and password authentication device of terminal equipment
CN103235684A (en) * 2013-03-27 2013-08-07 广东欧珀移动通信有限公司 Method and device for conducting dynamic switching to screen locking mode of mobile terminal
CN104301117A (en) * 2014-10-22 2015-01-21 中国联合网络通信集团有限公司 Identity verification method and device
CN106446624A (en) * 2015-08-06 2017-02-22 中兴通讯股份有限公司 Mobile terminal unlocking method and mobile terminal
CN105279405A (en) * 2015-10-28 2016-01-27 同济大学 Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof
CN105898015A (en) * 2015-12-04 2016-08-24 乐视致新电子科技(天津)有限公司 Safety certification controlling method and terminal
CN110891045A (en) * 2018-09-11 2020-03-17 珠海格力电器股份有限公司 Password setting method, password verification method and related equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111159698A (en) * 2019-12-31 2020-05-15 北京交通大学 Terminal implicit identity authentication method based on Sudoku password
CN116342128A (en) * 2023-03-23 2023-06-27 杭州自旋科技有限责任公司 Payment system based on blockchain technology

Also Published As

Publication number Publication date
CN110121174B (en) 2022-04-15

Similar Documents

Publication Publication Date Title
US11133929B1 (en) System and method of biobehavioral derived credentials identification
CN107122641B (en) Intelligent equipment owner identification method and intelligent equipment owner identification device based on use habit
CN108269187A (en) Verification method, device, equipment and the computer storage media of financial business
US20150317638A1 (en) Methods, Devices and Systems for Transaction Initiation
Singh et al. Biometric identification system: security and privacy concern
CN106022030A (en) Identity authentication system and method based on user habit behavior features
KR20100114110A (en) Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data
Datta et al. Survey of security and privacy issues on biometric system
CN102456102A (en) Method for carrying out identity recertification on particular operation of information system by using Usb key technology
US8474026B2 (en) Realization of access control conditions as boolean expressions in credential authentications
CN104765453B (en) A kind of identity identifying method of the handheld device based on embedded three-dimensional accelerometer
CN106878344A (en) A kind of biological characteristic authentication, register method and device
CN111563746A (en) Method, device, electronic equipment and medium for user identity authentication
CN110121174A (en) A kind of implicit identity identifying method of mobile intelligent terminal
CN108154017A (en) A kind of method of password authentication and password validation system based on intelligent terminal
US20210173910A1 (en) Thermally enriched multi-modal and multi-channel biometric authentication
CN106470192A (en) Auth method, apparatus and system
US10740447B2 (en) Using biometric user-specific attributes
JP5903257B2 (en) Authentication system, registration device, and authentication device
US20050286761A1 (en) Ported system for personal identity verification
Goicoechea-Telleria et al. Attack potential evaluation in desktop and smartphone fingerprint sensors: can they be attacked by anyone?
Bock Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication
Goicoechea-Telleria et al. Vulnerabilities of Biometric Systems integrated in Mobile Devices: an evaluation
CN109068009B (en) Smart phone implicit identity authentication method based on context detection
WO2021135800A1 (en) Extended biological feature authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant