CN111859326A - Identity recognition post-processing method - Google Patents

Identity recognition post-processing method Download PDF

Info

Publication number
CN111859326A
CN111859326A CN202010716593.7A CN202010716593A CN111859326A CN 111859326 A CN111859326 A CN 111859326A CN 202010716593 A CN202010716593 A CN 202010716593A CN 111859326 A CN111859326 A CN 111859326A
Authority
CN
China
Prior art keywords
login
information
intelligent device
logging
legal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010716593.7A
Other languages
Chinese (zh)
Inventor
秦方
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Henghui Originality Technology Co ltd
Original Assignee
Tianjin Henghui Originality Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Henghui Originality Technology Co ltd filed Critical Tianjin Henghui Originality Technology Co ltd
Priority to CN202010716593.7A priority Critical patent/CN111859326A/en
Publication of CN111859326A publication Critical patent/CN111859326A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Abstract

In a highly information age, many information systems and intelligent devices need to be accessed through collection, such as: and identity identification information such as passwords, fingerprints, human faces, voiceprints, graphic passwords and the like is used for verifying the legality of the login user. However, the identification information once acquired by someone may result in a loss of significant interest or property to the legitimate registrant. The situation that a legal login user is forced to give out identity identification information on the premise of violating the real will of the user due to the coercion of the legal login user and the like occurs. The invention provides a solution for ensuring the personal safety of a legal login user and protecting the safety of the great benefits or properties of the legal login user.

Description

Identity recognition post-processing method
Technical Field
The invention relates to the field of information technology and security, in particular to a method for processing an information system and an intelligent device after identity recognition.
Background
In a highly information age, many information systems and intelligent devices need to be accessed through collection, such as: and the identity identification information such as the password, the fingerprint, the face, the figure password, the voiceprint, the iris and the like is used for verifying the legality of the login user. However, the identification information once acquired by someone may result in a loss of significant interest or property to the legitimate registrant. On the premise of violating the real will of the user, the situation of being forced to give out the identity identification information occurs.
Disclosure of Invention
In view of the above problems, the present invention is directed to an identity recognition post-processing method, and the technical solution adopted by the present invention to solve the above problems is:
an identity recognition post-processing method is characterized in that a legal logger sets one or more preset additional logging identity recognition information for the legal logger besides the preset logging identity recognition information for the same account, which is logged in an information system and/or an intelligent device in a normal logging state, so that the legal logger logs in different and specific logging states respectively by using different preset additional logging identity recognition information; when the information system and/or the intelligent device performs login operation, the information system and/or the intelligent device compares the received login identification information with all preset login identification information of the legal login user in the same account including the preset additional login identification information one by one, if the received login identification information is matched with one of the information, the information system and/or the intelligent device logs in the corresponding normal login state or the different and specific login states according to the preset setting, and if the received login identification information is not matched with one of the information system and/or the intelligent device, the information system and/or the intelligent device refuses to log in, wherein the different and specific login states comprise:
(1) after logging in, the device can be used for alarming or asking for help;
(2) after logging in, the information system and/or the intelligent device is concealed to stop normal logging operation or guide the information system and/or the intelligent device to enter preset follow-up operation, wherein the follow-up operation comprises the step of starting different ways and/or devices for recording and/or sending the logging-in time and place and logging-in post-incident personnel and event information to the outside;
(3) the authority, assets, wealth, money, funds, resources, functions and benefits which are all owned by a legal login user under the same account of the information system and/or the intelligent device are allowed to be set in advance, and the authority, assets, wealth, money, funds, resources, functions and benefits of one part of the same account of the information system and/or the intelligent device are hidden and can not be operated after login;
(4) based on the logical algebraic combination of some or all of the different and specific login states in (1), (2), and (3).
In addition, in order to complete the login operation in the normal login state or in the different and specific login states, the legal login user is allowed to preset a group of login identification information for the information system and/or the intelligent device in sequence; allowing the legal loggers to submit the login identification information set in the group one by one for the information system and/or the intelligent device according to the sequence set in the group, and using the login identification information to log in the normal login state or the different and specific login states; and if and only if the group of login identification information submitted according to the sequence set in the group is completely verified, allowing the information system and/or the intelligent device to login into the normal login state or the respective different and specific login state.
Moreover, the concealed starting of external alarm and help seeking after login means that the information system and/or the intelligent device gives an alarm to an organization or a person which is arranged at a far end in advance and has the capacity of receiving and handling alarm information through a wired and/or wireless network communication means.
The invention has the advantages that:
the invention relates to the field of information technology and security, in particular to a method for entering a system and/or an intelligent device after identity recognition.
When the legal login user of the information system and/or the intelligent device is forced to give out the identification information on the premise of violating the real will of the user due to the coercion of the legal login user by other people and the like. In order to guarantee the personal safety of a legal login user and protect the safety of the important interests or properties of the legal login user, a login scheme for releasing only part of rights, assets, resources, functions and interests by setting different identity identification information is provided, and the hidden alarm can be realized at the first time.
The method disclosed by the invention enables the legal loggers under the same account number to have the right and the opportunity of selecting different login states.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the following drawings are process flow diagrams.
FIG. 1 is a process flow diagram of the present invention.
Detailed Description
An identity recognition post-processing method is characterized in that a legal logger sets one or more preset additional logging identity recognition information for the legal logger besides the preset logging identity recognition information for the same account, which is logged in an information system and/or an intelligent device in a normal logging state, so that the legal logger logs in different and specific logging states respectively by using different preset additional logging identity recognition information; when the information system and/or the intelligent device performs login operation, the information system and/or the intelligent device compares the received login identification information with all preset login identification information of the legal login user in the same account including the preset additional login identification information one by one, if the received login identification information is matched with one of the information, the information system and/or the intelligent device logs in the corresponding normal login state or the different and specific login states according to the preset setting, and if the received login identification information is not matched with one of the information system and/or the intelligent device, the information system and/or the intelligent device refuses to log in, wherein the different and specific login states comprise:
(1) after logging in, the device can be used for alarming or asking for help;
(2) after logging in, the information system and/or the intelligent device is concealed to stop normal logging operation or guide the information system and/or the intelligent device to enter preset follow-up operation, wherein the follow-up operation comprises the step of starting different ways and/or devices for recording and/or sending the logging-in time and place and logging-in post-incident personnel and event information to the outside;
(3) the authority, assets, wealth, money, funds, resources, functions and benefits which are all owned by a legal login user under the same account of the information system and/or the intelligent device are allowed to be set in advance, and the authority, assets, wealth, money, funds, resources, functions and benefits of one part of the same account of the information system and/or the intelligent device are hidden and can not be operated after login;
(4) based on the logical algebraic combination of some or all of the different and specific login states in (1), (2), and (3).
In addition, in order to complete the login operation in the normal login state or in the different and specific login states, the legal login user is allowed to preset a group of login identification information for the information system and/or the intelligent device in sequence; allowing the legal loggers to submit the login identification information set in the group one by one for the information system and/or the intelligent device according to the sequence set in the group, and using the login identification information to log in the normal login state or the different and specific login states; and if and only if the group of login identification information submitted according to the sequence set in the group is completely verified, allowing the information system and/or the intelligent device to login into the normal login state or the respective different and specific login state.
Moreover, the concealed starting of external alarm and help seeking after login means that the information system and/or the intelligent device gives an alarm to an organization or a person which is arranged at a far end in advance and has the capacity of receiving and handling alarm information through a wired and/or wireless network communication means.
By the method disclosed by the invention, the legal loggers under the same account number have the authority, the capability and the opportunity of selecting different login states.
The following application examples are included:
application example 1:
the mobile phone bank account of a legal logger is provided with 2000 ten thousand deposits, when the legal logger is stressed, the cipher which is forced to be logged in the mobile phone bank can be only selected, because the legal logger presets a plurality of login ciphers with different purposes in advance, after logging in with a certain specific cipher, only 10 ten thousand deposits are presented on the log-in state account, meanwhile, the legal logger reports the personal information, the working time and the position information of the legal logger to the police through background operation in a concealed way, thereby providing clues for the follow-up police to check, rescue, evidence collection and case resolution.
Application example 2:
a legal logger has 200 ten thousand deposits on a bank account, when the legal logger encounters hijacking, the legal logger can only select the password which is forced to be handed out to log in a bank savings card, because the legal logger presets a plurality of login passwords with different purposes in advance, after one specific password is used for inserting and logging in a POS, the account only presents 2 ten thousand deposits, and after the hijacking person takes out cash from the POS machine, the legal logger is released.
Application example 3:
the method is characterized in that a legal logger has to make a choice of paying money to a threat person under the condition of being threatened, because the legal logger presets a plurality of login passwords with different purposes for a mobile phone bank account in advance, when the legal logger logs in a mobile phone bank for transferring money by using one specific password, a positioning function and a mobile phone recording function are firstly opened in a concealed mode, positioning information of a place of issue and a process of communication between two parties in language at the time of the issue are recorded, and evidence is left for maintaining right by legal means in the future.
Application example 4:
when a legal login person encounters hijacking, the hijacking person threatens to let the legal login person open the login screen locking password of the mobile phone, and because the legal login person presets a plurality of login screen locking passwords with different purposes for the mobile phone in advance, after the legal login person logs in the mobile phone by using one specific password, only the APP allowed to be displayed in advance appears on the screen of the mobile phone, and other APPs are all hidden.
Application example 5:
in order to strengthen the safety of deposit, 2000 thousands of deposits are deposited on the bank account of a legal logger, and in order to strengthen the safety of deposit, 2000 deposits can be seen after logging in the account of the bank system only by providing a group of correct fingerprint information one by one according to a preset sequence in advance, and subsequent transfer or withdrawal operation is carried out. For example, the operation sequence for implementing the login is: firstly, identifying the middle finger of the left hand, then identifying the middle finger of the right hand, then identifying the ring finger of the left hand, and finally manually inputting a string of passwords. Whether the supplied fingerprint information is not correct or the supplied sequence is not correct, or the input password is not correct, the login is not successful.
Application example 6:
a face recognition function is opened by a legal login person in a mobile phone bank, and the legal login person presets a plurality of face login passwords with different purposes and different characteristics in advance, wherein one of the face login passwords is as follows: the legal loggers keep the mouth opening state all the time when face recognition is carried out, only 2000 yuan deposit is presented in the account after login, meanwhile, the positioning function and the mobile phone recording function are automatically started, the time and place positioning information and the process of language communication of the two parties at the moment are recorded, and evidence is left for future disposal.
Application example 7:
the bank account of a legal registrant has 5000 thousands of deposits, and the legal registrant is preset with a plurality of login identification information with different purposes in advance. If the bank system is logged in through single face recognition, only a single fund below 5 ten thousand dollars can be seen and controlled in the account.
If the bank system is logged in after the serial verification of a group of fingerprints (first, the middle finger of the left hand is identified, then the middle finger of the right hand is identified, and then the ring finger of the left hand is identified), a single pen of funds below 20 ten thousand yuan can be seen and controlled in the account.
If the bank system is logged in after a series of fingerprint verification (first identifying the middle finger of the left hand, then the middle finger of the right hand, and then the index finger of the left hand), a single pen of funds below 100 ten thousand yuan can be seen and controlled in the account.
If the user logs in the bank system after the fingerprint is verified in sequence through a group of fingerprints (firstly, the middle finger of the left hand is recognized, then, the middle finger of the right hand is recognized, and then, the mother finger of the left hand is recognized), then, a password is added for verification, and the user logs in the bank system after the password is verified, so that all funds in the account can be seen and controlled.
If the user logs in the bank system after passing only one password authentication, a single fund below 5 ten thousand yuan can be seen and controlled in the account. Meanwhile, the concealment gives an alarm to the police. The personal information, the time of the accident and the position information of the place are reported, thereby providing clues for the police to check, rescue, collect evidence and solve the case.
Application example 8:
an intelligent door lock with remote communication capability is installed in a certain household, and besides a password for normally opening the door, a password for opening the door and giving an alarm to the outside is also set. When a certain family is clamped by other people to open the door, the password for alarming is used while the door is opened, so that the personal safety of the clamped person is protected, and the person can alarm for seeking rescue without sound and color.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (3)

1. An identity recognition post-processing method is characterized in that a legal logger sets one or more preset additional logging identity recognition information for the legal logger besides the preset logging identity recognition information for the same account, which is logged in an information system and/or an intelligent device in a normal logging state, so that the legal logger logs in different and specific logging states respectively by using different preset additional logging identity recognition information; when the information system and/or the intelligent device performs login operation, the information system and/or the intelligent device compares the received login identification information with all preset login identification information of the legal login user in the same account including the preset additional login identification information one by one, if the received login identification information is matched with one of the information, the information system and/or the intelligent device logs in the corresponding normal login state or the different and specific login states according to the preset setting, and if the received login identification information is not matched with one of the information system and/or the intelligent device, the information system and/or the intelligent device refuses to log in, wherein the different and specific login states comprise:
(1) after logging in, the device can be used for alarming or asking for help;
(2) after logging in, the information system and/or the intelligent device is concealed to stop normal logging operation or guide the information system and/or the intelligent device to enter preset follow-up operation, wherein the follow-up operation comprises the step of starting different ways and/or devices for recording and/or sending the logging-in time and place and logging-in post-incident personnel and event information to the outside;
(3) the authority, assets, wealth, money, funds, resources, functions and benefits which are all owned by a legal login user under the same account of the information system and/or the intelligent device are allowed to be set in advance, and the authority, assets, wealth, money, funds, resources, functions and benefits of one part of the same account of the information system and/or the intelligent device are hidden and can not be operated after login;
(4) based on the logical algebraic combination of some or all of the different and specific login states in (1), (2), and (3).
2. The method as claimed in claim 1, wherein a set of login identification information is preset for the legitimate login user to complete a login operation in the normal login status or the different and specific login statuses; allowing the legal loggers to submit the login identification information set in the group one by one for the information system and/or the intelligent device according to the sequence set in the group, and using the login identification information to log in the normal login state or the different and specific login states; and if and only if the group of login identification information submitted according to the sequence set in the group is completely verified, allowing the information system and/or the intelligent device to login into the normal login state or the respective different and specific login state.
3. The method for processing after identity recognition according to claim 1, wherein the concealed initiation of external alarm and help seeking after logging in means that the information system and/or intelligent device alarms to a remote organization or individual with the ability to receive and process alarm information through wired and/or wireless network communication means.
CN202010716593.7A 2020-07-23 2020-07-23 Identity recognition post-processing method Withdrawn CN111859326A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010716593.7A CN111859326A (en) 2020-07-23 2020-07-23 Identity recognition post-processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010716593.7A CN111859326A (en) 2020-07-23 2020-07-23 Identity recognition post-processing method

Publications (1)

Publication Number Publication Date
CN111859326A true CN111859326A (en) 2020-10-30

Family

ID=72950959

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010716593.7A Withdrawn CN111859326A (en) 2020-07-23 2020-07-23 Identity recognition post-processing method

Country Status (1)

Country Link
CN (1) CN111859326A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509394A (en) * 2011-11-01 2012-06-20 卢清伟 Multi-account management system based on IC (identification card) and identification password combined login
CN105956856A (en) * 2016-04-18 2016-09-21 宇龙计算机通信科技(深圳)有限公司 Account controlling method and account controlling system
CN106504086A (en) * 2016-10-20 2017-03-15 方琳 A kind of method and bank account system for protecting bank account safety
CN109587123A (en) * 2018-11-21 2019-04-05 许继集团有限公司 Double factor verification method and certificate server, biometric authentication service device
CN109584058A (en) * 2018-09-29 2019-04-05 阿里巴巴集团控股有限公司 A kind of object control method, apparatus, equipment and medium
CN110717166A (en) * 2018-07-11 2020-01-21 深圳市阿丹能量信息技术有限公司 Vehicle-mounted identity recognition method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509394A (en) * 2011-11-01 2012-06-20 卢清伟 Multi-account management system based on IC (identification card) and identification password combined login
CN105956856A (en) * 2016-04-18 2016-09-21 宇龙计算机通信科技(深圳)有限公司 Account controlling method and account controlling system
CN106504086A (en) * 2016-10-20 2017-03-15 方琳 A kind of method and bank account system for protecting bank account safety
CN110717166A (en) * 2018-07-11 2020-01-21 深圳市阿丹能量信息技术有限公司 Vehicle-mounted identity recognition method and system
CN109584058A (en) * 2018-09-29 2019-04-05 阿里巴巴集团控股有限公司 A kind of object control method, apparatus, equipment and medium
CN109587123A (en) * 2018-11-21 2019-04-05 许继集团有限公司 Double factor verification method and certificate server, biometric authentication service device

Similar Documents

Publication Publication Date Title
US8433921B2 (en) Object authentication system
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN101763672A (en) Centralized management system for fingerprint access control system
CN109410407A (en) A kind of face and fingerprint recognition access control system
CN104680670A (en) Re-encryption/encryption technique solution for key control points during bank card operation on ATM (automatic teller machine)
CN103646200A (en) Encoding encryption application method for human face information
CN109461241A (en) A kind of face and fingerprint identification entrance guard system control method
Schneier Sensible Authentication: According to the author of Beyond Fear, it’s not enough to know who you are; you’ve got to prove it.
CN109522694A (en) A kind of identification system based on computer network
CN106710033B (en) Entrance guard opening method and device
Bose Intelligent technologies for managing fraud and identity theft
CN110349301A (en) Gate inhibition's open method and device
CN111859326A (en) Identity recognition post-processing method
CN207938057U (en) Bank vault place remote Defending door control system
JP5978114B2 (en) Entrance / exit management system and program thereof
Fernandes Biometric ATM
JP4008626B2 (en) Integrated management system for entry / exit and equipment use
CN110675880B (en) Identity verification method and device and electronic equipment
Lunawat et al. 3-Level Authentication for Bank Locker Security
CN110335373A (en) Intelligent door lock and intelligent access control system
US20190199701A1 (en) Securitization of Temporal Digital Communications Via Authentication and Validation for Wireless User and Access Devices
Zibran Biometric authentication: The security issues
CN101359410A (en) Bank account and bank card password wall technology
Armington et al. Biometric authentication in infrastructure security
Mills et al. Cybercrimes against consumers: could biometric technology be the solution?

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20201030

WW01 Invention patent application withdrawn after publication