CN115758297A - Verification method and device - Google Patents

Verification method and device Download PDF

Info

Publication number
CN115758297A
CN115758297A CN202211424058.XA CN202211424058A CN115758297A CN 115758297 A CN115758297 A CN 115758297A CN 202211424058 A CN202211424058 A CN 202211424058A CN 115758297 A CN115758297 A CN 115758297A
Authority
CN
China
Prior art keywords
verification
mode
result
score
verification mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211424058.XA
Other languages
Chinese (zh)
Inventor
厉科嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN202211424058.XA priority Critical patent/CN115758297A/en
Publication of CN115758297A publication Critical patent/CN115758297A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application discloses a verification method and a verification device. In one verification process, each time the verification mode is selected, the score corresponding to the verification process is determined according to the verification result corresponding to the selected verification mode, the verification mode is stopped from being continuously selected for verification until the score is enough to indicate whether the identity of the requester is legal, and the final result is output. By the embodiment of the application, the safety and the reliability of the verification method can be ensured, and the convenience of the verification method can be improved.

Description

Verification method and device
Technical Field
The present application relates to the field of information technologies, and in particular, to a verification method and apparatus.
Background
In the internet era, how to ensure the account security of a user is extremely important, so that the account of the user is not stolen by lawbreakers. The main means for ensuring the security of the account of the user is to perform authentication on a requester who requests to operate the account (such as operations of logging in the account, modifying the password of the account, setting the attribute of the account, and the like) so as to ensure that the requester is the user himself.
The existing identity authentication methods mainly comprise the following two methods: 1. and the identity of the requester is verified by adopting one of verification modes such as an account password, a mobile phone verification code, fingerprint identification and the like. 2. The identity authentication is performed by adopting more than one authentication mode, and the user can be allowed to operate the account of the user only by sequentially performing authentication in multiple authentication modes.
However, the mode is too dependent on a certain verification mode, and is easily cracked by lawless persons, so that the account security of the user is endangered. Although the second mode improves the account security of the user to a certain extent, the user himself has to deal with the authentication of a plurality of continuous authentication modes each time the user needs to operate the account, which causes great inconvenience to the user.
Disclosure of Invention
The embodiment of the application provides a verification method and a verification device, and aims to solve the problems of poor safety and low convenience of the existing verification method.
In order to solve the above technical problem, the embodiment of the present application is implemented as follows:
an authentication method provided by an embodiment of the present application includes:
when the verification process is triggered, selecting at least one verification mode from a plurality of verification modes for verification to obtain a verification result corresponding to the verification mode;
determining a score corresponding to the verification process according to the verification result;
judging whether to end the verification process or not according to the score;
if yes, outputting a final result of the verification process;
otherwise, continuing to select a verification mode for verification.
An authentication device provided in an embodiment of the present application includes:
the verification selection module is used for selecting at least one verification mode from a plurality of verification modes to carry out verification when a verification flow is triggered to obtain a verification result corresponding to the verification mode;
the determining module is used for determining a score corresponding to the verification process according to the verification result;
the judging module judges whether to end the verification process or not according to the score; if yes, outputting a final result of the verification process; otherwise, continuing to select a verification mode for verification.
As can be seen from the above technical solutions provided in the embodiments of the present application, in one verification process, each time a verification manner is selected, a score corresponding to the verification process is determined according to a verification result corresponding to the selected verification manner, and until the score corresponding to the verification process is enough to indicate whether the identity of the requester is legal, the verification process is stopped from being continuously selected for verification, and a final result is output. Therefore, whether the identity of the requester is legal or not is taken as the basis for finishing the verification process by the score value, and the safety and the reliability of the verification process are ensured. In addition, in the whole verification process, the used verification modes are not fixed, the number of the used verification modes is also not fixed, and a user only needs to face the verification of a small number of verification modes at times, so that the convenience of the verification method is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the description below are only some embodiments described in the present application, and for those skilled in the art, other drawings may be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a verification method provided in an embodiment of the present application;
fig. 2 is a schematic diagram of an authentication apparatus according to an embodiment of the present application.
Detailed Description
The embodiment of the application provides a verification method and device.
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making creative efforts shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart of a verification method provided in an embodiment of the present application, including the following steps:
s101: when the verification process is triggered, at least one verification mode is selected from the plurality of verification modes for verification, and a verification result corresponding to the verification mode is obtained.
The execution main body of the method can be a server or a terminal with an identity recognition function.
The authentication method provided by the embodiment of the application can be used for identity authentication in various service scenes, such as account management, terminal security management, access control management and the like. In a service scene of account management, identity verification can be performed on a requester who requests to operate an account so as to ensure that the requester is the user, wherein the action of operating the account can be login of the account, and can also be setting of account attributes, such as account password modification, payment password modification, bound mobile phone number modification and the like; the method can also be used for daily security maintenance of the account, and the server spontaneously verifies the identity of an operator who operates the account so as to avoid abnormal conditions. Hereinafter, for convenience of description, the requester is used as a target of authentication, and is not described in detail.
The authentication process described in the embodiment of the present application refers to a whole process of performing authentication for a requester or an operator and finally outputting a final result of the authentication.
In this embodiment of the application, the verification process may be triggered by a specific event, where the event may be any event related to authentication, such as sending an account operation request by a requester, or the server autonomously performs the verification according to a preset time point or condition, such as "autonomously authenticate an operator currently logging in the account every 2 hours" or triggering the verification process when there is an abnormal operation. In short, the event has an attribute capable of triggering the verification process, and the event is not specifically limited in the present application.
In the embodiment of the application, a plurality of verification modes can be prestored on the server, when the verification process is triggered, the server selects at least one verification mode from the prestored verification modes for verification, and obtains a verification result corresponding to the selected verification mode; the authentication modes do not need to be stored in advance, and when the authentication flow is triggered, the server requests external input of a plurality of authentication modes (for example, requests a manager of the server to input a plurality of authentication modes) for selection by the server. For convenience of description, the following description will be made by taking as an example that several verification means are prestored.
For example, a hacker wants to invade an account of a certain user, the hacker triggers an account login interface as a requester, and then triggers an authentication process, and if the server selects an authentication method of "account and password" for authentication, prompt information is displayed in the login interface to request the requester to input the account and the password corresponding to the account that the hacker wants to log in, and after the requester inputs the account and the password and determines the account and the password, if the server determines that the corresponding relationship between the account and the password input by the requester is correct, the authentication result corresponding to the authentication method is determined to be passed, and if the corresponding relationship between the account and the password input by the requester is incorrect, the authentication result corresponding to the authentication method is determined to be failed.
The pre-stored authentication means may include, but is not limited to, the following authentication means: account password, security problem, short message verification code, e-mail, biometric identification (such as face identification, iris identification, fingerprint identification), voice identification, electronic signature, digital certificate, two-dimensional code, handwriting or mark scanning identification, location information verification, login equipment verification, user habit verification, and the like.
The verification result may typically be a pass or a fail. Specifically, for some authentication methods, such as fingerprint identification, the authentication result obtained by using fingerprint identification to authenticate the identity of the requester is not that which is the case, and a threshold value of fingerprint matching degree is usually set, such as 95%, where fingerprint matching degree is greater than 95% and is equivalent to passing authentication, and fingerprint matching degree is less than 95% and is equivalent to failing authentication.
In the embodiment of the present application, the authentication results obtained by using an authentication method such as fingerprint identification are not distinguished from each other, but different fingerprint matching degrees are used as the authentication results, such as 95% of the authentication results or 99% of the authentication results.
In the embodiment of the present application, the server may randomly select a verification manner from among the pre-stored verification manners to perform verification, or may select a verification manner from among the pre-stored verification manners to perform verification in a certain order. Moreover, the server may select more than one authentication mode at a time for authentication, which is not limited in the present application. For convenience of description, the following description will be made by taking one verification mode as an example, and it should be understood by those skilled in the art that, based on the same technical principle, a mode of selecting more than one verification mode at a time and obtaining the verification results corresponding to the verification modes to perform the subsequent steps is also within the protection scope claimed by the present application.
When the verification mode is selected, the verification mode corresponding to the event can be selected from the pre-stored verification modes for verification according to the attribute of the event triggering the verification process. Specifically, a plurality of verification methods corresponding to each event may be set in advance for each event according to the attribute of the event, and when the flow to be verified is triggered, a verification method may be selected from the verification methods corresponding to the event according to the attribute of the event triggering the verification flow and according to a certain rule for verification. And even if the verification mode needs to be continuously selected for verification subsequently, the verification mode corresponding to the event can be continuously selected for verification.
The attribute of the event may be a security level corresponding to the event, a task type corresponding to the event, and the like. For example, if the event is that the requester requests to modify the password of the account, the security level corresponds to a first level, and thus the server may select the authentication modes in order from the authentication modes corresponding to the security level of the first level for authentication.
In the embodiment of the application, in order to make it difficult for lawless persons to catch the rule of selecting the verification mode by the server, the verification mode can be selected from the pre-stored verification modes for verification according to the probability of selecting each verification mode.
It should be noted that, for each account, the probability of selecting each verification method (the selection probability of each verification method) may be related to the habit of the user corresponding to the account. That is, the selection probability of each authentication method corresponding to each account may be set according to the habit of the user corresponding to the account.
Specifically, operation data generated when the user operates the account of the user historically may be acquired for each user, the preference of the user for each verification manner may be determined according to the acquired operation data, and the selection probability of each verification manner corresponding to the account of the user may be set according to the preference.
For example, according to operation data generated by the user a operating the account historically, the fact that the user a likes to set a complex password is known, and the pass rate of the password authentication mode is high, it can be determined that the user a has a high preference for the password authentication mode, and the selection probability of the password authentication mode corresponding to the account of the user a can be further determined to be high.
In addition, after the user generates new operation data for each user, the selection probability of each verification mode corresponding to the account of the user can be dynamically adjusted to better meet the preference of the user.
In the embodiment of the present application, a probability corresponding to each verification method may be set in advance for each verification method, as the probability for selecting the verification method. Thus, the probability table shown in table 1 can be obtained.
Verification mode Probability of
Verification mode 1 20%
Verification mode 2 5%
……
Verification mode N-1 6.5%
Verification mode N 0.6%
TABLE 1
For example, the probability of selecting authentication method 1 is 20%, which means that authentication method 1 has a probability of being selected by 20% when selecting authentication method, and so on.
S102: and determining a score corresponding to the verification process according to the verification result.
In this embodiment of the present application, the manner of determining the score according to the verification result may be: and for each verification mode, pre-storing the scores corresponding to different verification results corresponding to the verification mode. Specifically, for each verification mode, when the verification result is pass, the score a corresponding to the verification mode may be stored in advance, and when the verification result is fail, the score B corresponding to the verification mode may be stored in advance. Therefore, each time one verification mode is selected for verification to obtain a verification result, the corresponding score is obtained through inquiry according to the verification result corresponding to the verification mode and is used as the score corresponding to the verification process.
Further, the manner of determining the score according to the verification result may also be: determining a stepping value corresponding to the verification mode according to the verification result; when the verification mode is the verification mode selected for the first time in the verification process, the step value corresponding to the verification mode is accumulated in the initial value corresponding to the verification process to obtain the value corresponding to the verification process; and when the verification mode is a verification mode which is not selected for the first time in the verification process, accumulating the step value corresponding to the verification mode into the score determined by the verification mode selected for the last time so as to re-determine the score. When the verification process is triggered, the initial state of the verification process corresponds to an initial score. The initial score may be 0 or any value, which is not limited in this application.
For each verification mode, a first alternative value and a second alternative value corresponding to the verification mode can be preset. When the score corresponding to the verification process is determined by adopting the accumulation mode, the first alternative value is a positive value, and the second alternative value is a negative value. If the verification result is passed, determining a first alternative value corresponding to the verification mode as a stepping value corresponding to the verification mode; and if the verification result is that the second candidate value does not pass the verification result, determining the second candidate value corresponding to the verification mode as the stepping value corresponding to the verification mode. It can be seen that for a certain way of verification, the first alternative value is actually the step value when the verification passes, and the second alternative value is actually the step value when the verification does not pass.
Of course, the score corresponding to the verification process may also be determined by multiplying the step values, and when this is adopted, the initial score should be greater than 0, the first candidate value should be greater than 1, and the second candidate value should be between 0 and 1.
In particular, for particular authentication means such as fingerprint recognition, as previously described, the authentication results are not otherwise (pass or fail). Thus, for this particular way of verification, different verification results may correspond to different alternative values.
Specifically, for a particular authentication method, candidate values corresponding to the respective authentication results may be stored in advance as the candidate values corresponding to the authentication method, based on the respective authentication results corresponding to the authentication method. The size of the candidate value corresponding to a certain verification result may be determined by a specific algorithm or may be specified.
For example, taking the fingerprint identification verification method as an example, if the fingerprint matching degree (the verification result of the fingerprint identification method) is not less than 95% and can be regarded as passing the verification, and less than 95% can be regarded as failing the verification, 95% can be used as a critical value, if the verification result is not less than 95%, the candidate value corresponding to the verification result is a positive value, and if the verification result is less than 95%, the candidate value corresponding to the verification result is a negative value. The candidate value corresponding to 95% match may be set to 0.5, the candidate value corresponding to 96% match may be set to 1.2, the candidate value corresponding to 99% match may be set to 3, the candidate value corresponding to 90% match may be set to-0.6, the candidate value corresponding to 20% -85% match may be set to-5, etc. Thus, the corresponding alternative value can be used as the step value according to the verification result.
S103: and judging whether the verification process is finished or not according to the score, if so, executing a step S104, and otherwise, executing a step S105.
In the embodiment of the application, the score value has the function of quantitatively indicating whether the verification process is performed enough to judge whether the requester is the user himself or herself, if so, the verification process can be ended without continuously selecting the next verification mode for verification, and if not, the next verification mode is continuously selected for verification.
In the prior art, when multiple authentication methods are used for authentication, although the safety is ensured to a certain extent, the user himself has to face the authentication of multiple authentication methods, which is unnecessary for the user himself and brings great inconvenience to the user. In the embodiment of the application, on one hand, the score corresponding to the verification process is determined by the verification result obtained by each verification in the verification process, so that whether the verification process can be ended or not can be quantitatively evaluated, and a reliable final result can be output; on the other hand, because of the existence of the score, whether the final result is reliable or not is no longer strongly dependent on the number of the verification modes, but is directly related to the score, and sometimes the verification process can be ended by only using one or two verification modes, and the determined final result is output. That is to say, the verification method provided by the embodiment of the application has both the reliability of the final result and the convenience of the verification process.
In the embodiment of the present application, if the score is greater than a first threshold or less than a second threshold, the verification process is ended; if the score is not greater than the first threshold and not less than the second threshold, not ending the verification process; the first threshold is greater than the second threshold.
The first threshold and the second threshold are preset and can be regarded as the upper limit and the lower limit of the score, and when the score is between the first threshold and the second threshold, the condition that whether the identity of the requester is legal or not is not enough according to the score is described, and the verification needs to be continued; when the score is greater than a first threshold, indicating that the score is sufficient to indicate that the identity of the requestor is legitimate; when the score is less than a second threshold, the score is sufficient to indicate that the identity of the requester is not legitimate. Thus, the larger the score, the higher the likelihood that the identity of the requestor is legitimate.
In this embodiment, the first threshold and the second threshold may also be determined according to an event that triggers the verification process. As mentioned above, different events have different attributes, and often correspond to different security levels, and the security levels are represented by setting the first threshold and the second threshold. If a certain event corresponds to a higher security level, the first threshold and the second threshold corresponding to the authentication process triggered by the event are both higher, so that the requester needs to obtain a higher score after entering the authentication process to be able to pass the authentication process, and if the score obtained by the requester is not very high, the requester is easily smaller than the second threshold and is determined as an authentication failure.
In this embodiment of the present application, when the score is determined by using a step-by-step value accumulation manner, the score may be regarded as the accumulation of effects of the previous verifications in the verification process, where the score being greater than the first threshold may indicate that positive effects of the previous verifications are sufficiently large to enable the requester to be identified as the user, and the score being smaller than the first threshold may indicate that negative effects of the previous verifications are sufficiently small to enable the requester to be identified as the user.
Since the first threshold and the second threshold are actually upper and lower limits of the score, the score is obtained by accumulating the step values corresponding to each verification mode, and the step values corresponding to each verification mode are directly determined by the alternative values corresponding to each verification mode, the alternative values corresponding to the set verification modes, the first threshold and the second threshold may have a restricted relationship with each other.
Specifically, the candidate value corresponding to each authentication method may be set in consideration of the security level of the authentication method, and the appropriate first threshold value and second threshold value may be set according to the candidate value corresponding to each authentication method. The proper standard is that the positive cumulative effect of the stepping value obtained by a verification method with stronger safety on the value is more obvious, so that the cumulative value can be closer to a first threshold value; the positive accumulation effect of the stepping value determined by the verification method with weaker safety on the score is poorer, so that the accumulated score has a certain difference with the first threshold value. Similarly, the negative accumulation effect of the step value which is not obtained by the verification method with stronger security on the score is stronger, and the negative accumulation effect of the step value which is not obtained by the verification method with weaker security on the score is weaker, so that the details are not repeated.
For example, if the verification result with a fingerprint matching degree of 99% can determine that the requester is the principal, the first candidate value corresponding to the verification result may be 10; or a verification result with a fingerprint matching degree of 20% may conclude that the requester is not the user himself, the second alternative to which the verification result corresponds may be-20. If the first threshold is 3 and the second threshold is-2, in this example, the identity of the requester can be directly determined only by using a fingerprint identification verification method, a score value that can end the verification process is obtained, and a corresponding final result is output.
For another example, if the first alternative value corresponding to the verification mode of the mobile phone verification code is 1.5, the second alternative value is-1.8, the first threshold value is 3, and the second threshold value is-2, then the verification mode of the mobile phone verification code is only used for verification, no matter how the verification result is, the identity of the requester cannot be directly identified, and it is also necessary to accumulate the step value corresponding to the verification mode into the score determined by the last selected verification mode, so as to determine whether to end the verification process.
S104: and outputting the final result of the verification process.
In the embodiment of the application, when the verification process is finished, if the score is greater than a first threshold, a final result of successful verification is output; and if the score is smaller than a second threshold value, outputting a final result of verification failure.
S105: and continuously selecting a verification mode for verification.
And if the verification process cannot be ended after the verification is carried out in the first verification mode, continuously selecting a verification mode from the prestored verification modes for verification.
As described above, the verification method corresponding to the event may still be selected from the pre-stored verification methods according to the attribute of the event that triggers the verification process. It can be seen that steps S102-S105 may be performed in a loop.
In step S105, in addition to the verification method being continuously selected based on the probability of each verification method as shown in table 1, the verification method may be continuously selected based on the transition probability between the verification methods. Specifically, the probability of the initial state being transferred to each verification manner may be set in advance for the initial state of the verification flow, and the probability of the verification manner being transferred to each verification manner may be set in advance for each verification manner. The initial state refers to a state of the verification process when the verification process is triggered and verification by a verification mode is not started yet. In this way, the following n × n matrix is obtained:
Figure BDA0003941205070000111
wherein, a ij The probability value of the ith row and the jth column represents the probability of the ith verification mode being transferred to the jth verification mode. And initial state transfer to each verifierThe probability of formula is considered as an n x 1 vector a 01 a 02 a 03 ……a 0n-1 a 0n Where 0 represents the initial state.
It should be noted that, instead of the n × 1 vector, the verification method (i.e., verification method 1) may be such that the initial state is regarded as a blank, and the probability of the initial state being shifted to each verification method may be regarded as the probability a of the verification method 1 being shifted to each verification method 1j
Moreover, a certain authentication method may also be transferred to itself with a certain probability. Of course, a certain verification method may not be able to transfer to itself, and then the probability of transferring to itself is 0%. This is not specifically limited by the present application.
When the transition probabilities shown by the matrix are configured in advance, if a verification mode is selected for the first time in the verification process, selecting a verification mode from prestored verification modes for verification according to the probability of transition from the initial state to each verification mode; and if the verification mode is not selected for the first time in the verification process, selecting the verification mode from the prestored verification modes for verification according to the probability that the verification mode selected for the last time is transferred to each verification mode. For example, if the selected last verification mode is verification mode 3, the server selects this time according to the probability a of transferring to each verification mode according to verification mode 3 3j A selection is made.
The verification mode is selected according to the transition probability, the unpredictability of the verification mode and the unpredictability of the transition of the subsequent verification mode can be selected for the first time, so that the lawbreaker can hardly grasp the rule of selecting the verification mode, and the difficulty of the lawbreaker in passing through the verification process is increased.
With the verification method shown in fig. 1, in one verification process, each time a verification mode is selected, the score corresponding to the verification process is determined according to the verification result corresponding to the selected verification mode, until the score corresponding to the verification process is enough to indicate whether the identity of the requester is legal, the verification process is stopped from being continuously selected for verification, and a final result is output. Therefore, the score is enough to indicate whether the identity of the requester is legal or not as the basis for finishing the verification process, and the safety and reliability of the verification process are ensured. Also, the number of authentication methods used throughout the authentication process is not necessarily the number, depending on when the score is sufficient to indicate whether the identity of the requestor is legitimate or not. Therefore, compared with the existing verification method that the user has to face the verification of a plurality of continuous verification modes, the user in the embodiment of the application only needs to face the verification of a small number of verification modes, and the convenience of the verification method is improved.
Meanwhile, the user can choose to intentionally not pass the verification of the verification mode on the premise of ensuring that the score determined according to a certain verification mode is not enough to indicate that the identity of the requester is illegal, thereby skipping the verification mode and directly facing the verification of the next verification mode. That is to say, in this application embodiment, the user can choose to skip the verification mode that the user is not accustomed to, which further improves the convenience.
In addition, in practical application, the user may operate carelessly, and the verification may not be passed due to an input error, and in such a case, if the verification result of the verification is directly determined to be not passed, inconvenience may be caused to the user. Therefore, in the embodiment of the application, one verification mode can be selected from the pre-stored verification modes to perform multiple times of verification, so as to obtain the verification result corresponding to each time of verification, and the score corresponding to the verification process is determined according to the verification result corresponding to each time of verification.
Therefore, when the verification result is passed, the verification method does not need to be used for verifying once again; and when the verification result is failed, the server gives the requester at least one opportunity to re-input, and determines the score according to the verification result corresponding to each verification. For a lawbreaker, the number of attempts to crack a verification mode is often counted in hundreds, and the cracking difficulty is not obviously reduced by inputting the verification mode again once or twice.
Moreover, when the score is determined by using a step-by-step value accumulation manner, there may be a special case that when a requester is faced with a series of verification manners, some verification manners pass and some verification manners do not pass, and the number of the passed verification manners and the number of the failed verification manners are substantially equal, so that the score always swings up and down, cannot approach the first threshold or the second threshold, and further causes that the verification process cannot be finished late, and thus, a reliable verification result cannot be output, and great inconvenience is caused to a user.
In the embodiment of the present application, in consideration of the above special cases, a forced termination condition may be set for the verification process. If the times of selecting the verification mode is more than the specified times or the time consumed by the verification process is more than the specified duration, ending the verification process and outputting the final result of verification failure. Of course, other forced termination conditions may be set, and the present application is not limited thereto.
In addition, in order to further improve the convenience of the method for the user, in the verification process of a specific service scene, the verification mode selected by the server for the first time can be a verification mode with higher safety in the service scene, the first alternative value corresponding to the verification mode with higher safety is larger, and when the user faces identity verification, as long as the user successfully passes the first verification, the score value corresponding to the verification process is close to or directly exceeds the first threshold value. Therefore, when the user himself is faced with the identity authentication, the user can only need to test in one to two authentication modes. Meanwhile, a lower second alternative value can be set for the first selected verification mode, when a lawbreaker faces identity verification, the first faced verification mode with higher security is checked, the lawbreaker is most likely to fail in verification, once the verification fails, the server does not try for the lawbreaker, the step value corresponding to the verification mode is directly determined to be the second alternative value, and then the value directly approaches the second threshold value or is lower than the second threshold value, so that the server outputs the final result of the verification failure.
In the embodiment of the application, several security verification modes can be designated as the verification mode selected for the first time by setting the probability of the initial state to be transferred to each verification mode. For example, in a payment scenario, the probability of transferring the initial state to the fingerprint recognition mode may be set to 80%, the probability of transferring the initial state to the mobile phone verification code mode may be set to 5%, the probability of transferring the initial state to the voice recognition mode may be set to 15%, and the probability of transferring the initial state to each of the remaining verification modes may be set to 0%.
It should be noted that, according to the attribute of the event triggering the verification process, the corresponding security level may be determined, and then several verification methods corresponding to the security level may be designated as the verification method selected for the first time. The specific authentication mode to be selected for the first time can be determined according to the probability of the initial state being transferred to the several authentication modes.
Further, in this embodiment of the application, for each verification manner appearing in the verification flow, the probability of selecting the verification manner may be adjusted according to the verification result corresponding to the verification manner.
The time for adjusting the probability of selecting the verification mode is not particularly limited, and the method can be carried out asynchronously after the verification process is finished or synchronously in the verification process.
Specifically, for a certain verification method, if the verification result corresponding to the verification method is passed, the probability of selecting the verification method is increased; and if the verification result corresponding to the verification mode is failed, reducing the probability of selecting the verification mode.
Of course, there may be various methods for dynamically adjusting the probability of selecting the verification mode, for example, it may be specified that the probability of the verification mode 1 being transferred to the verification mode 2 is inversely proportional to the number of times the verification mode 2 fails; it is also possible to specify "the probability of transition of verification mode 1 to verification mode 2" = "the sum of step values historically corresponding to verification mode 2"/"the sum of step values historically corresponding to all verification modes"; the probability of selecting the verification mode can be dynamically adjusted according to indexes such as the use times of the verification mode, the accuracy, the user preference, the verification mode which is difficult to be cracked by lawbreakers and the like.
In a word, the principle of adjusting the probability of selecting the verification mode is that the verification mode with high pass rate and less failure times is often the verification mode according with the habit of the user, and the corresponding probability should be larger; the verification mode with low pass rate and multiple failure times is often a verification mode which is repeatedly tried to be cracked by a lawbreaker, and in order to make the effort of trying to crack by the lawbreaker aiming at the verification mode before, the probability corresponding to the verification mode should be reduced. Therefore, the server preferentially provides a verification mode which accords with the habit of the user and has higher safety for verification, so that the user can more easily and quickly pass through the verification process, and a lawbreaker can more difficultly pass through the verification process.
The main way for a lawbreaker to break the verification mode is trial and error, which inevitably leads to that the lawbreaker can continuously try when confronted with the verification of one verification mode, and the verification can be successful after failing for many times. However, in the embodiment of the present application, once a verification mode fails or two or three consecutive verifications are different, the verification mode is immediately transferred to the next verification mode for verification, so that the lawless persons will not try to continue to try, the previous try of the lawless persons is equivalent to doing useless work, the probability corresponding to the verification mode that the lawless persons try to crack repeatedly is reduced, the transferred next verification mode is probably not the same verification mode, and the lawless persons have to crack a new verification mode again. That is to say, the more costly the lawbreaker is trying to pass through the verification process, the lower the probability corresponding to the verification method that the lawbreaker is trying to crack is made by the server, and the higher the cost it consumes in which verification method, the greater the amplitude of the reduction in the probability corresponding to which verification method is adjusted, and the harder the lawbreaker is to pass through the verification process.
It can be seen that, in the embodiment of the present application, when the verification manner is selected by the probability of selecting the verification manner, the selection of the verification manner is unpredictable, and the transition between the verification manners is also unpredictable. Compared with the prior art, the difficulty of passing the verification process by lawless persons is also obviously improved.
In addition, in the prior art, when a plurality of verification modes are used for verification, the requesters are tested in turn according to a certain sequence, the verification result of each verification mode is fed back to the requesters in real time, so that the continuous trial and error of lawbreakers are facilitated actually, and when the requesters are lawbreakers, the requesters can break through the verification modes one by one. Assuming that the cost consumed by a lawbreaker to break one verification method on average is 100, the cost required by the lawbreaker to verify N verification methods in the prior art is 100 × N.
In the embodiment of the application, the server obtains the verification result by selecting the verification mode once and determines the score according to the verification result, but the verification result or the score is not fed back to the requester, so that the trial and error cost of a lawbreaker is increased. Or, assuming that the cost consumed by a lawbreaker to averagely break one verification mode is 100, the cost required to be consumed by the lawbreaker when facing the continuous N verification modes in the embodiment of the application is 100^ N, and the cost is exponentially improved compared with the cost in the prior art.
Although it is difficult for a lawbreaker to pass through the verification process, the user can often pass through the verification process quickly. The first authentication mode that the server can select for the first time can be an authentication mode with higher security, so that the score is not far from the first threshold value once the user passes through the authentication mode; secondly, the server only carries out one or a few times when using one verification mode, then determines the score according to the verification result, and the user often only needs one or a few times to pass a certain verification mode, so that the score is accumulated towards the front direction; thirdly, the probability corresponding to each verification mode can be dynamically adjusted, so that the user habit is better met, and the user can quickly pass through the whole verification process.
In the embodiment of the present application, each pre-stored verification manner may include some verification manners with low disturbance degree, such as location information and device information. The authentication method with low disturbance level means that when the requester is authenticated by using such an authentication method, the requester is not required to input information, and the requester does not perceive it and the authentication is actually performed in the background. The verification mode with low disturbance degree is used, so that inconvenience is not caused to the user. For example, when the verification is performed by using the verification method of the location information, the terminal may determine, by GPS positioning, the location of a requester currently using the terminal, determine whether the determined location is an area where the user frequently moves, and further determine whether the requester is the user himself or herself.
In the embodiment of the present application, the verification methods with low disturbance degree may be used as selectable verification methods in the verification process, and the verification methods with low disturbance degree may be selected with a certain probability. When a certain verification mode with low disturbance degree is selected, the verification is carried out in the background, the user does not sense, the step value corresponding to the verification mode is accumulated in the value, and the subsequent judgment of whether the verification process is finished or not is influenced. It can be seen that when the authentication mode with low disturbance degree is selected for authentication, the number of the facing authentication modes is not increased for the user, but the authentication process can be advanced by one step.
In the embodiment of the application, before the verification mode is selected for the first time, verification can be completed in a background by using the verification modes with low disturbance degree, and an accumulated score is obtained and is used as an initial score. Subsequently, the step value corresponding to the selected verification mode can be further accumulated into the initial score to obtain the score corresponding to the verification process.
Based on the method for consensus verification shown in fig. 1, the embodiment of the present application further provides a verification apparatus, as shown in fig. 2, including:
a verification selecting module 201, which selects at least one verification mode from a plurality of verification modes for verification when a verification process is triggered, and obtains a verification result corresponding to the verification mode;
the determining module 202 is used for determining a score corresponding to the verification process according to the verification result;
the judging module 203 judges whether to end the verification process according to the score; if yes, outputting a final result of the verification process; otherwise, continuing to select a verification mode for verification.
The selective verification module 201 selects a verification mode corresponding to the event from a plurality of verification modes for verification according to the event triggering the verification process.
The selective verification module 201 selects at least one verification mode from a plurality of verification modes for verification according to the probability of selecting each verification mode.
The selective verification module 201 selects at least one verification mode from a plurality of verification modes for verification according to the probability of transferring the initial state to each verification mode if the verification mode is selected for the first time in the verification process; if the verification mode is not selected for the first time in the verification process, selecting at least one verification mode from the plurality of verification modes for verification according to the probability that the verification mode selected for the last time is transferred to each verification mode.
The device further comprises: the adjusting module 204 adjusts, for each verification mode appearing in the verification process, the probability of selecting the verification mode according to the verification result corresponding to the verification mode.
The adjusting module 204 increases the probability of selecting the verification mode if the verification result corresponding to the verification mode passes; and if the verification result corresponding to the verification mode is failed, reducing the probability of selecting the verification mode.
The verification selecting module 201 selects one verification mode from the plurality of verification modes to perform multiple times of verification, and obtains a verification result corresponding to each verification;
the determining module 202 determines a score corresponding to the verification process according to a verification result corresponding to each verification.
The determining module 202 determines a step value corresponding to the verification mode according to the verification result; when the verification mode is the verification mode selected for the first time in the verification process, the step value corresponding to the verification mode is accumulated into the initial value corresponding to the verification process to obtain the value corresponding to the verification process; when the verification mode is a verification mode which is not selected for the first time in the verification process, the step value corresponding to the verification mode is accumulated in the score determined by the verification mode selected for the last time, so that the score is determined again.
The determining module 202, if the verification result is that the first candidate value corresponding to the verification mode passes, determines the first candidate value corresponding to the verification mode as the step value corresponding to the verification mode; and if the verification result is that the second candidate value does not pass the verification result, determining the second candidate value corresponding to the verification mode as the stepping value corresponding to the verification mode.
The determining module 203, if the score is greater than a first threshold or smaller than a second threshold, ending the verification process; if the score is not greater than the first threshold and not less than the second threshold, not ending the verification process; the first threshold is greater than the second threshold; if the score is larger than a first threshold value, outputting a final result of successful verification; if the score is smaller than a second threshold value, outputting a final result of verification failure;
the first threshold and the second threshold are determined according to an event that triggers the verification procedure.
The device further comprises: and a forced termination module 205, configured to terminate the verification process and output a final result of verification failure if the number of times of selecting the verification manner is greater than a specified number of times or the time consumed by the verification process is greater than a specified duration.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain a corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually manufacturing an Integrated Circuit chip, such programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development, but the original code before compiling is also written in a specific programming Language, which is called Hardware Description Language (HDL), and the HDL is not only one kind but many kinds, such as abll (Advanced boot Expression Language), AHDL (alternate hard Description Language), traffic, CUPL (computer universal programming Language), HDCal (Java hard Description Language), lava, lola, HDL, PALASM, rhydl (Hardware Description Language), VHDL (Hardware Description Language), and vhul-Language, which is currently used most commonly. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, atmel at91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic of the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller in purely computer readable program code means, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be regarded as a hardware component and the means for performing the various functions included therein may also be regarded as structures within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of other like elements in a process, method, article, or apparatus comprising the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
All the embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, as for the system embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and reference may be made to the partial description of the method embodiment for relevant points.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement or the like made within the spirit and principle of the present application shall be included in the scope of the claims of the present application.

Claims (18)

1. A method of authentication, the method comprising:
selecting at least one verification mode from a plurality of verification modes for verification to obtain a verification result corresponding to the verification mode;
determining a score corresponding to the verification process according to the verification result;
judging whether the verification process is enough to judge whether the requester is the user according to the score;
if the verification process is not enough to judge whether the requester is the user himself or not, at least one verification mode is selected from a plurality of verification modes to carry out verification continuously.
2. The method according to claim 1, wherein the step of selecting at least one verification mode from a plurality of verification modes for verification specifically comprises:
and selecting a verification mode corresponding to the event from a plurality of verification modes for verification according to the event triggering the verification process.
3. The method according to claim 1, wherein the step of selecting at least one verification mode from a plurality of verification modes for verification specifically comprises:
setting the probability of transferring the initial state to each verification mode aiming at the initial state of the verification process in advance;
and selecting at least one verification mode from the plurality of verification modes for verification according to the probability of selecting each verification mode.
4. The method according to claim 3, wherein selecting at least one verification mode from the plurality of verification modes for verification according to the probability of selecting each verification mode specifically comprises:
if the verification mode is selected for the first time in the verification process, selecting at least one verification mode from a plurality of verification modes for verification according to the probability of transferring the initial state to each verification mode;
if the verification mode is not selected for the first time in the verification process, selecting at least one verification mode from the plurality of verification modes for verification according to the probability that the verification mode selected for the last time is transferred to each verification mode.
5. The method of claim 3, further comprising:
and aiming at each verification mode appearing in the verification flow, adjusting the probability of selecting the verification mode according to the verification result corresponding to the verification mode.
6. The method of claim 5, wherein adjusting the probability of selecting the verification mode according to the verification result corresponding to the verification mode specifically comprises:
if the verification result corresponding to the verification mode is passed, increasing the probability of selecting the verification mode;
and if the verification result corresponding to the verification mode is failed, reducing the probability of selecting the verification mode.
7. The method according to claim 1, wherein at least one verification mode is selected from a plurality of verification modes for verification to obtain a verification result corresponding to the verification mode, and the method specifically comprises the following steps:
selecting one verification mode from a plurality of verification modes to carry out verification for multiple times to obtain a verification result corresponding to each verification;
determining a score corresponding to the verification process according to the verification result, specifically comprising:
and determining the score corresponding to the verification process according to the verification result corresponding to each verification.
8. The method according to claim 1, wherein determining a score corresponding to the verification process according to the verification result specifically includes:
determining a stepping value corresponding to the verification mode according to the verification result;
when the verification mode is the verification mode selected for the first time in the verification process, the step value corresponding to the verification mode is accumulated into the initial value corresponding to the verification process to obtain the value corresponding to the verification process;
and when the verification mode is a verification mode which is not selected for the first time in the verification process, accumulating the step value corresponding to the verification mode into the score determined by the verification mode selected for the last time so as to re-determine the score.
9. The method according to claim 8, wherein determining the step value corresponding to the verification mode according to the verification result specifically includes:
if the verification result is passed, determining a first alternative value corresponding to the verification mode as a stepping value corresponding to the verification mode;
and if the verification result is that the second candidate value does not pass the verification result, determining the second candidate value corresponding to the verification mode as the stepping value corresponding to the verification mode.
10. The method according to claim 8, wherein determining the step value corresponding to the verification mode according to the verification result specifically includes:
according to each verification result corresponding to the verification mode, pre-storing alternative values corresponding to each verification result;
according to the verification result, taking the corresponding alternative value as a stepping value; and the size of the alternative value corresponding to the verification result is positively correlated with the matching degree of the verification result.
11. The method according to claim 1, wherein determining a score corresponding to the verification process according to the verification result specifically includes:
obtaining a verification result by selecting a verification mode once;
determining a corresponding score according to the verification result; the verification result or the score is not fed back to the requester.
12. The method of claim 1, wherein determining whether the verification process has proceeded sufficiently to determine whether the requestor is the user himself based on the score comprises:
if the score is larger than a first threshold or smaller than a second threshold, ending the verification process;
if the score is not greater than the first threshold and not less than the second threshold, not ending the verification process; the first threshold is greater than the second threshold;
outputting the result of the verification process, specifically comprising:
if the score is larger than a first threshold value, outputting a final result of successful verification;
and if the score is smaller than a second threshold value, outputting a final result of verification failure.
13. The method of claim 12, the first threshold and the second threshold are determined from an event that triggers the authentication procedure.
14. The method of claim 1, determining whether the authentication process has proceeded sufficiently to determine whether the requestor is the user himself based on the score, further comprising:
if the verification process is enough to judge whether the requester is the user, the verification process is finished, and the final result of the verification process is output.
15. The method according to claim 1, wherein said continuing to select at least one authentication means from a plurality of authentication means for authentication comprises:
setting the probability of transferring each verification mode to each verification mode aiming at each verification mode in advance;
and continuously selecting the verification modes according to the probability of transferring each verification mode to each verification mode.
16. The method of claim 1, further comprising:
if the times of selecting the verification mode is more than the specified times or the time consumed by the verification process is more than the specified duration, ending the verification process and outputting the final result of verification failure.
17. An authentication apparatus comprising:
selecting a verification module, selecting at least one verification mode from a plurality of verification modes for verification, and obtaining a verification result corresponding to the verification mode;
the determining module is used for determining a score corresponding to the verification process according to the verification result;
the judging module is used for judging whether the verification process is performed enough to judge whether the requester is the user according to the score; and if the verification process is not enough to judge whether the requester is the user himself or not, continuing to select at least one verification mode from the plurality of verification modes for verification.
18. The apparatus according to claim 17, wherein the judging module sets, in advance, for each of the verification modes, a probability of transferring each of the verification modes to each of the verification modes; and continuously selecting the verification modes according to the probability of transferring each verification mode to each verification mode.
CN202211424058.XA 2017-05-25 2017-05-25 Verification method and device Pending CN115758297A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211424058.XA CN115758297A (en) 2017-05-25 2017-05-25 Verification method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710379031.6A CN108959865B (en) 2017-05-25 2017-05-25 Verification method and device
CN202211424058.XA CN115758297A (en) 2017-05-25 2017-05-25 Verification method and device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201710379031.6A Division CN108959865B (en) 2017-05-25 2017-05-25 Verification method and device

Publications (1)

Publication Number Publication Date
CN115758297A true CN115758297A (en) 2023-03-07

Family

ID=64494493

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202211424058.XA Pending CN115758297A (en) 2017-05-25 2017-05-25 Verification method and device
CN201710379031.6A Active CN108959865B (en) 2017-05-25 2017-05-25 Verification method and device

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201710379031.6A Active CN108959865B (en) 2017-05-25 2017-05-25 Verification method and device

Country Status (1)

Country Link
CN (2) CN115758297A (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110489544A (en) * 2019-06-24 2019-11-22 厦门美域中央信息科技有限公司 A kind of corpus file classification method based on Markov chain
CN111209100B (en) * 2020-01-03 2020-12-22 光大兴陇信托有限责任公司 Service processing and data source determining method
CN111611572B (en) * 2020-06-28 2022-11-22 支付宝(杭州)信息技术有限公司 Real-name authentication method and device based on face authentication
CN112036890B (en) * 2020-09-01 2024-04-16 中国银行股份有限公司 Customer identity authentication method and device

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004077208A2 (en) * 2003-02-27 2004-09-10 Rand Afrikaans University Authentication system and method
WO2009075180A1 (en) * 2007-12-11 2009-06-18 Nec Corporation Authentication device, authentication system, authentication method and program
CN101697514B (en) * 2009-10-22 2016-08-24 中兴通讯股份有限公司 A kind of method and system of authentication
CN103246460A (en) * 2012-02-10 2013-08-14 中兴通讯股份有限公司 Unlocking method and device for touch screen
CN102684882B (en) * 2012-05-16 2016-08-03 中国科学院计算机网络信息中心 Verification method and checking equipment
CN103685169B (en) * 2012-09-06 2019-02-12 盛趣信息技术(上海)有限公司 Login method and system
US20150242605A1 (en) * 2014-02-23 2015-08-27 Qualcomm Incorporated Continuous authentication with a mobile device
CN103995997B (en) * 2014-05-15 2017-09-12 华为技术有限公司 The distribution method and equipment of a kind of user right
US9430628B2 (en) * 2014-08-13 2016-08-30 Qualcomm Incorporated Access authorization based on synthetic biometric data and non-biometric data
CN104598795A (en) * 2015-01-30 2015-05-06 科大讯飞股份有限公司 Authentication method and system
CN104598796B (en) * 2015-01-30 2017-08-25 科大讯飞股份有限公司 Personal identification method and system
CN106339610A (en) * 2015-07-09 2017-01-18 宇龙计算机通信科技(深圳)有限公司 Method and device for authenticating end user
CN105573614B (en) * 2015-07-28 2018-12-25 东莞酷派软件技术有限公司 A kind of unlocking screen method and user terminal
CN105224850A (en) * 2015-10-24 2016-01-06 北京进化者机器人科技有限公司 Combined right-discriminating method and intelligent interactive system

Also Published As

Publication number Publication date
CN108959865B (en) 2022-12-16
CN108959865A (en) 2018-12-07

Similar Documents

Publication Publication Date Title
TWI703465B (en) Core body method and device
US20210286870A1 (en) Step-Up Authentication
JP6894511B2 (en) Verification method and device based on verification code
US11122026B2 (en) Queue management and load shedding for complex authentication schemes
CN108959865B (en) Verification method and device
US11316702B2 (en) Verification-based service authorization
KR101552587B1 (en) Location-based access control for portable electronic device
US9667611B1 (en) Situationally aware authentication
US9485255B1 (en) Authentication using remote device locking
US20150040193A1 (en) Physical Interaction Style Based User Authentication for Mobile Computing Devices
US20160234024A1 (en) Leveraging Multiple Biometrics For Enabling User Access To Security Metadata
US9721087B1 (en) User authentication
KR102427853B1 (en) Method and apparatus for adaptively updating registration database for user authentication
CN112653679B (en) Dynamic identity authentication method, device, server and storage medium
EP3665860A1 (en) Multi-factor authentication
KR101837852B1 (en) Apparatus, method, and application for user authentication based on scroll
CN111741115B (en) Service processing method, device and system and electronic equipment
JP2014067352A (en) Apparatus, method, and program for biometric authentication
CN111784352A (en) Authentication risk identification method and device and electronic equipment
CN108876386B (en) Object authentication method and device, and transaction method and device based on object authentication
CN115270086A (en) Account authentication method, device and equipment
CN111209552A (en) Identity authentication method and device based on user behaviors
KR20210071562A (en) User authentication apparatus, and control method thereof
US9641538B1 (en) Authenticating an entity
CN112784233B (en) Identity verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination