CN116186672B - User collaborative identification method and system for multi-feature variables - Google Patents
User collaborative identification method and system for multi-feature variables Download PDFInfo
- Publication number
- CN116186672B CN116186672B CN202310422744.1A CN202310422744A CN116186672B CN 116186672 B CN116186672 B CN 116186672B CN 202310422744 A CN202310422744 A CN 202310422744A CN 116186672 B CN116186672 B CN 116186672B
- Authority
- CN
- China
- Prior art keywords
- authentication
- user
- collaborative
- result
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000004458 analytical method Methods 0.000 claims abstract description 54
- 238000012790 confirmation Methods 0.000 claims description 20
- 238000000605 extraction Methods 0.000 claims description 10
- 230000004044 response Effects 0.000 claims description 9
- 238000011156 evaluation Methods 0.000 claims description 7
- 238000013507 mapping Methods 0.000 claims description 5
- 238000004806 packaging method and process Methods 0.000 claims description 5
- 238000013480 data collection Methods 0.000 claims description 4
- 230000000694 effects Effects 0.000 abstract description 6
- 238000012545 processing Methods 0.000 abstract description 5
- 238000007726 management method Methods 0.000 description 15
- 230000008569 process Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 230000003068 static effect Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013075 data extraction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a user collaborative identification method and a system for multiple characteristic variables, which relate to the technical field of data processing, and the method comprises the following steps: information acquisition of a user is carried out through a data exchange device; user identity authentication and user demand analysis are carried out based on the information exchange result; the identity and authority matching judgment is carried out through the user identity initial authentication result and the user demand analysis result; after the matching judgment is passed, matching the collaborative recognition scheme; data acquisition is carried out on a user through a first device, and a first collaborative identification feature is generated; the first cooperative device is used for carrying out data acquisition of cooperative users to generate a second cooperative identification feature; and performing collaborative feature authentication of the user, and performing authentication management of the user based on a collaborative feature authentication result. The invention solves the technical problems of single user identification and incapability of guaranteeing authentication safety in the prior art, and achieves the technical effects of improving identification accuracy and identification safety.
Description
Technical Field
The invention relates to the technical field of data processing, in particular to a user collaborative identification method and system for multi-feature variables.
Background
Along with the economic development entering a new normal state, the scientific technology is continuously promoted to be new, and new equipment of the new technology is continuously applied to production and life, so that the aims of improving the working efficiency and reducing the labor cost are fulfilled. With the advent of the big data age, informatization and internet+strategy are the big direction of enterprise transformation, and the user authentication security problem in the internet is becoming the focus of attention.
At present, the identity condition of a user is authenticated by a static password authentication mode using single factor authentication, but the authentication security of the static password mainly depends on the password, and the identity of the user is easy to be stolen under the condition that the password is leaked. However, the two-factor authentication is mainly performed by means of a dynamic password card, a static password and the like, and the problems that a single user authentication mode is single, and loopholes are easy to occur in user authentication and identification still exist. The prior art has the technical problems that the user identification is single and the authentication safety cannot be ensured.
Disclosure of Invention
The application provides a user collaborative identification method and system for multiple characteristic variables, which are used for solving the technical problems that user identification is single and authentication safety cannot be ensured in the prior art.
In view of the above problems, the present application provides a method and a system for collaborative recognition of multiple feature variables.
In a first aspect of the present application, a method for user collaborative identification of multiple feature variables is provided, where the method is applied to a user collaborative identification system, where the user collaborative identification system is communicatively connected to a first device, a first collaboration device, and a data exchange device, and the method includes:
the data exchange device is used for collecting information of a user to obtain an information exchange result;
user identity authentication and user demand analysis are carried out based on the information exchange result, and a user identity initial authentication result and a user demand analysis result are obtained;
the identity and the authority are matched and judged according to the initial authentication result of the user identity and the analysis result of the user requirement;
when the matching judgment is passed, matching a collaborative recognition scheme according to the user demand analysis result and the user identity initial authentication result;
based on the collaborative recognition scheme, carrying out data acquisition on the user through the first device to generate a first collaborative recognition feature;
based on the collaborative recognition scheme, data acquisition of collaborative users is carried out through the first collaborative device, and a second collaborative recognition feature is generated;
and carrying out cooperative characteristic authentication of the user through the first cooperative identification characteristic and the second cooperative identification characteristic, and carrying out authentication management of the user based on a cooperative characteristic authentication result.
In a second aspect of the present application, there is provided a user collaborative identification system for multiple feature variables, the system comprising:
the exchange result obtaining module is used for collecting information of a user through the data exchange device and obtaining an information exchange result;
the demand analysis module is used for carrying out user identity authentication and user demand analysis based on the information exchange result to obtain a user identity initial authentication result and a user demand analysis result;
the matching judgment module is used for carrying out matching judgment on the identity and the authority through the user identity initial authentication result and the user demand analysis result;
the identification scheme matching module is used for matching a collaborative identification scheme according to the user demand analysis result and the user identity initial authentication result after the matching judgment is passed;
the identification feature generation module is used for carrying out data acquisition on the user through a first device based on the collaborative identification scheme to generate a first collaborative identification feature;
the second identification feature generation module is used for carrying out data acquisition of collaborative users through the first collaborative device based on the collaborative identification scheme to generate second collaborative identification features;
and the authentication management module is used for carrying out collaborative feature authentication of the user through the first collaborative identification feature and the second collaborative identification feature, and carrying out authentication management of the user based on a collaborative feature authentication result.
One or more technical solutions provided in the present application have at least the following technical effects or advantages:
according to the method, information acquisition of a user is conducted through a data exchange device, an information exchange result is obtained, user identity authentication and user demand analysis are conducted based on the information exchange result, an initial user identity authentication result and a user demand analysis result are obtained, then identity and authority matching judgment is conducted through the initial user identity authentication result and the user demand analysis result, then after the matching judgment is passed, a collaborative recognition scheme is matched according to the initial user identity authentication result and the user identity authentication result, data acquisition is conducted on the user through a first device based on the collaborative recognition scheme, first collaborative recognition features are generated, data acquisition of the collaborative user is conducted through the first collaborative device based on the collaborative recognition scheme, second collaborative recognition features are generated, collaborative feature authentication of the user is conducted through the first collaborative recognition features and the second collaborative recognition features, and authentication management of the user is conducted based on the collaborative feature authentication result. The technical effects of improving the cooperative complexity of authentication management and ensuring the safety and accuracy of authentication management are achieved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a user collaborative identification method for multiple feature variables according to an embodiment of the present application;
fig. 2 is a schematic flow chart of completing data collection of a collaborative user in a multi-feature variable user collaborative recognition method provided in an embodiment of the present application;
fig. 3 is a schematic flow chart of performing collaborative feature authentication of a user in a multi-feature variable user collaborative recognition method provided in an embodiment of the present application;
fig. 4 is a schematic structural diagram of a user collaborative recognition system with multiple feature variables according to an embodiment of the present application.
Reference numerals illustrate: the system comprises an exchange result obtaining module 11, a demand analyzing module 12, a matching judging module 13, an identification scheme matching module 14, an identification characteristic generating module 15, a second identification characteristic generating module 16 and an authentication management module 17.
Detailed Description
The application provides a user collaborative identification method and a system for multiple characteristic variables, which are used for solving the technical problems that in the prior art, user identification is single and authentication safety cannot be ensured.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It will be apparent that the described embodiments are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present application based on the embodiments herein.
It should be noted that the terms "comprises" and "comprising," along with any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus, but may include other steps or modules not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
As shown in fig. 1, the present application provides a method for user collaborative identification of multiple feature variables, where the method is applied to a user collaborative identification system, where the user collaborative identification system is communicatively connected to a first device, a first collaboration device, and a data exchange device, and the method includes:
step S100: the data exchange device is used for collecting information of a user to obtain an information exchange result;
specifically, the user collaborative recognition system is an entity for storing, processing and operating data in collaborative recognition in a user authentication management process, and is in communication connection with a first device, a first collaborative device and a data interaction device through a connection port, so that the data obtained in each device are uploaded to the system for analysis and processing. The first device is a device for authenticating the identity of the user and comprises a GPS positioning device, iris recognition equipment, fingerprint scanning equipment and the like. The first cooperative device is a device for authenticating the identity of the cooperative user and comprises a GPS (global positioning system) locator, a voiceprint recognition device and the like. The user is any user who needs to perform a task and thus needs to be authenticated. The data exchange device is a device for carrying out interactive transmission on user information and comprises a video scanning device, an IC card reading device and the like.
Specifically, the data exchange device is used for acquiring information of the user, so that basic information of the user can be acquired, and the information exchange result is obtained. The information exchange result is information obtained after collecting information which can reflect the difference between the user and other users, and the information comprises user identity information, user requirements, user levels, user identification time and the like. And providing basic analysis data for the subsequent identification of the user by obtaining the information exchange result and carrying out authentication analysis on the user.
Step S200: user identity authentication and user demand analysis are carried out based on the information exchange result, and a user identity initial authentication result and a user demand analysis result are obtained;
specifically, data extraction is performed from the information exchange result by taking the user identity and the user requirement as indexes, so that user identity information and user requirement information are obtained. And judging whether the user identity information is in the user database or not by carrying out initial matching according to the user identity information in the information exchange result and the identity information in the user database. The user database is a database established by staff according to the related information of the accessible user, and is set by the staff according to the requirements without limitation. And obtaining the user identity initial authentication result according to the matching result, wherein the user identity initial authentication result is obtained after initial identity confirmation, namely single identity recognition, is carried out on the user, and reflects the identity condition of the user.
Specifically, the user requirement analysis is to analyze the information of the user requirement information, index the requirement as a keyword, and obtain the requirement of the authenticated user, that is, the task the user wants to do. And acquiring a user demand analysis result by carrying out user demand analysis, collecting tasks to be carried out by the user, and providing an analysis object for further analyzing whether the user has task permission or not.
Step S300: the identity and the authority are matched and judged according to the initial authentication result of the user identity and the analysis result of the user requirement;
specifically, determining the authority of a user according to an initial authentication result of the user identity, further determining a task to be performed by the user according to an analysis result of user requirements, then matching the authority required by the task with the authority obtained in the initial authentication result of the user identity, performing identity and authority matching judgment according to the matching result, and if the authority required by the task is within the authority range obtained in the initial authentication result of the user identity, performing matching judgment; if the authority required by the task is not in the authority range obtained in the user identity initial authentication result, the matching judgment is not passed.
Step S400: when the matching judgment is passed, matching a collaborative recognition scheme according to the user demand analysis result and the user identity initial authentication result;
further, step S400 in the embodiment of the present application further includes:
step S410: constructing an authentication scheme set of identity authentication, wherein the authentication scheme set and a collaborative recognition scheme have a mapping relation;
step S420: and carrying out identity authentication control of the first device and the first cooperative device through a scheme matching result of the authentication scheme set.
Specifically, the authentication scheme set is a specific recognition scheme for authenticating the identity according to different identity authentication results, and preferably, the complexity of the authentication scheme is determined according to the level of the identity. The higher the level of identity, the higher the importance of the data information that may be involved, and thus the more complex it is to authenticate the identity. Illustratively, the user is a general employee, and the authentication scheme may be fingerprint recognition; the user is an advanced manager, and the authentication scheme can be to perform authentication by sending dynamic passwords in a time-staggered manner and combining iris recognition. The collaborative recognition scheme is an authentication scheme used when a third party performs collaborative recognition, and the corresponding accuracy between authentication schemes is ensured by enabling the authentication scheme set and the collaborative recognition scheme to have a mapping relation, so that the occurrence of the condition of disordered authentication is avoided.
Specifically, according to the authentication scheme corresponding to the user identity initial authentication result, the corresponding collaborative recognition scheme is obtained by combining the mapping relation between the authentication scheme set and the collaborative recognition scheme. The collaborative recognition scheme is a scheme for authenticating the identity of the collaborative user. And respectively controlling the first device and the first cooperative device according to the authentication scheme and the cooperative identification scheme to perform identity authentication control of the user and the cooperative user.
Step S500: based on the collaborative recognition scheme, carrying out data acquisition on the user through the first device to generate a first collaborative recognition feature;
specifically, the data collected by the first device to the user is determined according to the authentication mode in the collaborative recognition scheme, and the authentication mode in the collaborative recognition scheme is that fingerprint recognition and voice recognition are performed simultaneously, the data collection is performed on the user through fingerprint recognition equipment and voice collection equipment in the first device, and the first collaborative recognition feature is obtained according to the collected result. The first collaborative recognition feature is to perform feature extraction on data acquired by the user, so that features different from other users are acquired, and optionally, the first collaborative recognition feature comprises fingerprint line features and voiceprint features. And providing basic identification data for subsequent authentication by carrying out feature identification on the information of the user.
Step S600: based on the collaborative recognition scheme, data acquisition of collaborative users is carried out through the first collaborative device, and a second collaborative recognition feature is generated;
further, as shown in fig. 2, the data collection of the collaborative user through the first collaborative device, step S600 in the embodiment of the present application further includes:
step S610: acquiring identity authentication data of the cooperative user through the first cooperative device to obtain cooperative identity authentication data;
step S620: when the collaborative identity authentication data passes authentication, generating user task data according to the user demand analysis result and the user identity initial authentication result, and sending the user task data to the collaborative user for task confirmation;
step S630: and completing data acquisition of the collaborative user according to the collaborative identity authentication data and the task confirmation result.
Further, step S600 in the embodiment of the present application further includes:
step S640: when the collaborative identity authentication data passes the authentication, generating an associated authentication authority;
step S650: permitting the collaborative user to carry out track extraction authentication of the user through the associated authentication authority;
step S660: and extracting authentication data, the collaborative identity authentication data and the task confirmation result according to the track to complete data acquisition of the collaborative user.
Specifically, according to the method for identifying the cooperative users in the cooperative identification scheme, determining the type of the first cooperative device for data acquisition of the cooperative users, and when the identification method in the cooperative identification scheme is IC card identification and dynamic verification code identification, using dynamic verification equipment and IC card identification equipment for data acquisition to obtain corresponding data, and taking the obtained data as the cooperative identity authentication data.
Specifically, when the collaborative identity authentication data is authentication passing, namely, after the identity information of the collaborative user is verified, the identity of the collaborative user is confirmed. And obtaining user task data according to the user demand analysis result and the user identity initial authentication result, wherein the user task data is a task which is required to be processed through identification authentication by the user and comprises data information such as task type, task time, task content and the like. And sending the user task data to the cooperative user to confirm the task, so that the manual confirmation of the cooperative user on the task is obtained, namely, the manual confirmation is added in the authentication and identification aspect, and the accuracy of the task is ensured. And completing data acquisition of the collaborative user according to the collaborative identity authentication data and the task confirmation result, and extracting features according to the data acquisition result so as to obtain the second collaborative identification features. The second collaborative recognition feature not only reflects the identity feature of the collaborative user, but also includes the confirmation information feature of the collaborative user to the task. Therefore, the linkage position is determined through the second cooperative identification feature, and the accuracy and reliability of cooperative identification are improved according to the track of the user.
Preferably, the authentication scheme can be determined according to the requirement analysis result, and the higher the requirement level is, the more complex the corresponding authentication scheme is. And when the collaborative identity authentication data passes the authentication, obtaining the associated authentication authority. The associated authentication authority is an authority for opening associated authentication to a collaborative user, and the collaborative user can extract authentication on the track of the user according to the associated authentication authority, so that track extraction authentication data are obtained.
Specifically, the track extraction authentication data is data obtained after determining a movement track of the user, and the data includes the movement track, the movement time and the like. The identity of the cooperative user is determined to be correct according to the cooperative identity authentication data, whether the user can execute the task or not is further determined according to a task confirmation result, then the movement track of the user is confirmed by utilizing the track extraction authentication data, more characteristic data are obtained, and the user is determined to be executing the task indeed.
Step S700: and carrying out cooperative characteristic authentication of the user through the first cooperative identification characteristic and the second cooperative identification characteristic, and carrying out authentication management of the user based on a cooperative characteristic authentication result.
Further, as shown in fig. 3, step S700 in the embodiment of the present application further includes:
step S710: judging whether the collaborative recognition scheme comprises a mobile key for authenticating the user;
step S720: when the collaborative recognition scheme includes a mobile key for authenticating the user, transmitting authentication information to the mobile key through the first device;
step S730: receiving feedback information of the mobile key, wherein the feedback information comprises feedback authentication information and authentication position information;
step S740: when the position distance of the authentication position information meets a preset distance threshold value and the feedback authentication information is authentication passing, the mobile key passes authentication, and an auxiliary cooperative identification feature is generated based on an authentication passing result;
step S750: and carrying out collaborative feature authentication of the user through the first collaborative recognition feature, the second collaborative recognition feature and the auxiliary collaborative recognition feature.
Specifically, whether the cooperative identification scheme includes a mobile key for authenticating the user is determined, wherein the mobile key is a mobile password passing through authentication of the user. The mobile key may be, for example, a passcode, a pattern, a string, etc. And carrying out data search on the collaborative recognition scheme by taking the mobile key as an index, if the information related to the key is searched, determining that the collaborative recognition scheme comprises the mobile key for authenticating the user, and if the information related to the key is not searched, determining that the collaborative recognition scheme does not comprise the mobile key for authenticating the user.
Specifically, when the collaborative recognition scheme includes a mobile key for authenticating the user, authentication information is sent to the mobile key by the first device, where the authentication information is information that needs to be decrypted and is sent to the mobile key, so that the location of the mobile key and the security of the mobile key can be determined.
Specifically, the authentication information is decrypted by using the mobile key, so that feedback information is obtained. The feedback information refers to feedback data for authentication and identification of the user through the mobile key, and comprises feedback authentication information and authentication position information. The feedback authentication information is data obtained after decrypting the data to be decrypted in the authentication information. The authentication location information is information for determining a mobile key location of the user.
Specifically, the distance between the user in the authentication position information and the first device is compared with a preset distance threshold, and if the preset distance threshold is met according to the comparison result, the position near the first device is indicated to be the first user. When the preset distance threshold is met and the feedback authentication information is authentication passing, the mobile key authentication passes, and the mobile key authentication passing result is used as an auxiliary cooperative identification feature, wherein the auxiliary cooperative identification feature is a feature for performing side auxiliary authentication on the authentication process of the user.
Specifically, the user is authenticated by cooperative feature authentication according to the first cooperative identification feature, the second cooperative identification feature and the auxiliary cooperative identification feature, that is, the first cooperative identification feature, the second cooperative identification feature and the auxiliary cooperative identification feature are verified according to the features that the user should have in the cooperative identification scheme, and the cooperative feature authentication result of the user is obtained according to the verification result.
Further, before receiving the feedback information of the mobile key, step S720 in the embodiment of the present application further includes:
step S721: generating random authentication data by the first device, and displaying the data of the random authentication data based on a time authentication window;
step S722: after the mobile key receives the authentication information, matching an authentication sequence through an authentication analysis result;
step S723: transmitting the authentication number sequence to the mobile equipment of the user, and triggering equipment authentication of the mobile equipment;
step S724: image acquisition of the user and the random authentication data is performed through the mobile device;
step S725: and packaging the image acquisition result and the authentication analysis result to be used as the feedback information.
Specifically, before receiving feedback information of the mobile key, the feedback information needs to be acquired. And generating random authentication data by the first device, wherein the random authentication data is randomly generated data used for authenticating the user, and can be numbers, pictures, formulas, letters and the like. The time authentication window is a time period for performing random authentication, and data display of random authentication data is performed in the time period, so that the random authentication data is displayed to the user. Preferably, the time authentication window is a preset time period for performing random authentication, and may be set by a worker, for example, 45 seconds.
Specifically, after the mobile key receives the authentication information, the mobile key is used for analyzing the data information contained in the authentication information, and the authentication number sequence is correspondingly matched according to the authentication analysis result. That is, when the number is included in the authentication information, the corresponding authentication number column is also a number. The authentication sequence is a sequence obtained by decrypting the authentication information by the mobile key. And triggering the device authentication of the mobile device by sending the authentication number sequence to the mobile device of the user, namely inputting the authentication number sequence into the mobile device, so that the authentication of the user is fed back by the mobile device. The mobile equipment collects the images of the user and the random authentication data authentication, so that the user is ensured to be subjected to the random authentication, and the identification safety is further ensured. And packaging the image acquisition result and the authentication analysis result, and setting the packaging result as the feedback information.
Further, step S700 in the embodiment of the present application further includes:
step S760: setting a response time window of cooperative authentication;
step S770: performing feature authentication time limit evaluation on the first collaborative recognition feature and the second collaborative recognition feature through the response time window;
step S780: and carrying out cooperative feature authentication of the user according to the feature authentication time limit evaluation result.
Specifically, the response time window is an allowable period of time set by the staff for which the user who performs the cooperative authentication feeds back the cooperative authentication. By evaluating the authentication time of the first cooperative identification feature and the second cooperative identification feature according to the response time window, when the feature authentication time limit exceeds the response time window, the authentication is indicated to be overtime, and the reliability of the authentication result cannot be ensured even if the authentication is successful. Thus, the user is authenticated cooperatively by evaluating the result according to the characteristic authentication time limit. By judging the time and analyzing the reliability of authentication from the characteristic variable of the time, the technical effect of improving the authentication accuracy is achieved.
In summary, the embodiments of the present application have at least the following technical effects:
according to the authentication management method and the authentication management system, the data interaction device is used for collecting information of the user to be identified, meanwhile, the identity information of the user is subjected to preliminary authentication according to the collection result, the task of the identification is obtained, whether the user has the authority of the corresponding task or not is determined by matching the obtained information with the authenticated identity information, furthermore, the data of the collaborative user is collected by the first collaborative device, and the identification characteristics corresponding to the user and the identification characteristics corresponding to the collaborative user are used as the basis of collaborative identification, so that the authentication management of the user is carried out. The method and the device achieve the technical effects of improving the reliability of authentication management, and improving the safety of authentication identification by establishing a mode of monitoring and participating in authentication by a third party and acquiring feedback information.
Example two
Based on the same inventive concept as the user collaborative recognition method of a multi-feature variable in the foregoing embodiment, as shown in fig. 4, the present application provides a user collaborative recognition system of a multi-feature variable, and the system and method embodiments in the embodiments of the present application are based on the same inventive concept. Wherein the system comprises:
the exchange result obtaining module 11 is used for collecting information of a user through the data exchange device to obtain an information exchange result;
the requirement analysis module 12 is configured to perform user identity authentication and user requirement analysis based on the information exchange result, and obtain a user identity initial authentication result and a user requirement analysis result;
the matching judgment module 13 is used for carrying out matching judgment on the identity and the authority through the initial authentication result of the user identity and the analysis result of the user requirement;
the identification scheme matching module 14 is configured to match a collaborative identification scheme according to the user requirement analysis result and the user identity initial authentication result after the matching determination is passed;
the identification feature generation module 15 is configured to perform data acquisition on the user through a first device based on the collaborative identification scheme, and generate a first collaborative identification feature;
the second identification feature generation module 16 is configured to perform data acquisition of the collaborative user through the first collaborative device based on the collaborative identification scheme, and generate a second collaborative identification feature;
and the authentication management module 17 is used for carrying out cooperative feature authentication of the user through the first cooperative identification feature and the second cooperative identification feature, and carrying out authentication management of the user based on a cooperative feature authentication result.
Further, the system further comprises:
a mobile key judgment unit for judging whether the collaborative recognition scheme includes a mobile key for authenticating the user;
an authentication information transmitting unit configured to transmit authentication information to a mobile key by the first device when the cooperative identification scheme includes the mobile key for authenticating the user;
the feedback information receiving unit is used for receiving feedback information of the mobile key, wherein the feedback information comprises feedback authentication information and authentication position information;
the authentication passing unit is used for passing the mobile key authentication when the position distance of the authentication position information meets a preset distance threshold value and the feedback authentication information is authentication passing, and generating auxiliary cooperative identification characteristics based on an authentication passing result;
and the cooperative authentication unit is used for carrying out cooperative characteristic authentication on the user through the first cooperative identification characteristic, the second cooperative identification characteristic and the auxiliary cooperative identification characteristic.
Further, the system further comprises:
a data display unit for generating random authentication data by the first device and performing data display of the random authentication data based on a time authentication window;
the authentication sequence matching unit is used for matching an authentication sequence through an authentication analysis result after the mobile key receives the authentication information;
the device authentication unit is used for sending the authentication number sequence to the mobile device of the user and triggering the device authentication of the mobile device;
the image acquisition unit is used for acquiring images of the user and the random authentication data through the mobile equipment;
and the feedback information setting unit is used for packaging the image acquisition result and the authentication analysis result to be used as the feedback information.
Further, the system further comprises:
the authentication data acquisition unit is used for acquiring the identity authentication data of the cooperative user through the first cooperative device to acquire cooperative identity authentication data;
the task confirmation unit is used for generating user task data according to the user demand analysis result and the user identity initial authentication result when the collaborative identity authentication data passes authentication, and sending the user task data to the collaborative user for task confirmation;
and the user data acquisition unit is used for completing the data acquisition of the collaborative user according to the collaborative identity authentication data and the task confirmation result.
Further, the system further comprises:
the association authentication unit is used for generating association authentication authority after the collaborative identity authentication data passes authentication;
the extraction authentication unit is used for permitting the collaborative user to carry out track extraction authentication of the user through the associated authentication authority;
and the collaborative user data acquisition unit is used for extracting authentication data, collaborative identity authentication data and task confirmation results according to the track to complete data acquisition of the collaborative user.
Further, the system further comprises:
a time window setting unit for setting a response time window of the cooperative authentication;
an authentication time limit evaluation unit for performing feature authentication time limit evaluation on the first cooperative identification feature and the second cooperative identification feature through the response time window;
and the cooperative characteristic authentication unit is used for performing cooperative characteristic authentication of the user according to the characteristic authentication time limit evaluation result.
Further, the system further comprises:
the authentication scheme construction unit is used for constructing an authentication scheme set of identity authentication, wherein the authentication scheme set and the collaborative recognition scheme have a mapping relation;
and the identity authentication control unit is used for carrying out identity authentication control on the first device and the first cooperative device according to the scheme matching result of the authentication scheme set.
It should be noted that the sequence of the embodiments of the present application is merely for description, and does not represent the advantages and disadvantages of the embodiments. And the foregoing description has been directed to specific embodiments of this specification. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The foregoing description of the preferred embodiments of the present application is not intended to limit the invention to the particular embodiments of the present application, but to limit the scope of the invention to the particular embodiments of the present application.
The specification and drawings are merely exemplary of the application and are to be regarded as covering any and all modifications, variations, combinations, or equivalents that are within the scope of the application. It will be apparent to those skilled in the art that various modifications and variations can be made in the present application without departing from the scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the present application and the equivalents thereof, the present application is intended to cover such modifications and variations.
Claims (6)
1. A method for user collaborative recognition of multiple feature variables, the method being applied to a user collaborative recognition system, the user collaborative recognition system being communicatively connected to a first device, a first collaborative device, and a data exchange device, the method comprising:
the data exchange device is used for collecting information of a user to obtain an information exchange result;
user identity authentication and user demand analysis are carried out based on the information exchange result, and a user identity initial authentication result and a user demand analysis result are obtained;
the identity and the authority are matched and judged according to the initial authentication result of the user identity and the analysis result of the user requirement;
when the matching judgment is passed, matching a collaborative recognition scheme according to the user demand analysis result and the user identity initial authentication result;
based on the collaborative recognition scheme, carrying out data acquisition on the user through the first device to generate a first collaborative recognition feature;
based on the collaborative recognition scheme, data acquisition of collaborative users is carried out through the first collaborative device, and a second collaborative recognition feature is generated;
performing collaborative feature authentication of the user through the first collaborative feature and the second collaborative feature, and performing authentication management of the user based on a collaborative feature authentication result;
wherein, the data collection of the collaborative user is performed through the first collaborative device, and the method further comprises:
acquiring identity authentication data of the cooperative user through the first cooperative device to obtain cooperative identity authentication data;
when the collaborative identity authentication data passes authentication, generating user task data according to the user demand analysis result and the user identity initial authentication result, and sending the user task data to the collaborative user for task confirmation;
completing data acquisition of the collaborative user according to the collaborative identity authentication data and the task confirmation result;
the method further comprises the steps of:
when the collaborative identity authentication data passes the authentication, generating an associated authentication authority;
permitting the collaborative user to carry out track extraction authentication of the user through the associated authentication authority;
and extracting authentication data, the collaborative identity authentication data and the task confirmation result according to the track to complete data acquisition of the collaborative user.
2. The method of claim 1, wherein the method further comprises:
judging whether the collaborative recognition scheme comprises a mobile key for authenticating the user;
when the collaborative recognition scheme includes a mobile key for authenticating the user, transmitting authentication information to the mobile key through the first device;
receiving feedback information of the mobile key, wherein the feedback information comprises feedback authentication information and authentication position information;
when the position distance of the authentication position information meets a preset distance threshold value and the feedback authentication information is authentication passing, the mobile key passes authentication, and an auxiliary cooperative identification feature is generated based on an authentication passing result;
and carrying out collaborative feature authentication of the user through the first collaborative recognition feature, the second collaborative recognition feature and the auxiliary collaborative recognition feature.
3. The method of claim 2, wherein prior to receiving feedback information for the mobile key, further comprising:
generating random authentication data by the first device, and displaying the data of the random authentication data based on a time authentication window;
after the mobile key receives the authentication information, matching an authentication sequence through an authentication analysis result;
transmitting the authentication number sequence to the mobile equipment of the user, and triggering equipment authentication of the mobile equipment;
image acquisition of the user and the random authentication data is performed through the mobile device;
and packaging the image acquisition result and the authentication analysis result to be used as the feedback information.
4. The method of claim 1, wherein the method further comprises:
setting a response time window of cooperative authentication;
performing feature authentication time limit evaluation on the first collaborative recognition feature and the second collaborative recognition feature through the response time window;
and carrying out cooperative feature authentication of the user according to the feature authentication time limit evaluation result.
5. The method of claim 1, wherein the method further comprises:
constructing an authentication scheme set of identity authentication, wherein the authentication scheme set and a collaborative recognition scheme have a mapping relation;
and carrying out identity authentication control of the first device and the first cooperative device through a scheme matching result of the authentication scheme set.
6. A multi-feature variable user collaborative identification system, the system comprising:
the exchange result obtaining module is used for collecting information of a user through the data exchange device and obtaining an information exchange result;
the demand analysis module is used for carrying out user identity authentication and user demand analysis based on the information exchange result to obtain a user identity initial authentication result and a user demand analysis result;
the matching judgment module is used for carrying out matching judgment on the identity and the authority through the user identity initial authentication result and the user demand analysis result;
the identification scheme matching module is used for matching a collaborative identification scheme according to the user demand analysis result and the user identity initial authentication result after the matching judgment is passed;
the identification feature generation module is used for carrying out data acquisition on the user through a first device based on the collaborative identification scheme to generate a first collaborative identification feature;
the second identification feature generation module is used for carrying out data acquisition of collaborative users through the first collaborative device based on the collaborative identification scheme to generate second collaborative identification features;
the authentication management module is used for carrying out collaborative feature authentication of the user through the first collaborative identification feature and the second collaborative identification feature, and carrying out authentication management of the user based on a collaborative feature authentication result;
the authentication data acquisition unit is used for acquiring the identity authentication data of the cooperative user through the first cooperative device to acquire cooperative identity authentication data;
the task confirmation unit is used for generating user task data according to the user demand analysis result and the user identity initial authentication result when the collaborative identity authentication data passes authentication, and sending the user task data to the collaborative user for task confirmation;
the user data acquisition unit is used for completing the data acquisition of the collaborative user according to the collaborative identity authentication data and the task confirmation result;
the association authentication unit is used for generating association authentication authority after the collaborative identity authentication data passes authentication;
the extraction authentication unit is used for permitting the collaborative user to carry out track extraction authentication of the user through the associated authentication authority;
and the collaborative user data acquisition unit is used for extracting authentication data, collaborative identity authentication data and task confirmation results according to the track to complete data acquisition of the collaborative user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310422744.1A CN116186672B (en) | 2023-04-20 | 2023-04-20 | User collaborative identification method and system for multi-feature variables |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310422744.1A CN116186672B (en) | 2023-04-20 | 2023-04-20 | User collaborative identification method and system for multi-feature variables |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116186672A CN116186672A (en) | 2023-05-30 |
CN116186672B true CN116186672B (en) | 2023-07-28 |
Family
ID=86449115
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310422744.1A Active CN116186672B (en) | 2023-04-20 | 2023-04-20 | User collaborative identification method and system for multi-feature variables |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116186672B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117313063B (en) * | 2023-11-30 | 2024-03-22 | 浙江尚链信息科技有限责任公司 | Data response monitoring management method and system based on multiparty security calculation |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108390884A (en) * | 2018-03-01 | 2018-08-10 | 北京得意音通技术有限责任公司 | A kind of identity identifying method and device |
CN109698833A (en) * | 2018-12-28 | 2019-04-30 | 王梅 | A kind of method and system for the collaboration certification carrying out identification information in internet |
CN114491432A (en) * | 2021-11-29 | 2022-05-13 | 国网浙江省电力有限公司嵊州市供电公司 | User authentication method for digital energy service system |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9589127B2 (en) * | 2013-03-08 | 2017-03-07 | Open Text Sa Ulc | System and method for collaborative authentication |
CN105592074A (en) * | 2015-11-26 | 2016-05-18 | 中国银联股份有限公司 | Method and system of mobile device cooperation authentication on the basis of geographic position |
CN105631272B (en) * | 2016-02-02 | 2018-05-11 | 云南大学 | A kind of identity identifying method of multiple security |
US20180019986A1 (en) * | 2016-07-12 | 2018-01-18 | Qualcomm Incorporated | User privacy protected location-based authentication on mobile devices |
CN109101801B (en) * | 2018-07-12 | 2021-04-27 | 北京百度网讯科技有限公司 | Method, apparatus, device and computer readable storage medium for identity authentication |
CN113076859A (en) * | 2021-03-31 | 2021-07-06 | 深圳供电局有限公司 | Safety monitoring method and system for face recognition, electronic equipment and storage medium |
-
2023
- 2023-04-20 CN CN202310422744.1A patent/CN116186672B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108390884A (en) * | 2018-03-01 | 2018-08-10 | 北京得意音通技术有限责任公司 | A kind of identity identifying method and device |
CN109698833A (en) * | 2018-12-28 | 2019-04-30 | 王梅 | A kind of method and system for the collaboration certification carrying out identification information in internet |
CN114491432A (en) * | 2021-11-29 | 2022-05-13 | 国网浙江省电力有限公司嵊州市供电公司 | User authentication method for digital energy service system |
Also Published As
Publication number | Publication date |
---|---|
CN116186672A (en) | 2023-05-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6810480B1 (en) | Verification of identity and continued presence of computer users | |
CN112005231A (en) | Biometric authentication method, system and computer program | |
US20150319170A1 (en) | Computer implemented frameworks and methodologies for enabling identification verification in an online environment | |
WO2021021373A1 (en) | Self-sovereign identity systems and methods for identification documents | |
US20120032782A1 (en) | System for restricted biometric access for a secure global online and electronic environment | |
US20100174914A1 (en) | System and method for traceless biometric identification with user selection | |
US20080201579A1 (en) | Biometric based repeat visitor recognition system and method | |
US20090007257A1 (en) | System, method, server, client terminal, program for biometric authentication | |
CN106453341A (en) | Information processing method and device | |
US20190268158A1 (en) | Systems and methods for providing mobile identification of individuals | |
CN116186672B (en) | User collaborative identification method and system for multi-feature variables | |
CN111654468A (en) | Secret-free login method, device, equipment and storage medium | |
JP6707702B1 (en) | User authentication device and program | |
US10482225B1 (en) | Method of authorization dialog organizing | |
US20130047268A1 (en) | Methods for Using Biometric Authentication Methods for Securing Files and for Providing Secure Access to Such Files by Originators and/or Authorized Others | |
US11521209B2 (en) | Systems and methods for automated identity verification | |
US20200334430A1 (en) | Self-sovereign identity systems and methods for identification documents | |
WO2007013181A1 (en) | Biometrics authentication server, business provider terminal, program, and biometrics authentication service providing method | |
KR101334744B1 (en) | Loaning method using kiosk system | |
CN112329004A (en) | Method and device for face recognition and face password | |
CN109167749A (en) | A kind of identity identifying method and device | |
JP5422326B2 (en) | Biometric authentication device | |
KR20030052194A (en) | A system for user verification using biometric information, a method for registering certificates in the system and a user verification method | |
JP2005293172A (en) | Identification system | |
JP5279007B2 (en) | Verification system, verification method, program, and recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |